dependabot-bun 0.296.2 → 0.296.3
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/helpers/.eslintrc +11 -0
- data/helpers/README.md +29 -0
- data/helpers/build +26 -0
- data/helpers/jest.config.js +5 -0
- data/helpers/lib/npm/conflicting-dependency-parser.js +78 -0
- data/helpers/lib/npm/index.js +9 -0
- data/helpers/lib/npm/vulnerability-auditor.js +291 -0
- data/helpers/lib/npm6/helpers.js +25 -0
- data/helpers/lib/npm6/index.js +9 -0
- data/helpers/lib/npm6/peer-dependency-checker.js +111 -0
- data/helpers/lib/npm6/remove-dependencies-from-lockfile.js +22 -0
- data/helpers/lib/npm6/subdependency-updater.js +78 -0
- data/helpers/lib/npm6/updater.js +199 -0
- data/helpers/lib/pnpm/index.js +5 -0
- data/helpers/lib/pnpm/lockfile-parser.js +82 -0
- data/helpers/lib/yarn/conflicting-dependency-parser.js +176 -0
- data/helpers/lib/yarn/fix-duplicates.js +80 -0
- data/helpers/lib/yarn/helpers.js +54 -0
- data/helpers/lib/yarn/index.js +14 -0
- data/helpers/lib/yarn/lockfile-parser.js +21 -0
- data/helpers/lib/yarn/peer-dependency-checker.js +132 -0
- data/helpers/lib/yarn/replace-lockfile-declaration.js +57 -0
- data/helpers/lib/yarn/subdependency-updater.js +83 -0
- data/helpers/lib/yarn/updater.js +209 -0
- data/helpers/package-lock.json +28519 -0
- data/helpers/package.json +29 -0
- data/helpers/patches/npm++pacote+9.5.12.patch +14 -0
- data/helpers/run.js +30 -0
- data/helpers/test/npm6/conflicting-dependency-parser.test.js +66 -0
- data/helpers/test/npm6/fixtures/conflicting-dependency-parser/deeply-nested/package-lock.json +591 -0
- data/helpers/test/npm6/fixtures/conflicting-dependency-parser/deeply-nested/package.json +14 -0
- data/helpers/test/npm6/fixtures/conflicting-dependency-parser/nested/package-lock.json +188 -0
- data/helpers/test/npm6/fixtures/conflicting-dependency-parser/nested/package.json +14 -0
- data/helpers/test/npm6/fixtures/conflicting-dependency-parser/simple/package-lock.json +27 -0
- data/helpers/test/npm6/fixtures/conflicting-dependency-parser/simple/package.json +14 -0
- data/helpers/test/npm6/fixtures/updater/original/package-lock.json +16 -0
- data/helpers/test/npm6/fixtures/updater/original/package.json +9 -0
- data/helpers/test/npm6/fixtures/updater/updated/package-lock.json +16 -0
- data/helpers/test/npm6/helpers.js +21 -0
- data/helpers/test/npm6/updater.test.js +30 -0
- data/helpers/test/pnpm/fixtures/parser/empty_version/pnpm-lock.yaml +72 -0
- data/helpers/test/pnpm/fixtures/parser/no_lockfile_change/pnpm-lock.yaml +2744 -0
- data/helpers/test/pnpm/fixtures/parser/only_dev_dependencies/pnpm-lock.yaml +16 -0
- data/helpers/test/pnpm/fixtures/parser/peer_disambiguation/pnpm-lock.yaml +855 -0
- data/helpers/test/pnpm/lockfile-parser.test.js +62 -0
- data/helpers/test/yarn/conflicting-dependency-parser.test.js +83 -0
- data/helpers/test/yarn/fixtures/conflicting-dependency-parser/deeply-nested/package.json +14 -0
- data/helpers/test/yarn/fixtures/conflicting-dependency-parser/deeply-nested/yarn.lock +496 -0
- data/helpers/test/yarn/fixtures/conflicting-dependency-parser/dev-dependencies/package.json +14 -0
- data/helpers/test/yarn/fixtures/conflicting-dependency-parser/dev-dependencies/yarn.lock +21 -0
- data/helpers/test/yarn/fixtures/conflicting-dependency-parser/nested/package.json +14 -0
- data/helpers/test/yarn/fixtures/conflicting-dependency-parser/nested/yarn.lock +183 -0
- data/helpers/test/yarn/fixtures/conflicting-dependency-parser/simple/package.json +14 -0
- data/helpers/test/yarn/fixtures/conflicting-dependency-parser/simple/yarn.lock +21 -0
- data/helpers/test/yarn/fixtures/updater/illegal_character/package.json +8 -0
- data/helpers/test/yarn/fixtures/updater/illegal_character/yarn.lock +14 -0
- data/helpers/test/yarn/fixtures/updater/original/package.json +6 -0
- data/helpers/test/yarn/fixtures/updater/original/yarn.lock +11 -0
- data/helpers/test/yarn/fixtures/updater/updated/yarn.lock +12 -0
- data/helpers/test/yarn/fixtures/updater/with-version-comments/package.json +5 -0
- data/helpers/test/yarn/fixtures/updater/with-version-comments/yarn.lock +13 -0
- data/helpers/test/yarn/helpers.js +18 -0
