socketsecurity 2.2.27__tar.gz → 2.2.33__tar.gz
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- socketsecurity-2.2.33/Dockerfile +106 -0
- {socketsecurity-2.2.27 → socketsecurity-2.2.33}/PKG-INFO +4 -2
- {socketsecurity-2.2.27 → socketsecurity-2.2.33}/README.md +2 -0
- {socketsecurity-2.2.27 → socketsecurity-2.2.33}/pyproject.toml +2 -2
- socketsecurity-2.2.33/scripts/build_container_flexible.sh +161 -0
- socketsecurity-2.2.33/scripts/docker-entrypoint.sh +18 -0
- {socketsecurity-2.2.27 → socketsecurity-2.2.33}/socketsecurity/__init__.py +1 -1
- {socketsecurity-2.2.27 → socketsecurity-2.2.33}/socketsecurity/config.py +38 -9
- {socketsecurity-2.2.27 → socketsecurity-2.2.33}/socketsecurity/core/tools/reachability.py +24 -1
- {socketsecurity-2.2.27 → socketsecurity-2.2.33}/socketsecurity/socketcli.py +13 -2
- socketsecurity-2.2.27/Dockerfile +0 -41
- {socketsecurity-2.2.27 → socketsecurity-2.2.33}/.github/CODEOWNERS +0 -0
- {socketsecurity-2.2.27 → socketsecurity-2.2.33}/.github/PULL_REQUEST_TEMPLATE/bug-fix.md +0 -0
- {socketsecurity-2.2.27 → socketsecurity-2.2.33}/.github/PULL_REQUEST_TEMPLATE/feature.md +0 -0
- {socketsecurity-2.2.27 → socketsecurity-2.2.33}/.github/PULL_REQUEST_TEMPLATE/improvement.md +0 -0
- {socketsecurity-2.2.27 → socketsecurity-2.2.33}/.github/PULL_REQUEST_TEMPLATE.md +0 -0
- {socketsecurity-2.2.27 → socketsecurity-2.2.33}/.github/workflows/docker-stable.yml +0 -0
- {socketsecurity-2.2.27 → socketsecurity-2.2.33}/.github/workflows/pr-preview.yml +0 -0
- {socketsecurity-2.2.27 → socketsecurity-2.2.33}/.github/workflows/release.yml +0 -0
- {socketsecurity-2.2.27 → socketsecurity-2.2.33}/.github/workflows/version-check.yml +0 -0
- {socketsecurity-2.2.27 → socketsecurity-2.2.33}/.gitignore +0 -0
- {socketsecurity-2.2.27 → socketsecurity-2.2.33}/.hooks/sync_version.py +0 -0
- {socketsecurity-2.2.27 → socketsecurity-2.2.33}/.pre-commit-config.yaml +0 -0
- {socketsecurity-2.2.27 → socketsecurity-2.2.33}/.python-version +0 -0
- {socketsecurity-2.2.27 → socketsecurity-2.2.33}/LICENSE +0 -0
- {socketsecurity-2.2.27 → socketsecurity-2.2.33}/Makefile +0 -0
- {socketsecurity-2.2.27 → socketsecurity-2.2.33}/docs/README.md +0 -0
- {socketsecurity-2.2.27 → socketsecurity-2.2.33}/pytest.ini +0 -0
- {socketsecurity-2.2.27 → socketsecurity-2.2.33}/scripts/build_container.sh +0 -0
- {socketsecurity-2.2.27 → socketsecurity-2.2.33}/scripts/deploy-test-docker.sh +0 -0
- {socketsecurity-2.2.27 → socketsecurity-2.2.33}/scripts/deploy-test-pypi.sh +0 -0
- {socketsecurity-2.2.27 → socketsecurity-2.2.33}/scripts/run.sh +0 -0
- {socketsecurity-2.2.27 → socketsecurity-2.2.33}/socketsecurity/core/__init__.py +0 -0
- {socketsecurity-2.2.27 → socketsecurity-2.2.33}/socketsecurity/core/classes.py +0 -0
- {socketsecurity-2.2.27 → socketsecurity-2.2.33}/socketsecurity/core/cli_client.py +0 -0
- {socketsecurity-2.2.27 → socketsecurity-2.2.33}/socketsecurity/core/exceptions.py +0 -0
- {socketsecurity-2.2.27 → socketsecurity-2.2.33}/socketsecurity/core/git_interface.py +0 -0
- {socketsecurity-2.2.27 → socketsecurity-2.2.33}/socketsecurity/core/helper/__init__.py +0 -0
