@trustify-da/trustify-da-javascript-client 0.3.0-ea.b40d888 → 0.3.0-ea.c2f6c64
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +191 -11
- package/dist/package.json +23 -10
- package/dist/src/analysis.d.ts +21 -5
- package/dist/src/analysis.js +74 -80
- package/dist/src/batch_opts.d.ts +24 -0
- package/dist/src/batch_opts.js +35 -0
- package/dist/src/cli.js +241 -8
- package/dist/src/cyclone_dx_sbom.d.ts +10 -2
- package/dist/src/cyclone_dx_sbom.js +32 -5
- package/dist/src/index.d.ts +138 -11
- package/dist/src/index.js +288 -7
- package/dist/src/license/index.d.ts +28 -0
- package/dist/src/license/index.js +100 -0
- package/dist/src/license/license_utils.d.ts +40 -0
- package/dist/src/license/license_utils.js +134 -0
- package/dist/src/license/licenses_api.d.ts +34 -0
- package/dist/src/license/licenses_api.js +98 -0
- package/dist/src/license/project_license.d.ts +20 -0
- package/dist/src/license/project_license.js +62 -0
- package/dist/src/oci_image/images.d.ts +4 -5
- package/dist/src/oci_image/utils.d.ts +4 -4
- package/dist/src/oci_image/utils.js +11 -2
- package/dist/src/provider.d.ts +17 -5
- package/dist/src/provider.js +27 -5
- package/dist/src/providers/base_java.d.ts +3 -5
- package/dist/src/providers/base_javascript.d.ts +29 -7
- package/dist/src/providers/base_javascript.js +129 -22
- package/dist/src/providers/base_pyproject.d.ts +147 -0
- package/dist/src/providers/base_pyproject.js +279 -0
- package/dist/src/providers/golang_gomodules.d.ts +20 -13
- package/dist/src/providers/golang_gomodules.js +112 -114
- package/dist/src/providers/gomod_parser.d.ts +4 -0
- package/dist/src/providers/gomod_parser.js +16 -0
- package/dist/src/providers/java_gradle.d.ts +9 -3
- package/dist/src/providers/java_gradle.js +12 -2
- package/dist/src/providers/java_gradle_groovy.d.ts +1 -1
- package/dist/src/providers/java_gradle_kotlin.d.ts +1 -1
- package/dist/src/providers/java_maven.d.ts +12 -5
- package/dist/src/providers/java_maven.js +33 -5
- package/dist/src/providers/javascript_pnpm.d.ts +1 -1
- package/dist/src/providers/javascript_pnpm.js +2 -2
- package/dist/src/providers/manifest.d.ts +2 -0
- package/dist/src/providers/manifest.js +22 -4
- package/dist/src/providers/processors/yarn_berry_processor.js +82 -3
- package/dist/src/providers/python_controller.d.ts +5 -2
- package/dist/src/providers/python_controller.js +56 -58
- package/dist/src/providers/python_pip.d.ts +11 -4
- package/dist/src/providers/python_pip.js +47 -54
- package/dist/src/providers/python_poetry.d.ts +42 -0
- package/dist/src/providers/python_poetry.js +146 -0
- package/dist/src/providers/python_uv.d.ts +26 -0
- package/dist/src/providers/python_uv.js +118 -0
- package/dist/src/providers/requirements_parser.d.ts +6 -0
- package/dist/src/providers/requirements_parser.js +24 -0
- package/dist/src/providers/rust_cargo.d.ts +52 -0
- package/dist/src/providers/rust_cargo.js +614 -0
- package/dist/src/providers/tree-sitter-gomod.wasm +0 -0
- package/dist/src/providers/tree-sitter-requirements.wasm +0 -0
- package/dist/src/sbom.d.ts +10 -1
- package/dist/src/sbom.js +12 -2
- package/dist/src/tools.d.ts +22 -6
- package/dist/src/tools.js +56 -1
- package/dist/src/workspace.d.ts +61 -0
- package/dist/src/workspace.js +256 -0
- package/package.json +24 -11
package/dist/src/analysis.js
CHANGED
|
@@ -1,28 +1,12 @@
|
|
|
1
1
|
import fs from "node:fs";
|
|
2
2
|
import path from "node:path";
|
|
3
3
|
import { EOL } from "os";
|
|
4
|
-
import {
|
|
4
|
+
import { runLicenseCheck } from "./license/index.js";
|
|
5
5
|
import { generateImageSBOM, parseImageRef } from "./oci_image/utils.js";
|
|
6
|
-
import {
|
|
7
|
-
|
|
8
|
-
const
|
|
9
|
-
|
|
10
|
-
const rhdaSourceHeader = "rhda-source";
|
|
11
|
-
const rhdaOperationTypeHeader = "rhda-operation-type";
|
|
12
|
-
const rhdaPackageManagerHeader = "rhda-pkg-manager";
|
|
13
|
-
/**
|
|
14
|
-
* Adds proxy agent configuration to fetch options if a proxy URL is specified
|
|
15
|
-
* @param {RequestInit} options - The base fetch options
|
|
16
|
-
* @param {import("index.js").Options} opts - The trustify DA options that may contain proxy configuration
|
|
17
|
-
* @returns {RequestInit} The fetch options with proxy agent if applicable
|
|
18
|
-
*/
|
|
19
|
-
function addProxyAgent(options, opts) {
|
|
20
|
-
const proxyUrl = getCustom('TRUSTIFY_DA_PROXY_URL', null, opts);
|
|
21
|
-
if (proxyUrl) {
|
|
22
|
-
options.agent = new HttpsProxyAgent(proxyUrl);
|
|
23
|
-
}
|
|
24
|
-
return options;
|
|
25
|
-
}
|
|
6
|
+
import { addProxyAgent, getCustom, getTokenHeaders, TRUSTIFY_DA_OPERATION_TYPE_HEADER, TRUSTIFY_DA_PACKAGE_MANAGER_HEADER } from "./tools.js";
|
|
7
|
+
/** Media type for CycloneDX JSON batch payloads (batch-analysis API). */
|
|
8
|
+
export const CYCLONEDX_JSON_MEDIA_TYPE = 'application/vnd.cyclonedx+json';
|
|
9
|
+
export default { requestComponent, requestStack, requestStackBatch, requestImages, validateToken };
|
|
26
10
|
/**
|
|
27
11
|
* Send a stack analysis request and get the report as 'text/html' or 'application/json'.
