yarn-audit-wrap 0.1.0
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +7 -0
- data/.standard.yml +3 -0
- data/Gemfile +12 -0
- data/Guardfile +29 -0
- data/LICENSE.txt +21 -0
- data/README.md +73 -0
- data/Rakefile +14 -0
- data/bin/yarn_audit_wrap +15 -0
- data/lib/yarn/audit/wrap/audit_parser.rb +61 -0
- data/lib/yarn/audit/wrap/config.rb +30 -0
- data/lib/yarn/audit/wrap/opt_parser.rb +93 -0
- data/lib/yarn/audit/wrap/version.rb +9 -0
- data/lib/yarn/audit/wrap/yarn_command.rb +20 -0
- data/lib/yarn/audit/wrap.rb +129 -0
- data/sig/yarn/audit/wrap.rbs +8 -0
- metadata +162 -0
checksums.yaml
ADDED
@@ -0,0 +1,7 @@
|
|
1
|
+
---
|
2
|
+
SHA256:
|
3
|
+
metadata.gz: 23bf4109fd39849a1dd92e923bda87208ed87748b40bd9a682132c5bc71a10cb
|
4
|
+
data.tar.gz: 4167895a473bd8eff713e5749409e6cd847436f374647e8c5da69592593a05a2
|
5
|
+
SHA512:
|
6
|
+
metadata.gz: 7aad5cf9648b1a091f107750529feec57c8d3bccbad22c0288f12642b35f29717ebddcad96a7f6633533827f2ea9b2a752ce356310f7c0f52d0c6e9f454c4dea
|
7
|
+
data.tar.gz: 45eb4fb53f9a7b3b523d0613f5f394f6d686307d9e562f61838a4f9c8320b18d6452da958d3cc3eba2cee013e88f1a9bd5c50cc7b29958998fb300629758e7ba
|
data/.standard.yml
ADDED
data/Gemfile
ADDED
data/Guardfile
ADDED
@@ -0,0 +1,29 @@
|
|
1
|
+
# A sample Guardfile
|
2
|
+
# More info at https://github.com/guard/guard#readme
|
3
|
+
|
4
|
+
## Uncomment and set this to only include directories you want to watch
|
5
|
+
# directories %w(app lib config test spec features) \
|
6
|
+
# .select{|d| Dir.exist?(d) ? d : UI.warning("Directory #{d} does not exist")}
|
7
|
+
|
8
|
+
## Note: if you are using the `directories` clause above and you are not
|
9
|
+
## watching the project directory ('.'), then you will want to move
|
10
|
+
## the Guardfile to a watched dir and symlink it back, e.g.
|
11
|
+
#
|
12
|
+
# $ mkdir config
|
13
|
+
# $ mv Guardfile config/
|
14
|
+
# $ ln -s config/Guardfile .
|
15
|
+
#
|
16
|
+
# and, you'll have to watch "config/Guardfile" instead of "Guardfile"
|
17
|
+
|
18
|
+
guard :standardrb, fix: false, all_on_start: true do
|
19
|
+
UI.info "StandardRb is initialized"
|
20
|
+
watch(/.+\.rb$/)
|
21
|
+
end
|
22
|
+
|
23
|
+
guard :minitest, all_after_pass: true do
|
24
|
+
# with Minitest::Unit
|
25
|
+
watch(%r{^bin/}) { "test" }
|
26
|
+
watch(%r{^test/(.*)/?test_(.*)\.rb$}) { "test" }
|
27
|
+
watch(%r{^lib/(.*/)?([^/]+)\.rb$}) { "test" }
|
28
|
+
watch(%r{^test/test_helper\.rb$}) { "test" }
|
29
|
+
end
|
data/LICENSE.txt
ADDED
@@ -0,0 +1,21 @@
|
|
1
|
+
The MIT License (MIT)
|
2
|
+
|
3
|
+
Copyright (c) 2022 Eddy Kim
|
4
|
+
|
5
|
+
Permission is hereby granted, free of charge, to any person obtaining a copy
|
6
|
+
of this software and associated documentation files (the "Software"), to deal
|
7
|
+
in the Software without restriction, including without limitation the rights
|
8
|
+
to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
|
9
|
+
copies of the Software, and to permit persons to whom the Software is
|
10
|
+
furnished to do so, subject to the following conditions:
|
11
|
+
|
12
|
+
The above copyright notice and this permission notice shall be included in
|
13
|
+
all copies or substantial portions of the Software.
