Skip to content

Commit b70e636

Browse files
feat: automate pre-release blogpost creation (#773)
1 parent 648918b commit b70e636

File tree

6 files changed

+269
-14
lines changed

6 files changed

+269
-14
lines changed

components/git/security.js

+24-4
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,7 @@
11
import CLI from '../../lib/cli.js';
22
import SecurityReleaseSteward from '../../lib/prepare_security.js';
33
import UpdateSecurityRelease from '../../lib/update_security_release.js';
4+
import SecurityBlog from '../../lib/security_blog.js';
45

56
export const command = 'security [options]';
67
export const describe = 'Manage an in-progress security release or start a new one.';
@@ -21,18 +22,23 @@ const securityOptions = {
2122
'remove-report': {
2223
describe: 'Removes a report from vulnerabilities.json',
2324
type: 'string'
25+
},
26+
'pre-release': {
27+
describe: 'Create the pre-release announcement',
28+
type: 'boolean'
2429
}
2530
};
2631

2732
let yargsInstance;
2833

2934
export function builder(yargs) {
3035
yargsInstance = yargs;
31-
return yargs.options(securityOptions).example(
32-
'git node security --start',
33-
'Prepare a security release of Node.js')
36+
return yargs.options(securityOptions)
37+
.example(
38+
'git node security --start',
39+
'Prepare a security release of Node.js')
3440
.example(
35-
'git node security --update-date=31/12/2023',
41+
'git node security --update-date=YYYY/MM/DD',
3642
'Updates the target date of the security release'
3743
)
3844
.example(
@@ -42,6 +48,10 @@ export function builder(yargs) {
4248
.example(
4349
'git node security --remove-report=H1-ID',
4450
'Removes the Hackerone report based on ID provided from vulnerabilities.json'
51+
)
52+
.example(
53+
'git node security --pre-release' +
54+
'Create the pre-release announcement on the Nodejs.org repo'
4555
);
4656
}
4757

@@ -52,6 +62,9 @@ export function handler(argv) {
5262
if (argv['update-date']) {
5363
return updateReleaseDate(argv);
5464
}
65+
if (argv['pre-release']) {
66+
return createPreRelease(argv);
67+
}
5568
if (argv['add-report']) {
5669
return addReport(argv);
5770
}
@@ -85,6 +98,13 @@ async function updateReleaseDate(argv) {
8598
return update.updateReleaseDate(releaseDate);
8699
}
87100

101+
async function createPreRelease() {
102+
const logStream = process.stdout.isTTY ? process.stdout : process.stderr;
103+
const cli = new CLI(logStream);
104+
const preRelease = new SecurityBlog(cli);
105+
return preRelease.createPreRelease();
106+
}
107+
88108
async function startSecurityRelease() {
89109
const logStream = process.stdout.isTTY ? process.stdout : process.stderr;
90110
const cli = new CLI(logStream);

docs/git-node.md

+11-2
Original file line numberDiff line numberDiff line change
@@ -457,13 +457,22 @@ This command creates the Next Security Issue in Node.js private repository
457457
following the [Security Release Process][] document.
458458
It will retrieve all the triaged HackerOne reports and add creates the `vulnerabilities.json`.
459459

460-
### `git node security --update-date=target`
460+
### `git node security --update-date=YYYY/MM/DD`
461461

462462
This command updates the `vulnerabilities.json` with target date of the security release.
463463
Example:
464464

465465
```sh
466-
git node security --update-date=16/12/2023
466+
git node security --update-date=2023/12/31
467+
```
468+
469+
### `git node security --pre-release`
470+
471+
This command creates a pre-release announcement for the security release.
472+
Example:
473+
474+
```sh
475+
git node security --pre-release
467476
```
468477

469478
### `git node security --add-report=report-id`
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,29 @@
1+
---
2+
date: %ANNOUNCEMENT_DATE%
3+
category: vulnerability
4+
title: %RELEASE_DATE% Security Releases
5+
slug: %SLUG%
6+
layout: blog-post.hbs
7+
author: The Node.js Project
8+
---
9+
10+
# Summary
11+
12+
The Node.js project will release new versions of the %AFFECTED_VERSIONS%
13+
releases lines on or shortly after, %RELEASE_DATE% in order to address:
14+
15+
%VULNERABILITIES%
16+
%OPENSSL_UPDATES%
17+
## Impact
18+
19+
%IMPACT%
20+
21+
## Release timing
22+
23+
Releases will be available on, or shortly after, %RELEASE_DATE%.
24+
25+
## Contact and future updates
26+
27+
The current Node.js security policy can be found at <https://nodejs.org/en/security/>. Please follow the process outlined in <https://github.com/nodejs/node/blob/master/SECURITY.md> if you wish to report a vulnerability in Node.js.
28+
29+
Subscribe to the low-volume announcement-only nodejs-sec mailing list at <https://groups.google.com/forum/#!forum/nodejs-sec> to stay up to date on security vulnerabilities and security-related releases of Node.js and the projects maintained in the nodejs GitHub organization.

