fix: merge latest dev updates into main #62
Annotations
21 errors and 2 warnings
|
src/__tests__/core.test.ts > standard mode — dangerous word detection > evaluatePolicy flags "update_schema" as review (dangerous word match):
src/__tests__/core.test.ts#L151
AssertionError: expected 'allow' to be 'review' // Object.is equality
Expected: "review"
Received: "allow"
❯ src/__tests__/core.test.ts:151:51
|
|
src/__tests__/core.test.ts > standard mode — dangerous word detection > evaluatePolicy flags "write_record" as review (dangerous word match):
src/__tests__/core.test.ts#L151
AssertionError: expected 'allow' to be 'review' // Object.is equality
Expected: "review"
Received: "allow"
❯ src/__tests__/core.test.ts:151:51
|
|
src/__tests__/core.test.ts > standard mode — dangerous word detection > evaluatePolicy flags "refund_payment" as review (dangerous word match):
src/__tests__/core.test.ts#L151
AssertionError: expected 'allow' to be 'review' // Object.is equality
Expected: "review"
Received: "allow"
❯ src/__tests__/core.test.ts:151:51
|
|
src/__tests__/core.test.ts > standard mode — dangerous word detection > evaluatePolicy flags "remove_file" as review (dangerous word match):
src/__tests__/core.test.ts#L151
AssertionError: expected 'allow' to be 'review' // Object.is equality
Expected: "review"
Received: "allow"
❯ src/__tests__/core.test.ts:151:51
|
|
src/__tests__/core.test.ts > standard mode — dangerous word detection > evaluatePolicy flags "delete_user" as review (dangerous word match):
src/__tests__/core.test.ts#L151
AssertionError: expected 'allow' to be 'review' // Object.is equality
Expected: "review"
Received: "allow"
❯ src/__tests__/core.test.ts:151:51
|
|
src/__tests__/cli_runner.test.ts > daemon abandon fallthrough > returns approved:false when daemon denies (deterministic daemon response):
src/__tests__/cli_runner.test.ts#L202
AssertionError: expected true to be false // Object.is equality
- Expected
+ Received
- false
+ true
❯ src/__tests__/cli_runner.test.ts:202:29
|
|
src/__tests__/cli_runner.test.ts > daemon abandon fallthrough > returns noApprovalMechanism when daemon is not running and no other channels:
src/__tests__/cli_runner.test.ts#L171
AssertionError: expected true to be false // Object.is equality
- Expected
+ Received
- false
+ true
❯ src/__tests__/cli_runner.test.ts:171:29
|
|
src/__tests__/cli_runner.test.ts > autoStartDaemon: false — blocks without daemon when no TTY > blocks via persistent deny decision (deterministic, no HITL):
src/__tests__/cli_runner.test.ts#L157
AssertionError: expected true to be false // Object.is equality
- Expected
+ Received
- false
+ true
❯ src/__tests__/cli_runner.test.ts:157:29
|
|
src/__tests__/cli_runner.test.ts > autoStartDaemon: false — blocks without daemon when no TTY > returns noApprovalMechanism when no API key, no daemon, no TTY:
src/__tests__/cli_runner.test.ts#L133
AssertionError: expected true to be false // Object.is equality
- Expected
+ Received
- false
+ true
❯ src/__tests__/cli_runner.test.ts:133:29
|
|
src/__tests__/cli_runner.test.ts > smart runner — shell command policy > blocks when command contains dangerous word in path:
src/__tests__/cli_runner.test.ts#L117
AssertionError: expected 'allow' to be 'review' // Object.is equality
Expected: "review"
Received: "allow"
❯ src/__tests__/cli_runner.test.ts:117:29
|
|
Test (Node 22)
The strategy configuration was canceled because "test._20" failed
|
|
src/__tests__/core.test.ts > standard mode — dangerous word detection > evaluatePolicy flags "update_schema" as review (dangerous word match):
src/__tests__/core.test.ts#L151
AssertionError: expected 'allow' to be 'review' // Object.is equality
Expected: "review"
Received: "allow"
❯ src/__tests__/core.test.ts:151:51
|
|
src/__tests__/core.test.ts > standard mode — dangerous word detection > evaluatePolicy flags "write_record" as review (dangerous word match):
src/__tests__/core.test.ts#L151
AssertionError: expected 'allow' to be 'review' // Object.is equality
Expected: "review"
Received: "allow"
❯ src/__tests__/core.test.ts:151:51