|
14
|
+
|
15
|
+
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
16
|
+
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
|
17
|
+
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
|
18
|
+
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
|
19
|
+
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
|
20
|
+
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
|
21
|
+
THE SOFTWARE.
|
data/README.md
ADDED
@@ -0,0 +1,73 @@
|
|
1
|
+
# Yarn::Audit::Wrap
|
2
|
+
|
3
|
+
This is a ruby gem to parse the result of `yarn audit --json`. You can filter
|
4
|
+
different levels of findings, and ignore specific findings for a set time.
|
5
|
+
|
6
|
+
It needs as input the json file, and a YAML configuration file with directives on
|
7
|
+
individual findings to ignore.
|
8
|
+
|
9
|
+
## Installation
|
10
|
+
|
11
|
+
Install the gem and add to the application's Gemfile by executing:
|
12
|
+
|
13
|
+
$ bundle add yarn-audit-wrap
|
14
|
+
|
15
|
+
If bundler is not being used to manage dependencies, install the gem by executing:
|
16
|
+
|
17
|
+
$ gem install yarn-audit-wrap
|
18
|
+
|
19
|
+
## Usage
|
20
|
+
```
|
21
|
+
yarn-audit --file=<tmp/yarn-audit.json> --level=moderate,high,critical --ignorelist=<config/yarn-audit.yml>
|
22
|
+
|
23
|
+
All switches are optional, with defaults as shown above.
|
24
|
+
|
25
|
+
--help This.
|
26
|
+
--file json output from "yarn audit". Path is relative to app root.
|
27
|
+
--level comma separated list of severity strings (case insensitive).
|
28
|
+
INFO
|
29
|
+
LOW
|
30
|
+
MODERATE
|
31
|
+
HIGH
|
32
|
+
CRITICAL
|
33
|
+
or use "ALL" to select all levels.
|
34
|
+
--ignorelist path relative to app root, a YAML file containing list of packages to ignore, see below for format.
|
35
|
+
default = config/yarn-audit.yml
|
36
|
+
|
37
|
+
The ignorelist is a YAML file of an array of hashes
|
38
|
+
```
|
39
|
+
|
40
|
+
Sample YAML:
|
41
|
+
```
|
42
|
+
---
|
43
|
+
:ignore:
|
44
|
+
- github_advisory_id: GHSA-cj88-88mr-972w
|
45
|
+
:until: 2022-07-19
|
46
|
+
```
|
47
|
+
|
48
|
+
You can identify a finding by any key, `github_advisory_id`, `cve`, etc. Please use
|
49
|
+
the `:until` key with a date in the future that will re-enable the finding to avoid
|
50
|
+
config pollution, as well as pushing for best-practices to remove vulnerable packages.
|
51
|
+
|
52
|
+
## Possible future enhancements
|
53
|
+
The next logical step would be to implement a workflow that helps fix vulnerable npm packages.
|
54
|
+
There is currently no equivalent to `npm audit --fix` for yarn, and ignoring the controversy
|
55
|
+
(<https://github.com/yarnpkg/yarn/issues/7075>), there are a number of workarounds
|
56
|
+
that are currently in place.
|
57
|
+
|
58
|
+
This will be the next step, but it is my hope that yarn implements the `--fix` feature
|
59
|
+
and such a workaround will be unnecessary.
|
60
|
+
|
61
|
+
## Development
|
62
|
+
|
63
|
+
After checking out the repo, run `bin/setup` to install dependencies. Then, run `rake test` to run the tests. You can also run `bin/console` for an interactive prompt that will allow you to experiment.