lib/security-release/security-release.js

+25-1
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,7 @@
11
import { runSync } from '../run.js';
22
import nv from '@pkgjs/nv';
3+
import fs from 'node:fs';
4+
import path from 'node:path';
35

46
export const NEXT_SECURITY_RELEASE_BRANCH = 'next-security-release';
57
export const NEXT_SECURITY_RELEASE_FOLDER = 'security-release/next-security-release';
@@ -14,7 +16,13 @@ export const PLACEHOLDERS = {
1416
vulnerabilitiesPRURL: '%VULNERABILITIES_PR_URL%',
1517
preReleasePrivate: '%PRE_RELEASE_PRIV%',
1618
postReleasePrivate: '%POS_RELEASE_PRIV%',
17-
affectedLines: '%AFFECTED_LINES%'
19+
affectedLines: '%AFFECTED_LINES%',
20+
annoucementDate: '%ANNOUNCEMENT_DATE%',
21+
slug: '%SLUG%',
22+
affectedVersions: '%AFFECTED_VERSIONS%',
23+
openSSLUpdate: '%OPENSSL_UPDATES%',
24+
impact: '%IMPACT%',
25+
vulnerabilities: '%VULNERABILITIES%'
1826
};
1927

2028
export function checkRemote(cli, repository) {
@@ -73,3 +81,19 @@ export async function getSummary(reportId, req) {
7381
if (!summaries?.length) return;
7482
return summaries?.[0].attributes?.content;
7583
}
84+
85+
export function getVulnerabilitiesJSON(cli) {
86+
const vulnerabilitiesJSONPath = path.join(process.cwd(),
87+
NEXT_SECURITY_RELEASE_FOLDER, 'vulnerabilities.json');
88+
cli.startSpinner(`Reading vulnerabilities.json from ${vulnerabilitiesJSONPath}..`);
89+
const file = JSON.parse(fs.readFileSync(vulnerabilitiesJSONPath, 'utf-8'));
90+
cli.stopSpinner(`Done reading vulnerabilities.json from ${vulnerabilitiesJSONPath}`);
91+
return file;
92+
}
93+
94+
export function validateDate(releaseDate) {
95+
const value = new Date(releaseDate).valueOf();
96+
if (Number.isNaN(value) || value < 0) {
97+
throw new Error('Invalid date format');
98+
}
99+
}