- data/helpers/test/yarn/updater.test.js +117 -0
- data/lib/dependabot/bun/bun_package_manager.rb +47 -0
- data/lib/dependabot/bun/constraint_helper.rb +359 -0
- data/lib/dependabot/bun/dependency_files_filterer.rb +157 -0
- data/lib/dependabot/bun/file_fetcher/path_dependency_builder.rb +184 -0
- data/lib/dependabot/bun/file_fetcher.rb +402 -0
- data/lib/dependabot/bun/file_parser/bun_lock.rb +140 -0
- data/lib/dependabot/bun/file_parser/lockfile_parser.rb +105 -0
- data/lib/dependabot/bun/file_parser.rb +477 -0
- data/lib/dependabot/bun/file_updater/bun_lockfile_updater.rb +144 -0
- data/lib/dependabot/bun/file_updater/npmrc_builder.rb +256 -0
- data/lib/dependabot/bun/file_updater/package_json_preparer.rb +88 -0
- data/lib/dependabot/bun/file_updater/package_json_updater.rb +378 -0
- data/lib/dependabot/bun/file_updater.rb +203 -0
- data/lib/dependabot/bun/helpers.rb +93 -0
- data/lib/dependabot/bun/language.rb +45 -0
- data/lib/dependabot/bun/metadata_finder.rb +214 -0
- data/lib/dependabot/bun/native_helpers.rb +19 -0
- data/lib/dependabot/bun/package_manager.rb +280 -0
- data/lib/dependabot/bun/package_name.rb +118 -0
- data/lib/dependabot/bun/pnpm_package_manager.rb +55 -0
- data/lib/dependabot/bun/registry_helper.rb +188 -0
- data/lib/dependabot/bun/registry_parser.rb +93 -0
- data/lib/dependabot/bun/requirement.rb +146 -0
- data/lib/dependabot/bun/sub_dependency_files_filterer.rb +82 -0
- data/lib/dependabot/bun/update_checker/conflicting_dependency_resolver.rb +59 -0
- data/lib/dependabot/bun/update_checker/dependency_files_builder.rb +79 -0
- data/lib/dependabot/bun/update_checker/latest_version_finder.rb +448 -0
- data/lib/dependabot/bun/update_checker/library_detector.rb +76 -0
- data/lib/dependabot/bun/update_checker/registry_finder.rb +279 -0
- data/lib/dependabot/bun/update_checker/requirements_updater.rb +206 -0
- data/lib/dependabot/bun/update_checker/subdependency_version_resolver.rb +154 -0
- data/lib/dependabot/bun/update_checker/version_resolver.rb +583 -0
- data/lib/dependabot/bun/update_checker/vulnerability_auditor.rb +164 -0
- data/lib/dependabot/bun/update_checker.rb +455 -0
- data/lib/dependabot/bun/version.rb +138 -0
- data/lib/dependabot/bun/version_selector.rb +61 -0
- data/lib/dependabot/bun.rb +337 -35
- metadata +108 -65
- data/lib/dependabot/javascript/bun/file_fetcher.rb +0 -77
- data/lib/dependabot/javascript/bun/file_parser/bun_lock.rb +0 -156
- data/lib/dependabot/javascript/bun/file_parser/lockfile_parser.rb +0 -55
- data/lib/dependabot/javascript/bun/file_parser.rb +0 -74
- data/lib/dependabot/javascript/bun/file_updater/lockfile_updater.rb +0 -138
- data/lib/dependabot/javascript/bun/file_updater.rb +0 -75
- data/lib/dependabot/javascript/bun/helpers.rb +0 -72
- data/lib/dependabot/javascript/bun/package_manager.rb +0 -48
- data/lib/dependabot/javascript/bun/requirement.rb +0 -11
- data/lib/dependabot/javascript/bun/update_checker/conflicting_dependency_resolver.rb +0 -64
- data/lib/dependabot/javascript/bun/update_checker/dependency_files_builder.rb +0 -47
- data/lib/dependabot/javascript/bun/update_checker/latest_version_finder.rb +0 -450
- data/lib/dependabot/javascript/bun/update_checker/library_detector.rb +0 -76
- data/lib/dependabot/javascript/bun/update_checker/requirements_updater.rb +0 -203
- data/lib/dependabot/javascript/bun/update_checker/subdependency_version_resolver.rb +0 -144
- data/lib/dependabot/javascript/bun/update_checker/version_resolver.rb +0 -525
- data/lib/dependabot/javascript/bun/update_checker/vulnerability_auditor.rb +0 -165
- data/lib/dependabot/javascript/bun/update_checker.rb +0 -440
- data/lib/dependabot/javascript/bun/version.rb +0 -11
- data/lib/dependabot/javascript/shared/constraint_helper.rb +0 -359
- data/lib/dependabot/javascript/shared/dependency_files_filterer.rb +0 -164
- data/lib/dependabot/javascript/shared/file_fetcher.rb +0 -283
- data/lib/dependabot/javascript/shared/file_parser/lockfile_parser.rb +0 -106
- data/lib/dependabot/javascript/shared/file_parser.rb +0 -454
- data/lib/dependabot/javascript/shared/file_updater/npmrc_builder.rb +0 -394