|
64
|
+
|
65
|
+
To install this gem onto your local machine, run `bundle exec rake install`. To release a new version, update the version number in `version.rb`, and then run `bundle exec rake release`, which will create a git tag for the version, push git commits and the created tag, and push the `.gem` file to [rubygems.org](https://rubygems.org).
|
66
|
+
|
67
|
+
## Contributing
|
68
|
+
|
69
|
+
Bug reports and pull requests are welcome on GitHub at https://github.com/edk/yarn-audit-wrap
|
70
|
+
|
71
|
+
## License
|
72
|
+
|
73
|
+
The gem is available as open source under the terms of the [MIT License](https://opensource.org/licenses/MIT).
|
data/Rakefile
ADDED
@@ -0,0 +1,14 @@
|
|
1
|
+
# frozen_string_literal: true
|
2
|
+
|
3
|
+
require "bundler/gem_tasks"
|
4
|
+
require "rake/testtask"
|
5
|
+
|
6
|
+
Rake::TestTask.new(:test) do |t|
|
7
|
+
t.libs << "test"
|
8
|
+
t.libs << "lib"
|
9
|
+
t.test_files = FileList["test/**/test_*.rb"]
|
10
|
+
end
|
11
|
+
|
12
|
+
require "standard/rake"
|
13
|
+
|
14
|
+
task default: %i[test standard]
|
data/bin/yarn_audit_wrap
ADDED
@@ -0,0 +1,61 @@
|
|
1
|
+
module Yarn
|
2
|
+
module Audit
|
3
|
+
module Wrap
|
4
|
+
class AuditParser
|
5
|
+
attr_accessor :output
|
6
|
+
|
7
|
+
def initialize opts:
|
8
|
+
@opts = opts
|
9
|
+
@ignored = {
|
10
|
+
info: [],
|
11
|
+
low: [],
|
12
|
+
moderate: [],
|
13
|
+
high: [],
|
14
|
+
critical: []
|
15
|
+
}
|
16
|
+
parse_json_audit
|
17
|
+
end
|
18
|
+
|
19
|
+
def parse_json_audit
|
20
|
+
audit_json = @opts[:audit_json]
|
21
|
+
@output = if File.exist?(audit_json)
|
22
|
+
File.readlines(audit_json).map do |line|
|
23
|
+
JSON.parse(line)
|
24
|
+
end
|
25
|
+
else
|
26
|
+
[]
|
27
|
+
end
|
28
|
+
end
|
29
|
+
|
30
|
+
def add_ignored(type:, val:)
|
31
|
+
@ignored[type.to_sym] << val
|
32
|
+
end
|
33
|
+
|
34
|
+
def select(&blk)
|
35
|
+
if @output
|
36
|
+
@output.select do |item|
|
37
|
+
yield item if item["type"] == "auditAdvisory"
|
38
|
+
end
|
39
|
+
else
|
40
|
+
[]
|
41
|
+
end
|
42
|
+
end
|
43
|
+
|
44
|
+
def get_summary
|
45
|
+
@output.detect { |item| item["type"] == "auditSummary" } || {}
|
46
|
+
end
|
47
|
+
|
48
|
+
def print_summary
|
49
|
+
puts "\nOriginal Yarn Audit:"
|
50
|
+
s = get_summary["data"] || {}
|
51
|
+
s.each { |k, v| puts "#{k.to_s.rjust(23)}: #{v.inspect}" }
|
52
|
+
|
53
|
+
puts "\nSkipped vulnerabilities:"
|
54
|
+
@ignored.each do |k, v|
|
55
|
+
puts "#{k.to_s.rjust(23)}: #{v.size}"
|
56
|
+
end
|
57
|
+
end
|
58
|
+
end # class
|
59
|
+
end # Wrap
|
60
|
+
end
|
61
|
+
end
|
@@ -0,0 +1,30 @@
|
|
1
|
+
module Yarn
|
2
|
+
module Audit
|
3
|
+
module Wrap
|
4
|
+
class Config
|
5
|
+
def initialize(opts:)