|
|
28
12
|
* @param {import('./provider').Provider} provider - the provided data for constructing the request
|
|
@@ -35,15 +19,15 @@ function addProxyAgent(options, opts) {
|
|
|
35
19
|
async function requestStack(provider, manifest, url, html = false, opts = {}) {
|
|
36
20
|
opts["source-manifest"] = Buffer.from(fs.readFileSync(manifest).toString()).toString('base64');
|
|
37
21
|
opts["manifest-type"] = path.parse(manifest).base;
|
|
38
|
-
let provided = provider.provideStack(manifest, opts); // throws error if content providing failed
|
|
22
|
+
let provided = await provider.provideStack(manifest, opts); // throws error if content providing failed
|
|
39
23
|
opts["source-manifest"] = "";
|
|
40
|
-
opts[
|
|
24
|
+
opts[TRUSTIFY_DA_OPERATION_TYPE_HEADER.toUpperCase().replaceAll("-", "_")] = "stack-analysis";
|
|
41
25
|
let startTime = new Date();
|
|
42
26
|
let endTime;
|
|
43
27
|
if (process.env["TRUSTIFY_DA_DEBUG"] === "true") {
|
|
44
28
|
console.log("Starting time of sending stack analysis request to the dependency analytics server= " + startTime);
|
|
45
29
|
}
|
|
46
|
-
opts[
|
|
30
|
+
opts[TRUSTIFY_DA_PACKAGE_MANAGER_HEADER.toUpperCase().replaceAll("-", "_")] = provided.ecosystem;
|
|
47
31
|
const fetchOptions = addProxyAgent({
|
|
48
32
|
method: 'POST',
|
|
49
33
|
headers: {
|
|
@@ -53,7 +37,7 @@ async function requestStack(provider, manifest, url, html = false, opts = {}) {
|
|
|
53
37
|
},
|
|
54
38
|
body: provided.content
|
|
55
39
|
}, opts);
|
|
56
|
-
const finalUrl = new URL(`${url}/api/
|
|
40
|
+
const finalUrl = new URL(`${url}/api/v5/analysis`);
|
|
57
41
|
if (opts['TRUSTIFY_DA_RECOMMENDATIONS_ENABLED'] === 'false') {
|
|
58
42
|
finalUrl.searchParams.append('recommend', 'false');
|
|
59
43
|
}
|
|
@@ -94,13 +78,13 @@ async function requestStack(provider, manifest, url, html = false, opts = {}) {
|
|
|
94
78
|
*/
|
|
95
79
|
async function requestComponent(provider, manifest, url, opts = {}) {
|
|
96
80
|
opts["source-manifest"] = Buffer.from(fs.readFileSync(manifest).toString()).toString('base64');
|
|
97
|
-
let provided = provider.provideComponent(manifest, opts); // throws error if content providing failed
|
|
81
|
+
let provided = await provider.provideComponent(manifest, opts); // throws error if content providing failed
|
|
98
82
|
opts["source-manifest"] = "";
|
|
99
|
-
opts[
|
|
83
|
+
opts[TRUSTIFY_DA_OPERATION_TYPE_HEADER.toUpperCase().replaceAll("-", "_")] = "component-analysis";
|
|
100
84
|
if (process.env["TRUSTIFY_DA_DEBUG"] === "true") {
|
|
101
85
|
console.log("Starting time of sending component analysis request to Trustify DA backend server= " + new Date());
|
|
102
86
|
}
|
|
103
|
-
opts[
|
|
87
|
+
opts[TRUSTIFY_DA_PACKAGE_MANAGER_HEADER.toUpperCase().replaceAll("-", "_")] = provided.ecosystem;
|
|
104
88
|
const fetchOptions = addProxyAgent({
|
|
105
89
|
method: 'POST',
|
|
106
90
|
headers: {
|
|
@@ -110,7 +94,7 @@ async function requestComponent(provider, manifest, url, opts = {}) {
|
|
|
110
94
|
},
|
|
111
95
|
body: provided.content
|
|
112
96
|
}, opts);
|
|
113
|
-
const finalUrl = new URL(`${url}/api/
|
|
97
|
+
const finalUrl = new URL(`${url}/api/v5/analysis`);
|
|
114
98
|
if (opts['TRUSTIFY_DA_RECOMMENDATIONS_ENABLED'] === 'false') {
|
|
115
99
|
finalUrl.searchParams.append('recommend', 'false');
|
|
116
100
|
}
|
|
@@ -127,12 +111,67 @@ async function requestComponent(provider, manifest, url, opts = {}) {
|
|
|
127
111
|
console.log(JSON.stringify(result, null, 4));
|
|
128
112
|
console.log("Ending time of sending component analysis request to Trustify DA backend server= " + new Date());
|
|
129
113
|
}
|
|
114
|
+
const licenseCheckEnabled = getCustom('TRUSTIFY_DA_LICENSE_CHECK', 'true', opts) !== 'false' && opts.licenseCheck !== false;
|
|
115
|
+
if (licenseCheckEnabled) {
|
|
116
|
+
try {
|
|
117
|
+
result.licenseSummary = await runLicenseCheck(provided.content, manifest, url, opts, result);
|
|
118
|
+
}
|
|
119
|
+
catch (licenseErr) {
|
|
120
|
+
result.licenseSummary = { error: licenseErr.message };
|
|
121
|
+
}
|
|
122
|
+
}
|
|
130
123
|
}
|
|
131
124
|
else {
|
|
132
125
|
throw new Error(`Got error response from Trustify DA backend - http return code : ${resp.status}, ex-request-id: ${resp.headers.get("ex-request-id")} error message => ${await resp.text()}`);
|
|
133
126
|
}
|
|
134
127
|
return Promise.resolve(result);
|
|
135
128
|
}
|
|
129
|
+
/**
|
|
130
|
+
* Send a batch stack analysis request for multiple manifests (SBOMs keyed by purl).
