@coana-tech/cli 14.12.68 → 14.12.70
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/cli.mjs +37 -4
- package/package.json +1 -1
- package/repos/coana-tech/alucard/alucard.jar +0 -0
- package/repos/coana-tech/goana/bin/goana-darwin-amd64.gz +0 -0
- package/repos/coana-tech/goana/bin/goana-darwin-arm64.gz +0 -0
- package/repos/coana-tech/goana/bin/goana-linux-amd64.gz +0 -0
- package/repos/coana-tech/goana/bin/goana-linux-arm64.gz +0 -0
package/cli.mjs
CHANGED
|
@@ -229215,7 +229215,10 @@ async function upgradePurl(rootDir, upgrades, artifacts, options, logFile, cliFi
|
|
|
229215
229215
|
logger.initWinstonLogger(options.debug);
|
|
229216
229216
|
logger.silent = options.silent;
|
|
229217
229217
|
const cliRunId = cliFixRunId;
|
|
229218
|
-
const upgradePurlRunId = cliRunId
|
|
229218
|
+
const upgradePurlRunId = cliRunId && await getSocketAPI().registerUpgradePurlRun(cliRunId, Array.from(upgrades).map(([idx, upgradeVersion]) => ({
|
|
229219
|
+
purl: artifacts[idx],
|
|
229220
|
+
upgradeVersion
|
|
229221
|
+
})));
|
|
229219
229222
|
Spinner.instance({
|
|
229220
229223
|
text: "Running Coana Upgrade Purl CLI",
|
|
229221
229224
|
isSilent: options.silentSpinner ?? options.silent
|
|
@@ -229590,6 +229593,7 @@ async function fetchArtifactsFromSocket(rootWorkingDirectory, manifestsTarHash,
|
|
|
229590
229593
|
for (const vuln of artifact.vulnerabilities) {
|
|
229591
229594
|
const vulnerability = {
|
|
229592
229595
|
url: vuln.ghsaId,
|
|
229596
|
+
severity: vuln.severity,
|
|
229593
229597
|
purlType: artifact.type,
|
|
229594
229598
|
range: vuln.range,
|
|
229595
229599
|
name: artifact.name ?? "",
|
|
@@ -230535,6 +230539,9 @@ function toSocketReachabilitySchema(vulnerability) {
|
|
|
230535
230539
|
if (codeAwareScanResult.type === "noAnalysisCheck") {
|
|
230536
230540
|
return { type: "undeterminable_reachability" };
|
|
230537
230541
|
}
|
|
230542
|
+
if (codeAwareScanResult.type === "unknown") {
|
|
230543
|
+
return { type: "unknown", reason: codeAwareScanResult.message ?? "Unknown reason" };
|
|
230544
|
+
}
|
|
230538
230545
|
if (codeAwareScanResult.type === "analysisError") {
|
|
230539
230546
|
return { type: "error", error: codeAwareScanResult.message };
|
|
230540
230547
|
}
|
|
@@ -245497,10 +245504,20 @@ async function onlineScan(dependencyTree, apiKey, timeout) {
|
|
|
245497
245504
|
}
|
|
245498
245505
|
|
|
245499
245506
|
// dist/version.js
|
|
245500
|
-
var version2 = "14.12.
|
|
245507
|
+
var version2 = "14.12.70";
|
|
245501
245508
|
|
|
245502
245509
|
// dist/cli-core.js
|
|
245503
245510
|
var { mapValues, omit, partition, pick } = import_lodash15.default;
|
|
245511
|
+
var SEVERITY_ORDER = {
|
|
245512
|
+
INFO: 0,
|
|
245513
|
+
LOW: 1,
|
|
245514
|
+
MODERATE: 2,
|
|
245515
|
+
HIGH: 3,
|
|
245516
|
+
CRITICAL: 4
|
|
245517
|
+
};
|
|
245518
|
+
function shouldAnalyzeBasedOnSeverity(vulnSeverity, minSeverity) {
|
|
245519
|
+
return SEVERITY_ORDER[vulnSeverity] >= SEVERITY_ORDER[minSeverity];
|
|
245520
|
+
}
|
|
245504
245521
|
var CliCore = class {
|
|
245505
245522
|
options;
|
|
245506
245523
|
spinner;
|
|
@@ -245954,13 +245971,28 @@ Subproject: ${subproject}`);
|
|
|
245954
245971
|
const vulnerabilities = workspaceToVulnerabilities[workspacePath] ?? [];
|
|
245955
245972
|
try {
|
|
245956
245973
|
const dataForAnalysis = workspacePathToDataForAnalysis[workspacePath];
|
|
245957
|
-
const
|
|
245974
|
+
const [vulnerabilitiesToAnalyze, vulnerabilitiesBelowThreshold] = this.options.minSeverity ? partition(vulnerabilities, (v) => !v.severity || shouldAnalyzeBasedOnSeverity(v.severity, this.options.minSeverity)) : [vulnerabilities, []];
|
|
245975
|
+
const vulnerabilitiesBelowThresholdWithResults = vulnerabilitiesBelowThreshold.map((v) => ({
|
|
245976
|
+
...v,
|
|
245977
|
+
results: {
|
|
245978
|
+
type: "unknown",
|
|
245979
|
+
message: `Reachability analysis not run since the severity of the vulnerability (${v.severity}) is lower than the min severity threshold: ${this.options.minSeverity}`
|
|
245980
|
+
}
|
|
245981
|
+
}));
|
|
245982
|
+
if (vulnerabilitiesBelowThreshold.length > 0) {
|
|
245983
|
+
logger.info(`Reachability analysis not run for ${vulnerabilitiesBelowThreshold.length} vulnerabilities with severity level ${this.options.minSeverity} in workspace ${workspacePath}`);
|
|
245984
|
+
}
|
|
245985
|
+
