dependabot-bun 0.296.2 → 0.296.3

Sign up to get free protection for your applications and to get access to all the features.
Files changed (144) hide show
  1. checksums.yaml +4 -4
  2. data/helpers/.eslintrc +11 -0
  3. data/helpers/README.md +29 -0
  4. data/helpers/build +26 -0
  5. data/helpers/jest.config.js +5 -0
  6. data/helpers/lib/npm/conflicting-dependency-parser.js +78 -0
  7. data/helpers/lib/npm/index.js +9 -0
  8. data/helpers/lib/npm/vulnerability-auditor.js +291 -0
  9. data/helpers/lib/npm6/helpers.js +25 -0
  10. data/helpers/lib/npm6/index.js +9 -0
  11. data/helpers/lib/npm6/peer-dependency-checker.js +111 -0
  12. data/helpers/lib/npm6/remove-dependencies-from-lockfile.js +22 -0
  13. data/helpers/lib/npm6/subdependency-updater.js +78 -0
  14. data/helpers/lib/npm6/updater.js +199 -0
  15. data/helpers/lib/pnpm/index.js +5 -0
  16. data/helpers/lib/pnpm/lockfile-parser.js +82 -0
  17. data/helpers/lib/yarn/conflicting-dependency-parser.js +176 -0
  18. data/helpers/lib/yarn/fix-duplicates.js +80 -0
  19. data/helpers/lib/yarn/helpers.js +54 -0
  20. data/helpers/lib/yarn/index.js +14 -0
  21. data/helpers/lib/yarn/lockfile-parser.js +21 -0
  22. data/helpers/lib/yarn/peer-dependency-checker.js +132 -0
  23. data/helpers/lib/yarn/replace-lockfile-declaration.js +57 -0
  24. data/helpers/lib/yarn/subdependency-updater.js +83 -0
  25. data/helpers/lib/yarn/updater.js +209 -0
  26. data/helpers/package-lock.json +28519 -0
  27. data/helpers/package.json +29 -0
  28. data/helpers/patches/npm++pacote+9.5.12.patch +14 -0
  29. data/helpers/run.js +30 -0
  30. data/helpers/test/npm6/conflicting-dependency-parser.test.js +66 -0
  31. data/helpers/test/npm6/fixtures/conflicting-dependency-parser/deeply-nested/package-lock.json +591 -0
  32. data/helpers/test/npm6/fixtures/conflicting-dependency-parser/deeply-nested/package.json +14 -0
  33. data/helpers/test/npm6/fixtures/conflicting-dependency-parser/nested/package-lock.json +188 -0
  34. data/helpers/test/npm6/fixtures/conflicting-dependency-parser/nested/package.json +14 -0
  35. data/helpers/test/npm6/fixtures/conflicting-dependency-parser/simple/package-lock.json +27 -0
  36. data/helpers/test/npm6/fixtures/conflicting-dependency-parser/simple/package.json +14 -0
  37. data/helpers/test/npm6/fixtures/updater/original/package-lock.json +16 -0
  38. data/helpers/test/npm6/fixtures/updater/original/package.json +9 -0
  39. data/helpers/test/npm6/fixtures/updater/updated/package-lock.json +16 -0
  40. data/helpers/test/npm6/helpers.js +21 -0
  41. data/helpers/test/npm6/updater.test.js +30 -0
  42. data/helpers/test/pnpm/fixtures/parser/empty_version/pnpm-lock.yaml +72 -0
  43. data/helpers/test/pnpm/fixtures/parser/no_lockfile_change/pnpm-lock.yaml +2744 -0
  44. data/helpers/test/pnpm/fixtures/parser/only_dev_dependencies/pnpm-lock.yaml +16 -0
  45. data/helpers/test/pnpm/fixtures/parser/peer_disambiguation/pnpm-lock.yaml +855 -0
  46. data/helpers/test/pnpm/lockfile-parser.test.js +62 -0
  47. data/helpers/test/yarn/conflicting-dependency-parser.test.js +83 -0
  48. data/helpers/test/yarn/fixtures/conflicting-dependency-parser/deeply-nested/package.json +14 -0
  49. data/helpers/test/yarn/fixtures/conflicting-dependency-parser/deeply-nested/yarn.lock +496 -0
  50. data/helpers/test/yarn/fixtures/conflicting-dependency-parser/dev-dependencies/package.json +14 -0
  51. data/helpers/test/yarn/fixtures/conflicting-dependency-parser/dev-dependencies/yarn.lock +21 -0
  52. data/helpers/test/yarn/fixtures/conflicting-dependency-parser/nested/package.json +14 -0
  53. data/helpers/test/yarn/fixtures/conflicting-dependency-parser/nested/yarn.lock +183 -0