|
6
|
+
# format of config file:
|
7
|
+
# hash with ignore: key, an array of hashes. Each hash can have one or more
|
8
|
+
# keys where the value is matched.
|
9
|
+
# One additional key is `until: <date>` where the ignore item is resurfaced,
|
10
|
+
# to avoid eternal vulnerabilities.
|
11
|
+
# YAML.dump({ ignore: [ { "github_adivosry_id" => "GHSA-cj88-88mr-972w" } ] })
|
12
|
+
audit_config = opts[:audit_config]
|
13
|
+
@config = if File.exist?(audit_config)
|
14
|
+
YAML.safe_load(File.read(audit_config), permitted_classes: [Symbol, Date])
|
15
|
+
else
|
16
|
+
{}
|
17
|
+
end
|
18
|
+
end
|
19
|
+
|
20
|
+
def ignores
|
21
|
+
if @config && @config.size > 0
|
22
|
+
@config[:ignore]
|
23
|
+
else
|
24
|
+
[]
|
25
|
+
end
|
26
|
+
end
|
27
|
+
end
|
28
|
+
end # Wrap
|
29
|
+
end
|
30
|
+
end
|
@@ -0,0 +1,93 @@
|
|
1
|
+
module Yarn
|
2
|
+
module Audit
|
3
|
+
module Wrap
|
4
|
+
class OptParser
|
5
|
+
attr_accessor :opts
|
6
|
+
|
7
|
+
def audit_levels
|
8
|
+
opts[:audit_levels]
|
9
|
+
end
|
10
|
+
|
11
|
+
def initialize args, output: $stdout
|
12
|
+
@output = output
|
13
|
+
@err_output = @output == $stdout ? $stderr : @output
|
14
|
+
defaults = {
|
15
|
+
audit_config: "config/yarn-audit.yml", # configuration and ignorelists
|
16
|
+
audit_json: "tmp/yarn-audit.json", # the result of a yarn audit
|
17
|
+
audit_levels: "moderate,high,critical".split(",")
|
18
|
+
}
|
19
|
+
|
20
|
+
opts = defaults.dup
|
21
|
+
args.each do |arg|
|
22
|
+
key, val = arg.split("=")
|
23
|
+
case key
|
24
|
+
when "--help"
|
25
|
+
usage
|
26
|
+
raise ExitEarlyError
|
27
|
+
when "--skip-audit-gen"
|
28
|
+
opts[:skip_audit_gen] = true
|
29
|
+
when "--file"
|
30
|
+
check_file_exists val
|
31
|
+
opts[:audit_json] = val
|
32
|
+
when "--level"
|
33
|
+
raise MissingOptionValueError.new("missing option for --level") if val.nil?
|
34
|
+
opts[:audit_levels] = val.downcase.split(",").map(&:strip)
|
35
|
+
levels = %w[info low moderate high critical all]
|
36
|
+
opts[:audit_levels] = levels - ["all"] if opts[:audit_levels].include?("all")
|
37
|
+
if !(opts[:audit_levels] - levels).empty?
|
38
|
+
@err_output.puts "ERROR: Unknown audit level used in --levels option"
|
39
|
+
@err_output.puts " Please check: #{val}"
|
40
|
+
@err_output.puts "ABORTING"
|
41
|
+
raise BadLevelOptionValueError.new(val.to_s)
|
42
|
+
end
|
43
|
+
when "--ignorelist"
|
44
|
+
opts[:audit_config] = val
|
45
|
+
check_file_exists val
|
46
|
+
else
|
47
|
+
@err_output.puts "ERROR: unknown option: #{key}=#{val}"
|
48
|
+
@err_output.puts "aborting."
|
49
|
+
raise UnknownOptionError.new("#{key}=#{val}")
|
50
|
+
end
|
51
|
+
end
|
52
|
+
@opts = opts
|
53
|
+
end
|
54
|
+
|
55
|
+
def [](key)
|
56
|
+
@opts[key]
|
57
|
+
end
|
58
|
+
|
59
|
+
def usage
|
60
|
+
@output.puts <<~USAGE
|
61
|
+
Usage:
|
62
|
+
yarn-audit --file=<tmp/yarn-audit.json> --level=moderate,high,critical --ignorelist=<config/yarn-audit.yml>
|
63
|
+
All switches are optional, with defaults as shown above.