const augmentedVulnerabilitiesToAnalyze = reachabilitySupported && !this.shouldExcludeAnalyzingWorkspace(subprojectPath, workspacePath) ? await this.runReachabilityAnalysis(otherModulesCommunicator, subprojectPath, workspacePath, dataForAnalysis, ecosystem, vulnerabilitiesToAnalyze) : vulnerabilitiesToAnalyze.map((v) => ({
|
|
245958
245986
|
...v,
|
|
245959
245987
|
results: {
|
|
245960
245988
|
type: "otherError",
|
|
245961
245989
|
message: `Reachability analysis for languages using ${ecosystem} not supported yet`
|
|
245962
245990
|
}
|
|
245963
245991
|
}));
|
|
245992
|
+
const augmentedVulnerabilities = [
|
|
245993
|
+
...augmentedVulnerabilitiesToAnalyze,
|
|
245994
|
+
...vulnerabilitiesBelowThresholdWithResults
|
|
245995
|
+
];
|
|
245964
245996
|
return [workspacePath, augmentedVulnerabilities];
|
|
245965
245997
|
} catch (e) {
|
|
245966
245998
|
logger.error(`Reachability analysis failed for workspace ${workspacePath} in subproject ${subprojectPath}: ${e.message}`);
|
|
@@ -246211,9 +246243,10 @@ async function getGitDataToMetadataIfAvailable(rootWorkingDirectory) {
|
|
|
246211
246243
|
// dist/index.js
|
|
246212
246244
|
var program2 = new Command();
|
|
246213
246245
|
var run2 = new Command();
|
|
246214
|
-
run2.name("run").argument("<path>", "File system path to folder containing the project").option("-o, --output-dir <path>", "Write json report to <path>/coana-report.json").option("-d, --debug", "Enable debug logging", false).option("-s, --silent", "Silence all debug/warning output", false).option("--silent-spinner", "Silence spinner", "CI" in process.env || !process.stdin.isTTY).option("-p, --print-report", "Print the report to the console", false).option("--offline-database <path>", "Path to a coana-offline-db.json file for running the CLI without internet connectivity", void 0).option("-t, --timeout <timeout>", "Set API <timeout> in milliseconds to Coana backend.", "300000").option("-a, --analysis-timeout <timeout>", "Set <timeout> in seconds for each reachability analysis run").option("--memory-limit <memoryInMB>", "Set memory limit for analysis to <memoryInMB> megabytes of memory.", "8192").option("-c, --concurrency <concurrency>", "Set the maximum number of concurrent reachability analysis runs. It's recommended to choose a concurrency level that ensures that each analysis run has at least the --memory-limit amount of memory available.", "1").option("--api-key <key>", "Set the Coana dashboard API key. By setting you also enable the dashboard integration.").addOption(new Option("--write-report-to-file", "Write the report dashboard-compatible report to dashboard-report.json. This report may help the Coana team debug issues with the report insertion mechanism.").default(false).hideHelp()).option("--project-name <repoName>", "Set the name of the repository. Used for dashboard integration.").option("--repo-url <repoUrl>", "Set the URL of the repository. Used for dashboard integration.").option("--include-dirs <relativeDirs...>", "globs for directories to include from the detection of subprojects (space-separated)(use relative paths from the project root). Notice, projects that are not included may still be scanned if they are referenced from included projects.").option("--exclude-dirs <relativeDirs...>", "globs for directories to exclude from the detection of subprojects (space-separated)(use relative paths from the project root). Notice, excluded projects may still be scanned if they are referenced from non-excluded projects.").option("--disable-analysis-splitting", "Limits Coana to at most 1 reachability analysis run per workspace").option("--print-analysis-log-file", "Store log output from the JavaScript/TypeScript reachability analysis in the file js-analysis.log file in the root of each workspace", false).option("--entry-points <entryPoints...>", "List of files to analyze for root workspace. The reachability analysis automatically analyzes all files used by the entry points. If not provided, all JavaScript and TypeScript files are considered entry points. For non-root workspaces, all JavaScript and TypeScript files are analyzed as well.").option("--include-projects-with-no-reachability-support", "Also runs Coana on projects where we support traditional SCA, but does not yet support reachability analysis.", false).option("--ecosystems <ecosystems...>", "List of ecosystems to analyze (space-separated). Currently NPM, PIP, MAVEN, NUGET and GO are supported. Default is all supported ecosystems.").addOption(new Option("--purl-types <purlTypes...