  54. data/helpers/test/yarn/fixtures/conflicting-dependency-parser/simple/package.json +14 -0
  55. data/helpers/test/yarn/fixtures/conflicting-dependency-parser/simple/yarn.lock +21 -0
  56. data/helpers/test/yarn/fixtures/updater/illegal_character/package.json +8 -0
  57. data/helpers/test/yarn/fixtures/updater/illegal_character/yarn.lock +14 -0
  58. data/helpers/test/yarn/fixtures/updater/original/package.json +6 -0
  59. data/helpers/test/yarn/fixtures/updater/original/yarn.lock +11 -0
  60. data/helpers/test/yarn/fixtures/updater/updated/yarn.lock +12 -0
  61. data/helpers/test/yarn/fixtures/updater/with-version-comments/package.json +5 -0
  62. data/helpers/test/yarn/fixtures/updater/with-version-comments/yarn.lock +13 -0
  63. data/helpers/test/yarn/helpers.js +18 -0
  64. data/helpers/test/yarn/updater.test.js +117 -0
  65. data/lib/dependabot/bun/bun_package_manager.rb +47 -0
  66. data/lib/dependabot/bun/constraint_helper.rb +359 -0
  67. data/lib/dependabot/bun/dependency_files_filterer.rb +157 -0
  68. data/lib/dependabot/bun/file_fetcher/path_dependency_builder.rb +184 -0
  69. data/lib/dependabot/bun/file_fetcher.rb +402 -0
  70. data/lib/dependabot/bun/file_parser/bun_lock.rb +140 -0
  71. data/lib/dependabot/bun/file_parser/lockfile_parser.rb +105 -0
  72. data/lib/dependabot/bun/file_parser.rb +477 -0
  73. data/lib/dependabot/bun/file_updater/bun_lockfile_updater.rb +144 -0
  74. data/lib/dependabot/bun/file_updater/npmrc_builder.rb +256 -0
  75. data/lib/dependabot/bun/file_updater/package_json_preparer.rb +88 -0
  76. data/lib/dependabot/bun/file_updater/package_json_updater.rb +378 -0
  77. data/lib/dependabot/bun/file_updater.rb +203 -0
  78. data/lib/dependabot/bun/helpers.rb +93 -0
  79. data/lib/dependabot/bun/language.rb +45 -0
  80. data/lib/dependabot/bun/metadata_finder.rb +214 -0
  81. data/lib/dependabot/bun/native_helpers.rb +19 -0
  82. data/lib/dependabot/bun/package_manager.rb +280 -0
  83. data/lib/dependabot/bun/package_name.rb +118 -0
  84. data/lib/dependabot/bun/pnpm_package_manager.rb +55 -0
  85. data/lib/dependabot/bun/registry_helper.rb +188 -0
  86. data/lib/dependabot/bun/registry_parser.rb +93 -0
  87. data/lib/dependabot/bun/requirement.rb +146 -0
  88. data/lib/dependabot/bun/sub_dependency_files_filterer.rb +82 -0
  89. data/lib/dependabot/bun/update_checker/conflicting_dependency_resolver.rb +59 -0
  90. data/lib/dependabot/bun/update_checker/dependency_files_builder.rb +79 -0
  91. data/lib/dependabot/bun/update_checker/latest_version_finder.rb +448 -0
  92. data/lib/dependabot/bun/update_checker/library_detector.rb +76 -0
  93. data/lib/dependabot/bun/update_checker/registry_finder.rb +279 -0
  94. data/lib/dependabot/bun/update_checker/requirements_updater.rb +206 -0
  95. data/lib/dependabot/bun/update_checker/subdependency_version_resolver.rb +154 -0
  96. data/lib/dependabot/bun/update_checker/version_resolver.rb +583 -0
  97. data/lib/dependabot/bun/update_checker/vulnerability_auditor.rb +164 -0
  98. data/lib/dependabot/bun/update_checker.rb +455 -0
  99. data/lib/dependabot/bun/version.rb +138 -0
  100. data/lib/dependabot/bun/version_selector.rb +61 -0
  101. data/lib/dependabot/bun.rb +337 -35
  102. metadata +108 -65
  103. data/lib/dependabot/javascript/bun/file_fetcher.rb +0 -77
  104. data/lib/dependabot/javascript/bun/file_parser/bun_lock.rb +0 -156
  105. data/lib/dependabot/javascript/bun/file_parser/lockfile_parser.rb +0 -55
  106. data/lib/dependabot/javascript/bun/file_parser.rb +0 -74
  107. data/lib/dependabot/javascript/bun/file_updater/lockfile_updater.rb +0 -138
  108. data/lib/dependabot/javascript/bun/file_updater.rb +0 -75
  109. data/lib/dependabot/javascript/bun/helpers.rb +0 -72