- {socketsecurity-2.2.27 → socketsecurity-2.2.33}/socketsecurity/core/lazy_file_loader.py +0 -0
- {socketsecurity-2.2.27 → socketsecurity-2.2.33}/socketsecurity/core/logging.py +0 -0
- {socketsecurity-2.2.27 → socketsecurity-2.2.33}/socketsecurity/core/messages.py +0 -0
- {socketsecurity-2.2.27 → socketsecurity-2.2.33}/socketsecurity/core/resource_utils.py +0 -0
- {socketsecurity-2.2.27 → socketsecurity-2.2.33}/socketsecurity/core/scm/__init__.py +0 -0
- {socketsecurity-2.2.27 → socketsecurity-2.2.33}/socketsecurity/core/scm/base.py +0 -0
- {socketsecurity-2.2.27 → socketsecurity-2.2.33}/socketsecurity/core/scm/client.py +0 -0
- {socketsecurity-2.2.27 → socketsecurity-2.2.33}/socketsecurity/core/scm/github.py +0 -0
- {socketsecurity-2.2.27 → socketsecurity-2.2.33}/socketsecurity/core/scm/gitlab.py +0 -0
- {socketsecurity-2.2.27 → socketsecurity-2.2.33}/socketsecurity/core/scm_comments.py +0 -0
- {socketsecurity-2.2.27 → socketsecurity-2.2.33}/socketsecurity/core/socket_config.py +0 -0
- {socketsecurity-2.2.27 → socketsecurity-2.2.33}/socketsecurity/core/utils.py +0 -0
- {socketsecurity-2.2.27 → socketsecurity-2.2.33}/socketsecurity/output.py +0 -0
- {socketsecurity-2.2.27 → socketsecurity-2.2.33}/socketsecurity/plugins/__init__.py +0 -0
- {socketsecurity-2.2.27 → socketsecurity-2.2.33}/socketsecurity/plugins/base.py +0 -0
- {socketsecurity-2.2.27 → socketsecurity-2.2.33}/socketsecurity/plugins/jira.py +0 -0
- {socketsecurity-2.2.27 → socketsecurity-2.2.33}/socketsecurity/plugins/manager.py +0 -0
- {socketsecurity-2.2.27 → socketsecurity-2.2.33}/socketsecurity/plugins/slack.py +0 -0
- {socketsecurity-2.2.27 → socketsecurity-2.2.33}/socketsecurity/plugins/teams.py +0 -0
- {socketsecurity-2.2.27 → socketsecurity-2.2.33}/socketsecurity/plugins/webhook.py +0 -0
- {socketsecurity-2.2.27 → socketsecurity-2.2.33}/tests/__init__.py +0 -0
- {socketsecurity-2.2.27 → socketsecurity-2.2.33}/tests/core/conftest.py +0 -0
- {socketsecurity-2.2.27 → socketsecurity-2.2.33}/tests/core/create_diff_input.json +0 -0
- {socketsecurity-2.2.27 → socketsecurity-2.2.33}/tests/core/test_diff_generation.py +0 -0
- {socketsecurity-2.2.27 → socketsecurity-2.2.33}/tests/core/test_package_and_alerts.py +0 -0
- {socketsecurity-2.2.27 → socketsecurity-2.2.33}/tests/core/test_sdk_methods.py +0 -0
- {socketsecurity-2.2.27 → socketsecurity-2.2.33}/tests/core/test_supporting_methods.py +0 -0
- {socketsecurity-2.2.27 → socketsecurity-2.2.33}/tests/data/fullscans/create_response.json +0 -0
- {socketsecurity-2.2.27 → socketsecurity-2.2.33}/tests/data/fullscans/diff/stream_diff.json +0 -0
- {socketsecurity-2.2.27 → socketsecurity-2.2.33}/tests/data/fullscans/diff/stream_diff_full.json +0 -0
- {socketsecurity-2.2.27 → socketsecurity-2.2.33}/tests/data/fullscans/head_scan/metadata.json +0 -0
- {socketsecurity-2.2.27 → socketsecurity-2.2.33}/tests/data/fullscans/head_scan/stream_scan.json +0 -0
- {socketsecurity-2.2.27 → socketsecurity-2.2.33}/tests/data/fullscans/head_scan/stream_scan_full.json +0 -0
- {socketsecurity-2.2.27 → socketsecurity-2.2.33}/tests/data/fullscans/new_scan/metadata.json +0 -0