>", "List of PURL types to analyze (space-separated). Currently npm, pypi, maven, nuget, golang and cargo are supported. Default is all supported purl types.").hideHelp()).option("--changed-files <files...>", "List of files that have changed. If provided, Coana only analyzes workspaces and modules that contain changed files.").option("--disable-report-submission", "Disable the submission of the report to the Coana dashboard. Used by the pipeline blocking feature.", false).option("--disable-analytics-sharing", "Disable analytics sharing.", false).option("--provider-project <path>", "File system path to folder containing the provider project (Only supported for Maven, Gradle, and SBT)").option("--provider-workspaces <dirs...>", "List of workspaces that build the provided runtime environment (Only supported for Maven, Gradle, and SBT)", (paths) => paths.split(" ")).option("--lightweight-reachability", "Runs Coana in lightweight mode. This increases analysis speed but also raises the risk of Coana misclassifying the reachability of certain complex vulnerabilities. Recommended only for use with Coana Guardrail mode.", false).addOption(new Option("--run-without-docker", "Run package managers and reachability analyzers without using docker").default(process.env.RUN_WITHOUT_DOCKER === "true").hideHelp()).addOption(new Option("--run-env <env>", "Specifies the environment in which the CLI is run. So far only MANAGED_SCAN and UNKNOWN are supported.").default("UNKNOWN").choices(["UNKNOWN", "MANAGED_SCAN"]).hideHelp()).addOption(new Option("--guardrail-mode", "Run Coana in guardrail mode. This mode is used to prevent new reachable vulnerabilities from being introduced into the codebase. Usually run as a CI check when pushing new commits to a pull request.")).option("--ignore-failing-workspaces", "Continue processing when a workspace fails instead of exiting. Failed workspaces will be logged at termination.", false).addOption(new Option("--socket-mode <output-file>", "Run Coana in socket mode and write report to <output-file>").hideHelp()).addOption(new Option("--manifests-tar-hash <hash>", "Hash of the tarball containing all manifest files already uploaded to Socket. If provided, Socket will be used for computing dependency trees.").hideHelp()).option("--skip-cache-usage", "Do not attempt to use cached analysis configuration from previous runs", false).version(version2).configureHelp({ sortOptions: true }).action(async (path2, options) => {
|
|
246246
|
+
run2.name("run").argument("<path>", "File system path to folder containing the project").option("-o, --output-dir <path>", "Write json report to <path>/coana-report.json").option("-d, --debug", "Enable debug logging", false).option("-s, --silent", "Silence all debug/warning output", false).option("--silent-spinner", "Silence spinner", "CI" in process.env || !process.stdin.isTTY).option("-p, --print-report", "Print the report to the console", false).option("--offline-database <path>", "Path to a coana-offline-db.json file for running the CLI without internet connectivity", void 0).option("-t, --timeout <timeout>", "Set API <timeout> in milliseconds to Coana backend.", "300000").option("-a, --analysis-timeout <timeout>", "Set <timeout> in seconds for each reachability analysis run").option("--memory-limit <memoryInMB>", "Set memory limit for analysis to <memoryInMB> megabytes of memory.", "8192").option("-c, --concurrency <concurrency>", "Set the maximum number of concurrent reachability analysis runs. It's recommended to choose a concurrency level that ensures that each analysis run has at least the --memory-limit amount of memory available.", "1").option("--api-key <key>", "Set the Coana dashboard API key. By setting you also enable the dashboard integration.").addOption(new Option("--write-report-to-file", "Write the report dashboard-compatible report to dashboard-report.json. This report may help the Coana team debug issues with the report insertion mechanism.").default(false).hideHelp()).option("--project-name <repoName>", "Set the name of the repository. Used for dashboard integration.").option("--repo-url <repoUrl>", "Set the URL of the repository. Used for dashboard integration.").option("--include-dirs <relativeDirs...>", "globs for directories to include from the detection of subprojects (space-separated)(use relative paths from the project root). Notice, projects that are not included may still be scanned if they are referenced from included projects.").option("--exclude-dirs <relativeDirs...