  110. data/lib/dependabot/javascript/bun/package_manager.rb +0 -48
  111. data/lib/dependabot/javascript/bun/requirement.rb +0 -11
  112. data/lib/dependabot/javascript/bun/update_checker/conflicting_dependency_resolver.rb +0 -64
  113. data/lib/dependabot/javascript/bun/update_checker/dependency_files_builder.rb +0 -47
  114. data/lib/dependabot/javascript/bun/update_checker/latest_version_finder.rb +0 -450
  115. data/lib/dependabot/javascript/bun/update_checker/library_detector.rb +0 -76
  116. data/lib/dependabot/javascript/bun/update_checker/requirements_updater.rb +0 -203
  117. data/lib/dependabot/javascript/bun/update_checker/subdependency_version_resolver.rb +0 -144
  118. data/lib/dependabot/javascript/bun/update_checker/version_resolver.rb +0 -525
  119. data/lib/dependabot/javascript/bun/update_checker/vulnerability_auditor.rb +0 -165
  120. data/lib/dependabot/javascript/bun/update_checker.rb +0 -440
  121. data/lib/dependabot/javascript/bun/version.rb +0 -11
  122. data/lib/dependabot/javascript/shared/constraint_helper.rb +0 -359
  123. data/lib/dependabot/javascript/shared/dependency_files_filterer.rb +0 -164
  124. data/lib/dependabot/javascript/shared/file_fetcher.rb +0 -283
  125. data/lib/dependabot/javascript/shared/file_parser/lockfile_parser.rb +0 -106
  126. data/lib/dependabot/javascript/shared/file_parser.rb +0 -454
  127. data/lib/dependabot/javascript/shared/file_updater/npmrc_builder.rb +0 -394
  128. data/lib/dependabot/javascript/shared/file_updater/package_json_preparer.rb +0 -87
  129. data/lib/dependabot/javascript/shared/file_updater/package_json_updater.rb +0 -376
  130. data/lib/dependabot/javascript/shared/file_updater.rb +0 -179
  131. data/lib/dependabot/javascript/shared/language.rb +0 -45
  132. data/lib/dependabot/javascript/shared/metadata_finder.rb +0 -209
  133. data/lib/dependabot/javascript/shared/native_helpers.rb +0 -21
  134. data/lib/dependabot/javascript/shared/package_manager_detector.rb +0 -72
  135. data/lib/dependabot/javascript/shared/package_name.rb +0 -118
  136. data/lib/dependabot/javascript/shared/registry_helper.rb +0 -190
  137. data/lib/dependabot/javascript/shared/registry_parser.rb +0 -93
  138. data/lib/dependabot/javascript/shared/requirement.rb +0 -144
  139. data/lib/dependabot/javascript/shared/sub_dependency_files_filterer.rb +0 -79
  140. data/lib/dependabot/javascript/shared/update_checker/dependency_files_builder.rb +0 -87
  141. data/lib/dependabot/javascript/shared/update_checker/registry_finder.rb +0 -358
  142. data/lib/dependabot/javascript/shared/version.rb +0 -133
  143. data/lib/dependabot/javascript/shared/version_selector.rb +0 -60
  144. data/lib/dependabot/javascript.rb +0 -39
@@ -0,0 +1,164 @@
1
+ # typed: true
2
+ # frozen_string_literal: true
3
+
4
+ require "stringio"
5
+ require "dependabot/dependency"
6
+ require "dependabot/errors"
7
+ require "dependabot/logger"
8
+ require "dependabot/bun/file_parser"
9
+ require "dependabot/bun/helpers"
10
+ require "dependabot/bun/native_helpers"
11
+ require "dependabot/bun/update_checker"
12
+ require "dependabot/bun/update_checker/dependency_files_builder"
13
+ require "dependabot/shared_helpers"
14
+
15
+ module Dependabot
16
+ module Bun
17
+ class UpdateChecker < Dependabot::UpdateCheckers::Base
18
+ class VulnerabilityAuditor
19
+ def initialize(dependency_files:, credentials:)
20
+ @dependency_files = dependency_files
21
+ @credentials = credentials
22
+ end
23
+
24
+ # rubocop:disable Metrics/MethodLength
25
+ # Finds any dependencies in the `package-lock.json` or `npm-shrinkwrap.json` that have
26
+ # a subdependency on the given dependency that is locked to a vuln version range.