- data/lib/dependabot/javascript/shared/file_updater/package_json_preparer.rb +0 -87
- data/lib/dependabot/javascript/shared/file_updater/package_json_updater.rb +0 -376
- data/lib/dependabot/javascript/shared/file_updater.rb +0 -179
- data/lib/dependabot/javascript/shared/language.rb +0 -45
- data/lib/dependabot/javascript/shared/metadata_finder.rb +0 -209
- data/lib/dependabot/javascript/shared/native_helpers.rb +0 -21
- data/lib/dependabot/javascript/shared/package_manager_detector.rb +0 -72
- data/lib/dependabot/javascript/shared/package_name.rb +0 -118
- data/lib/dependabot/javascript/shared/registry_helper.rb +0 -190
- data/lib/dependabot/javascript/shared/registry_parser.rb +0 -93
- data/lib/dependabot/javascript/shared/requirement.rb +0 -144
- data/lib/dependabot/javascript/shared/sub_dependency_files_filterer.rb +0 -79
- data/lib/dependabot/javascript/shared/update_checker/dependency_files_builder.rb +0 -87
- data/lib/dependabot/javascript/shared/update_checker/registry_finder.rb +0 -358
- data/lib/dependabot/javascript/shared/version.rb +0 -133
- data/lib/dependabot/javascript/shared/version_selector.rb +0 -60
- data/lib/dependabot/javascript.rb +0 -39
@@ -0,0 +1,164 @@
|
|
1
|
+
# typed: true
|
2
|
+
# frozen_string_literal: true
|
3
|
+
|
4
|
+
require "stringio"
|
5
|
+
require "dependabot/dependency"
|
6
|
+
require "dependabot/errors"
|
7
|
+
require "dependabot/logger"
|
8
|
+
require "dependabot/bun/file_parser"
|
9
|
+
require "dependabot/bun/helpers"
|
10
|
+
require "dependabot/bun/native_helpers"
|
11
|
+
require "dependabot/bun/update_checker"
|
12
|
+
require "dependabot/bun/update_checker/dependency_files_builder"
|
13
|
+
require "dependabot/shared_helpers"
|
14
|
+
|
15
|
+
module Dependabot
|
16
|
+
module Bun
|
17
|
+
class UpdateChecker < Dependabot::UpdateCheckers::Base
|
18
|
+
class VulnerabilityAuditor
|
19
|
+
def initialize(dependency_files:, credentials:)
|
20
|
+
@dependency_files = dependency_files
|
21
|
+
@credentials = credentials
|
22
|
+
end
|
23
|
+
|
24
|
+
# rubocop:disable Metrics/MethodLength
|
25
|
+
# Finds any dependencies in the `package-lock.json` or `npm-shrinkwrap.json` that have
|
26
|
+
# a subdependency on the given dependency that is locked to a vuln version range.
|
27
|
+
#
|
28
|
+
# NOTE: yarn is currently not supported.
|
29
|
+
#
|
30
|
+
# @param dependency [Dependabot::Dependency] the dependency to check
|
31
|
+
# @param security_advisories [Array<Dependabot::SecurityAdvisory>] advisories for the dependency
|
32
|
+
# @return [Hash<String, [String, Array<Hash<String, String>>]>] the audit results
|
33
|
+
# * :dependency_name [String] the name of the dependency
|
34
|
+
# * :fix_available [Boolean] whether a fix is available
|
35
|
+
# * :current_version [String] the version of the dependency
|
36
|
+
# * :target_version [String] the version of the dependency after the fix
|
37
|
+
# * :fix_updates [Array<Hash<String, String>>] a list of dependencies to update in order to fix
|
38
|
+
# * :dependency_name [String] the name of the blocking dependency
|
39
|
+
# * :current_version [String] the current version of the blocking dependency
|
40
|
+
# * :target_version [String] the target version of the blocking dependency
|
41
|
+
# * :top_level_ancestors [Array<String>] the names of top-level dependencies with a transitive
|
42
|
+
# dependency on the blocking dependency
|
43
|
+
# * :top_level_ancestors [Array<String>] the names of all top-level dependencies with a transitive
|
44
|
+
# dependency on the dependency
|
45
|
+
# * :explanation [String] an explanation for why the project failed the vulnerability auditor run
|
46
|
+
def audit(dependency:, security_advisories:)
|
47
|
+
Dependabot.logger.info("VulnerabilityAuditor: starting audit")
|
48
|
+
|
49
|
+
fix_unavailable = {
|
50
|
+
"dependency_name" => dependency.name,
|
51
|
+
"fix_available" => false,
|
52
|
+
"fix_updates" => [],
|
53
|
+
"top_level_ancestors" => []
|
54
|
+
}
|
55
|
+
|
56
|
+
SharedHelpers.in_a_temporary_directory do
|
57
|
+
dependency_files_builder = DependencyFilesBuilder.new(
|
58
|
+
dependency: dependency,
|
59
|
+