|
|
131
|
+
* @param {Object.<string, object>} sbomByPurl - Map of root purl to CycloneDX SBOM object
|
|
132
|
+
* @param {string} url - the backend url
|
|
133
|
+
* @param {boolean} [html=false] - true returns HTML, false returns JSON
|
|
134
|
+
* @param {import("index.js").Options} [opts={}]
|
|
135
|
+
* @returns {Promise<string|Object.<string, import('@trustify-da/trustify-da-api-model/model/v5/AnalysisReport').AnalysisReport>>}
|
|
136
|
+
*/
|
|
137
|
+
async function requestStackBatch(sbomByPurl, url, html = false, opts = {}) {
|
|
138
|
+
const finalUrl = new URL(`${url}/api/v5/batch-analysis`);
|
|
139
|
+
if (opts['TRUSTIFY_DA_RECOMMENDATIONS_ENABLED'] === 'false') {
|
|
140
|
+
finalUrl.searchParams.append('recommend', 'false');
|
|
141
|
+
}
|
|
142
|
+
const fetchOptions = addProxyAgent({
|
|
143
|
+
method: 'POST',
|
|
144
|
+
headers: {
|
|
145
|
+
'Accept': html ? 'text/html' : 'application/json',
|
|
146
|
+
'Content-Type': CYCLONEDX_JSON_MEDIA_TYPE,
|
|
147
|
+
...getTokenHeaders(opts)
|
|
148
|
+
},
|
|
149
|
+
body: JSON.stringify(sbomByPurl)
|
|
150
|
+
}, opts);
|
|
151
|
+
const resp = await fetch(finalUrl, fetchOptions);
|
|
152
|
+
if (resp.status === 200) {
|
|
153
|
+
let result;
|
|
154
|
+
if (!html) {
|
|
155
|
+
result = await resp.json();
|
|
156
|
+
}
|
|
157
|
+
else {
|
|
158
|
+
result = await resp.text();
|
|
159
|
+
}
|
|
160
|
+
if (process.env["TRUSTIFY_DA_DEBUG"] === "true") {
|
|
161
|
+
const exRequestId = resp.headers.get("ex-request-id");
|
|
162
|
+
if (exRequestId) {
|
|
163
|
+
console.log("Unique Identifier associated with this request - ex-request-id=" + exRequestId);
|
|
164
|
+
}
|
|
165
|
+
console.log("Response body received from Trustify DA backend server : " + EOL + EOL);
|
|
166
|
+
console.log(JSON.stringify(result, null, 4));
|
|
167
|
+
console.log("Ending time of sending batch stack analysis request to Trustify DA backend server= " + new Date());
|
|
168
|
+
}
|
|
169
|
+
return result;
|
|
170
|
+
}
|
|
171
|
+
else {
|
|
172
|
+
throw new Error(`Got error response from Trustify DA backend - http return code : ${resp.status}, ex-request-id: ${resp.headers.get("ex-request-id")} error message => ${await resp.text()}`);
|
|
173
|
+
}
|
|
174
|
+
}
|
|
136
175
|
/**
|
|
137
176
|
*
|
|
138
177
|
* @param {Array<string>} imageRefs
|
|
@@ -146,19 +185,20 @@ async function requestImages(imageRefs, url, html = false, opts = {}) {
|
|
|
146
185
|
const parsedImageRef = parseImageRef(image, opts);
|
|
147
186
|
imageSboms[parsedImageRef.getPackageURL().toString()] = generateImageSBOM(parsedImageRef, opts);
|
|
148
187
|
}
|
|
149
|
-
const finalUrl = new URL(`${url}/api/
|
|
188
|
+
const finalUrl = new URL(`${url}/api/v5/batch-analysis`);
|
|
150
189
|
if (opts['TRUSTIFY_DA_RECOMMENDATIONS_ENABLED'] === 'false') {
|
|
151
190
|
finalUrl.searchParams.append('recommend', 'false');
|
|
152
191
|
}
|
|
153
|
-
const
|
|
192
|
+
const fetchOptions = addProxyAgent({
|
|
154
193
|
method: 'POST',
|
|
155
194
|
headers: {
|
|
156
195
|
'Accept': html ? 'text/html' : 'application/json',
|
|
157
|
-
'Content-Type':
|
|
196
|
+
'Content-Type': CYCLONEDX_JSON_MEDIA_TYPE,
|
|
158
197
|
...getTokenHeaders(opts)
|
|
159
198
|
},
|
|
160
199
|
body: JSON.stringify(imageSboms),
|
|
161
|
-
});
|
|
200
|
+
}, opts);
|
|
201
|
+
const resp = await fetch(finalUrl, fetchOptions);
|
|
162
202
|
if (resp.status === 200) {
|
|
163
203
|
let result;
|
|
164
204
|
if (!html) {
|
|
@@ -195,7 +235,7 @@ async function validateToken(url, opts = {}) {
|
|
|
195
235
|
...getTokenHeaders(opts),
|
|
196
236
|
}
|
|
197
237
|
}, opts);
|
|
198
|
-
let resp = await fetch(`${url}/api/
|
|
238
|
+
let resp = await fetch(`${url}/api/v5/token`, fetchOptions);
|
|
199
239
|
if (process.env["TRUSTIFY_DA_DEBUG"] === "true") {
|
|
200
240
|