27
+ #
28
+ # NOTE: yarn is currently not supported.
29
+ #
30
+ # @param dependency [Dependabot::Dependency] the dependency to check
31
+ # @param security_advisories [Array<Dependabot::SecurityAdvisory>] advisories for the dependency
32
+ # @return [Hash<String, [String, Array<Hash<String, String>>]>] the audit results
33
+ # * :dependency_name [String] the name of the dependency
34
+ # * :fix_available [Boolean] whether a fix is available
35
+ # * :current_version [String] the version of the dependency
36
+ # * :target_version [String] the version of the dependency after the fix
37
+ # * :fix_updates [Array<Hash<String, String>>] a list of dependencies to update in order to fix
38
+ # * :dependency_name [String] the name of the blocking dependency
39
+ # * :current_version [String] the current version of the blocking dependency
40
+ # * :target_version [String] the target version of the blocking dependency
41
+ # * :top_level_ancestors [Array<String>] the names of top-level dependencies with a transitive
42
+ # dependency on the blocking dependency
43
+ # * :top_level_ancestors [Array<String>] the names of all top-level dependencies with a transitive
44
+ # dependency on the dependency
45
+ # * :explanation [String] an explanation for why the project failed the vulnerability auditor run
46
+ def audit(dependency:, security_advisories:)
47
+ Dependabot.logger.info("VulnerabilityAuditor: starting audit")
48
+
49
+ fix_unavailable = {
50
+ "dependency_name" => dependency.name,
51
+ "fix_available" => false,
52
+ "fix_updates" => [],
53
+ "top_level_ancestors" => []
54
+ }
55
+
56
+ SharedHelpers.in_a_temporary_directory do
57
+ dependency_files_builder = DependencyFilesBuilder.new(
58
+ dependency: dependency,
59
+ dependency_files: dependency_files,
60
+ credentials: credentials
61
+ )
62
+ dependency_files_builder.write_temporary_dependency_files
63
+
64
+ vuln_versions = security_advisories.map do |a|
65
+ {
66
+ dependency_name: a.dependency_name,
67
+ affected_versions: a.vulnerable_version_strings
68
+ }
69
+ end
70
+
71
+ audit_result = SharedHelpers.run_helper_subprocess(
72
+ command: NativeHelpers.helper_path,
73
+ function: "npm:vulnerabilityAuditor",
74
+ args: [Dir.pwd, vuln_versions]
75
+ )
76
+
77
+ validation_result = validate_audit_result(audit_result, security_advisories)
78
+ if validation_result != :viable
79
+ Dependabot.logger.info("VulnerabilityAuditor: audit result not viable: #{validation_result}")
80
+ fix_unavailable["explanation"] = explain_fix_unavailable(validation_result, dependency)
81
+ return fix_unavailable
82
+ end
83
+
84
+ Dependabot.logger.info("VulnerabilityAuditor: audit result viable")
85
+ audit_result
86
+ end
87
+ rescue SharedHelpers::HelperSubprocessFailed => e
88
+ log_helper_subprocess_failure(dependency, e)
89
+ fix_unavailable
90
+ end
91
+ # rubocop:enable Metrics/MethodLength
92
+
93
+ private
94
+
95
+ attr_reader :dependency_files
96
+ attr_reader :credentials
97
+
98
+ def explain_fix_unavailable(validation_result, dependency)
99
+ case validation_result
100
+ when :fix_unavailable, :dependency_still_vulnerable, :downgrades_dependencies
101
+ "No patched version available for #{dependency.name}"
102
+ when :fix_incomplete
103
+ "The lockfile might be out of sync?"
104
+ end
105
+ end
106
+
107
+ def validate_audit_result(audit_result, security_advisories)
108
+ return :fix_unavailable unless audit_result["fix_available"]
109
+ return :dependency_still_vulnerable if dependency_still_vulnerable?(audit_result, security_advisories)
110
+ return :downgrades_dependencies if downgrades_dependencies?(audit_result)
111
+ return :fix_incomplete if fix_incomplete?(audit_result)
112
+
113
+ :viable
114
+ end
115
+
116
+ def dependency_still_vulnerable?(audit_result, security_advisories)
117
+ # vulnerable dependency is removed if the target version is nil
118
+ return false unless audit_result["target_version"]
119
+
120
+ version = Version.new(audit_result["target_version"])
121
+ security_advisories.any? { |a| a.vulnerable?(version) }
122
+ end
123
+
124
+ def downgrades_dependencies?(audit_result)
125
+ return true if downgrades_version?(audit_result["current_version"], audit_result["target_version"])
126
+
127
+ audit_result["fix_updates"].any? do |update|
128
+ downgrades_version?(update["current_version"], update["target_version"])
129
+ end
130
+ end
131
+
132
+ def downgrades_version?(current_version, target_version)
133
+ return false unless target_version
134
+
135
+ current = Version.new(current_version)
136
+ target = Version.new(target_version)
137
+ current > target
138
+ end
139
+
140
+ def fix_incomplete?(audit_result)
141
+ audit_result["fix_updates"].any? { |update| !update.key?("target_version") } ||
142
+ audit_result["fix_updates"].empty?