|
64
|
+
|
65
|
+
--help This.
|
66
|
+
--file json output from "yarn audit". Path is relative to app root.
|
67
|
+
--level comma separated list of severity strings (case insensitive).
|
68
|
+
INFO
|
69
|
+
LOW
|
70
|
+
MODERATE
|
71
|
+
HIGH
|
72
|
+
CRITICAL
|
73
|
+
or use "ALL" to select all levels.
|
74
|
+
--ignorelist path relative to app root, a YAML file containing list of packages to ignore, see below for format.
|
75
|
+
default = config/yarn-audit.yml
|
76
|
+
|
77
|
+
The ignorelist is a YAML file of an array of hashes
|
78
|
+
TODO: show example and structure of ignorelist file.
|
79
|
+
USAGE
|
80
|
+
end
|
81
|
+
|
82
|
+
def check_file_exists(filename)
|
83
|
+
raise MissingOptionValueError if filename.nil?
|
84
|
+
if !File.exist?(filename)
|
85
|
+
@err_output.puts "ERROR: missing file #{filename}"
|
86
|
+
@err_output.puts "aborting."
|
87
|
+
raise FileNotFoundError.new("Missing file #{filename}")
|
88
|
+
end
|
89
|
+
end
|
90
|
+
end # Parser
|
91
|
+
end
|
92
|
+
end
|
93
|
+
end
|
@@ -0,0 +1,20 @@
|
|
1
|
+
require "fileutils"
|
2
|
+
|
3
|
+
module Yarn
|
4
|
+
module Audit
|
5
|
+
module Wrap
|
6
|
+
class YarnCommand
|
7
|
+
def initialize opts:
|
8
|
+
@opts = opts
|
9
|
+
end
|
10
|
+
|
11
|
+
def run
|
12
|
+
filepath = @opts[:audit_json].to_s
|
13
|
+
FileUtils.mkdir_p File.dirname(filepath)
|
14
|
+
outfile = Shellwords.escape(filepath)
|
15
|
+
system("yarn audit --json > #{outfile}")
|
16
|
+
end
|
17
|
+
end
|
18
|
+
end # Wrap
|
19
|
+
end
|
20
|
+
end
|
@@ -0,0 +1,129 @@
|
|
1
|
+
# frozen_string_literal: true
|
2
|
+
|
3
|
+
require "json"
|
4
|
+
require "yaml"
|
5
|
+
require "date"
|
6
|
+
require_relative "wrap/audit_parser"
|
7
|
+
require_relative "wrap/config"
|
8
|
+
require_relative "wrap/opt_parser"
|
9
|
+
require_relative "wrap/version"
|
10
|
+
require_relative "wrap/yarn_command"
|
11
|
+
require "active_support/all"
