mirror of
https://github.com/NousResearch/hermes-agent.git
synced 2026-04-26 01:01:40 +00:00
Audit and update documentation across 12 files to match changes from
~50 recently merged PRs. Key updates:
Slash commands (slash-commands.md):
- Add 5 missing commands: /snapshot, /fast, /image, /debug, /restart
- Fix /status incorrectly labeled as messaging-only (available in both)
- Add --global flag to /model docs
- Add [focus topic] arg to /compress docs
CLI commands (cli-commands.md):
- Add hermes debug share section with options and examples
- Add hermes backup section with --quick and --label flags
- Add hermes import section
Feature docs:
- TTS: document global tts.speed and per-provider speed for Edge/OpenAI
- Web dashboard: add docs for 5 missing pages (Sessions, Logs,
Analytics, Cron, Skills) and 15+ API endpoints
- WhatsApp: add streaming, 4K chunking, and markdown formatting docs
- Skills: add GitHub rate-limit/GITHUB_TOKEN troubleshooting tip
- Budget: document CLI notification on iteration budget exhaustion
Config migration (compression.summary_* → auxiliary.compression.*):
- Update configuration.md, environment-variables.md,
fallback-providers.md, cli.md, and context-compression-and-caching.md
- Replace legacy compression.summary_model/provider/base_url references
with auxiliary.compression.model/provider/base_url
- Add legacy migration info boxes explaining auto-migration
Minor fixes:
- wecom-callback.md: clarify 'text only' limitation (input only)
- Escape {session_id}/{job_id} in web-dashboard.md headings for MDX
147 lines
5.2 KiB
Markdown
147 lines
5.2 KiB
Markdown
---
|
||
sidebar_position: 15
|
||
---
|
||
|
||
# WeCom Callback (Self-Built App)
|
||
|
||
Connect Hermes to WeCom (Enterprise WeChat) as a self-built enterprise application using the callback/webhook model.
|
||
|
||
:::info WeCom Bot vs WeCom Callback
|
||
Hermes supports two WeCom integration modes:
|
||
- **[WeCom Bot](wecom.md)** — bot-style, connects via WebSocket. Simpler setup, works in group chats.
|
||
- **WeCom Callback** (this page) — self-built app, receives encrypted XML callbacks. Shows as a first-class app in users' WeCom sidebar. Supports multi-corp routing.
|
||
:::
|
||
|
||
## How It Works
|
||
|
||
1. You register a self-built application in the WeCom Admin Console
|
||
2. WeCom pushes encrypted XML to your HTTP callback endpoint
|
||
3. Hermes decrypts the message, queues it for the agent
|
||
4. Immediately acknowledges (silent — nothing displayed to the user)
|
||
5. The agent processes the request (typically 3–30 minutes)
|
||
6. The reply is delivered proactively via the WeCom `message/send` API
|
||
|
||
## Prerequisites
|
||
|
||
- A WeCom enterprise account with admin access
|
||
- `aiohttp` and `httpx` Python packages (included in the default install)
|
||
- A publicly reachable server for the callback URL (or a tunnel like ngrok)
|
||
|
||
## Setup
|
||
|
||
### 1. Create a Self-Built App in WeCom
|
||
|
||
1. Go to [WeCom Admin Console](https://work.weixin.qq.com/) → **Applications** → **Create App**
|
||
2. Note your **Corp ID** (shown at the top of the admin console)
|
||
3. In the app settings, create a **Corp Secret**
|
||
4. Note the **Agent ID** from the app's overview page
|
||
5. Under **Receive Messages**, configure the callback URL:
|
||
- URL: `http://YOUR_PUBLIC_IP:8645/wecom/callback`
|
||
- Token: Generate a random token (WeCom provides one)
|
||
- EncodingAESKey: Generate a key (WeCom provides one)
|
||
|
||
### 2. Configure Environment Variables
|
||
|
||
Add to your `.env` file:
|
||
|
||
```bash
|
||
WECOM_CALLBACK_CORP_ID=your-corp-id
|
||
WECOM_CALLBACK_CORP_SECRET=your-corp-secret
|
||
WECOM_CALLBACK_AGENT_ID=1000002
|
||
WECOM_CALLBACK_TOKEN=your-callback-token
|
||
WECOM_CALLBACK_ENCODING_AES_KEY=your-43-char-aes-key
|
||
|
||
# Optional
|
||
WECOM_CALLBACK_HOST=0.0.0.0
|
||
WECOM_CALLBACK_PORT=8645
|
||
WECOM_CALLBACK_ALLOWED_USERS=user1,user2
|
||
```
|
||
|
||
### 3. Start the Gateway
|
||
|
||
```bash
|
||
hermes gateway start
|
||
```
|
||
|
||
The callback adapter starts an HTTP server on the configured port. WeCom will verify the callback URL via a GET request, then begin sending messages via POST.
