@coana-tech/cli 13.19.39 → 14.0.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/cli.js +31 -7
- package/package.json +1 -1
package/cli.js
CHANGED
|
@@ -92604,7 +92604,7 @@ var init_constants = __esm({
|
|
|
92604
92604
|
DOCKERFILES_ROOT = (0, import_lodash3.once)(() => {
|
|
92605
92605
|
return (0, import_path11.resolve)((0, import_constants.COANA_ROOT)(), "packages", "docker-management", "docker");
|
|
92606
92606
|
});
|
|
92607
|
-
REPOSITORY = process.env.DOCKER_REPOSITORY ?? "
|
|
92607
|
+
REPOSITORY = process.env.DOCKER_REPOSITORY ?? "coanapublic.azurecr.io";
|
|
92608
92608
|
getImageTag = () => {
|
|
92609
92609
|
return process.env.DOCKER_IMAGE_TAG_OVERWRITE ?? process.env.DOCKER_IMAGE_TAG ?? "latest";
|
|
92610
92610
|
};
|
|
@@ -130280,6 +130280,23 @@ var init_promise_queue = __esm({
|
|
|
130280
130280
|
}
|
|
130281
130281
|
});
|
|
130282
130282
|
|
|
130283
|
+
// ../web-compat-utils/src/analysis-error-keys.ts
|
|
130284
|
+
var analysis_error_keys_exports = {};
|
|
130285
|
+
__export(analysis_error_keys_exports, {
|
|
130286
|
+
CLI_ANALYSIS_ERROR_MESSAGE: () => CLI_ANALYSIS_ERROR_MESSAGE,
|
|
130287
|
+
FAILED_TO_INSTALL_PACKAGE_KEY: () => FAILED_TO_INSTALL_PACKAGE_KEY,
|
|
130288
|
+
SHARING_LOG_FOR_PYTHON_PROJECT_ERROR_MESSAGE: () => SHARING_LOG_FOR_PYTHON_PROJECT_ERROR_MESSAGE
|
|
130289
|
+
});
|
|
130290
|
+
var FAILED_TO_INSTALL_PACKAGE_KEY, CLI_ANALYSIS_ERROR_MESSAGE, SHARING_LOG_FOR_PYTHON_PROJECT_ERROR_MESSAGE;
|
|
130291
|
+
var init_analysis_error_keys = __esm({
|
|
130292
|
+
"../web-compat-utils/src/analysis-error-keys.ts"() {
|
|
130293
|
+
"use strict";
|
|
130294
|
+
FAILED_TO_INSTALL_PACKAGE_KEY = "[UNABLE_TO_INSTALL_PACKAGE_ERROR]: ";
|
|
130295
|
+
CLI_ANALYSIS_ERROR_MESSAGE = "Sharing log due to analysis error";
|
|
130296
|
+
SHARING_LOG_FOR_PYTHON_PROJECT_ERROR_MESSAGE = "Sharing log file for run including a python project";
|
|
130297
|
+
}
|
|
130298
|
+
});
|
|
130299
|
+
|
|
130283
130300
|
// ../utils/src/vulnerable-paths-utils.ts
|
|
130284
130301
|
var vulnerable_paths_utils_exports = {};
|
|
130285
130302
|
__export(vulnerable_paths_utils_exports, {
|
|
@@ -130381,7 +130398,13 @@ var init_dependency_tree = __esm({
|
|
|
130381
130398
|
"RUST",
|
|
130382
130399
|
"SWIFT"
|
|
130383
130400
|
];
|
|
130384
|
-
ADVISORY_SEVERITIES = [
|
|
130401
|
+
ADVISORY_SEVERITIES = [
|
|
130402
|
+
"INFO",
|
|
130403
|
+
"LOW",
|
|
130404
|
+
"MODERATE",
|
|
130405
|
+
"HIGH",
|
|
130406
|
+
"CRITICAL"
|
|
130407
|
+
];
|
|
130385
130408
|
PACKAGE_MANAGERS = [
|
|
130386
130409
|
"NPM",
|
|
130387
130410
|
"PNPM",
|
|
@@ -190057,7 +190080,7 @@ var init_security_auditor = __esm({
|
|
|
190057
190080
|
* If vulnerabilitiesMap is provided, then it's used to look for vulnerabilities instead
|
|
190058
190081
|
* of going through the vulnerability database
|
|
190059
190082
|
*/
|
|
190060
|
-
async findVulnerabilities(packageStructure, vulnerabiliesMap) {
|
|
190083
|
+
