|
1 | 1 | { |
2 | 2 | "nodeVersion": "22.14.0", |
3 | 3 | "sourceCommit": "v22.14.0", |
4 | | - "lastUpdated": "2026-03-24", |
| 4 | + "lastUpdated": "2026-03-25", |
5 | 5 | "expectations": { |
6 | 6 | "test-cluster-*.js": { |
7 | 7 | "reason": "cluster module is Tier 5 (Unsupported) — require(cluster) throws by design", |
|
1917 | 1917 | "expected": "fail" |
1918 | 1918 | }, |
1919 | 1919 | "test-crypto-key-objects.js": { |
1920 | | - "reason": "fs.readFileSync encoding argument handled as path component — test reads fixture PEM keys which fail to load", |
| 1920 | + "reason": "fs.readFileSync() still folds the encoding argument into the VFS path for PEM fixtures, so the test tries to open '/test/fixtures/rsa_public.pem/ascii'", |
1921 | 1921 | "category": "implementation-gap", |
1922 | 1922 | "expected": "fail" |
1923 | 1923 | }, |
1924 | 1924 | "test-crypto-padding.js": { |
1925 | | - "reason": "createCipheriv/createDecipheriv do not throw expected exceptions for invalid padding options", |
| 1925 | + "reason": "OpenSSL cipher errors still miss Node's `reason` field snapshot shape, so invalid-padding assertions on `ERR_OSSL_WRONG_FINAL_BLOCK_LENGTH` fail", |
1926 | 1926 | "category": "implementation-gap", |
1927 | 1927 | "expected": "fail" |
1928 | 1928 | }, |
|
1932 | 1932 | "expected": "fail" |
1933 | 1933 | }, |
1934 | 1934 | "test-crypto-private-decrypt-gh32240.js": { |
1935 | | - "reason": "Sandbox KeyObject.export() does not honor encrypted PEM export options yet, so the encrypted-key failure path is not exercised faithfully", |
| 1935 | + "reason": "encrypted private-key decrypt path does not throw the expected failure, so the test hits `Missing expected exception`", |
1936 | 1936 | "category": "implementation-gap", |
1937 | 1937 | "expected": "fail" |
1938 | 1938 | }, |
1939 | 1939 | "test-crypto-psychic-signatures.js": { |
1940 | | - "reason": "ECDSA key import fails with unsupported key format — bridge cannot decode the specific ECDSA public key encoding used in test", |
| 1940 | + "reason": "ECDSA psychic-signature fixture parsing still crashes with `TypeError: Cannot read properties of null (reading '2')`", |
1941 | 1941 | "category": "implementation-gap", |
1942 | 1942 | "expected": "fail" |
1943 | 1943 | }, |
1944 | 1944 | "test-crypto-rsa-dsa.js": { |
1945 | | - "reason": "fs.readFileSync encoding argument handled as path component — test reads fixture PEM/cert files which fail to load", |
| 1945 | + "reason": "crypto cert fixtures are incomplete in the conformance VFS, so the test fails opening `/test/fixtures/rsa_cert.crt`", |
1946 | 1946 | "category": "implementation-gap", |
1947 | 1947 | "expected": "fail" |
1948 | 1948 | }, |
|
1952 | 1952 | "expected": "fail" |
1953 | 1953 | }, |
1954 | 1954 | "test-crypto-sign-verify.js": { |
1955 | | - "reason": "fs.readFileSync encoding argument handled as path component — test reads fixture PEM/cert files which fail to load", |
| 1955 | + "reason": "crypto cert fixtures are incomplete in the conformance VFS, so the test fails opening `/test/fixtures/rsa_cert.crt`", |
1956 | 1956 | "category": "implementation-gap", |
1957 | 1957 | "expected": "fail" |
1958 | 1958 | }, |
|
3251 | 3251 | "expected": "fail" |
3252 | 3252 | }, |
3253 | 3253 | "test-webcrypto-sign-verify-eddsa.js": { |
3254 | | - "reason": "WebCrypto subtle.importKey() not implemented — crypto.subtle API methods return undefined", |