|
|
src/__tests__/core.test.ts > standard mode — dangerous word detection > evaluatePolicy flags "refund_payment" as review (dangerous word match):
src/__tests__/core.test.ts#L151
AssertionError: expected 'allow' to be 'review' // Object.is equality
Expected: "review"
Received: "allow"
❯ src/__tests__/core.test.ts:151:51
|
|
src/__tests__/core.test.ts > standard mode — dangerous word detection > evaluatePolicy flags "remove_file" as review (dangerous word match):
src/__tests__/core.test.ts#L151
AssertionError: expected 'allow' to be 'review' // Object.is equality
Expected: "review"
Received: "allow"
❯ src/__tests__/core.test.ts:151:51
|
|
src/__tests__/core.test.ts > standard mode — dangerous word detection > evaluatePolicy flags "delete_user" as review (dangerous word match):
src/__tests__/core.test.ts#L151
AssertionError: expected 'allow' to be 'review' // Object.is equality
Expected: "review"
Received: "allow"
❯ src/__tests__/core.test.ts:151:51
|
|
src/__tests__/cli_runner.test.ts > daemon abandon fallthrough > returns approved:false when daemon denies (deterministic daemon response):
src/__tests__/cli_runner.test.ts#L202
AssertionError: expected true to be false // Object.is equality
- Expected
+ Received
- false
+ true
❯ src/__tests__/cli_runner.test.ts:202:29
|
|
src/__tests__/cli_runner.test.ts > daemon abandon fallthrough > returns noApprovalMechanism when daemon is not running and no other channels:
src/__tests__/cli_runner.test.ts#L171
AssertionError: expected true to be false // Object.is equality
- Expected
+ Received
- false
+ true
❯ src/__tests__/cli_runner.test.ts:171:29
|
|
src/__tests__/cli_runner.test.ts > autoStartDaemon: false — blocks without daemon when no TTY > blocks via persistent deny decision (deterministic, no HITL):
src/__tests__/cli_runner.test.ts#L157
AssertionError: expected true to be false // Object.is equality
- Expected
+ Received
- false
+ true
❯ src/__tests__/cli_runner.test.ts:157:29
|
|
src/__tests__/cli_runner.test.ts > autoStartDaemon: false — blocks without daemon when no TTY > returns noApprovalMechanism when no API key, no daemon, no TTY:
src/__tests__/cli_runner.test.ts#L133
AssertionError: expected true to be false // Object.is equality
- Expected
+ Received
- false
+ true
❯ src/__tests__/cli_runner.test.ts:133:29
|
|
src/__tests__/cli_runner.test.ts > smart runner — shell command policy > blocks when command contains dangerous word in path:
src/__tests__/cli_runner.test.ts#L117
AssertionError: expected 'allow' to be 'review' // Object.is equality
Expected: "review"
Received: "allow"
❯ src/__tests__/cli_runner.test.ts:117:29
|
|
Test (Node 20)
Node.js 20 actions are deprecated. The following actions are running on Node.js 20 and may not work as expected: actions/checkout@v4, actions/setup-node@v4. Actions will be forced to run with Node.js 24 by default starting June 2nd, 2026. Please check if updated versions of these actions are available that support Node.js 24. To opt into Node.js 24 now, set the FORCE_JAVASCRIPT_ACTIONS_TO_NODE24=true environment variable on the runner or in your workflow file. Once Node.js 24 becomes the default, you can temporarily opt out by setting ACTIONS_ALLOW_USE_UNSECURE_NODE_VERSION=true. For more information see: https://github.blog/changelog/2025-09-19-deprecation-of-node-20-on-github-actions-runners/
|
|
Test (Node 22)
Node.js 20 actions are deprecated. The following actions are running on Node.js 20 and may not work as expected: actions/checkout@v4, actions/setup-node@v4. Actions will be forced to run with Node.js 24 by default starting June 2nd, 2026. Please check if updated versions of these actions are available that support Node.js 24. To opt into Node.js 24 now, set the FORCE_JAVASCRIPT_ACTIONS_TO_NODE24=true environment variable on the runner or in your workflow file. Once Node.js 24 becomes the default, you can temporarily opt out by setting ACTIONS_ALLOW_USE_UNSECURE_NODE_VERSION=true. For more information see: https://github.blog/changelog/2025-09-19-deprecation-of-node-20-on-github-actions-runners/
|