dependency_files: dependency_files,
|
60
|
+
credentials: credentials
|
61
|
+
)
|
62
|
+
dependency_files_builder.write_temporary_dependency_files
|
63
|
+
|
64
|
+
vuln_versions = security_advisories.map do |a|
|
65
|
+
{
|
66
|
+
dependency_name: a.dependency_name,
|
67
|
+
affected_versions: a.vulnerable_version_strings
|
68
|
+
}
|
69
|
+
end
|
70
|
+
|
71
|
+
audit_result = SharedHelpers.run_helper_subprocess(
|
72
|
+
command: NativeHelpers.helper_path,
|
73
|
+
function: "npm:vulnerabilityAuditor",
|
74
|
+
args: [Dir.pwd, vuln_versions]
|
75
|
+
)
|
76
|
+
|
77
|
+
validation_result = validate_audit_result(audit_result, security_advisories)
|
78
|
+
if validation_result != :viable
|
79
|
+
Dependabot.logger.info("VulnerabilityAuditor: audit result not viable: #{validation_result}")
|
80
|
+
fix_unavailable["explanation"] = explain_fix_unavailable(validation_result, dependency)
|
81
|
+
return fix_unavailable
|
82
|
+
end
|
83
|
+
|
84
|
+
Dependabot.logger.info("VulnerabilityAuditor: audit result viable")
|
85
|
+
audit_result
|
86
|
+
end
|
87
|
+
rescue SharedHelpers::HelperSubprocessFailed => e
|
88
|
+
log_helper_subprocess_failure(dependency, e)
|
89
|
+
fix_unavailable
|
90
|
+
end
|
91
|
+
# rubocop:enable Metrics/MethodLength
|
92
|
+
|
93
|
+
private
|
94
|
+
|
95
|
+
attr_reader :dependency_files
|
96
|
+
attr_reader :credentials
|
97
|
+
|
98
|
+
def explain_fix_unavailable(validation_result, dependency)
|
99
|
+
case validation_result
|
100
|
+
when :fix_unavailable, :dependency_still_vulnerable, :downgrades_dependencies
|
101
|
+
"No patched version available for #{dependency.name}"
|
102
|
+
when :fix_incomplete
|
103
|
+
"The lockfile might be out of sync?"
|
104
|
+
end
|
105
|
+
end
|
106
|
+
|
107
|
+
def validate_audit_result(audit_result, security_advisories)
|
108
|
+
return :fix_unavailable unless audit_result["fix_available"]
|
109
|
+
return :dependency_still_vulnerable if dependency_still_vulnerable?(audit_result, security_advisories)
|
110
|
+
return :downgrades_dependencies if downgrades_dependencies?(audit_result)
|
111
|
+
return :fix_incomplete if fix_incomplete?(audit_result)
|
112
|
+
|
113
|
+
:viable
|
114
|
+
end
|
115
|
+
|
116
|
+
def dependency_still_vulnerable?(audit_result, security_advisories)
|
117
|
+
# vulnerable dependency is removed if the target version is nil
|
118
|
+
return false unless audit_result["target_version"]
|
119
|
+
|
120
|
+
version = Version.new(audit_result["target_version"])
|
121
|
+
security_advisories.any? { |a| a.vulnerable?(version) }
|
122
|
+
end
|
123
|
+
|
124
|
+
def downgrades_dependencies?(audit_result)
|
125
|
+
return true if downgrades_version?(audit_result["current_version"], audit_result["target_version"])
|
126
|
+
|
127
|
+
audit_result["fix_updates"].any? do |update|
|
128
|
+
downgrades_version?(update["current_version"], update["target_version"])
|
129
|
+
end
|
130
|
+
end
|
131
|
+
|
132
|
+
def downgrades_version?(current_version, target_version)
|
133
|
+
return false unless target_version
|
134
|
+
|
135
|
+
current = Version.new(current_version)
|
136
|
+
target = Version.new(target_version)
|
137
|
+
current > target
|
138
|
+
end
|
139
|
+
|
140
|
+
def fix_incomplete?(audit_result)
|
141
|
+
audit_result["fix_updates"].any? { |update| !update.key?("target_version") } ||
|
142
|
+
audit_result["fix_updates"].empty?
|
143
|
+
end
|
144
|
+
|
145
|
+
def log_helper_subprocess_failure(dependency, error)
|
146
|
+
# See `Dependabot::SharedHelpers.run_helper_subprocess` for details on error context
|
147
|
+
context = error.error_context || {}
|
148
|
+
|
149
|
+
builder = ::StringIO.new
|
150
|
+
builder << "VulnerabilityAuditor: "
|
151
|
+
builder << "#{context[:function]} " if context[:function]
|
152
|
+
builder << "failed"
|
153
|
+
builder << " after #{context[:time_taken].truncate(2)}s" if context[:time_taken]
|
154
|
+
builder << " while auditing #{dependency.name}: "
|
155
|
+
builder << error.message
|
156
|
+
builder << "\n" << context[:trace]
|
157
|
+
|
158
|
+
msg = builder.string
|
159
|
+
Dependabot.logger.info(msg) # TODO: is this the right log level?
