Files
Moltbot/src/gateway/node-invoke-system-run-approval-match.test.ts
2026-03-02 21:31:36 +00:00

146 lines
3.8 KiB
TypeScript

import { describe, expect, test } from "vitest";
import { buildSystemRunApprovalBinding } from "../infra/system-run-approval-binding.js";
import { evaluateSystemRunApprovalMatch } from "./node-invoke-system-run-approval-match.js";
const defaultBinding = {
cwd: null,
agentId: null,
sessionKey: null,
};
function expectMismatch(
result: ReturnType<typeof evaluateSystemRunApprovalMatch>,
code: "APPROVAL_REQUEST_MISMATCH" | "APPROVAL_ENV_BINDING_MISSING",
) {
expect(result.ok).toBe(false);
if (result.ok) {
throw new Error("unreachable");
}
expect(result.code).toBe(code);
}
function expectV1BindingMatch(params: {
argv: string[];
requestCommand: string;
commandArgv?: string[];
}) {
const result = evaluateSystemRunApprovalMatch({
argv: params.argv,
request: {
host: "node",
command: params.requestCommand,
commandArgv: params.commandArgv,
systemRunBinding: buildSystemRunApprovalBinding({
argv: params.argv,
cwd: null,
agentId: null,
sessionKey: null,
}).binding,
},
binding: defaultBinding,
});
expect(result).toEqual({ ok: true });
}
describe("evaluateSystemRunApprovalMatch", () => {
test("rejects approvals that do not carry v1 binding", () => {
const result = evaluateSystemRunApprovalMatch({
argv: ["echo", "SAFE"],
request: {
host: "node",
command: "echo SAFE",
},
binding: defaultBinding,
});
expectMismatch(result, "APPROVAL_REQUEST_MISMATCH");
});
test("enforces exact argv binding in v1 object", () => {
expectV1BindingMatch({
argv: ["echo", "SAFE"],
requestCommand: "echo SAFE",
});
});
test("rejects argv mismatch in v1 object", () => {
const result = evaluateSystemRunApprovalMatch({
argv: ["echo", "SAFE"],
request: {
host: "node",
command: "echo SAFE",
systemRunBinding: buildSystemRunApprovalBinding({
argv: ["echo SAFE"],
cwd: null,
agentId: null,
sessionKey: null,
}).binding,
},
binding: defaultBinding,
});
expectMismatch(result, "APPROVAL_REQUEST_MISMATCH");
});
test("rejects env overrides when v1 binding has no env hash", () => {
const result = evaluateSystemRunApprovalMatch({
argv: ["git", "diff"],
request: {
host: "node",
command: "git diff",
systemRunBinding: buildSystemRunApprovalBinding({
argv: ["git", "diff"],
cwd: null,
agentId: null,
sessionKey: null,
}).binding,
},
binding: {
...defaultBinding,
env: { GIT_EXTERNAL_DIFF: "/tmp/pwn.sh" },
},
});
expectMismatch(result, "APPROVAL_ENV_BINDING_MISSING");
});
test("accepts matching env hash with reordered keys", () => {
const result = evaluateSystemRunApprovalMatch({
argv: ["git", "diff"],
request: {
host: "node",
command: "git diff",
systemRunBinding: buildSystemRunApprovalBinding({
argv: ["git", "diff"],
cwd: null,
agentId: null,
sessionKey: null,
env: { SAFE_A: "1", SAFE_B: "2" },
}).binding,
},
binding: {
...defaultBinding,
env: { SAFE_B: "2", SAFE_A: "1" },
},
});
expect(result).toEqual({ ok: true });
});
test("rejects non-node host requests", () => {
const result = evaluateSystemRunApprovalMatch({
argv: ["echo", "SAFE"],
request: {
host: "gateway",
command: "echo SAFE",
},
binding: defaultBinding,
});
expectMismatch(result, "APPROVAL_REQUEST_MISMATCH");
});
test("uses v1 binding even when legacy command text diverges", () => {
expectV1BindingMatch({
argv: ["echo", "SAFE"],
requestCommand: "echo STALE",
commandArgv: ["echo STALE"],
});
});
});