=== NEW SERVERS ADDED (7) === - servers/closebot — 119 tools, 14 modules, 4,656 lines TS (Stage 7) - servers/google-console — Google Search Console MCP (Stage 7) - servers/meta-ads — Meta/Facebook Ads MCP (Stage 8) - servers/twilio — Twilio communications MCP (Stage 8) - servers/competitor-research — Competitive intel MCP (Stage 6) - servers/n8n-apps — n8n workflow MCP apps (Stage 6) - servers/reonomy — Commercial real estate MCP (Stage 1) === FACTORY INFRASTRUCTURE ADDED === - infra/factory-tools — mcp-jest, mcp-validator, mcp-add, MCP Inspector - 60 test configs, 702 auto-generated test cases - All 30 servers score 100/100 protocol compliance - infra/command-center — Pipeline state, operator playbook, dashboard config - infra/factory-reviews — Automated eval reports === DOCS ADDED === - docs/MCP-FACTORY.md — Factory overview - docs/reports/ — 5 pipeline evaluation reports - docs/research/ — Browser MCP research === RULES ESTABLISHED === - CONTRIBUTING.md — All MCP work MUST go in this repo - README.md — Full inventory of 37 servers + infra docs - .gitignore — Updated for Python venvs TOTAL: 37 MCP servers + full factory pipeline in one repo. This is now the single source of truth for all MCP work.
43 lines
1.4 KiB
TypeScript
43 lines
1.4 KiB
TypeScript
/**
|
|
* Twilio credential management.
|
|
* Supports: ACCOUNT_SID/API_KEY:API_SECRET format from CLI arg or env vars.
|
|
*/
|
|
|
|
export interface TwilioCredentials {
|
|
accountSid: string;
|
|
apiKey: string;
|
|
apiSecret: string;
|
|
}
|
|
|
|
export function parseCredentials(arg?: string): TwilioCredentials {
|
|
// Try CLI argument first: ACCOUNT_SID/API_KEY:API_SECRET
|
|
if (arg) {
|
|
const match = arg.match(/^(AC[a-f0-9]{32})\/(SK[a-f0-9]{32}):(.+)$/);
|
|
if (match) {
|
|
return { accountSid: match[1], apiKey: match[2], apiSecret: match[3] };
|
|
}
|
|
// Also support ACCOUNT_SID:AUTH_TOKEN format
|
|
const simpleMatch = arg.match(/^(AC[a-f0-9]{32}):(.+)$/);
|
|
if (simpleMatch) {
|
|
return { accountSid: simpleMatch[1], apiKey: simpleMatch[1], apiSecret: simpleMatch[2] };
|
|
}
|
|
throw new Error(
|
|
'Invalid credential format. Expected: ACCOUNT_SID/API_KEY:API_SECRET or ACCOUNT_SID:AUTH_TOKEN'
|
|
);
|
|
}
|
|
|
|
// Fall back to environment variables
|
|
const accountSid = process.env.TWILIO_ACCOUNT_SID;
|
|
const apiKey = process.env.TWILIO_API_KEY || process.env.TWILIO_ACCOUNT_SID;
|
|
const apiSecret = process.env.TWILIO_API_SECRET || process.env.TWILIO_AUTH_TOKEN;
|
|
|
|
if (!accountSid || !apiSecret) {
|
|
throw new Error(
|
|
'Missing Twilio credentials. Provide as CLI arg (ACCOUNT_SID/API_KEY:API_SECRET) ' +
|
|
'or set TWILIO_ACCOUNT_SID + TWILIO_API_KEY/TWILIO_API_SECRET env vars.'
|
|
);
|
|
}
|
|
|
|
return { accountSid, apiKey: apiKey!, apiSecret };
|
|
}
|