143
+ end
144
+
145
+ def log_helper_subprocess_failure(dependency, error)
146
+ # See `Dependabot::SharedHelpers.run_helper_subprocess` for details on error context
147
+ context = error.error_context || {}
148
+
149
+ builder = ::StringIO.new
150
+ builder << "VulnerabilityAuditor: "
151
+ builder << "#{context[:function]} " if context[:function]
152
+ builder << "failed"
153
+ builder << " after #{context[:time_taken].truncate(2)}s" if context[:time_taken]
154
+ builder << " while auditing #{dependency.name}: "
155
+ builder << error.message
156
+ builder << "\n" << context[:trace]
157
+
158
+ msg = builder.string
159
+ Dependabot.logger.info(msg) # TODO: is this the right log level?
160
+ end
161
+ end
162
+ end
163
+ end
164
+ end
@@ -0,0 +1,455 @@
1
+ # typed: true
2
+ # frozen_string_literal: true
3
+
4
+ require "set"
5
+
6
+ require "dependabot/git_commit_checker"
7
+ require "dependabot/requirements_update_strategy"
8
+ require "dependabot/shared_helpers"
9
+ require "dependabot/update_checkers"
10
+ require "dependabot/update_checkers/base"
11
+
12
+ module Dependabot
13
+ module Bun
14
+ class UpdateChecker < Dependabot::UpdateCheckers::Base
15
+ require_relative "update_checker/requirements_updater"
16
+ require_relative "update_checker/library_detector"
17
+ require_relative "update_checker/latest_version_finder"
18
+ require_relative "update_checker/version_resolver"
19
+ require_relative "update_checker/subdependency_version_resolver"
20
+ require_relative "update_checker/conflicting_dependency_resolver"
21
+ require_relative "update_checker/vulnerability_auditor"
22
+
23
+ def up_to_date?
24
+ return false if security_update? &&
25
+ dependency.version &&
26
+ version_class.correct?(dependency.version) &&
27
+ vulnerable_versions.any? &&
28
+ !vulnerable_versions.include?(current_version)
29
+
30
+ super
31
+ end
32
+
33
+ def vulnerable?
34
+ super || vulnerable_versions.any?
35
+ end
36
+
37
+ def latest_version
38
+ @latest_version ||=
39
+ if git_dependency?
40
+ latest_version_for_git_dependency
41
+ else
42
+ latest_version_details&.fetch(:version)
43
+ end
44
+ end
45
+
46
+ def latest_resolvable_version
47
+ return unless latest_version
48
+
49
+ @latest_resolvable_version ||=
50
+ if dependency.top_level?
51
+ version_resolver.latest_resolvable_version
52
+ else
53
+ # If the dependency is indirect its version is constrained by the
54
+ # requirements placed on it by dependencies lower down the tree
55
+ subdependency_version_resolver.latest_resolvable_version
56
+ end
57
+ end
58
+
59
+ def lowest_security_fix_version
60
+ # This will require a full unlock to update multiple top level ancestors.
61
+ return if vulnerability_audit["fix_available"] && vulnerability_audit["top_level_ancestors"].count > 1
62
+
63
+ latest_version_finder.lowest_security_fix_version
64
+ end
65
+
66
+ def lowest_resolvable_security_fix_version
67
+ raise "Dependency not vulnerable!" unless vulnerable?
68
+
69
+ # NOTE: Currently, we don't resolve transitive/sub-dependencies as
70
+ # npm/yarn don't provide any control over updating to a specific
71
+ # sub-dependency version.
72
+
73
+ # Return nil for vulnerable transitive dependencies if there are conflicting dependencies.
74
+ # This helps catch errors in such cases.
75
+ return nil if !dependency.top_level? && conflicting_dependencies.any?
76
+
77
+ # For transitive dependencies without conflicts, return the latest resolvable transitive
78
+ # security fix version that does not require unlocking other dependencies.
79
+ return latest_resolvable_transitive_security_fix_version_with_no_unlock unless dependency.top_level?