lib/security_blog.js

+176
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,176 @@
1+
import fs from 'node:fs';
2+
import path from 'node:path';
3+
import _ from 'lodash';
4+
import {
5+
PLACEHOLDERS,
6+
getVulnerabilitiesJSON,
7+
checkoutOnSecurityReleaseBranch,
8+
NEXT_SECURITY_RELEASE_REPOSITORY,
9+
validateDate
10+
} from './security-release/security-release.js';
11+
12+
export default class SecurityBlog {
13+
repository = NEXT_SECURITY_RELEASE_REPOSITORY;
14+
constructor(cli) {
15+
this.cli = cli;
16+
}
17+
18+
async createPreRelease() {
19+
const { cli } = this;
20+
21+
// checkout on security release branch
22+
checkoutOnSecurityReleaseBranch(cli, this.repository);
23+
24+
// read vulnerabilities JSON file
25+
const content = getVulnerabilitiesJSON(cli);
26+
// validate the release date read from vulnerabilities JSON
27+
if (!content.releaseDate) {
28+
cli.error('Release date is not set in vulnerabilities.json,' +
29+
' run `git node security --update-date=YYYY/MM/DD` to set the release date.');
30+
process.exit(1);
31+
}
32+
33+
validateDate(content.releaseDate);
34+
const releaseDate = new Date(content.releaseDate);
35+
36+
const template = this.getSecurityPreReleaseTemplate();
37+
const data = {
38+
annoucementDate: await this.getAnnouncementDate(cli),
39+
releaseDate: this.formatReleaseDate(releaseDate),
40+
affectedVersions: this.getAffectedVersions(content),
41+
vulnerabilities: this.getVulnerabilities(content),
42+
slug: this.getSlug(releaseDate),
43+
impact: this.getImpact(content),
44+
openSSLUpdate: await this.promptOpenSSLUpdate(cli)
45+
};
46+
const month = releaseDate.toLocaleString('en-US', { month: 'long' }).toLowerCase();
47+
const year = releaseDate.getFullYear();
48+
const fileName = `${month}-${year}-security-releases.md`;
49+
const preRelease = this.buildPreRelease(template, data);
50+
const file = path.join(process.cwd(), fileName);
51+
fs.writeFileSync(file, preRelease);
52+
cli.ok(`Pre-release announcement file created at ${file}`);
53+
}
54+
55+
promptOpenSSLUpdate(cli) {
56+
return cli.prompt('Does this security release containt OpenSSL updates?', {
57+
defaultAnswer: true
58+
});
59+
}
60+
61+
formatReleaseDate(releaseDate) {
62+
const options = {
63+
weekday: 'long',
64+
month: 'long',
65+
day: 'numeric',
66+
year: 'numeric'
67+
};
68+
return releaseDate.toLocaleDateString('en-US', options);
69+
}
70+
71+
buildPreRelease(template, data) {
72+
const {
73+
annoucementDate,
74+
releaseDate,
75+
affectedVersions,
76+
vulnerabilities,
77+
slug,
78+
impact,
79+
openSSLUpdate
80+
} = data;
81+
return template.replaceAll(PLACEHOLDERS.annoucementDate, annoucementDate)
82+
.replaceAll(PLACEHOLDERS.slug, slug)
83+
.replaceAll(PLACEHOLDERS.affectedVersions, affectedVersions)
84+
.replaceAll(PLACEHOLDERS.vulnerabilities, vulnerabilities)
85+
.replaceAll(PLACEHOLDERS.releaseDate, releaseDate)
86+
.replaceAll(PLACEHOLDERS.impact, impact)
87+
.replaceAll(PLACEHOLDERS.openSSLUpdate, this.getOpenSSLUpdateTemplate(openSSLUpdate));
88+
}
89+
90+
getOpenSSLUpdateTemplate(openSSLUpdate) {
91+
if (openSSLUpdate) {
92+
return '\n## OpenSSL Security updates\n\n' +
93+
'This security release includes OpenSSL security updates\n';
94+
}
95+
return '';
96+
}
97+
98+
getSlug(releaseDate) {
99+
const month = releaseDate.toLocaleString('en-US', { month: 'long' });
100+
const year = releaseDate.getFullYear();
101+
return `${month.toLocaleLowerCase()}-${year}-security-releases`;
102+
}
103+
104+
async getAnnouncementDate(cli) {
105+
try {
106+
const date = await this.promptAnnouncementDate(cli);
107+
validateDate(date);
108+
return new Date(date).toISOString();
109+
} catch (error) {
110+
return PLACEHOLDERS.annoucementDate;
111+
}
112+
}
113+
114+
promptAnnouncementDate(cli) {
115+
return cli.prompt('When is the security release going to be announced? ' +
116+
'Enter in YYYY-MM-DD format:', {
117+
questionType: 'input',
118+
defaultAnswer: PLACEHOLDERS.annoucementDate
119+
});
120+
}
121+
122+
getImpact(content) {
123+
const impact = content.reports.reduce((acc, report) => {
124+
for (const affectedVersion of report.affectedVersions) {
125+
if (acc[affectedVersion]) {
126+
acc[affectedVersion].push(report);
127+
} else {
128+
acc[affectedVersion] = [report];
129+
}
130+
}
131+
return acc;
132+
}, {});
133+
134+
const impactText = [];
135+
for (const [key, value] of Object.entries(impact)) {
136+
const groupedByRating = Object.values(_.groupBy(value, 'severity.rating'))
137+
.map(severity => {
138+
const firstSeverityRating = severity[0].severity.rating.toLocaleLowerCase();
139+
return `${severity.length} ${firstSeverityRating} severity issues`;
140+
}).join(', ');
141+
142+
impactText.push(`The ${key} release line of Node.js is vulnerable to ${groupedByRating}.`);
143+
}
144+
145+
return impactText.join('\n');
146+
}
147+
148+
getVulnerabilities(content) {
149+
const grouped = _.groupBy(content.reports, 'severity.rating');
150+
const text = [];
151+
for (const [key, value] of Object.entries(grouped)) {
152+
text.push(`* ${value.length} ${key.toLocaleLowerCase()} severity issues.`);
153+
}
154+
return text.join('\n');
155+
}
156+
157+
getAffectedVersions(content) {
158+
const affectedVersions = new Set();
159+
for (const report of Object.values(content.reports)) {
160+
for (const affectedVersion of report.affectedVersions) {
161+
affectedVersions.add(affectedVersion);
162+
}
163+
}
164+
return Array.from(affectedVersions).join(', ');
165+
}
166+
167+
getSecurityPreReleaseTemplate() {
168+
return fs.readFileSync(
169+
new URL(
170+
'./github/templates/security-pre-release.md',
171+
import.meta.url
172+
),
173+
'utf-8'
174+
);
175+
}
176+
}

lib/update_security_release.js

+4-7
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,8 @@ import {
44
checkoutOnSecurityReleaseBranch,
55
commitAndPushVulnerabilitiesJSON,
66
getSupportedVersions,
7-
getSummary
7+
getSummary,
8+
validateDate
89
} from './security-release/security-release.js';
910
import fs from 'node:fs';
1011
import path from 'node:path';
@@ -21,13 +22,9 @@ export default class UpdateSecurityRelease {
2122
const { cli } = this;
2223

2324
try {
24-
const [day, month, year] = releaseDate.split('/');
25-
const value = new Date(`${month}/${day}/${year}`).valueOf();
26-
if (Number.isNaN(value) || value < 0) {
27-
throw new Error('Invalid date format');
28-
}
25+
validateDate(releaseDate);
2926
} catch (error) {
30-
cli.error('Invalid date format. Please use the format dd/mm/yyyy.');
27+
cli.error('Invalid date format. Please use the format yyyy/mm/dd.');
3128
process.exit(1);
3229
}
3330

0 commit comments

Comments
 (0)