- {socketsecurity-2.2.27 → socketsecurity-2.2.33}/tests/data/fullscans/new_scan/stream_scan.json +0 -0
- {socketsecurity-2.2.27 → socketsecurity-2.2.33}/tests/data/repos/repo_info_error.json +0 -0
- {socketsecurity-2.2.27 → socketsecurity-2.2.33}/tests/data/repos/repo_info_no_head.json +0 -0
- {socketsecurity-2.2.27 → socketsecurity-2.2.33}/tests/data/repos/repo_info_success.json +0 -0
- {socketsecurity-2.2.27 → socketsecurity-2.2.33}/tests/data/settings/security-policy.json +0 -0
- {socketsecurity-2.2.27 → socketsecurity-2.2.33}/tests/unit/__init__.py +0 -0
- {socketsecurity-2.2.27 → socketsecurity-2.2.33}/tests/unit/test_cli_config.py +0 -0
- {socketsecurity-2.2.27 → socketsecurity-2.2.33}/tests/unit/test_client.py +0 -0
- {socketsecurity-2.2.27 → socketsecurity-2.2.33}/tests/unit/test_config.py +0 -0
- {socketsecurity-2.2.27 → socketsecurity-2.2.33}/tests/unit/test_gitlab_auth.py +0 -0
- {socketsecurity-2.2.27 → socketsecurity-2.2.33}/tests/unit/test_gitlab_auth_fallback.py +0 -0
- {socketsecurity-2.2.27 → socketsecurity-2.2.33}/tests/unit/test_output.py +0 -0
- {socketsecurity-2.2.27 → socketsecurity-2.2.33}/uv.lock +0 -0
- {socketsecurity-2.2.27 → socketsecurity-2.2.33}/workflows/bitbucket-pipelines.yml +0 -0
- {socketsecurity-2.2.27 → socketsecurity-2.2.33}/workflows/github-actions.yml +0 -0
- {socketsecurity-2.2.27 → socketsecurity-2.2.33}/workflows/gitlab-ci.yml +0 -0
|
@@ -0,0 +1,106 @@
|
|
|
1
|
+
FROM python:3-alpine
|
|
2
|
+
LABEL org.opencontainers.image.authors="socket.dev"
|
|
3
|
+
|
|
4
|
+
# Language version arguments with defaults
|
|
5
|
+
ARG GO_VERSION=system
|
|
6
|
+
ARG JAVA_VERSION=17
|
|
7
|
+
ARG DOTNET_VERSION=8
|
|
8
|
+
|
|
9
|
+
# CLI and SDK arguments
|
|
10
|
+
ARG CLI_VERSION
|
|
11
|
+
ARG SDK_VERSION
|
|
12
|
+
ARG PIP_INDEX_URL=https://pypi.org/simple
|
|
13
|
+
ARG PIP_EXTRA_INDEX_URL=https://pypi.org/simple
|
|
14
|
+
ARG USE_LOCAL_INSTALL=false
|
|
15
|
+
|
|
16
|
+
# Install base packages first
|
|
17
|
+
RUN apk update && apk add --no-cache \
|
|
18
|
+
git nodejs npm yarn curl wget \
|
|
19
|
+
ruby ruby-dev build-base
|
|
20
|
+
|
|
21
|
+
# Install Go with version control
|
|
22
|
+
RUN if [ "$GO_VERSION" = "system" ]; then \
|
|
23
|
+
apk add --no-cache go; \
|
|
24
|
+
else \
|
|
25
|
+
cd /tmp && \
|
|
26
|
+
ARCH=$(uname -m) && \
|
|
27
|
+
case $ARCH in \
|
|
28
|
+
x86_64) GOARCH=amd64 ;; \
|
|
29
|
+
aarch64) GOARCH=arm64 ;; \
|
|
30
|
+
*) echo "Unsupported architecture: $ARCH" && exit 1 ;; \
|
|
31
|
+
esac && \
|
|
32
|
+
wget https://golang.org/dl/go${GO_VERSION}.linux-${GOARCH}.tar.gz && \
|
|
33
|
+
tar -C /usr/local -xzf go${GO_VERSION}.linux-${GOARCH}.tar.gz && \
|
|
34
|
+
rm go${GO_VERSION}.linux-${GOARCH}.tar.gz; \
|
|
35
|
+
fi
|
|
36
|
+
|
|
37
|
+
# Install Java with version control
|
|
38
|
+
RUN if [ "$JAVA_VERSION" = "8" ]; then \
|
|
39
|
+
apk add --no-cache openjdk8-jdk; \
|
|
40
|
+
elif [ "$JAVA_VERSION" = "11" ]; then \
|
|
41
|
+
apk add --no-cache openjdk11-jdk; \
|
|
42
|
+
elif [ "$JAVA_VERSION" = "17" ]; then \
|
|
43
|
+
apk add --no-cache openjdk17-jdk; \
|
|
44
|
+
elif [ "$JAVA_VERSION" = "21" ]; then \
|
|
45
|
+
apk add --no-cache openjdk21-jdk; \