80
+
81
+ # For top-level dependencies, return the lowest security fix version.
82
+ # TODO: Consider checking resolvability here in the future.
83
+ lowest_security_fix_version
84
+ end
85
+
86
+ def latest_resolvable_version_with_no_unlock
87
+ return latest_resolvable_version unless dependency.top_level?
88
+
89
+ return latest_resolvable_version_with_no_unlock_for_git_dependency if git_dependency?
90
+
91
+ latest_version_finder.latest_version_with_no_unlock
92
+ end
93
+
94
+ def latest_resolvable_previous_version(updated_version)
95
+ version_resolver.latest_resolvable_previous_version(updated_version)
96
+ end
97
+
98
+ def updated_requirements
99
+ resolvable_version =
100
+ if preferred_resolvable_version.is_a?(version_class)
101
+ preferred_resolvable_version.to_s
102
+ elsif preferred_resolvable_version.nil?
103
+ nil
104
+ else
105
+ # If the preferred_resolvable_version came back as anything other
106
+ # than a version class or `nil` it must be because this is a git
107
+ # dependency, for which we don't check resolvability.
108
+ latest_version_details&.fetch(:version, nil)&.to_s
109
+ end
110
+
111
+ @updated_requirements ||=
112
+ RequirementsUpdater.new(
113
+ requirements: dependency.requirements,
114
+ updated_source: updated_source,
115
+ latest_resolvable_version: resolvable_version,
116
+ update_strategy: requirements_update_strategy
117
+ ).updated_requirements
118
+ end
119
+
120
+ def requirements_unlocked_or_can_be?
121
+ !requirements_update_strategy.lockfile_only?
122
+ end
123
+
124
+ def requirements_update_strategy
125
+ # If passed in as an option (in the base class) honour that option
126
+ return @requirements_update_strategy if @requirements_update_strategy
127
+
128
+ # Otherwise, widen ranges for libraries and bump versions for apps
129
+ library? ? RequirementsUpdateStrategy::WidenRanges : RequirementsUpdateStrategy::BumpVersions
130
+ end
131
+
132
+ def conflicting_dependencies
133
+ conflicts = ConflictingDependencyResolver.new(
134
+ dependency_files: dependency_files,
135
+ credentials: credentials
136
+ ).conflicting_dependencies(
137
+ dependency: dependency,
138
+ target_version: lowest_security_fix_version
139
+ )
140
+ return conflicts unless vulnerability_audit_performed?
141
+
142
+ vulnerable = [vulnerability_audit].select do |hash|
143
+ !hash["fix_available"] && hash["explanation"]
144
+ end
145
+
146
+ conflicts + vulnerable
147
+ end
148
+
149
+ private
150
+
151
+ def vulnerability_audit_performed?
152
+ defined?(@vulnerability_audit)
153
+ end
154
+
155
+ def vulnerability_audit
156
+ @vulnerability_audit ||=
157
+ VulnerabilityAuditor.new(
158
+ dependency_files: dependency_files,
159
+ credentials: credentials
160
+ ).audit(
161
+ dependency: dependency,
162
+ security_advisories: security_advisories
163
+ )
164
+ end
165
+
166
+ def vulnerable_versions
167
+ @vulnerable_versions ||=
168
+ begin
169
+ all_versions = dependency.all_versions
170
+ .filter_map { |v| version_class.new(v) if version_class.correct?(v) }
171
+
172
+ all_versions.select do |v|
173
+ security_advisories.any? { |advisory| advisory.vulnerable?(v) }
174
+ end
175
+ end
176
+ end
177
+
178
+ def latest_version_resolvable_with_full_unlock?
179
+ return false unless latest_version
180
+
181
+ return version_resolver.latest_version_resolvable_with_full_unlock? if dependency.top_level?
182
+
183
+ return false unless security_advisories.any?
184
+
185
+ vulnerability_audit["fix_available"]
186
+ end
187
+
188
+ def updated_dependencies_after_full_unlock
189
+ return conflicting_updated_dependencies if security_advisories.any? && vulnerability_audit["fix_available"]
190
+
191
+ version_resolver.dependency_updates_from_full_unlock
192
+ .map { |update_details| build_updated_dependency(update_details) }
193
+ end
194
+
195
+ # rubocop:disable Metrics/AbcSize
196
+ def conflicting_updated_dependencies
197
+ top_level_dependencies = top_level_dependency_lookup
198
+
199
+ updated_deps = []
200
+ vulnerability_audit["fix_updates"].each do |update|
201
+ dependency_name = update["dependency_name"]
202
+ requirements = top_level_dependencies[dependency_name]&.requirements || []
203
+
204
+ updated_deps << build_updated_dependency(
205
+ dependency: Dependency.new(
206
+ name: dependency_name,
207
+ package_manager: "bun",
208
+ requirements: requirements
209
+ ),
210
+ version: update["target_version"],
211
+ previous_version: update["current_version"]
212
+ )
213
+ end
214
+ # rubocop:enable Metrics/AbcSize
215
+
216
+ # We don't need to directly update the target dependency if it will
217
+ # be updated as a side effect of updating the parent. However, we need
218
+ # to include it so it's described in the PR and we'll pass validation
219
+ # that this dependency is at a non-vulnerable version.