|
||
|
||
## Configuration Reference
|
||
|
||
Set these in `config.yaml` under `platforms.wecom_callback.extra`, or use environment variables:
|
||
|
||
| Setting | Default | Description |
|
||
|---------|---------|-------------|
|
||
| `corp_id` | — | WeCom enterprise Corp ID (required) |
|
||
| `corp_secret` | — | Corp secret for the self-built app (required) |
|
||
| `agent_id` | — | Agent ID of the self-built app (required) |
|
||
| `token` | — | Callback verification token (required) |
|
||
| `encoding_aes_key` | — | 43-character AES key for callback encryption (required) |
|
||
| `host` | `0.0.0.0` | Bind address for the HTTP callback server |
|
||
| `port` | `8645` | Port for the HTTP callback server |
|
||
| `path` | `/wecom/callback` | URL path for the callback endpoint |
|
||
|
||
## Multi-App Routing
|
||
|
||
For enterprises running multiple self-built apps (e.g., across different departments or subsidiaries), configure the `apps` list in `config.yaml`:
|
||
|
||
```yaml
|
||
platforms:
|
||
wecom_callback:
|
||
enabled: true
|
||
extra:
|
||
host: "0.0.0.0"
|
||
port: 8645
|
||
apps:
|
||
- name: "dept-a"
|
||
corp_id: "ww_corp_a"
|
||
corp_secret: "secret-a"
|
||
agent_id: "1000002"
|
||
token: "token-a"
|
||
encoding_aes_key: "key-a-43-chars..."
|
||
- name: "dept-b"
|
||
corp_id: "ww_corp_b"
|
||
corp_secret: "secret-b"
|
||
agent_id: "1000003"
|
||
token: "token-b"
|
||
encoding_aes_key: "key-b-43-chars..."
|
||
```
|
||
|
||
Users are scoped by `corp_id:user_id` to prevent cross-corp collisions. When a user sends a message, the adapter records which app (corp) they belong to and routes replies through the correct app's access token.
|
||
|
||
## Access Control
|
||
|
||
Restrict which users can interact with the app:
|
||
|
||
```bash
|
||
# Allowlist specific users
|
||
WECOM_CALLBACK_ALLOWED_USERS=zhangsan,lisi,wangwu
|
||
|
||
# Or allow all users
|
||
WECOM_CALLBACK_ALLOW_ALL_USERS=true
|
||
```
|
||
|
||
## Endpoints
|
||
|
||
The adapter exposes:
|
||
|
||
| Method | Path | Purpose |
|
||
|--------|------|---------|
|
||
| GET | `/wecom/callback` | URL verification handshake (WeCom sends this during setup) |
|
||
| POST | `/wecom/callback` | Encrypted message callback (WeCom sends user messages here) |
|
||
| GET | `/health` | Health check — returns `{"status": "ok"}` |
|
||
|
||
## Encryption
|
||
|
||
All callback payloads are encrypted with AES-CBC using the EncodingAESKey. The adapter handles:
|
||
|
||
- **Inbound**: Decrypt XML payload, verify SHA1 signature
|
||
- **Outbound**: Replies sent via proactive API (not encrypted callback response)
|
||
|
||
The crypto implementation is compatible with Tencent's official WXBizMsgCrypt SDK.
|
||
|
||
## Limitations
|
||
|
||
- **No streaming** — replies arrive as complete messages after the agent finishes
|
||
- **No typing indicators** — the callback model doesn't support typing status
|
||
- **Text only** — currently supports text messages for input; image/file/voice input not yet implemented. The agent is aware of outbound media capabilities via the WeCom platform hint (images, documents, video, voice).
|
||
- **Response latency** — agent sessions take 3–30 minutes; users see the reply when processing completes
|