|
|
46
|
+
else \
|
|
47
|
+
echo "Unsupported Java version: $JAVA_VERSION. Supported: 8, 11, 17, 21" && exit 1; \
|
|
48
|
+
fi
|
|
49
|
+
|
|
50
|
+
# Install .NET with version control
|
|
51
|
+
RUN if [ "$DOTNET_VERSION" = "6" ]; then \
|
|
52
|
+
apk add --no-cache dotnet6-sdk; \
|
|
53
|
+
elif [ "$DOTNET_VERSION" = "8" ]; then \
|
|
54
|
+
apk add --no-cache dotnet8-sdk; \
|
|
55
|
+
else \
|
|
56
|
+
echo "Unsupported .NET version: $DOTNET_VERSION. Supported: 6, 8" && exit 1; \
|
|
57
|
+
fi
|
|
58
|
+
|
|
59
|
+
# Install additional tools
|
|
60
|
+
RUN npm install @coana-tech/cli -g && \
|
|
61
|
+
gem install bundler && \
|
|
62
|
+
curl --proto '=https' --tlsv1.2 -sSf https://sh.rustup.rs | sh -s -- -y && \
|
|
63
|
+
. ~/.cargo/env && \
|
|
64
|
+
rustup component add rustfmt clippy
|
|
65
|
+
|
|
66
|
+
# Set environment paths
|
|
67
|
+
ENV PATH="/usr/local/go/bin:/root/.cargo/bin:${PATH}"
|
|
68
|
+
ENV GOROOT="/usr/local/go"
|
|
69
|
+
ENV GOPATH="/go"
|
|
70
|
+
|
|
71
|
+
# Install uv
|
|
72
|
+
COPY --from=ghcr.io/astral-sh/uv:latest /uv /usr/local/bin/uv
|
|
73
|
+
|
|
74
|
+
# Install CLI based on build mode
|
|
75
|
+
RUN if [ "$USE_LOCAL_INSTALL" = "true" ]; then \
|
|
76
|
+
echo "Using local development install"; \
|
|
77
|
+
else \
|
|
78
|
+
for i in $(seq 1 10); do \
|
|
79
|
+
echo "Attempt $i/10: Installing socketsecurity==$CLI_VERSION"; \
|
|
80
|
+
if pip install --index-url ${PIP_INDEX_URL} --extra-index-url ${PIP_EXTRA_INDEX_URL} socketsecurity==$CLI_VERSION; then \
|
|
81
|
+
break; \
|
|
82
|
+
fi; \
|
|
83
|
+
echo "Install failed, waiting 30s before retry..."; \
|
|
84
|
+
sleep 30; \
|
|
85
|
+
done && \
|
|
86
|
+
if [ ! -z "$SDK_VERSION" ]; then \
|
|
87
|
+
pip install --index-url ${PIP_INDEX_URL} --extra-index-url ${PIP_EXTRA_INDEX_URL} socketdev==${SDK_VERSION}; \
|
|
88
|
+
fi; \
|
|
89
|
+
fi
|
|
90
|
+
|
|
91
|
+
# Copy local source and install in editable mode if USE_LOCAL_INSTALL is true
|
|
92
|
+
COPY . /app
|
|
93
|
+
WORKDIR /app
|
|
94
|
+
RUN if [ "$USE_LOCAL_INSTALL" = "true" ]; then \
|
|
95
|
+
pip install --upgrade -e .; \
|
|
96
|
+
pip install --upgrade socketdev; \
|
|
97
|
+
fi
|
|
98
|
+
|
|
99
|
+
# Create workspace directory with proper permissions
|
|
100
|
+
RUN mkdir -p /go/src && chmod -R 777 /go
|
|
101
|
+
|
|
102
|
+
# Copy and setup entrypoint script
|
|
103
|
+
COPY scripts/docker-entrypoint.sh /usr/local/bin/docker-entrypoint.sh
|
|
104
|
+
RUN chmod +x /usr/local/bin/docker-entrypoint.sh
|
|
105
|
+
|
|
106
|
+
ENTRYPOINT ["/usr/local/bin/docker-entrypoint.sh"]
|
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
Metadata-Version: 2.4
|
|
2
2
|
Name: socketsecurity
|
|
3
|
-
Version: 2.2.
|
|
3
|
+
Version: 2.2.33
|
|
4
4
|
Summary: Socket Security CLI for CI/CD
|
|
5
5
|
Project-URL: Homepage, https://socket.dev
|
|
6
6
|
Author-email: Douglas Coburn <douglas@socket.dev>
|
|
@@ -40,7 +40,7 @@ Requires-Dist: packaging
|
|
|
40
40
|
Requires-Dist: prettytable
|
|
41
41
|
Requires-Dist: python-dotenv
|
|
42
42
|
Requires-Dist: requests
|
|
43
|
-
Requires-Dist: socketdev<4.0.0,>=3.0.