async findVulnerabilities(packageStructure, vulnerabiliesMap, enableMissingVulnerabilitySupportReporting = this.enableMissingVulnerabilitySupportReporting) {
|
|
190061
190084
|
const startTime = Date.now();
|
|
190062
190085
|
const vulnerabilitiesFound = [];
|
|
190063
190086
|
const that = this;
|
|
@@ -190103,7 +190126,7 @@ var init_security_auditor = __esm({
|
|
|
190103
190126
|
getEcosystem(vuln),
|
|
190104
190127
|
vuln.url
|
|
190105
190128
|
);
|
|
190106
|
-
if (
|
|
190129
|
+
if (enableMissingVulnerabilitySupportReporting && vulnDetails?.type === "database" && !vulnDetails.data?.demand && !vulnDetails.data?.active) {
|
|
190107
190130
|
that.slackReporter?.reportVulnerabilityWithMissingAccessPathPattern(vuln);
|
|
190108
190131
|
(await that.coanaSupportedVulnerabilitiesDbInterface).registerVulnerabilityWithMissingAccessPathPattern(vuln, that.pms);
|
|
190109
190132
|
}
|
|
@@ -190309,7 +190332,7 @@ var require_version = __commonJS({
|
|
|
190309
190332
|
"use strict";
|
|
190310
190333
|
Object.defineProperty(exports2, "__esModule", { value: true });
|
|
190311
190334
|
exports2.version = void 0;
|
|
190312
|
-
exports2.version = "
|
|
190335
|
+
exports2.version = "14.0.1";
|
|
190313
190336
|
}
|
|
190314
190337
|
});
|
|
190315
190338
|
|
|
@@ -190335,6 +190358,7 @@ var require_cli_core = __commonJS({
|
|
|
190335
190358
|
var promise_queue_1 = (init_promise_queue(), __toCommonJS(promise_queue_exports));
|
|
190336
190359
|
var spinner_1 = (init_spinner(), __toCommonJS(spinner_exports));
|
|
190337
190360
|
var tmp_file_1 = (init_tmp_file(), __toCommonJS(tmp_file_exports));
|
|
190361
|
+
var analysis_error_keys_1 = (init_analysis_error_keys(), __toCommonJS(analysis_error_keys_exports));
|
|
190338
190362
|
var vulnerable_paths_utils_1 = (init_vulnerable_paths_utils(), __toCommonJS(vulnerable_paths_utils_exports));
|
|
190339
190363
|
var async_1 = (init_async(), __toCommonJS(async_exports));
|
|
190340
190364
|
var dependency_tree_1 = (init_dependency_tree(), __toCommonJS(dependency_tree_exports));
|
|
@@ -190454,9 +190478,9 @@ var require_cli_core = __commonJS({
|
|
|
190454
190478
|
}
|
|
190455
190479
|
if (report.vulnerabilities.some((v) => v.codeAwareScanResult.type === "analysisError")) {
|
|
190456
190480
|
logger_singleton_1.logger.warn("Analysis error detected in the report - sharing log with Coana to help debug the issue");
|
|
190457
|
-
await this.shareErrorLogWithDashboard(new Error(
|
|
190481
|
+
await this.shareErrorLogWithDashboard(new Error(analysis_error_keys_1.CLI_ANALYSIS_ERROR_MESSAGE), false);
|
|
190458
190482
|
} else if (report.vulnerabilities.some((v) => v.ecosystem === "PIP")) {
|
|
190459
|
-
await this.shareErrorLogWithDashboard(new Error(
|
|
190483
|
+
await this.shareErrorLogWithDashboard(new Error(analysis_error_keys_1.SHARING_LOG_FOR_PYTHON_PROJECT_ERROR_MESSAGE), false);
|
|
190460
190484
|
}
|
|
190461
190485
|
if (this.options.runEnv === "MANAGED_SCAN") {
|
|
190462
190486
|
this.shareLogWithDashboard();
|