|
160
|
+
end
|
161
|
+
end
|
162
|
+
end
|
163
|
+
end
|
164
|
+
end
|
@@ -0,0 +1,455 @@
|
|
1
|
+
# typed: true
|
2
|
+
# frozen_string_literal: true
|
3
|
+
|
4
|
+
require "set"
|
5
|
+
|
6
|
+
require "dependabot/git_commit_checker"
|
7
|
+
require "dependabot/requirements_update_strategy"
|
8
|
+
require "dependabot/shared_helpers"
|
9
|
+
require "dependabot/update_checkers"
|
10
|
+
require "dependabot/update_checkers/base"
|
11
|
+
|
12
|
+
module Dependabot
|
13
|
+
module Bun
|
14
|
+
class UpdateChecker < Dependabot::UpdateCheckers::Base
|
15
|
+
require_relative "update_checker/requirements_updater"
|
16
|
+
require_relative "update_checker/library_detector"
|
17
|
+
require_relative "update_checker/latest_version_finder"
|
18
|
+
require_relative "update_checker/version_resolver"
|
19
|
+
require_relative "update_checker/subdependency_version_resolver"
|
20
|
+
require_relative "update_checker/conflicting_dependency_resolver"
|
21
|
+
require_relative "update_checker/vulnerability_auditor"
|
22
|
+
|
23
|
+
def up_to_date?
|
24
|
+
return false if security_update? &&
|
25
|
+
dependency.version &&
|
26
|
+
version_class.correct?(dependency.version) &&
|
27
|
+
vulnerable_versions.any? &&
|
28
|
+
!vulnerable_versions.include?(current_version)
|
29
|
+
|
30
|
+
super
|
31
|
+
end
|
32
|
+
|
33
|
+
def vulnerable?
|
34
|
+
super || vulnerable_versions.any?
|
35
|
+
end
|
36
|
+
|
37
|
+
def latest_version
|
38
|
+
@latest_version ||=
|
39
|
+
if git_dependency?
|
40
|
+
latest_version_for_git_dependency
|
41
|
+
else
|
42
|
+
latest_version_details&.fetch(:version)
|
43
|
+
end
|
44
|
+
end
|
45
|
+
|
46
|
+
def latest_resolvable_version
|
47
|
+
return unless latest_version
|
48
|
+
|
49
|
+
@latest_resolvable_version ||=
|
50
|
+
if dependency.top_level?
|
51
|
+
version_resolver.latest_resolvable_version
|
52
|
+
else
|
53
|
+
# If the dependency is indirect its version is constrained by the
|
54
|
+
# requirements placed on it by dependencies lower down the tree
|
55
|
+
subdependency_version_resolver.latest_resolvable_version
|
56
|
+
end
|
57
|
+
end
|
58
|
+
|
59
|
+
def lowest_security_fix_version
|
60
|
+
# This will require a full unlock to update multiple top level ancestors.
|
61
|
+
return if vulnerability_audit["fix_available"] && vulnerability_audit["top_level_ancestors"].count > 1
|
62
|
+
|
63
|
+
latest_version_finder.lowest_security_fix_version
|
64
|
+
end
|
65
|
+
|
66
|
+
def lowest_resolvable_security_fix_version
|
67
|
+
raise "Dependency not vulnerable!" unless vulnerable?
|
68
|
+
|
69
|
+
# NOTE: Currently, we don't resolve transitive/sub-dependencies as
|
70
|
+
# npm/yarn don't provide any control over updating to a specific
|
71
|
+
# sub-dependency version.
|
72
|
+
|
73
|
+
# Return nil for vulnerable transitive dependencies if there are conflicting dependencies.
|
74
|
+
# This helps catch errors in such cases.
|
75
|
+
return nil if !dependency.top_level? && conflicting_dependencies.any?
|
76
|
+
|
77
|
+
# For transitive dependencies without conflicts, return the latest resolvable transitive
|
78
|
+
# security fix version that does not require unlocking other dependencies.
|
79
|
+
return latest_resolvable_transitive_security_fix_version_with_no_unlock unless dependency.top_level?
|
80
|
+
|
81
|
+
# For top-level dependencies, return the lowest security fix version.
|
82
|
+
# TODO: Consider checking resolvability here in the future.
|
83
|
+
lowest_security_fix_version
|
84
|
+
end
|
85
|
+
|
86
|
+
def latest_resolvable_version_with_no_unlock
|
87
|
+
return latest_resolvable_version unless dependency.top_level?
|
88
|
+
|
89
|
+
return latest_resolvable_version_with_no_unlock_for_git_dependency if git_dependency?
|
90
|
+
|
91
|
+
latest_version_finder.latest_version_with_no_unlock
|
92
|
+
end
|
93
|
+
|
94
|
+
def latest_resolvable_previous_version(updated_version)
|
95
|
+
version_resolver.latest_resolvable_previous_version(updated_version)
|
96
|
+
end
|
97
|
+
|
98
|
+
def updated_requirements
|
99
|
+
resolvable_version =
|
100
|
+
if preferred_resolvable_version.is_a?(version_class)
|
101
|
+
preferred_resolvable_version.to_s
|
102
|
+
elsif preferred_resolvable_version.nil?
|
103
|
+
nil
|
104
|
+
else
|
105
|
+
# If the preferred_resolvable_version came back as anything other
|
106
|
+
# than a version class or `nil` it must be because this is a git
|
107
|
+
# dependency, for which we don't check resolvability.
|
108
|
+
latest_version_details&.fetch(:version, nil)&.to_s
|
109
|
+
end
|
110
|
+
|
111
|
+
@updated_requirements ||=
|
112
|
+
RequirementsUpdater.new(
|
113
|
+
requirements: dependency.requirements,
|
114
|
+
updated_source: updated_source,
|
115
|
+
latest_resolvable_version: resolvable_version,
|
116
|
+
update_strategy: requirements_update_strategy
|
117
|
+
).updated_requirements
|
118
|
+
end
|
119
|
+
|
120
|
+
def requirements_unlocked_or_can_be?