let exRequestId = resp.headers.get("ex-request-id");
|
|
201
241
|
if (exRequestId) {
|
|
@@ -204,49 +244,3 @@ async function validateToken(url, opts = {}) {
|
|
|
204
244
|
}
|
|
205
245
|
return resp.status;
|
|
206
246
|
}
|
|
207
|
-
/**
|
|
208
|
-
*
|
|
209
|
-
* @param {string} headerName - the header name to populate in request
|
|
210
|
-
* @param headers
|
|
211
|
-
* @param {import("index.js").Options} [opts={}] - optional various options to pass along the application
|
|
212
|
-
* @private
|
|
213
|
-
*/
|
|
214
|
-
function setRhdaHeader(headerName, headers, opts) {
|
|
215
|
-
let rhdaHeaderValue = getCustom(headerName.toUpperCase().replaceAll("-", "_"), null, opts);
|
|
216
|
-
if (rhdaHeaderValue) {
|
|
217
|
-
headers[headerName] = rhdaHeaderValue;
|
|
218
|
-
}
|
|
219
|
-
}
|
|
220
|
-
/**
|
|
221
|
-
* Utility function for fetching vendor tokens
|
|
222
|
-
* @param {import("index.js").Options} [opts={}] - optional various options to pass along the application
|
|
223
|
-
* @returns {{}}
|
|
224
|
-
*/
|
|
225
|
-
function getTokenHeaders(opts = {}) {
|
|
226
|
-
let supportedTokens = ['snyk', 'oss-index'];
|
|
227
|
-
let headers = {};
|
|
228
|
-
supportedTokens.forEach(vendor => {
|
|
229
|
-
let token = getCustom(`TRUSTIFY_DA_${vendor.replace("-", "_").toUpperCase()}_TOKEN`, null, opts);
|
|
230
|
-
if (token) {
|
|
231
|
-
headers[`ex-${vendor}-token`] = token;
|
|
232
|
-
}
|
|
233
|
-
let user = getCustom(`TRUSTIFY_DA_${vendor.replace("-", "_").toUpperCase()}_USER`, null, opts);
|
|
234
|
-
if (user) {
|
|
235
|
-
headers[`ex-${vendor}-user`] = user;
|
|
236
|
-
}
|
|
237
|
-
});
|
|
238
|
-
setRhdaHeader(rhdaTokenHeader, headers, opts);
|
|
239
|
-
setRhdaHeader(rhdaSourceHeader, headers, opts);
|
|
240
|
-
setRhdaHeader(rhdaOperationTypeHeader, headers, opts);
|
|
241
|
-
setRhdaHeader(rhdaPackageManagerHeader, headers, opts);
|
|
242
|
-
setRhdaHeader(rhdaTelemetryId, headers, opts);
|
|
243
|
-
if (process.env["TRUSTIFY_DA_DEBUG"] === "true") {
|
|
244
|
-
console.log("Headers Values to be sent to Trustify DA backend:" + EOL);
|
|
245
|
-
for (const headerKey in headers) {
|
|
246
|
-
if (!headerKey.match(RegexNotToBeLogged)) {
|
|
247
|
-
console.log(`${headerKey}: ${headers[headerKey]}`);
|
|
248
|
-
}
|
|
249
|
-
}
|
|
250
|
-
}
|
|
251
|
-
return headers;
|
|
252
|
-
}
|
|
@@ -0,0 +1,24 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* Whether to skip failed manifests and continue (default), or fail on first SBOM/validation error.
|
|
3
|
+
* `opts.continueOnError` overrides; env `TRUSTIFY_DA_CONTINUE_ON_ERROR=false` disables continuation.
|
|
4
|
+
*
|
|
5
|
+
* @param {{ continueOnError?: boolean, TRUSTIFY_DA_CONTINUE_ON_ERROR?: string, [key: string]: unknown }} [opts={}]
|
|
6
|
+
* @returns {boolean} true = collect errors (default), false = fail-fast
|
|
7
|
+
*/
|
|
8
|
+
export function resolveContinueOnError(opts?: {
|
|
9
|
+
continueOnError?: boolean;
|
|
10
|
+
TRUSTIFY_DA_CONTINUE_ON_ERROR?: string;
|
|
11
|
+
[key: string]: unknown;
|
|
12
|
+
}): boolean;
|
|
13
|
+
/**
|
|
14
|
+
* When true, `stackAnalysisBatch` returns `{ analysis, metadata }` instead of the backend response only.
|
|
15
|
+
* `opts.batchMetadata` overrides; env `TRUSTIFY_DA_BATCH_METADATA=true` enables.
|
|
16
|
+
*
|
|
17
|
+
* @param {{ batchMetadata?: boolean, TRUSTIFY_DA_BATCH_METADATA?: string, [key: string]: unknown }} [opts={}]
|
|
18
|
+
* @returns {boolean}
|
|
19
|
+
*/
|
|
20
|
+
export function resolveBatchMetadata(opts?: {
|
|
21
|
+
batchMetadata?: boolean;
|
|
22
|
+
TRUSTIFY_DA_BATCH_METADATA?: string;
|
|
23
|
+
[key: string]: unknown;
|
|
24
|
+
}): boolean;
|
|
@@ -0,0 +1,35 @@
|
|
|
1
|
+
import { getCustom } from './tools.js';
|
|
2
|
+
/**
|
|
3
|
+
* Whether to skip failed manifests and continue (default), or fail on first SBOM/validation error.