220
+ if updated_deps.none? { |dep| dep.name == dependency.name }
221
+ target_version = vulnerability_audit["target_version"]
222
+ updated_deps << build_updated_dependency(
223
+ dependency: dependency,
224
+ version: target_version,
225
+ previous_version: dependency.version,
226
+ removed: target_version.nil?,
227
+ metadata: { information_only: true } # Instruct updater to not directly update this dependency
228
+ )
229
+ end
230
+
231
+ # Target dependency should be first in the result to support rebases
232
+ updated_deps.select { |dep| dep.name == dependency.name } +
233
+ updated_deps.reject { |dep| dep.name == dependency.name }
234
+ end
235
+
236
+ def top_level_dependency_lookup
237
+ top_level_dependencies = FileParser.new(
238
+ dependency_files: dependency_files,
239
+ credentials: credentials,
240
+ source: nil
241
+ ).parse.select(&:top_level?)
242
+
243
+ top_level_dependencies.to_h { |dep| [dep.name, dep] }
244
+ end
245
+
246
+ def build_updated_dependency(update_details)
247
+ original_dep = update_details.fetch(:dependency)
248
+ removed = update_details.fetch(:removed, false)
249
+ version = update_details.fetch(:version).to_s unless removed
250
+ previous_version = update_details.fetch(:previous_version)&.to_s
251
+ metadata = update_details.fetch(:metadata, {})
252
+
253
+ Dependency.new(
254
+ name: original_dep.name,
255
+ version: version,
256
+ requirements: RequirementsUpdater.new(
257
+ requirements: original_dep.requirements,
258
+ updated_source: original_dep == dependency ? updated_source : original_source(original_dep),
259
+ latest_resolvable_version: version,
260
+ update_strategy: requirements_update_strategy
261
+ ).updated_requirements,
262
+ previous_version: previous_version,
263
+ previous_requirements: original_dep.requirements,
264
+ package_manager: original_dep.package_manager,
265
+ removed: removed,
266
+ metadata: metadata
267
+ )
268
+ end
269
+
270
+ def latest_resolvable_transitive_security_fix_version_with_no_unlock
271
+ fix_possible = Dependabot::UpdateCheckers::VersionFilters.filter_vulnerable_versions(
272
+ [latest_resolvable_version].compact,
273
+ security_advisories
274
+ ).any?
275
+ return nil unless fix_possible
276
+
277
+ latest_resolvable_version
278
+ end
279
+
280
+ def latest_resolvable_version_with_no_unlock_for_git_dependency
281
+ reqs = dependency.requirements.filter_map do |r|
282
+ next if r.fetch(:requirement).nil?
283
+
284
+ requirement_class.requirements_array(r.fetch(:requirement))
285
+ end
286
+
287
+ current_version =
288
+ if existing_version_is_sha? ||
289
+ !version_class.correct?(dependency.version)
290
+ dependency.version
291
+ else
292
+ version_class.new(dependency.version)
293
+ end
294
+
295
+ return current_version if git_commit_checker.pinned?
296
+
297
+ # TODO: Really we should get a tag that satisfies the semver req
298
+ return current_version if reqs.any?
299
+
300
+ git_commit_checker.head_commit_for_current_branch
301
+ end
302
+
303
+ def latest_version_for_git_dependency
304
+ @latest_version_for_git_dependency ||=
305
+ if version_class.correct?(dependency.version)
306
+ latest_git_version_details[:version] &&
307
+ version_class.new(latest_git_version_details[:version])
308
+ else
309
+ latest_git_version_details[:sha]
310
+ end
311
+ end
312
+
313
+ def latest_released_version
314
+ @latest_released_version ||=
315
+ latest_version_finder.latest_version_from_registry
316
+ end
317
+
318
+ def latest_version_details
319
+ @latest_version_details ||=
320
+ if git_dependency?