|
|
43
|
+
Requires-Dist: socketdev<4.0.0,>=3.0.19
|
|
44
44
|
Provides-Extra: dev
|
|
45
45
|
Requires-Dist: hatch; extra == 'dev'
|
|
46
46
|
Requires-Dist: pre-commit; extra == 'dev'
|
|
@@ -228,6 +228,8 @@ If you don't want to provide the Socket API Token every time then you can use th
|
|
|
228
228
|
| --reach-version | False | latest | Version of @coana-tech/cli to use for analysis |
|
|
229
229
|
| --reach-analysis-timeout | False | 1200 | Timeout in seconds for the reachability analysis (default: 1200 seconds / 20 minutes) |
|
|
230
230
|
| --reach-analysis-memory-limit | False | 4096 | Memory limit in MB for the reachability analysis (default: 4096 MB / 4 GB) |
|
|
231
|
+
| --reach-concurrency | False | | Control parallel analysis execution (must be >= 1) |
|
|
232
|
+
| --reach-additional-params | False | | Pass custom parameters to the coana CLI tool |
|
|
231
233
|
| --reach-ecosystems | False | | Comma-separated list of ecosystems to analyze (e.g., "npm,pypi"). If not specified, all supported ecosystems are analyzed |
|
|
232
234
|
| --reach-exclude-paths | False | | Comma-separated list of file paths or patterns to exclude from reachability analysis |
|
|
233
235
|
| --reach-min-severity | False | | Minimum severity level for reporting reachability results (low, medium, high, critical) |
|
|
@@ -171,6 +171,8 @@ If you don't want to provide the Socket API Token every time then you can use th
|
|
|
171
171
|
| --reach-version | False | latest | Version of @coana-tech/cli to use for analysis |
|
|
172
172
|
| --reach-analysis-timeout | False | 1200 | Timeout in seconds for the reachability analysis (default: 1200 seconds / 20 minutes) |
|
|
173
173
|
| --reach-analysis-memory-limit | False | 4096 | Memory limit in MB for the reachability analysis (default: 4096 MB / 4 GB) |
|
|
174
|
+
| --reach-concurrency | False | | Control parallel analysis execution (must be >= 1) |
|
|
175
|
+
| --reach-additional-params | False | | Pass custom parameters to the coana CLI tool |
|
|
174
176
|
| --reach-ecosystems | False | | Comma-separated list of ecosystems to analyze (e.g., "npm,pypi"). If not specified, all supported ecosystems are analyzed |
|
|
175
177
|
| --reach-exclude-paths | False | | Comma-separated list of file paths or patterns to exclude from reachability analysis |
|
|
176
178
|
| --reach-min-severity | False | | Minimum severity level for reporting reachability results (low, medium, high, critical) |
|
|
@@ -6,7 +6,7 @@ build-backend = "hatchling.build"
|
|
|
6
6
|
|
|
7
7
|
[project]
|
|
8
8
|
name = "socketsecurity"
|
|
9
|
-
version = "2.2.
|
|
9
|
+
version = "2.2.33"
|
|
10
10
|
requires-python = ">= 3.10"
|
|
11
11
|
license = {"file" = "LICENSE"}
|
|
12
12
|
dependencies = [
|
|
@@ -16,7 +16,7 @@ dependencies = [
|
|
|
16
16
|
'GitPython',
|
|
17
17
|
'packaging',
|
|
18
18
|
'python-dotenv',
|
|
19
|
-
'socketdev>=3.0.
|
|
19
|
+
'socketdev>=3.0.19,<4.0.0',
|
|
20
20
|
"bs4>=0.0.2",
|
|
21
21
|
]
|
|
22
22
|
readme = "README.md"
|
|
@@ -0,0 +1,161 @@
|
|
|
1
|
+
#!/bin/sh
|
|
2
|
+
VERSION=$(grep -o "__version__.*" socketsecurity/__init__.py | awk '{print $3}' | tr -d "'")
|
|
3
|
+
ENABLE_PYPI_BUILD=$1
|
|
4
|
+
STABLE_VERSION=$2
|
|
5
|
+
GO_VERSION=${GO_VERSION:-"1.21"}
|
|
6
|
+
JAVA_VERSION=${JAVA_VERSION:-"17"}
|
|
7
|
+
DOTNET_VERSION=${DOTNET_VERSION:-"8"}
|
|
8
|
+
|
|
9
|
+
verify_package() {
|
|
10
|
+
local version=$1
|
|
11
|
+
local pip_index=$2
|
|
12
|
+
echo "Verifying package availability..."
|
|
13
|
+
|
|
14
|
+
for i in $(seq 1 30); do
|
|
15
|
+
if pip install --index-url $pip_index socketsecurity==$version; then
|
|
16
|
+
echo "Package $version is now available and installable"
|
|
17
|
+
pip uninstall -y socketsecurity
|
|
18
|
+
return 0
|
|
19
|
+
fi
|
|
20
|
+
echo "Attempt $i: Package not yet installable, waiting 20s... ($i/30)"
|
|
21
|
+
sleep 20
|
|
22
|
+
done
|
|
23
|
+
|
|
24
|
+
echo "Package verification failed after 30 attempts"
|
|
25
|
+
return 1
|
|
26
|
+
}
|
|
27
|
+
|
|
28
|
+
# Function to build Docker image with language versions
|
|
29
|
+
build_docker_image() {
|
|
30
|
+
local cli_version=$1
|
|
31
|
+
local tag=$2
|
|
32
|
+
local pip_index=${3:-"https://pypi.org/simple"}
|
|
33
|
+
local pip_extra_index=${4:-"https://pypi.org/simple"}
|
|
34
|
+
local use_local=${5:-"false"}
|
|
35
|
+
local dockerfile=${6:-"Dockerfile"}
|
|
36
|
+
|
|
37
|
+
echo "Building with Go $GO_VERSION, Java $JAVA_VERSION, .NET $DOTNET_VERSION"
|
|
38
|
+
|
|
39
|
+
local build_args="--build-arg CLI_VERSION=$cli_version"
|
|
40
|
+
build_args="$build_args --build-arg GO_VERSION=$GO_VERSION"
|
|
41
|
+
build_args="$build_args --build-arg JAVA_VERSION=$JAVA_VERSION"
|
|
42
|
+
build_args="$build_args --build-arg DOTNET_VERSION=$DOTNET_VERSION"
|
|
43
|
+
build_args="$build_args --build-arg PIP_INDEX_URL=$pip_index"
|
|
44
|
+
build_args="$build_args --build-arg PIP_EXTRA_INDEX_URL=$pip_extra_index"
|
|
45
|
+
build_args="$build_args --build-arg USE_LOCAL_INSTALL=$use_local"
|
|
46
|
+
|
|
47
|
+
docker build --no-cache $build_args --platform linux/amd64,linux/arm64 -t $tag -f $dockerfile .