|
|
4
|
+
* `opts.continueOnError` overrides; env `TRUSTIFY_DA_CONTINUE_ON_ERROR=false` disables continuation.
|
|
5
|
+
*
|
|
6
|
+
* @param {{ continueOnError?: boolean, TRUSTIFY_DA_CONTINUE_ON_ERROR?: string, [key: string]: unknown }} [opts={}]
|
|
7
|
+
* @returns {boolean} true = collect errors (default), false = fail-fast
|
|
8
|
+
*/
|
|
9
|
+
export function resolveContinueOnError(opts = {}) {
|
|
10
|
+
if (typeof opts.continueOnError === 'boolean') {
|
|
11
|
+
return opts.continueOnError;
|
|
12
|
+
}
|
|
13
|
+
const v = getCustom('TRUSTIFY_DA_CONTINUE_ON_ERROR', null, opts);
|
|
14
|
+
if (v != null && String(v).trim() !== '') {
|
|
15
|
+
return String(v).toLowerCase() !== 'false';
|
|
16
|
+
}
|
|
17
|
+
return true;
|
|
18
|
+
}
|
|
19
|
+
/**
|
|
20
|
+
* When true, `stackAnalysisBatch` returns `{ analysis, metadata }` instead of the backend response only.
|
|
21
|
+
* `opts.batchMetadata` overrides; env `TRUSTIFY_DA_BATCH_METADATA=true` enables.
|
|
22
|
+
*
|
|
23
|
+
* @param {{ batchMetadata?: boolean, TRUSTIFY_DA_BATCH_METADATA?: string, [key: string]: unknown }} [opts={}]
|
|
24
|
+
* @returns {boolean}
|
|
25
|
+
*/
|
|
26
|
+
export function resolveBatchMetadata(opts = {}) {
|
|
27
|
+
if (typeof opts.batchMetadata === 'boolean') {
|
|
28
|
+
return opts.batchMetadata;
|
|
29
|
+
}
|
|
30
|
+
const v = getCustom('TRUSTIFY_DA_BATCH_METADATA', null, opts);
|
|
31
|
+
if (v != null && String(v).trim() !== '') {
|
|
32
|
+
return String(v).toLowerCase() === 'true';
|
|
33
|
+
}
|
|
34
|
+
return false;
|
|
35
|
+
}
|
package/dist/src/cli.js
CHANGED
|
@@ -1,8 +1,10 @@
|
|
|
1
1
|
#!/usr/bin/env node
|
|
2
|
+
import fs from 'node:fs';
|
|
2
3
|
import * as path from "path";
|
|
3
4
|
import yargs from 'yargs';
|
|
4
5
|
import { hideBin } from 'yargs/helpers';
|
|
5
|
-
import
|
|
6
|
+
import { getProjectLicense, getLicenseDetails } from './license/index.js';
|
|
7
|
+
import client, { selectTrustifyDABackend, generateSbom } from './index.js';
|
|
6
8
|
// command for component analysis take manifest type and content
|
|
7
9
|
const component = {
|
|
8
10
|
command: 'component </path/to/manifest>',
|
|
@@ -11,10 +13,18 @@ const component = {
|
|
|
11
13
|
desc: 'manifest path for analyzing',
|
|
12
14
|
type: 'string',
|
|
13
15
|
normalize: true,
|
|
16
|
+
}).options({
|
|
17
|
+
workspaceDir: {
|
|
18
|
+
alias: 'w',
|
|
19
|
+
desc: 'Workspace root directory (for monorepos; lock file is expected here)',
|
|
20
|
+
type: 'string',
|
|
21
|
+
normalize: true,
|
|
22
|
+
}
|
|
14
23
|
}),
|
|
15
24
|
handler: async (args) => {
|
|
16
25
|
let manifestName = args['/path/to/manifest'];
|
|
17
|
-
|
|
26
|
+
const opts = args.workspaceDir ? { TRUSTIFY_DA_WORKSPACE_DIR: args.workspaceDir } : {};
|
|
27
|
+
let res = await client.componentAnalysis(manifestName, opts);
|
|
18
28
|
console.log(JSON.stringify(res, null, 2));
|
|
19
29
|
}
|
|
20
30
|
};
|
|
@@ -22,9 +32,8 @@ const validateToken = {
|
|
|
22
32
|
command: 'validate-token <token-provider> [--token-value thevalue]',
|
|
23
33
|
desc: 'Validates input token if authentic and authorized',
|
|
24
34
|
builder: yargs => yargs.positional('token-provider', {
|
|
25
|
-
desc: 'the token provider',
|
|
26
|
-
type: 'string'
|
|
27
|
-
choices: ['snyk', 'oss-index'],
|
|
35
|
+
desc: 'the token provider name',
|
|
36
|
+
type: 'string'
|
|
28
37
|
}).options({
|
|
29
38
|
tokenValue: {
|
|
30
39
|
alias: 'value',
|
|
@@ -37,7 +46,7 @@ const validateToken = {
|
|
|
37
46
|
let opts = {};
|
|
38
47
|
if (args['tokenValue'] !== undefined && args['tokenValue'].trim() !== "") {
|
|
39
48
|
let tokenValue = args['tokenValue'].trim();
|
|
40
|
-
opts[`
|
|
49
|
+
opts[`TRUSTIFY_DA_PROVIDER_${tokenProvider}_TOKEN`] = tokenValue;
|
|
41
50
|
}
|
|
42
51
|
let res = await client.validateToken(opts);
|
|
43
52
|
console.log(res);
|
|
@@ -117,15 +126,22 @@ const stack = {
|
|
|
117
126
|
desc: 'For JSON report, get only the \'summary\'',
|
|
118
127
|
type: 'boolean',
|
|
119
128
|
conflicts: 'html'
|
|
129
|
+
},
|
|
130
|
+
workspaceDir: {