321
+ latest_git_version_details
322
+ else
323
+ { version: latest_released_version }
324
+ end
325
+ end
326
+
327
+ def latest_version_finder
328
+ @latest_version_finder ||=
329
+ LatestVersionFinder.new(
330
+ dependency: dependency,
331
+ credentials: credentials,
332
+ dependency_files: dependency_files,
333
+ ignored_versions: ignored_versions,
334
+ raise_on_ignored: raise_on_ignored,
335
+ security_advisories: security_advisories
336
+ )
337
+ end
338
+
339
+ def version_resolver
340
+ @version_resolver ||=
341
+ VersionResolver.new(
342
+ dependency: dependency,
343
+ credentials: credentials,
344
+ dependency_files: dependency_files,
345
+ latest_allowable_version: latest_version,
346
+ latest_version_finder: latest_version_finder,
347
+ repo_contents_path: repo_contents_path,
348
+ dependency_group: dependency_group
349
+ )
350
+ end
351
+
352
+ def subdependency_version_resolver
353
+ @subdependency_version_resolver ||=
354
+ SubdependencyVersionResolver.new(
355
+ dependency: dependency,
356
+ credentials: credentials,
357
+ dependency_files: dependency_files,
358
+ ignored_versions: ignored_versions,
359
+ latest_allowable_version: latest_version,
360
+ repo_contents_path: repo_contents_path
361
+ )
362
+ end
363
+
364
+ def git_dependency?
365
+ git_commit_checker.git_dependency?
366
+ end
367
+
368
+ def latest_git_version_details
369
+ semver_req =
370
+ dependency.requirements
371
+ .find { |req| req.dig(:source, :type) == "git" }
372
+ &.fetch(:requirement)
373
+
374
+ # If there was a semver requirement provided or the dependency was
375
+ # pinned to a version, look for the latest tag
376
+ if semver_req || git_commit_checker.pinned_ref_looks_like_version?
377
+ latest_tag = git_commit_checker.local_tag_for_latest_version
378
+ return {
379
+ sha: latest_tag&.fetch(:commit_sha),
380
+ version: latest_tag&.fetch(:tag)&.gsub(/^[^\d]*/, "")
381
+ }
382
+ end
383
+
384
+ # Otherwise, if the gem isn't pinned, the latest version is just the
385
+ # latest commit for the specified branch.
386
+ return { sha: git_commit_checker.head_commit_for_current_branch } unless git_commit_checker.pinned?
387
+
388
+ # If the dependency is pinned to a tag that doesn't look like a
389
+ # version then there's nothing we can do.
390
+ { sha: dependency.version }
391
+ end
392
+
393
+ def updated_source
394
+ # Never need to update source, unless a git_dependency
395
+ return dependency_source_details unless git_dependency?
396
+
397
+ # Update the git tag if updating a pinned version
398
+ if git_commit_checker.pinned_ref_looks_like_version? &&
399
+ !git_commit_checker.local_tag_for_latest_version.nil?
400
+ new_tag = git_commit_checker.local_tag_for_latest_version
401
+ return dependency_source_details.merge(ref: new_tag.fetch(:tag))
402
+ end
403
+
404
+ # Otherwise return the original source
405
+ dependency_source_details
406
+ end
407
+
408
+ def library?
409
+ return true unless dependency.version
410
+ return true if dependency_files.any? { |f| f.name == "lerna.json" }
411
+
412
+ @library =
413
+ LibraryDetector.new(
414
+ package_json_file: package_json,
415
+ credentials: credentials,
416
+ dependency_files: dependency_files
417
+ ).library?
418
+ end
419
+
420
+ def security_update?
421
+ security_advisories.any?
422
+ end
423
+
424
+ def dependency_source_details
425
+ original_source(dependency)
426
+ end
427
+
428
+ def original_source(updated_dependency)
429
+ sources =
430
+ updated_dependency.requirements.map { |r| r.fetch(:source) }.uniq.compact
431
+ .sort_by { |source| RegistryFinder.central_registry?(source[:url]) ? 1 : 0 }
432
+
433
+ sources.first
434
+ end
435
+
436
+ def package_json
437
+ @package_json ||=
438
+ dependency_files.find { |f| f.name == "package.json" }
439
+ end
440
+
441
+ def git_commit_checker
442
+ @git_commit_checker ||=
443
+ GitCommitChecker.new(
444
+ dependency: dependency,
445
+ credentials: credentials,
446
+ ignored_versions: ignored_versions,
447
+ raise_on_ignored: raise_on_ignored
448
+ )
449
+ end
450
+ end
451
+ end
452
+ end
453
+
454
+ Dependabot::UpdateCheckers
455
+ .register("bun", Dependabot::Bun::UpdateChecker)