>", "globs for directories to exclude from the detection of subprojects (space-separated)(use relative paths from the project root). Notice, excluded projects may still be scanned if they are referenced from non-excluded projects.").option("--disable-analysis-splitting", "Limits Coana to at most 1 reachability analysis run per workspace").option("--print-analysis-log-file", "Store log output from the JavaScript/TypeScript reachability analysis in the file js-analysis.log file in the root of each workspace", false).option("--entry-points <entryPoints...>", "List of files to analyze for root workspace. The reachability analysis automatically analyzes all files used by the entry points. If not provided, all JavaScript and TypeScript files are considered entry points. For non-root workspaces, all JavaScript and TypeScript files are analyzed as well.").option("--include-projects-with-no-reachability-support", "Also runs Coana on projects where we support traditional SCA, but does not yet support reachability analysis.", false).option("--ecosystems <ecosystems...>", "List of ecosystems to analyze (space-separated). Currently NPM, PIP, MAVEN, NUGET and GO are supported. Default is all supported ecosystems.").addOption(new Option("--purl-types <purlTypes...>", "List of PURL types to analyze (space-separated). Currently npm, pypi, maven, nuget, golang and cargo are supported. Default is all supported purl types.").hideHelp()).option("--changed-files <files...>", "List of files that have changed. If provided, Coana only analyzes workspaces and modules that contain changed files.").option("--disable-report-submission", "Disable the submission of the report to the Coana dashboard. Used by the pipeline blocking feature.", false).option("--disable-analytics-sharing", "Disable analytics sharing.", false).option("--provider-project <path>", "File system path to folder containing the provider project (Only supported for Maven, Gradle, and SBT)").option("--provider-workspaces <dirs...>", "List of workspaces that build the provided runtime environment (Only supported for Maven, Gradle, and SBT)", (paths) => paths.split(" ")).option("--lightweight-reachability", "Runs Coana in lightweight mode. This increases analysis speed but also raises the risk of Coana misclassifying the reachability of certain complex vulnerabilities. Recommended only for use with Coana Guardrail mode.", false).addOption(new Option("--run-without-docker", "Run package managers and reachability analyzers without using docker").default(process.env.RUN_WITHOUT_DOCKER === "true").hideHelp()).addOption(new Option("--run-env <env>", "Specifies the environment in which the CLI is run. So far only MANAGED_SCAN and UNKNOWN are supported.").default("UNKNOWN").choices(["UNKNOWN", "MANAGED_SCAN"]).hideHelp()).addOption(new Option("--guardrail-mode", "Run Coana in guardrail mode. This mode is used to prevent new reachable vulnerabilities from being introduced into the codebase. Usually run as a CI check when pushing new commits to a pull request.")).option("--ignore-failing-workspaces", "Continue processing when a workspace fails instead of exiting. Failed workspaces will be logged at termination.", false).addOption(new Option("--socket-mode <output-file>", "Run Coana in socket mode and write report to <output-file>").hideHelp()).addOption(new Option("--manifests-tar-hash <hash>", "Hash of the tarball containing all manifest files already uploaded to Socket. If provided, Socket will be used for computing dependency trees.").hideHelp()).option("--skip-cache-usage", "Do not attempt to use cached analysis configuration from previous runs", false).addOption(new Option("--min-severity <severity>", "Set the minimum severity of vulnerabilities to analyze. Supported severities are info, low, moderate, high and critical.").choices(["info", "INFO", "low", "LOW", "moderate", "MODERATE", "high", "HIGH", "critical", "CRITICAL"])).version(version2).configureHelp({ sortOptions: true }).action(async (path2, options) => {
|
|
246215
246247
|
process.env.DOCKER_IMAGE_TAG ??= version2;
|
|
246216
246248
|
options.ecosystems = options.ecosystems?.map((e) => e.toUpperCase());
|
|
246249
|
+
options.minSeverity = options.minSeverity?.toUpperCase();
|
|
246217
246250
|
options.purlTypes = options.purlTypes?.map((e) => e.toLowerCase());
|
|
246218
246251
|
await new CliCore(path2, options).main();
|
|
246219
246252
|
});
|
package/package.json
CHANGED
|
Binary file
|
|
Binary file
|
|
Binary file
|
|
Binary file
|
|
Binary file
|