| 3254 | + "reason": "EdDSA WebCrypto path still fails runtime assertions during sign/verify coverage (`AssertionError2: false == true`)", |
3255 | 3255 | "category": "implementation-gap", |
3256 | 3256 | "expected": "fail" |
3257 | 3257 | }, |
|
3606 | 3606 | "expected": "fail" |
3607 | 3607 | }, |
3608 | 3608 | "test-crypto-async-sign-verify.js": { |
3609 | | - "reason": "uses crypto/webcrypto APIs not fully bridged in sandbox", |
| 3609 | + "reason": "crypto fixture set is incomplete in the conformance VFS, so async sign/verify fails opening `/test/fixtures/rsa_public.pem`", |
3610 | 3610 | "category": "implementation-gap", |
3611 | 3611 | "expected": "fail" |
3612 | 3612 | }, |
3613 | 3613 | "test-crypto-certificate.js": { |
3614 | | - "reason": "tests Node.js-specific error codes (ERR_*) — sandbox polyfills throw plain errors", |
| 3614 | + "reason": "crypto certificate fixtures are incomplete in the conformance VFS, so the test fails opening `/test/fixtures/rsa_spkac.spkac`", |
3615 | 3615 | "category": "implementation-gap", |
3616 | 3616 | "expected": "fail" |
3617 | 3617 | }, |
3618 | 3618 | "test-crypto-classes.js": { |
3619 | | - "reason": "uses crypto/webcrypto APIs not fully bridged in sandbox", |
| 3619 | + "reason": "constructor/factory parity is incomplete for crypto classes, so `createX()` instances fail `instanceof crypto.X` assertions", |
3620 | 3620 | "category": "implementation-gap", |
3621 | 3621 | "expected": "fail" |
3622 | 3622 | }, |
3623 | 3623 | "test-crypto-dh-group-setters.js": { |
3624 | | - "reason": "uses crypto/webcrypto APIs not fully bridged in sandbox", |
| 3624 | + "reason": "ECDH instances still expose `setPrivateKey()` where Node expects `undefined`, so the group-setter surface mismatches Node", |
3625 | 3625 | "category": "implementation-gap", |
3626 | 3626 | "expected": "fail" |
3627 | 3627 | }, |
3628 | 3628 | "test-crypto-getcipherinfo.js": { |
3629 | | - "reason": "tests Node.js-specific error codes (ERR_*) — sandbox polyfills throw plain errors", |
| 3629 | + "reason": "`crypto.getCipherInfo()` is still missing from the sandbox crypto surface", |
3630 | 3630 | "category": "implementation-gap", |
3631 | 3631 | "expected": "fail" |
3632 | 3632 | }, |
3633 | 3633 | "test-crypto-hash.js": { |
3634 | | - "reason": "tests Node.js-specific error codes (ERR_*) — sandbox polyfills throw plain errors", |
| 3634 | + "reason": "hash parity still breaks Node's identity-sensitive output assertions (`Values identical but not reference-equal`) in the vendored hash suite", |
3635 | 3635 | "category": "implementation-gap", |
3636 | 3636 | "expected": "fail" |
3637 | 3637 | }, |
3638 | 3638 | "test-crypto-hkdf.js": { |
3639 | | - "reason": "tests Node.js-specific error codes (ERR_*) — sandbox polyfills throw plain errors", |
| 3639 | + "reason": "`crypto.hkdf()` is still missing from the sandbox crypto surface, so the test gets `hkdf is not a function`", |
3640 | 3640 | "category": "implementation-gap", |
3641 | 3641 | "expected": "fail" |
3642 | 3642 | }, |
3643 | 3643 | "test-crypto-hmac.js": { |
3644 | | - "reason": "tests Node.js-specific error codes (ERR_*) — sandbox polyfills throw plain errors", |
| 3644 | + "reason": "`crypto.Hmac` constructor parity is incomplete, so calling it without `new` does not return a fresh Hmac instance like Node", |
3645 | 3645 | "category": "implementation-gap", |
3646 | 3646 | "expected": "fail" |
3647 | 3647 | }, |
3648 | 3648 | "test-crypto-oneshot-hash.js": { |
3649 | | - "reason": "tests Node.js-specific error codes (ERR_*) — sandbox polyfills throw plain errors", |