|
12
|
+
|
13
|
+
module Yarn
|
14
|
+
module Audit
|
15
|
+
module Wrap
|
16
|
+
class Error < StandardError; end
|
17
|
+
|
18
|
+
class FileNotFoundError < StandardError; end
|
19
|
+
|
20
|
+
class MissingOptionValueError < StandardError; end
|
21
|
+
|
22
|
+
class BadLevelOptionValueError < StandardError; end
|
23
|
+
|
24
|
+
class UnknownOptionError < StandardError; end
|
25
|
+
|
26
|
+
class ExitEarlyError < StandardError; end
|
27
|
+
|
28
|
+
class YarnAuditRuntimeError < StandardError; end
|
29
|
+
|
30
|
+
class Main
|
31
|
+
def err str
|
32
|
+
# While I like the idea of standardrb, its recommendation in this case is absolute garbage.
|
33
|
+
# Errors should always go to stderr, not warn.
|
34
|
+
$stderr.send(:puts, str)
|
35
|
+
end
|
36
|
+
|
37
|
+
def warn str
|
38
|
+
$stdout.puts str
|
39
|
+
end
|
40
|
+
|
41
|
+
# Initialize the main loop
|
42
|
+
#
|
43
|
+
# @param args list [Strings] ARGV, can be an empty array, if no options were passed in.
|
44
|
+
# In that case, the defaults will be used.
|
45
|
+
#
|
46
|
+
def initialize args
|
47
|
+
@opts = OptParser.new(args)
|
48
|
+
rescue FileNotFoundError
|
49
|
+
err "File not found"
|
50
|
+
rescue MissingOptionValueError
|
51
|
+
err "Missing value for option #{$!}"
|
52
|
+
end
|
53
|
+
|
54
|
+
def run
|
55
|
+
# generates a tmp/yarn-audit.json by default. Change @opts to rename/move output file.
|
56
|
+
cmd = YarnCommand.new(opts: @opts) unless @opts[:skip_audit_gen]
|
57
|
+
raise YarnAuditRuntimeError if !cmd
|
58
|
+
cmd.run
|
59
|
+
|
60
|
+
# parse output of yarn audit and store
|
61
|
+
audit_output = AuditParser.new(opts: @opts)
|
62
|
+
|
63
|
+
# load config, such as ignorelists
|
64
|
+
config = Config.new(opts: @opts)
|
65
|
+
|
66
|
+
# check and return results
|
67
|
+
rv = process audit_output: audit_output, config: config, opts: @opts
|
68
|
+
|
69
|
+
audit_output.print_summary
|
70
|
+
|
71
|
+
rv.size # number of vulnerabilities. 0 is shell for success, non-zero is failure!
|
72
|
+
end
|
73
|
+
|
74
|
+
def process(audit_output:, config:, opts:)
|
75
|
+
levels = opts[:audit_levels]
|
76
|
+
used = []
|
77
|
+
|
78
|
+
audit_output.select do |item|
|
79
|
+
if levels.include?(item["data"]["advisory"]["severity"]) &&
|
80
|
+
use_advisory?(advisory: item, config: config)
|
81
|
+
used << item
|
82
|
+
else
|
83
|
+
audit_output.add_ignored type: item["data"]["advisory"]["severity"], val: item
|
84
|
+
end
|
85
|
+
end
|
86
|
+
|
87
|
+
used
|
88
|
+
end
|
89
|
+
|
90
|
+
def handle_advisories(advisories:, summary:, opts:)
|
91
|
+
# print if any, return proper exit code
|
92
|
+
if advisories && advisories.size > 0
|
93
|
+
warn "yarn-audit: #{advisories.size} flagged packages"
|
94
|
+
exit 1
|
95
|
+
else
|
96
|
+
warn "yarn-audit: No advisories flagged."
|
97
|
+
warn summary.inspect
|
98
|
+
exit 0
|
99
|
+
end
|
100
|
+
end
|
101
|
+
|
102
|
+
# advisory is a single line from yarn audit --json output
|
103
|
+
# config is a set of all the ignore directives. Find if the advisory is included in
|
104
|
+
# the ignore list, and if so see if the values match and if the optional until: date is set.
|
105
|
+
# If the Date is present and past, use the advisory, otherwise ignore it until the date is past.
|
106
|
+
def use_advisory?(advisory:, config:)
|
107
|
+
config.ignores.detect do |ignore_item|
|
108
|
+
found = (ignore_item.keys - [:until]).all? do |key|
|
109
|
+
(advisory["data"]["advisory"][key] == ignore_item[key])
|
110
|
+
end
|
111
|
+
if found
|
112
|
+
record = advisory["data"]["advisory"]
|
113
|
+
if ignore_item[:until]&.past?