|
|
131
|
+
alias: 'w',
|
|
132
|
+
desc: 'Workspace root directory (for monorepos; lock file is expected here)',
|
|
133
|
+
type: 'string',
|
|
134
|
+
normalize: true,
|
|
120
135
|
}
|
|
121
136
|
}),
|
|
122
137
|
handler: async (args) => {
|
|
123
138
|
let manifest = args['/path/to/manifest'];
|
|
124
139
|
let html = args['html'];
|
|
125
140
|
let summary = args['summary'];
|
|
141
|
+
const opts = args.workspaceDir ? { TRUSTIFY_DA_WORKSPACE_DIR: args.workspaceDir } : {};
|
|
126
142
|
let theProvidersSummary = new Map();
|
|
127
143
|
let theProvidersObject = {};
|
|
128
|
-
let res = await client.stackAnalysis(manifest, html);
|
|
144
|
+
let res = await client.stackAnalysis(manifest, html, opts);
|
|
129
145
|
if (summary) {
|
|
130
146
|
for (let provider in res.providers) {
|
|
131
147
|
if (res.providers[provider].sources !== undefined) {
|
|
@@ -143,13 +159,230 @@ const stack = {
|
|
|
143
159
|
console.log(html ? res : JSON.stringify(!html && summary ? theProvidersObject : res, null, 2));
|
|
144
160
|
}
|
|
145
161
|
};
|
|
162
|
+
// command for batch stack analysis (workspace)
|
|
163
|
+
const stackBatch = {
|
|
164
|
+
command: 'stack-batch </path/to/workspace-root> [--html|--summary] [--concurrency <n>] [--ignore <pattern>...] [--metadata] [--fail-fast]',
|
|
165
|
+
desc: 'produce stack report for all packages/crates in a workspace (Cargo or JS/TS)',
|
|
166
|
+
builder: yargs => yargs.positional('/path/to/workspace-root', {
|
|
167
|
+
desc: 'workspace root directory (containing Cargo.toml+Cargo.lock or package.json+lock file)',
|
|
168
|
+
type: 'string',
|
|
169
|
+
normalize: true,
|
|
170
|
+
}).options({
|
|
171
|
+
html: {
|
|
172
|
+
alias: 'r',
|
|
173
|
+
desc: 'Get the report as HTML instead of JSON',
|
|
174
|
+
type: 'boolean',
|
|
175
|
+
conflicts: 'summary'
|
|
176
|
+
},
|
|
177
|
+
summary: {
|
|
178
|
+
alias: 's',
|
|
179
|
+
desc: 'For JSON report, get only the \'summary\' per package',
|
|
180
|
+
type: 'boolean',
|
|
181
|
+
conflicts: 'html'
|
|
182
|
+
},
|
|
183
|
+
concurrency: {
|
|
184
|
+
alias: 'c',
|
|
185
|
+
desc: 'Max parallel SBOM generations (default: 10, env: TRUSTIFY_DA_BATCH_CONCURRENCY)',
|
|
186
|
+
type: 'number',
|
|
187
|
+
},
|
|
188
|
+
ignore: {
|
|
189
|
+
alias: 'i',
|
|
190
|
+
desc: 'Extra glob patterns excluded from workspace discovery (merged with defaults). Repeat flag per pattern. Env: TRUSTIFY_DA_WORKSPACE_DISCOVERY_IGNORE (comma-separated)',
|
|
191
|
+
type: 'string',
|
|
192
|
+
array: true,
|
|
193
|
+
},
|
|
194
|
+
metadata: {
|
|
195
|
+
alias: 'm',
|
|
196
|
+
desc: 'Return { analysis, metadata } with per-manifest errors (env: TRUSTIFY_DA_BATCH_METADATA=true)',
|
|
197
|
+
type: 'boolean',
|
|
198
|
+
default: false,
|
|
199
|
+
},
|
|
200
|
+
failFast: {
|
|
201
|
+
desc: 'Stop on first invalid package.json or SBOM error (env: TRUSTIFY_DA_CONTINUE_ON_ERROR=false)',
|
|
202
|
+
type: 'boolean',
|
|
203
|
+
default: false,
|
|
204
|
+
}
|
|
205
|
+
}),
|
|
206
|
+
handler: async (args) => {
|
|
207
|
+
const workspaceRoot = args['/path/to/workspace-root'];
|
|
208
|
+
const html = args['html'];
|
|
209
|
+
const summary = args['summary'];
|
|
210
|
+
const opts = {};
|
|
211
|
+
if (args.concurrency != null) {
|
|
212
|
+
opts.batchConcurrency = args.concurrency;
|
|
213
|
+
}
|
|
214
|
+
const extraIgnores = Array.isArray(args.ignore) ? args.ignore.filter(p => p != null && String(p).trim()) : [];
|
|
215
|
+
if (extraIgnores.length > 0) {
|
|
216
|
+
opts.workspaceDiscoveryIgnore = extraIgnores;
|
|
217
|
+
}
|
|
218
|
+
if (args.metadata) {
|
|
219
|
+
opts.batchMetadata = true;
|
|
220
|
+
}
|
|
221
|
+
if (args.failFast) {
|
|
222
|
+
opts.continueOnError = false;
|
|
223
|
+
}
|
|
224
|
+
let res = await client.stackAnalysisBatch(workspaceRoot, html, opts);
|
|
225
|
+
const batchAnalysis = res && typeof res === 'object' && res != null && 'analysis' in res ? res.analysis : res;
|
|
226
|
+
if (summary && !html && typeof batchAnalysis === 'object') {
|
|
227
|
+
const summaries = {};
|
|
228
|
+