|
121
|
+
!requirements_update_strategy.lockfile_only?
|
122
|
+
end
|
123
|
+
|
124
|
+
def requirements_update_strategy
|
125
|
+
# If passed in as an option (in the base class) honour that option
|
126
|
+
return @requirements_update_strategy if @requirements_update_strategy
|
127
|
+
|
128
|
+
# Otherwise, widen ranges for libraries and bump versions for apps
|
129
|
+
library? ? RequirementsUpdateStrategy::WidenRanges : RequirementsUpdateStrategy::BumpVersions
|
130
|
+
end
|
131
|
+
|
132
|
+
def conflicting_dependencies
|
133
|
+
conflicts = ConflictingDependencyResolver.new(
|
134
|
+
dependency_files: dependency_files,
|
135
|
+
credentials: credentials
|
136
|
+
).conflicting_dependencies(
|
137
|
+
dependency: dependency,
|
138
|
+
target_version: lowest_security_fix_version
|
139
|
+
)
|
140
|
+
return conflicts unless vulnerability_audit_performed?
|
141
|
+
|
142
|
+
vulnerable = [vulnerability_audit].select do |hash|
|
143
|
+
!hash["fix_available"] && hash["explanation"]
|
144
|
+
end
|
145
|
+
|
146
|
+
conflicts + vulnerable
|
147
|
+
end
|
148
|
+
|
149
|
+
private
|
150
|
+
|
151
|
+
def vulnerability_audit_performed?
|
152
|
+
defined?(@vulnerability_audit)
|
153
|
+
end
|
154
|
+
|
155
|
+
def vulnerability_audit
|
156
|
+
@vulnerability_audit ||=
|
157
|
+
VulnerabilityAuditor.new(
|
158
|
+
dependency_files: dependency_files,
|
159
|
+
credentials: credentials
|
160
|
+
).audit(
|
161
|
+
dependency: dependency,
|
162
|
+
security_advisories: security_advisories
|
163
|
+
)
|
164
|
+
end
|
165
|
+
|
166
|
+
def vulnerable_versions
|
167
|
+
@vulnerable_versions ||=
|
168
|
+
begin
|
169
|
+
all_versions = dependency.all_versions
|
170
|
+
.filter_map { |v| version_class.new(v) if version_class.correct?(v) }
|
171
|
+
|
172
|
+
all_versions.select do |v|
|
173
|
+
security_advisories.any? { |advisory| advisory.vulnerable?(v) }
|
174
|
+
end
|
175
|
+
end
|
176
|
+
end
|
177
|
+
|
178
|
+
def latest_version_resolvable_with_full_unlock?
|
179
|
+
return false unless latest_version
|
180
|
+
|
181
|
+
return version_resolver.latest_version_resolvable_with_full_unlock? if dependency.top_level?
|
182
|
+
|
183
|
+
return false unless security_advisories.any?
|
184
|
+
|
185
|
+
vulnerability_audit["fix_available"]
|
186
|
+
end
|
187
|
+
|
188
|
+
def updated_dependencies_after_full_unlock
|
189
|
+
return conflicting_updated_dependencies if security_advisories.any? && vulnerability_audit["fix_available"]
|
190
|
+
|
191
|
+
version_resolver.dependency_updates_from_full_unlock
|
192
|
+
.map { |update_details| build_updated_dependency(update_details) }
|
193
|
+
end
|
194
|
+
|
195
|
+
# rubocop:disable Metrics/AbcSize
|
196
|
+
def conflicting_updated_dependencies
|
197
|
+
top_level_dependencies = top_level_dependency_lookup
|
198
|
+
|
199
|
+
updated_deps = []
|
200
|
+
vulnerability_audit["fix_updates"].each do |update|
|
201
|
+
dependency_name = update["dependency_name"]
|
202
|
+
requirements = top_level_dependencies[dependency_name]&.requirements || []
|
203
|
+
|
204
|
+
updated_deps << build_updated_dependency(
|
205
|
+
dependency: Dependency.new(
|
206
|
+
name: dependency_name,
|
207
|
+
package_manager: "bun",
|
208
|
+
requirements: requirements
|
209
|
+
),
|
210
|
+
version: update["target_version"],
|
211
|
+
previous_version: update["current_version"]
|
212
|
+
)
|
213
|
+
end
|
214
|
+
# rubocop:enable Metrics/AbcSize
|
215
|
+
|
216
|
+
# We don't need to directly update the target dependency if it will
|
217
|
+
# be updated as a side effect of updating the parent. However, we need
|
218
|
+
# to include it so it's described in the PR and we'll pass validation
|
219
|
+
# that this dependency is at a non-vulnerable version.
|
220
|
+
if updated_deps.none? { |dep| dep.name == dependency.name }
|
221
|
+
target_version = vulnerability_audit["target_version"]
|
222
|
+
updated_deps << build_updated_dependency(
|
223
|
+
dependency: dependency,
|
224
|
+
version: target_version,
|
225
|
+
previous_version: dependency.version,
|
226
|
+
removed: target_version.nil?,
|
227
|
+
metadata: { information_only: true } # Instruct updater to not directly update this dependency
|
228
|
+
)
|
229
|
+
end
|
230
|
+
|
231
|
+
# Target dependency should be first in the result to support rebases
|
232
|
+
updated_deps.select { |dep| dep.name == dependency.name } +
|
233
|
+
updated_deps.reject { |dep| dep.name == dependency.name }
|
234
|
+
end
|
235
|
+
|
236
|
+
def top_level_dependency_lookup
|
237
|
+
top_level_dependencies = FileParser.new(
|
238
|
+
dependency_files: dependency_files,
|
239
|
+
credentials: credentials,
|
240
|
+
source: nil
|
241
|
+
).parse.select(&:top_level?)
