Files
moltbot/scripts/check-no-pairing-store-group-auth.mjs
2026-03-02 14:36:41 +00:00

181 lines
5.2 KiB
JavaScript

#!/usr/bin/env node
import ts from "typescript";
import { createPairingGuardContext } from "./lib/pairing-guard-context.mjs";
import {
collectFileViolations,
getPropertyNameText,
runAsScript,
toLine,
} from "./lib/ts-guard-utils.mjs";
const { repoRoot, sourceRoots, resolveFromRepo } = createPairingGuardContext(import.meta.url);
const allowedFiles = new Set([
resolveFromRepo("src/security/dm-policy-shared.ts"),
resolveFromRepo("src/channels/allow-from.ts"),
// Config migration/audit logic may intentionally reference store + group fields.
resolveFromRepo("src/security/fix.ts"),
resolveFromRepo("src/security/audit-channel.ts"),
]);
const storeIdentifierRe = /^(?:storeAllowFrom|storedAllowFrom|storeAllowList)$/i;
const groupNameRe =
/(?:groupAllowFrom|effectiveGroupAllowFrom|groupAllowed|groupAllow|groupAuth|groupSender)/i;
const storeSourceCallNames = new Set([
"readChannelAllowFromStore",
"readChannelAllowFromStoreSync",
"readStoreAllowFromForDmPolicy",
]);
const allowedResolverCallNames = new Set([
"resolveEffectiveAllowFromLists",
"resolveDmGroupAccessWithLists",
"resolveMattermostEffectiveAllowFromLists",
"resolveIrcEffectiveAllowlists",
]);
function getDeclarationNameText(name) {
if (ts.isIdentifier(name)) {
return name.text;
}
if (ts.isObjectBindingPattern(name) || ts.isArrayBindingPattern(name)) {
return name.getText();
}
return null;
}
function containsPairingStoreSource(node) {
let found = false;
const visit = (current) => {
if (found) {
return;
}
if (ts.isIdentifier(current) && storeIdentifierRe.test(current.text)) {
found = true;
return;
}
if (ts.isCallExpression(current)) {
const callName = getCallName(current);
if (callName && storeSourceCallNames.has(callName)) {
found = true;
return;
}
}
ts.forEachChild(current, visit);
};
visit(node);
return found;
}
function getCallName(node) {
if (!ts.isCallExpression(node)) {
return null;
}
if (ts.isIdentifier(node.expression)) {
return node.expression.text;
}
if (ts.isPropertyAccessExpression(node.expression)) {
return node.expression.name.text;
}
return null;
}
function isSuspiciousNormalizeWithStoreCall(node) {
if (!ts.isCallExpression(node)) {
return false;
}
if (!ts.isIdentifier(node.expression) || node.expression.text !== "normalizeAllowFromWithStore") {
return false;
}
const firstArg = node.arguments[0];
if (!firstArg || !ts.isObjectLiteralExpression(firstArg)) {
return false;
}
let hasStoreProp = false;
let hasGroupAllowProp = false;
for (const property of firstArg.properties) {
if (!ts.isPropertyAssignment(property)) {
continue;
}
const name = getPropertyNameText(property.name);
if (!name) {
continue;
}
if (name === "storeAllowFrom" && containsPairingStoreSource(property.initializer)) {
hasStoreProp = true;
}
if (name === "allowFrom" && groupNameRe.test(property.initializer.getText())) {
hasGroupAllowProp = true;
}
}
return hasStoreProp && hasGroupAllowProp;
}
function findViolations(content, filePath) {
const sourceFile = ts.createSourceFile(filePath, content, ts.ScriptTarget.Latest, true);
const violations = [];
const visit = (node) => {
if (ts.isVariableDeclaration(node) && node.initializer) {
const name = getDeclarationNameText(node.name);
if (name && groupNameRe.test(name) && containsPairingStoreSource(node.initializer)) {
const callName = getCallName(node.initializer);
if (callName && allowedResolverCallNames.has(callName)) {
ts.forEachChild(node, visit);
return;
}
violations.push({
line: toLine(sourceFile, node),
reason: `group-scoped variable "${name}" references pairing-store identifiers`,
});
}
}
if (ts.isPropertyAssignment(node)) {
const propName = getPropertyNameText(node.name);
if (propName && groupNameRe.test(propName) && containsPairingStoreSource(node.initializer)) {
violations.push({
line: toLine(sourceFile, node),
reason: `group-scoped property "${propName}" references pairing-store identifiers`,
});
}
}
if (isSuspiciousNormalizeWithStoreCall(node)) {
violations.push({
line: toLine(sourceFile, node),
reason: "group allowlist uses normalizeAllowFromWithStore(...) with pairing-store entries",
});
}
ts.forEachChild(node, visit);
};
visit(sourceFile);
return violations;
}
async function main() {
const violations = await collectFileViolations({
sourceRoots,
repoRoot,
findViolations,
skipFile: (filePath) => allowedFiles.has(filePath),
});
if (violations.length === 0) {
return;
}
console.error("Found pairing-store identifiers referenced in group auth composition:");
for (const violation of violations) {
console.error(`- ${violation.path}:${violation.line} (${violation.reason})`);
}
console.error(
"Group auth must be composed via shared resolvers (resolveDmGroupAccessWithLists / resolveEffectiveAllowFromLists).",
);
process.exit(1);
}
runAsScript(import.meta.url, main);