for (const [purl, report] of Object.entries(batchAnalysis)) {
|
|
229
|
+
if (report?.providers) {
|
|
230
|
+
for (const provider of Object.keys(report.providers)) {
|
|
231
|
+
const sources = report.providers[provider]?.sources;
|
|
232
|
+
if (sources) {
|
|
233
|
+
for (const [source, data] of Object.entries(sources)) {
|
|
234
|
+
if (data?.summary) {
|
|
235
|
+
if (!summaries[purl]) {
|
|
236
|
+
summaries[purl] = {};
|
|
237
|
+
}
|
|
238
|
+
if (!summaries[purl][provider]) {
|
|
239
|
+
summaries[purl][provider] = {};
|
|
240
|
+
}
|
|
241
|
+
summaries[purl][provider][source] = data.summary;
|
|
242
|
+
}
|
|
243
|
+
}
|
|
244
|
+
}
|
|
245
|
+
}
|
|
246
|
+
}
|
|
247
|
+
}
|
|
248
|
+
if (res && typeof res === 'object' && res != null && 'metadata' in res) {
|
|
249
|
+
res = { analysis: summaries, metadata: res.metadata };
|
|
250
|
+
}
|
|
251
|
+
else {
|
|
252
|
+
res = summaries;
|
|
253
|
+
}
|
|
254
|
+
}
|
|
255
|
+
if (html) {
|
|
256
|
+
const htmlContent = res && typeof res === 'object' && 'analysis' in res ? res.analysis : res;
|
|
257
|
+
console.log(htmlContent);
|
|
258
|
+
}
|
|
259
|
+
else {
|
|
260
|
+
console.log(JSON.stringify(res, null, 2));
|
|
261
|
+
}
|
|
262
|
+
}
|
|
263
|
+
};
|
|
264
|
+
// command for license checking
|
|
265
|
+
const license = {
|
|
266
|
+
command: 'license </path/to/manifest>',
|
|
267
|
+
desc: 'Display project license information from manifest and LICENSE file in JSON format',
|
|
268
|
+
builder: yargs => yargs.positional('/path/to/manifest', {
|
|
269
|
+
desc: 'manifest path for license analysis',
|
|
270
|
+
type: 'string',
|
|
271
|
+
normalize: true,
|
|
272
|
+
}),
|
|
273
|
+
handler: async (args) => {
|
|
274
|
+
let manifestPath = args['/path/to/manifest'];
|
|
275
|
+
const opts = {}; // CLI options can be extended in the future
|
|
276
|
+
try {
|
|
277
|
+
selectTrustifyDABackend(opts);
|
|
278
|
+
}
|
|
279
|
+
catch (err) {
|
|
280
|
+
console.error(JSON.stringify({ error: err.message }, null, 2));
|
|
281
|
+
process.exit(1);
|
|
282
|
+
}
|
|
283
|
+
let localResult;
|
|
284
|
+
try {
|
|
285
|
+
localResult = getProjectLicense(manifestPath);
|
|
286
|
+
}
|
|
287
|
+
catch (err) {
|
|
288
|
+
console.error(JSON.stringify({ error: `Failed to read manifest: ${err.message}` }, null, 2));
|
|
289
|
+
process.exit(1);
|
|
290
|
+
}
|
|
291
|
+
const errors = [];
|
|
292
|
+
// Build LicenseInfo objects
|
|
293
|
+
const buildLicenseInfo = async (spdxId) => {
|
|
294
|
+
if (!spdxId) {
|
|
295
|
+
return null;
|
|
296
|
+
}
|
|
297
|
+
const licenseInfo = { spdxId };
|
|
298
|
+
try {
|
|
299
|
+
const details = await getLicenseDetails(spdxId, opts);
|
|
300
|
+
if (details) {
|
|
301
|
+
// Check if backend recognized the license as valid
|
|
302
|
+
if (details.category === 'UNKNOWN') {
|
|
303
|
+
errors.push(`"${spdxId}" is not a valid SPDX license identifier. Please use a valid SPDX expression (e.g., "Apache-2.0", "MIT"). See https://spdx.org/licenses/`);
|
|
304
|
+
}
|
|
305
|
+
else {
|
|
306
|
+
Object.assign(licenseInfo, details);
|
|
307
|
+
}
|
|
308
|
+
}
|
|
309
|
+
else {
|
|
310
|
+
errors.push(`No license details found for ${spdxId}`);
|
|
311
|
+
}
|
|
312
|
+
}
|
|
313
|
+
catch (err) {
|
|
314
|
+
errors.push(`Failed to fetch details for ${spdxId}: ${err.message}`);
|
|
315
|
+
}
|
|
316
|
+
return licenseInfo;
|
|
317
|
+
};
|
|
318
|
+
const output = {
|
|
319
|
+
manifestLicense: await buildLicenseInfo(localResult.fromManifest),
|
|
320
|
+
fileLicense: await buildLicenseInfo(localResult.fromFile),
|
|
321
|
+
mismatch: localResult.mismatch
|
|
322
|
+
};
|
|
323
|
+
if (errors.length > 0) {
|
|
324
|
+
output.errors = errors;
|
|
325
|
+
}
|
|
326
|
+
console.log(JSON.stringify(output, null, 2));
|
|
327
|
+
}
|
|
328
|
+
};
|
|
329
|
+
const sbom = {
|
|
330
|
+
command: 'sbom </path/to/manifest> [--output]',
|
|
331
|
+
desc: 'generate a CycloneDX SBOM from a manifest file',
|
|
332
|
+
builder: yargs => yargs.positional('/path/to/manifest', {
|
|
333
|
+
desc: 'manifest path for SBOM generation',