|
114
|
+
warn "Found expired vulnerability. Using advisory \"#{record["title"]}\""
|
115
|
+
else
|
116
|
+
warn "Actively ignoring. \"#{record["title"]}\""
|
117
|
+
return false
|
118
|
+
end
|
119
|
+
else
|
120
|
+
warn "not found"
|
121
|
+
return true
|
122
|
+
end
|
123
|
+
end
|
124
|
+
true
|
125
|
+
end
|
126
|
+
end # Main
|
127
|
+
end
|
128
|
+
end
|
129
|
+
end
|
metadata
ADDED
@@ -0,0 +1,162 @@
|
|
1
|
+
--- !ruby/object:Gem::Specification
|
2
|
+
name: yarn-audit-wrap
|
3
|
+
version: !ruby/object:Gem::Version
|
4
|
+
version: 0.1.0
|
5
|
+
platform: ruby
|
6
|
+
authors:
|
7
|
+
- Eddy Kim
|
8
|
+
autorequire:
|
9
|
+
bindir: bin
|
10
|
+
cert_chain: []
|
11
|
+
date: 2022-07-27 00:00:00.000000000 Z
|
12
|
+
dependencies:
|
13
|
+
- !ruby/object:Gem::Dependency
|
14
|
+
name: activesupport
|
15
|
+
requirement: !ruby/object:Gem::Requirement
|
16
|
+
requirements:
|
17
|
+
- - "~>"
|
18
|
+
- !ruby/object:Gem::Version
|
19
|
+
version: '7.0'
|
20
|
+
type: :runtime
|
21
|
+
prerelease: false
|
22
|
+
version_requirements: !ruby/object:Gem::Requirement
|
23
|
+
requirements:
|
24
|
+
- - "~>"
|
25
|
+
- !ruby/object:Gem::Version
|
26
|
+
version: '7.0'
|
27
|
+
- !ruby/object:Gem::Dependency
|
28
|
+
name: pry
|
29
|
+
requirement: !ruby/object:Gem::Requirement
|
30
|
+
requirements:
|
31
|
+
- - ">="
|
32
|
+
- !ruby/object:Gem::Version
|
33
|
+
version: '0'
|
34
|
+
type: :development
|
35
|
+
prerelease: false
|
36
|
+
version_requirements: !ruby/object:Gem::Requirement
|
37
|
+
requirements:
|
38
|
+
- - ">="
|
39
|
+
- !ruby/object:Gem::Version
|
40
|
+
version: '0'
|
41
|
+
- !ruby/object:Gem::Dependency
|
42
|
+
name: debug
|
43
|
+
requirement: !ruby/object:Gem::Requirement
|
44
|
+
requirements:
|
45
|
+
- - ">="
|
46
|
+
- !ruby/object:Gem::Version
|
47
|
+
version: '0'
|
48
|
+
type: :development
|
49
|
+
prerelease: false
|
50
|
+
version_requirements: !ruby/object:Gem::Requirement
|
51
|
+
requirements:
|
52
|
+
- - ">="
|
53
|
+
- !ruby/object:Gem::Version
|
54
|
+
version: '0'
|
55
|
+
- !ruby/object:Gem::Dependency
|
56
|
+
name: guard
|
57
|
+
requirement: !ruby/object:Gem::Requirement
|
58
|
+
requirements:
|
59
|
+
- - ">="
|
60
|
+
- !ruby/object:Gem::Version
|
61
|
+
version: '0'
|
62
|
+
type: :development
|
63
|
+
prerelease: false
|
64
|
+
version_requirements: !ruby/object:Gem::Requirement
|
65
|
+
requirements:
|
66
|
+
- - ">="
|
67
|
+
- !ruby/object:Gem::Version
|
68
|
+
version: '0'
|
69
|
+
- !ruby/object:Gem::Dependency
|
70
|
+
name: guard-minitest
|
71
|
+
requirement: !ruby/object:Gem::Requirement
|
72
|
+
requirements:
|
73
|
+
- - ">="
|
74
|
+
- !ruby/object:Gem::Version
|
75
|
+
version: '0'
|
76
|
+
type: :development
|
77
|
+
prerelease: false
|
78
|
+
version_requirements: !ruby/object:Gem::Requirement
|
79
|
+