|
242
|
+
|
243
|
+
top_level_dependencies.to_h { |dep| [dep.name, dep] }
|
244
|
+
end
|
245
|
+
|
246
|
+
def build_updated_dependency(update_details)
|
247
|
+
original_dep = update_details.fetch(:dependency)
|
248
|
+
removed = update_details.fetch(:removed, false)
|
249
|
+
version = update_details.fetch(:version).to_s unless removed
|
250
|
+
previous_version = update_details.fetch(:previous_version)&.to_s
|
251
|
+
metadata = update_details.fetch(:metadata, {})
|
252
|
+
|
253
|
+
Dependency.new(
|
254
|
+
name: original_dep.name,
|
255
|
+
version: version,
|
256
|
+
requirements: RequirementsUpdater.new(
|
257
|
+
requirements: original_dep.requirements,
|
258
|
+
updated_source: original_dep == dependency ? updated_source : original_source(original_dep),
|
259
|
+
latest_resolvable_version: version,
|
260
|
+
update_strategy: requirements_update_strategy
|
261
|
+
).updated_requirements,
|
262
|
+
previous_version: previous_version,
|
263
|
+
previous_requirements: original_dep.requirements,
|
264
|
+
package_manager: original_dep.package_manager,
|
265
|
+
removed: removed,
|
266
|
+
metadata: metadata
|
267
|
+
)
|
268
|
+
end
|
269
|
+
|
270
|
+
def latest_resolvable_transitive_security_fix_version_with_no_unlock
|
271
|
+
fix_possible = Dependabot::UpdateCheckers::VersionFilters.filter_vulnerable_versions(
|
272
|
+
[latest_resolvable_version].compact,
|
273
|
+
security_advisories
|
274
|
+
).any?
|
275
|
+
return nil unless fix_possible
|
276
|
+
|
277
|
+
latest_resolvable_version
|
278
|
+
end
|
279
|
+
|
280
|
+
def latest_resolvable_version_with_no_unlock_for_git_dependency
|
281
|
+
reqs = dependency.requirements.filter_map do |r|
|
282
|
+
next if r.fetch(:requirement).nil?
|
283
|
+
|
284
|
+
requirement_class.requirements_array(r.fetch(:requirement))
|
285
|
+
end
|
286
|
+
|
287
|
+
current_version =
|
288
|
+
if existing_version_is_sha? ||
|
289
|
+
!version_class.correct?(dependency.version)
|
290
|
+
dependency.version
|
291
|
+
else
|
292
|
+
version_class.new(dependency.version)
|
293
|
+
end
|
294
|
+
|
295
|
+
return current_version if git_commit_checker.pinned?
|
296
|
+
|
297
|
+
# TODO: Really we should get a tag that satisfies the semver req
|
298
|
+
return current_version if reqs.any?
|
299
|
+
|
300
|
+
git_commit_checker.head_commit_for_current_branch
|
301
|
+
end
|
302
|
+
|
303
|
+
def latest_version_for_git_dependency
|
304
|
+
@latest_version_for_git_dependency ||=
|
305
|
+
if version_class.correct?(dependency.version)
|
306
|
+
latest_git_version_details[:version] &&
|
307
|
+
version_class.new(latest_git_version_details[:version])
|
308
|
+
else
|
309
|
+
latest_git_version_details[:sha]
|
310
|
+
end
|
311
|
+
end
|
312
|
+
|
313
|
+
def latest_released_version
|
314
|
+
@latest_released_version ||=
|
315
|
+
latest_version_finder.latest_version_from_registry
|
316
|
+
end
|
317
|
+
|
318
|
+
def latest_version_details
|
319
|
+
@latest_version_details ||=
|
320
|
+
if git_dependency?