|
|
334
|
+
type: 'string',
|
|
335
|
+
normalize: true,
|
|
336
|
+
}).options({
|
|
337
|
+
output: {
|
|
338
|
+
alias: 'o',
|
|
339
|
+
desc: 'Write SBOM JSON to a file instead of stdout',
|
|
340
|
+
type: 'string',
|
|
341
|
+
normalize: true,
|
|
342
|
+
},
|
|
343
|
+
workspaceDir: {
|
|
344
|
+
alias: 'w',
|
|
345
|
+
desc: 'Workspace root directory (for monorepos; lock file is expected here)',
|
|
346
|
+
type: 'string',
|
|
347
|
+
normalize: true,
|
|
348
|
+
}
|
|
349
|
+
}),
|
|
350
|
+
handler: async (args) => {
|
|
351
|
+
let manifest = args['/path/to/manifest'];
|
|
352
|
+
const opts = args.workspaceDir ? { TRUSTIFY_DA_WORKSPACE_DIR: args.workspaceDir } : {};
|
|
353
|
+
let result;
|
|
354
|
+
try {
|
|
355
|
+
result = await generateSbom(manifest, opts);
|
|
356
|
+
}
|
|
357
|
+
catch (err) {
|
|
358
|
+
console.error(JSON.stringify({ error: `Failed to generate SBOM: ${err.message}` }, null, 2));
|
|
359
|
+
process.exit(1);
|
|
360
|
+
}
|
|
361
|
+
const json = JSON.stringify(result, null, 2);
|
|
362
|
+
if (args.output) {
|
|
363
|
+
try {
|
|
364
|
+
fs.writeFileSync(args.output, json);
|
|
365
|
+
}
|
|
366
|
+
catch (err) {
|
|
367
|
+
console.error(JSON.stringify({ error: `Failed to write output file: ${err.message}` }, null, 2));
|
|
368
|
+
process.exit(1);
|
|
369
|
+
}
|
|
370
|
+
}
|
|
371
|
+
else {
|
|
372
|
+
console.log(json);
|
|
373
|
+
}
|
|
374
|
+
}
|
|
375
|
+
};
|
|
146
376
|
// parse and invoke the command
|
|
147
377
|
yargs(hideBin(process.argv))
|
|
148
|
-
.usage(`Usage: ${process.argv[0].includes("node") ? path.parse(process.argv[1]).base : path.parse(process.argv[0]).base} {component|stack|image|validate-token}`)
|
|
378
|
+
.usage(`Usage: ${process.argv[0].includes("node") ? path.parse(process.argv[1]).base : path.parse(process.argv[0]).base} {component|stack|stack-batch|image|validate-token|license|sbom}`)
|
|
149
379
|
.command(stack)
|
|
380
|
+
.command(stackBatch)
|
|
150
381
|
.command(component)
|
|
151
382
|
.command(image)
|
|
152
383
|
.command(validateToken)
|
|
384
|
+
.command(license)
|
|
385
|
+
.command(sbom)
|
|
153
386
|
.scriptName('')
|
|
154
387
|
.version(false)
|
|
155
388
|
.demandCommand(1)
|
|
@@ -1,4 +1,3 @@
|
|
|
1
|
-
/// <reference types="packageurl-js/src/package-url" />
|
|
2
1
|
export default class CycloneDxSbom {
|
|
3
2
|
sbomObject: any;
|
|
4
3
|
rootComponent: any;
|
|
@@ -7,9 +6,10 @@ export default class CycloneDxSbom {
|
|
|
7
6
|
sourceManifestForAuditTrail: any;
|
|
8
7
|
/**
|
|
9
8
|
* @param {PackageURL} root - add main/root component for sbom
|
|
9
|
+
* @param {string|Array} [licenses] - optional license(s) for the root component
|
|
10
10
|
* @return {CycloneDxSbom} the CycloneDxSbom Sbom Object
|
|
11
11
|
*/
|
|
12
|
-
addRoot(root: PackageURL): CycloneDxSbom;
|
|
12
|
+
addRoot(root: PackageURL, licenses?: string | any[]): CycloneDxSbom;
|
|
13
13
|
/**
|
|
14
14
|
* @return {{{"bom-ref": string, name, purl: string, type, version}}} root component of sbom.
|
|
15
15
|
*/
|
|
@@ -49,6 +49,7 @@ export default class CycloneDxSbom {
|
|
|
49
49
|
type: any;
|
|
50
50
|
version: any;
|
|
51
51
|
scope: any;
|
|
52
|
+
licenses?: any;
|
|
52
53
|
};
|
|
53
54
|
/**
|
|
54
55
|
* This method gets an array of dependencies to be ignored, and remove all of them from CycloneDx Sbom
|
|
@@ -69,6 +70,13 @@ export default class CycloneDxSbom {
|
|
|
69
70
|
* @return {boolean}
|
|
70
71
|
*/
|
|
71
72
|
checkIfPackageInsideDependsOnList(component: any, name: string): boolean;
|
|
73
|
+
/**
|
|
74
|
+
* Checks if any entry in the dependsOn list of sourceRef starts with the given purl prefix.
|
|
75
|
+
* @param {PackageURL} sourceRef - The source component
|
|
76
|
+
* @param {string} purlPrefix - The purl prefix to match (e.g. "pkg:npm/minimist@")
|
|
77
|
+
* @return {boolean}
|
|
78
|
+
*/
|
|
79
|
+
checkDependsOnByPurlPrefix(sourceRef: PackageURL, purlPrefix: string): boolean;
|
|
72
80
|
/** Removes the root component from the sbom
|
|
73
81
|
*/
|
|
74
82
|
removeRootComponent(): void;
|