|
|
48
|
+
}
|
|
49
|
+
|
|
50
|
+
echo "Socket CLI version: $VERSION"
|
|
51
|
+
echo "Language versions: Go $GO_VERSION, Java $JAVA_VERSION, .NET $DOTNET_VERSION"
|
|
52
|
+
|
|
53
|
+
if [ -z $ENABLE_PYPI_BUILD ] || [ -z $STABLE_VERSION ]; then
|
|
54
|
+
echo "$0 pypi-build=<option> stable=<true|false|prod|test>"
|
|
55
|
+
echo "\tpypi-build: Options are prod, test, or local"
|
|
56
|
+
echo "\t - prod: Build and publish to production PyPI, then build Docker images"
|
|
57
|
+
echo "\t - test: Build and publish to test PyPI, then build Docker images"
|
|
58
|
+
echo "\t - local: Build Docker images only using existing PyPI package (specify prod or test via stable parameter)"
|
|
59
|
+
echo "\tstable: true/false/prod/test - Also tag as stable; for local builds:"
|
|
60
|
+
echo "\t - stable=prod: Use production PyPI package"
|
|
61
|
+
echo "\t - stable=test: Use test PyPI package"
|
|
62
|
+
echo "\t - stable=false: Use local development install (pip install -e .)"
|
|
63
|
+
echo ""
|
|
64
|
+
echo "Environment variables for language versions:"
|
|
65
|
+
echo "\tGO_VERSION: Go version to install (default: 1.21, or 'system' for Alpine package)"
|
|
66
|
+
echo "\tJAVA_VERSION: Java version to install (default: 17, options: 8, 11, 17, 21)"
|
|
67
|
+
echo "\tDOTNET_VERSION: .NET version to install (default: 8, options: 6, 8)"
|
|
68
|
+
echo ""
|
|
69
|
+
echo "Examples:"
|
|
70
|
+
echo "\tGO_VERSION=1.19 JAVA_VERSION=11 $0 pypi-build=local stable=prod"
|
|
71
|
+
echo "\tGO_VERSION=system JAVA_VERSION=8 $0 pypi-build=local stable=false"
|
|
72
|
+
exit
|
|
73
|
+
fi
|
|
74
|
+
|
|
75
|
+
if [ $ENABLE_PYPI_BUILD = "pypi-build=prod" ]; then
|
|
76
|
+
echo "Doing production build"
|
|
77
|
+
|
|
78
|
+
build_docker_image $VERSION "socketdev/cli:$VERSION"
|
|
79
|
+
docker push socketdev/cli:$VERSION
|
|
80
|
+
|
|
81
|
+
build_docker_image $VERSION "socketdev/cli:latest"
|
|
82
|
+
docker push socketdev/cli:latest
|
|
83
|
+
fi
|
|
84
|
+
|
|
85
|
+
if [ $ENABLE_PYPI_BUILD = "pypi-build=test" ]; then
|
|
86
|
+
echo "Doing test build"
|
|
87
|
+
if ! python -m build --wheel --sdist; then
|
|
88
|
+
echo "Build failed"
|
|
89
|
+
exit 1
|
|
90
|
+
fi
|
|
91
|
+
|
|
92
|
+
if ! twine upload --repository testpypi dist/*$VERSION*; then
|
|
93
|
+
echo "Upload to TestPyPI failed"
|
|
94
|
+
exit 1
|
|
95
|
+
fi
|
|
96
|
+
|
|
97
|
+
if ! verify_package $VERSION "https://test.pypi.org/simple"; then
|
|
98
|
+
echo "Failed to verify package on TestPyPI"
|
|
99
|
+
exit 1
|
|
100
|
+
fi
|
|
101
|
+
|
|
102
|
+
build_docker_image $VERSION "socketdev/cli:$VERSION-test" "https://test.pypi.org/simple" "https://pypi.org/simple"
|
|
103
|
+
docker push socketdev/cli:$VERSION-test
|
|
104
|
+
|
|
105
|
+
build_docker_image $VERSION "socketdev/cli:test" "https://test.pypi.org/simple" "https://pypi.org/simple"
|
|
106
|
+
docker push socketdev/cli:test
|
|
107
|
+
fi
|
|
108
|
+
|
|
109
|
+
if [ $STABLE_VERSION = "stable=true" ]; then
|
|
110
|
+
if [ $ENABLE_PYPI_BUILD = "pypi-build=enable" ]; then
|
|
111
|
+
if ! verify_package $VERSION "https://pypi.org/simple"; then
|
|
112
|
+
echo "Failed to verify package on PyPI"