|
321
|
+
latest_git_version_details
|
322
|
+
else
|
323
|
+
{ version: latest_released_version }
|
324
|
+
end
|
325
|
+
end
|
326
|
+
|
327
|
+
def latest_version_finder
|
328
|
+
@latest_version_finder ||=
|
329
|
+
LatestVersionFinder.new(
|
330
|
+
dependency: dependency,
|
331
|
+
credentials: credentials,
|
332
|
+
dependency_files: dependency_files,
|
333
|
+
ignored_versions: ignored_versions,
|
334
|
+
raise_on_ignored: raise_on_ignored,
|
335
|
+
security_advisories: security_advisories
|
336
|
+
)
|
337
|
+
end
|
338
|
+
|
339
|
+
def version_resolver
|
340
|
+
@version_resolver ||=
|
341
|
+
VersionResolver.new(
|
342
|
+
dependency: dependency,
|
343
|
+
credentials: credentials,
|
344
|
+
dependency_files: dependency_files,
|
345
|
+
latest_allowable_version: latest_version,
|
346
|
+
latest_version_finder: latest_version_finder,
|
347
|
+
repo_contents_path: repo_contents_path,
|
348
|
+
dependency_group: dependency_group
|
349
|
+
)
|
350
|
+
end
|
351
|
+
|
352
|
+
def subdependency_version_resolver
|
353
|
+
@subdependency_version_resolver ||=
|
354
|
+
SubdependencyVersionResolver.new(
|
355
|
+
dependency: dependency,
|
356
|
+
credentials: credentials,
|
357
|
+
dependency_files: dependency_files,
|
358
|
+
ignored_versions: ignored_versions,
|
359
|
+
latest_allowable_version: latest_version,
|
360
|
+
repo_contents_path: repo_contents_path
|
361
|
+
)
|
362
|
+
end
|
363
|
+
|
364
|
+
def git_dependency?
|
365
|
+
git_commit_checker.git_dependency?
|
366
|
+
end
|
367
|
+
|
368
|
+
def latest_git_version_details
|
369
|
+
semver_req =
|
370
|
+
dependency.requirements
|
371
|
+
.find { |req| req.dig(:source, :type) == "git" }
|
372
|
+
&.fetch(:requirement)
|
373
|
+
|
374
|
+
# If there was a semver requirement provided or the dependency was
|
375
|
+
# pinned to a version, look for the latest tag
|
376
|
+
if semver_req || git_commit_checker.pinned_ref_looks_like_version?
|
377
|
+
latest_tag = git_commit_checker.local_tag_for_latest_version
|
378
|
+
return {
|
379
|
+
sha: latest_tag&.fetch(:commit_sha),
|
380
|
+
version: latest_tag&.fetch(:tag)&.gsub(/^[^\d]*/, "")
|
381
|
+
}
|
382
|
+
end
|
383
|
+
|
384
|
+
# Otherwise, if the gem isn't pinned, the latest version is just the
|
385
|
+
# latest commit for the specified branch.
|
386
|
+
return { sha: git_commit_checker.head_commit_for_current_branch } unless git_commit_checker.pinned?
|
387
|
+
|
388
|
+
# If the dependency is pinned to a tag that doesn't look like a
|
389
|
+
# version then there's nothing we can do.
|
390
|
+
{ sha: dependency.version }
|
391
|
+
end
|
392
|
+
|
393
|
+
def updated_source
|
394
|
+
# Never need to update source, unless a git_dependency
|
395
|
+
return dependency_source_details unless git_dependency?
|
396
|
+
|
397
|
+
# Update the git tag if updating a pinned version
|
398
|
+
if git_commit_checker.pinned_ref_looks_like_version? &&
|
399
|
+
!git_commit_checker.local_tag_for_latest_version.nil?
|
400
|
+
new_tag = git_commit_checker.local_tag_for_latest_version
|
401
|
+
return dependency_source_details.merge(ref: new_tag.fetch(:tag))
|
402
|
+
end
|
403
|
+
|
404
|
+
# Otherwise return the original source
|
405
|
+
dependency_source_details
|
406
|
+
end
|
407
|
+
|
408
|
+
def library?
|
409
|
+
return true unless dependency.version
|
410
|
+
return true if dependency_files.any? { |f| f.name == "lerna.json" }
|
411
|
+
|
412
|
+
@library =
|
413
|
+
LibraryDetector.new(
|
414
|
+
package_json_file: package_json,
|
415
|
+
credentials: credentials,
|
416
|
+
dependency_files: dependency_files
|
417
|
+
).library?
|
418
|
+
end
|
419
|
+
|
420
|
+
def security_update?
|
421
|
+
security_advisories.any?
|
422
|
+
end
|
423
|
+
|
424
|
+
def dependency_source_details
|
425
|
+
original_source(dependency)
|
426
|
+
end
|
427
|
+
|
428
|
+
def original_source(updated_dependency)
|
429
|
+
sources =
|
430
|
+
updated_dependency.requirements.map { |r| r.fetch(:source) }.uniq.compact
|
431
|
+
.sort_by { |source| RegistryFinder.central_registry?(source[:url]) ? 1 : 0 }
|
432
|
+
|
433
|
+
sources.first
|
434
|
+
end
|
435
|
+
|
436
|
+
def package_json
|
437
|
+
@package_json ||=
|
438
|
+
dependency_files.find { |f| f.name == "package.json" }
|
439
|
+
end
|
440
|
+
|
441
|
+
def git_commit_checker
|
442
|
+
@git_commit_checker ||=
|
443
|
+
GitCommitChecker.new(
|
444
|
+
dependency: dependency,
|
445
|
+
credentials: credentials,
|
446
|
+
ignored_versions: ignored_versions,
|
447
|
+
raise_on_ignored: raise_on_ignored
|
448
|
+
)
|
449
|
+
end
|
450
|
+
end
|
451
|
+
end
|
452
|
+
end
|
453
|
+
|
454
|
+
Dependabot::UpdateCheckers
|
455
|
+
.register("bun", Dependabot::Bun::UpdateChecker)
|