Files
moltbot/test/scripts/dependency-vulnerability-gate.test.ts
Josh Avant bd4db5ee62 Add dependency release safety evidence and PR awareness (#81325)
* test: cover dependency pin guard

* build: add dependency vulnerability gate

* build: add dependency risk report

* build: add dependency drift reports

* build: include dependency ownership surface evidence

* build: rename dependency report commands

* build: respect release age exclusions in risk report

* build: clarify transitive risk accounting

* build: remove transitive risk exception registry

* build: clarify transitive risk signal wording

* ci: attach dependency evidence to release preflight

* ci: extract dependency release evidence generator

* build: rename ownership surface dependency report

* ci: clarify release evidence naming

* build: clarify recently published risk report

* build: reorder transitive risk report sections

* build: fix ownership surface pluralization

* ci: surface dependency changes on PRs

* ci: harden dependency change awareness

* ci: use dependency changed PR label

* build: fix dependency report lint

* docs: add dependency safety changelog
2026-05-13 03:05:09 -05:00

172 lines
5.0 KiB
TypeScript

import { mkdtemp, writeFile } from "node:fs/promises";
import { tmpdir } from "node:os";
import path from "node:path";
import { describe, expect, it } from "vitest";
import {
classifyVulnerabilityFindings,
renderDependencyVulnerabilityGateMarkdownReport,
runDependencyVulnerabilityGate,
} from "../../scripts/dependency-vulnerability-gate.mjs";
function advisory({
id,
severity,
title,
vulnerableVersions = "<=1.0.0",
}: {
id: string;
severity: string;
title: string;
vulnerableVersions?: string;
}) {
return {
id,
severity,
title,
vulnerable_versions: vulnerableVersions,
url: `https://github.com/advisories/${id}`,
};
}
async function writeLockfile(rootDir: string) {
await writeFile(
path.join(rootDir, "pnpm-lock.yaml"),
`lockfileVersion: '9.0'
importers:
.:
dependencies:
runtime-high:
version: 1.0.0
devDependencies:
dev-high:
version: 1.0.0
snapshots:
runtime-high@1.0.0: {}
dev-high@1.0.0: {}
transitive-critical@1.0.0: {}
`,
"utf8",
);
}
describe("dependency-vulnerability-gate", () => {
it("blocks critical advisories anywhere and high advisories in the production graph", () => {
const result = classifyVulnerabilityFindings({
allAdvisories: {
"dev-high": [advisory({ id: "GHSA-dev-high", severity: "high", title: "dev high" })],
"transitive-critical": [
advisory({ id: "GHSA-critical", severity: "critical", title: "critical issue" }),
],
},
productionAdvisories: {
"runtime-high": [
advisory({ id: "GHSA-runtime-high", severity: "high", title: "runtime high" }),
],
},
});
expect(result.blockers.map((finding) => finding.id)).toEqual([
"GHSA-critical",
"GHSA-runtime-high",
]);
expect(result.findings.map((finding) => finding.id)).toEqual([
"GHSA-critical",
"GHSA-dev-high",
"GHSA-runtime-high",
]);
});
it("blocks malware advisories regardless of severity or graph", () => {
const result = classifyVulnerabilityFindings({
allAdvisories: {
dev: [advisory({ id: "GHSA-malware", severity: "low", title: "Malware in dev" })],
},
productionAdvisories: {},
});
expect(result.blockers).toMatchObject([
{
id: "GHSA-malware",
malware: true,
severity: "low",
},
]);
});
it("queries full and production lockfile graphs separately", async () => {
const rootDir = await mkdtemp(path.join(tmpdir(), "openclaw-vuln-gate-"));
await writeLockfile(rootDir);
const payloads: Record<string, string[]>[] = [];
const report = await runDependencyVulnerabilityGate({
rootDir,
fetchImpl: async (_url, init) => {
const payload = JSON.parse(String(init?.body));
payloads.push(payload);
const packages = Object.keys(payload);
const body: Record<string, unknown[]> = {};
if (packages.includes("runtime-high")) {
body["runtime-high"] = [
advisory({ id: "GHSA-runtime-high", severity: "high", title: "runtime high" }),
];
}
if (packages.includes("dev-high")) {
body["dev-high"] = [
advisory({ id: "GHSA-dev-high", severity: "high", title: "dev high" }),
];
}
return new Response(JSON.stringify(body), {
status: 200,
headers: { "content-type": "application/json" },
});
},
});
expect(payloads).toHaveLength(2);
expect(payloads[0]).toEqual({
"dev-high": ["1.0.0"],
"runtime-high": ["1.0.0"],
"transitive-critical": ["1.0.0"],
});
expect(payloads[1]).toEqual({
"runtime-high": ["1.0.0"],
});
expect(report.blockers.map((finding) => finding.id)).toEqual(["GHSA-runtime-high"]);
expect(report.findings.map((finding) => finding.id)).toEqual([
"GHSA-dev-high",
"GHSA-runtime-high",
]);
});
it("documents the resolved transitive dependency graph scope in Markdown", () => {
const markdown = renderDependencyVulnerabilityGateMarkdownReport({
generatedAt: "2026-05-12T00:00:00.000Z",
policy: {
blocks: [
"known malware advisories anywhere in the installed graph",
"critical advisories anywhere in the installed graph",
"high advisories in the production/runtime graph",
],
reports: [
"moderate and lower advisories",
"high advisories outside production/runtime graph",
],
vulnerabilityExceptions: false,
},
graphs: {
all: { packages: 2, packageVersions: 2 },
production: { packages: 1, packageVersions: 1 },
},
blockers: [],
findings: [],
});
expect(markdown).toContain("# npm Advisory Vulnerability Gate: Resolved Dependency Graph");
expect(markdown).toContain("## Scope");
expect(markdown).toContain("resolved package versions from pnpm-lock.yaml");
expect(markdown).toContain("It includes transitive dependencies.");
});
});