|
|
113
|
+
exit 1
|
|
114
|
+
fi
|
|
115
|
+
fi
|
|
116
|
+
|
|
117
|
+
build_docker_image $VERSION "socketdev/cli:stable"
|
|
118
|
+
docker push socketdev/cli:stable
|
|
119
|
+
fi
|
|
120
|
+
|
|
121
|
+
if [ $ENABLE_PYPI_BUILD = "pypi-build=local" ]; then
|
|
122
|
+
echo "Building local version without publishing to PyPI"
|
|
123
|
+
|
|
124
|
+
# Determine PyPI source and build parameters
|
|
125
|
+
if [ $STABLE_VERSION = "stable=prod" ]; then
|
|
126
|
+
echo "Using production PyPI"
|
|
127
|
+
PIP_INDEX_URL="https://pypi.org/simple"
|
|
128
|
+
PIP_EXTRA_INDEX_URL="https://pypi.org/simple"
|
|
129
|
+
TAG_SUFFIX="local"
|
|
130
|
+
USE_LOCAL_INSTALL="false"
|
|
131
|
+
elif [ $STABLE_VERSION = "stable=test" ]; then
|
|
132
|
+
echo "Using test PyPI"
|
|
133
|
+
PIP_INDEX_URL="https://test.pypi.org/simple"
|
|
134
|
+
PIP_EXTRA_INDEX_URL="https://pypi.org/simple"
|
|
135
|
+
TAG_SUFFIX="local-test"
|
|
136
|
+
USE_LOCAL_INSTALL="false"
|
|
137
|
+
elif [ $STABLE_VERSION = "stable=false" ]; then
|
|
138
|
+
echo "Using local development install (pip install -e .)"
|
|
139
|
+
TAG_SUFFIX="local-dev"
|
|
140
|
+
USE_LOCAL_INSTALL="true"
|
|
141
|
+
PIP_INDEX_URL="https://pypi.org/simple"
|
|
142
|
+
PIP_EXTRA_INDEX_URL="https://pypi.org/simple"
|
|
143
|
+
else
|
|
144
|
+
echo "For local builds, use stable=prod, stable=test, or stable=false"
|
|
145
|
+
exit 1
|
|
146
|
+
fi
|
|
147
|
+
|
|
148
|
+
# Create language-specific tag if non-default versions are used
|
|
149
|
+
LANG_TAG=""
|
|
150
|
+
if [ "$GO_VERSION" != "1.21" ] || [ "$JAVA_VERSION" != "17" ] || [ "$DOTNET_VERSION" != "8" ]; then
|
|
151
|
+
LANG_TAG="-go${GO_VERSION}-java${JAVA_VERSION}-dotnet${DOTNET_VERSION}"
|
|
152
|
+
fi
|
|
153
|
+
|
|
154
|
+
build_docker_image $VERSION "socketdev/cli:$VERSION-$TAG_SUFFIX$LANG_TAG" $PIP_INDEX_URL $PIP_EXTRA_INDEX_URL $USE_LOCAL_INSTALL "Dockerfile.flexible"
|
|
155
|
+
|
|
156
|
+
build_docker_image $VERSION "socketdev/cli:$TAG_SUFFIX$LANG_TAG" $PIP_INDEX_URL $PIP_EXTRA_INDEX_URL $USE_LOCAL_INSTALL "Dockerfile.flexible"
|
|
157
|
+
|
|
158
|
+
echo "Local build complete. Tagged as:"
|
|
159
|
+
echo " - socketdev/cli:$VERSION-$TAG_SUFFIX$LANG_TAG"
|
|
160
|
+
echo " - socketdev/cli:$TAG_SUFFIX$LANG_TAG"
|
|
161
|
+
fi
|
|
@@ -0,0 +1,18 @@
|
|
|
1
|
+
#!/bin/sh
|
|
2
|
+
|
|
3
|
+
# Docker entrypoint script to support both patterns:
|
|
4
|
+
# docker run socketdev/cli socketcli --params
|
|
5
|
+
# docker run socketdev/cli --cli-params
|
|
6
|
+
|
|
7
|
+
# Check if we have any arguments
|
|
8
|
+
if [ $# -eq 0 ]; then
|
|
9
|
+
# No arguments provided, run socketcli with no args (will show help)
|
|
10
|
+
exec socketcli --help
|
|
11
|
+
elif [ "$1" = "socketcli" ]; then
|
|
12
|
+
# If first argument is "socketcli", shift it out and pass the rest to socketcli
|
|
13
|
+
shift
|
|
14
|
+
exec socketcli "$@"
|
|
15
|
+
else
|
|
16
|
+
# If first argument is not "socketcli", assume all arguments are for socketcli
|
|
17
|
+
exec socketcli "$@"
|
|
18
|
+
fi
|
|
@@ -68,11 +68,14 @@ class CliConfig:
|
|
|
68
68
|
reach_analysis_memory_limit: Optional[int] = None
|
|
69
69