| 3649 | + "reason": "one-shot hash argument validation still misses Node's `ERR_INVALID_ARG_TYPE` error shape", |
3650 | 3650 | "category": "implementation-gap", |
3651 | 3651 | "expected": "fail" |
3652 | 3652 | }, |
3653 | 3653 | "test-crypto-randomuuid.js": { |
3654 | | - "reason": "tests Node.js-specific error codes (ERR_*) — sandbox polyfills throw plain errors", |
| 3654 | + "reason": "`require('crypto').randomUUID` is still missing from the module overlay, so the test gets `TypeError: randomUUID is not a function`", |
3655 | 3655 | "category": "implementation-gap", |
3656 | 3656 | "expected": "fail" |
3657 | 3657 | }, |
3658 | 3658 | "test-crypto-webcrypto-aes-decrypt-tag-too-small.js": { |
3659 | | - "reason": "crypto polyfill behavior gap", |
| 3659 | + "reason": "AES-GCM decrypt rejects undersized tags with `TypeError: Invalid authentication tag length: 0` instead of Node's `OperationError`", |
3660 | 3660 | "category": "implementation-gap", |
3661 | 3661 | "expected": "fail" |
3662 | 3662 | }, |
|
5699 | 5699 | "expected": "fail" |
5700 | 5700 | }, |
5701 | 5701 | "test-webcrypto-constructors.js": { |
5702 | | - "reason": "crypto.subtle (WebCrypto) API not fully implemented in sandbox", |
| 5702 | + "reason": "WebCrypto constructors still throw the wrong error shape (`TypeError` with missing `ERR_ILLEGAL_CONSTRUCTOR` metadata)", |
5703 | 5703 | "category": "implementation-gap", |
5704 | 5704 | "expected": "fail" |
5705 | 5705 | }, |
5706 | 5706 | "test-webcrypto-derivebits-hkdf.js": { |
5707 | | - "reason": "crypto.subtle (WebCrypto) API not fully implemented in sandbox", |
| 5707 | + "reason": "HKDF deriveBits/deriveKey parity is still broken, and the vendored test aborts with `Deriving bits failed`", |
5708 | 5708 | "category": "implementation-gap", |
5709 | 5709 | "expected": "fail" |
5710 | 5710 | }, |
5711 | 5711 | "test-webcrypto-digest.js": { |
5712 | | - "reason": "uses crypto/webcrypto APIs not fully bridged in sandbox", |
| 5712 | + "reason": "WebCrypto digest argument validation still misses Node's `ERR_INVALID_ARG_TYPE` error metadata", |
5713 | 5713 | "category": "implementation-gap", |
5714 | 5714 | "expected": "fail" |
5715 | 5715 | }, |
5716 | 5716 | "test-webcrypto-export-import-cfrg.js": { |
5717 | | - "reason": "uses crypto/webcrypto APIs not fully bridged in sandbox", |
| 5717 | + "reason": "WebCrypto import/export fixture set is incomplete in the conformance VFS, so the test fails opening `/test/fixtures/rsa_public_2048.pem`", |
5718 | 5718 | "category": "implementation-gap", |
5719 | 5719 | "expected": "fail" |
5720 | 5720 | }, |
5721 | 5721 | "test-webcrypto-export-import-ec.js": { |
5722 | | - "reason": "uses crypto/webcrypto APIs not fully bridged in sandbox", |
| 5722 | + "reason": "WebCrypto import/export fixture set is incomplete in the conformance VFS, so the test fails opening `/test/fixtures/rsa_public_2048.pem`", |
5723 | 5723 | "category": "implementation-gap", |
5724 | 5724 | "expected": "fail" |
5725 | 5725 | }, |
5726 | 5726 | "test-webcrypto-export-import-rsa.js": { |
5727 | | - "reason": "uses crypto/webcrypto APIs not fully bridged in sandbox", |
| 5727 | + "reason": "WebCrypto import/export fixture set is incomplete in the conformance VFS, so the test fails opening `/test/fixtures/ec_p256_public.pem`", |
5728 | 5728 | "category": "implementation-gap", |
5729 | 5729 | "expected": "fail" |
5730 | 5730 | }, |
|
0 commit comments