requirements:
|
80
|
+
- - ">="
|
81
|
+
- !ruby/object:Gem::Version
|
82
|
+
version: '0'
|
83
|
+
- !ruby/object:Gem::Dependency
|
84
|
+
name: guard-standardrb
|
85
|
+
requirement: !ruby/object:Gem::Requirement
|
86
|
+
requirements:
|
87
|
+
- - ">="
|
88
|
+
- !ruby/object:Gem::Version
|
89
|
+
version: '0'
|
90
|
+
type: :development
|
91
|
+
prerelease: false
|
92
|
+
version_requirements: !ruby/object:Gem::Requirement
|
93
|
+
requirements:
|
94
|
+
- - ">="
|
95
|
+
- !ruby/object:Gem::Version
|
96
|
+
version: '0'
|
97
|
+
- !ruby/object:Gem::Dependency
|
98
|
+
name: minitest-reporters
|
99
|
+
requirement: !ruby/object:Gem::Requirement
|
100
|
+
requirements:
|
101
|
+
- - ">="
|
102
|
+
- !ruby/object:Gem::Version
|
103
|
+
version: '0'
|
104
|
+
type: :development
|
105
|
+
prerelease: false
|
106
|
+
version_requirements: !ruby/object:Gem::Requirement
|
107
|
+
requirements:
|
108
|
+
- - ">="
|
109
|
+
- !ruby/object:Gem::Version
|
110
|
+
version: '0'
|
111
|
+
description: |2-
|
112
|
+
|
113
|
+
Script to parse and manage different levels of vulnerabilities from `yarn audit` in rails projects.
|
114
|
+
Also features a way to temporarily or permanently ignore vulnerabilities, due to
|
115
|
+
false positives or no alternatives for unfixed packages.
|
116
|
+
email:
|
117
|
+
- eddyhkim@gmail.com
|
118
|
+
executables:
|
119
|
+
- yarn_audit_wrap
|
120
|
+
extensions: []
|
121
|
+
extra_rdoc_files: []
|
122
|
+
files:
|
123
|
+
- ".standard.yml"
|
124
|
+
- Gemfile
|
125
|
+
- Guardfile
|
126
|
+
- LICENSE.txt
|
127
|
+
- README.md
|
128
|
+
- Rakefile
|
129
|
+
- bin/yarn_audit_wrap
|
130
|
+
- lib/yarn/audit/wrap.rb
|
131
|
+
- lib/yarn/audit/wrap/audit_parser.rb
|
132
|
+
- lib/yarn/audit/wrap/config.rb
|
133
|
+
- lib/yarn/audit/wrap/opt_parser.rb
|
134
|
+
- lib/yarn/audit/wrap/version.rb
|
135
|
+
- lib/yarn/audit/wrap/yarn_command.rb
|
136
|
+
- sig/yarn/audit/wrap.rbs
|
137
|
+
homepage: https://github.com/edk/yarn-audit-wrap
|
138
|
+
licenses:
|
139
|
+
- MIT
|
140
|
+
metadata:
|
141
|
+
homepage_uri: https://github.com/edk/yarn-audit-wrap
|
142
|
+
source_code_uri: https://github.com/edk/yarn-audit-wrap
|
143
|
+
post_install_message:
|
144
|
+
rdoc_options: []
|
145
|
+
require_paths:
|
146
|
+
- lib
|
147
|
+
required_ruby_version: !ruby/object:Gem::Requirement
|
148
|
+
requirements:
|
149
|
+
- - ">="
|
150
|
+
- !ruby/object:Gem::Version
|
151
|
+
version: 3.0.0
|
152
|
+
required_rubygems_version: !ruby/object:Gem::Requirement
|
153
|
+
requirements:
|
154
|
+
- - ">="
|
155
|
+
- !ruby/object:Gem::Version
|
156
|
+
version: '0'
|
157
|
+
requirements: []
|
158
|
+
rubygems_version: 3.3.7
|
159
|
+
signing_key:
|
160
|
+
specification_version: 4
|
161
|
+
summary: Run yarn audit and parse json results, for use in CI
|
162
|
+
test_files: []
|