|
reach_analysis_timeout: Optional[int] = None
|
|
70
70
|
reach_disable_analytics: bool = False
|
|
71
|
+
reach_disable_analysis_splitting: bool = False
|
|
71
72
|
reach_ecosystems: Optional[List[str]] = None
|
|
72
73
|
reach_exclude_paths: Optional[List[str]] = None
|
|
73
74
|
reach_skip_cache: bool = False
|
|
74
75
|
reach_min_severity: Optional[str] = None
|
|
75
76
|
reach_output_file: Optional[str] = None
|
|
77
|
+
reach_concurrency: Optional[int] = None
|
|
78
|
+
reach_additional_params: Optional[List[str]] = None
|
|
76
79
|
only_facts_file: bool = False
|
|
77
80
|
|
|
78
81
|
@classmethod
|
|
@@ -127,11 +130,14 @@ class CliConfig:
|
|
|
127
130
|
'reach_analysis_timeout': args.reach_analysis_timeout,
|
|
128
131
|
'reach_analysis_memory_limit': args.reach_analysis_memory_limit,
|
|
129
132
|
'reach_disable_analytics': args.reach_disable_analytics,
|
|
133
|
+
'reach_disable_analysis_splitting': args.reach_disable_analysis_splitting,
|
|
130
134
|
'reach_ecosystems': args.reach_ecosystems.split(',') if args.reach_ecosystems else None,
|
|
131
135
|
'reach_exclude_paths': args.reach_exclude_paths.split(',') if args.reach_exclude_paths else None,
|
|
132
136
|
'reach_skip_cache': args.reach_skip_cache,
|
|
133
137
|
'reach_min_severity': args.reach_min_severity,
|
|
134
138
|
'reach_output_file': args.reach_output_file,
|
|
139
|
+
'reach_concurrency': args.reach_concurrency,
|
|
140
|
+
'reach_additional_params': args.reach_additional_params,
|
|
135
141
|
'only_facts_file': args.only_facts_file,
|
|
136
142
|
'version': __version__
|
|
137
143
|
}
|
|
@@ -169,6 +175,11 @@ class CliConfig:
|
|
|
169
175
|
logging.error("--only-facts-file requires --reach to be specified")
|
|
170
176
|
exit(1)
|
|
171
177
|
|
|
178
|
+
# Validate reach_concurrency is >= 1 if provided
|
|
179
|
+
if args.reach_concurrency is not None and args.reach_concurrency < 1:
|
|
180
|
+
logging.error("--reach-concurrency must be >= 1")
|
|
181
|
+
exit(1)
|
|
182
|
+
|
|
172
183
|
return cls(**config_args)
|
|
173
184
|
|
|
174
185
|
def to_dict(self) -> dict:
|
|
@@ -429,20 +440,13 @@ def create_argument_parser() -> argparse.ArgumentParser:
|
|
|
429
440
|
help="Exclude license details from the diff report (boosts performance for large repos)"
|
|
430
441
|
)
|
|
431
442
|
|
|
432
|
-
|
|
433
|
-
security_group = parser.add_argument_group('Security Configuration')
|
|
434
|
-
security_group.add_argument(
|
|
435
|
-
"--allow-unverified",
|
|
436
|
-
action="store_true",
|
|
437
|
-
help="Allow unverified packages"
|
|
438
|
-
)
|
|
439
|
-
security_group.add_argument(
|
|
443
|
+
output_group.add_argument(
|
|
440
444
|
"--disable-security-issue",
|
|
441
445
|
dest="disable_security_issue",
|
|
442
446
|
action="store_true",
|
|
443
447
|
help="Disable security issue checks"
|
|
444
448
|
)
|
|
445
|
-
|
|
449
|
+
output_group.add_argument(
|
|
446
450
|
"--disable_security_issue",
|
|
447
451
|
dest="disable_security_issue",
|
|
448
452
|
action="store_true",
|
|
@@ -494,6 +498,11 @@ def create_argument_parser() -> argparse.ArgumentParser:
|
|
|
494
498
|
help="Timeout in seconds for API requests",
|
|
495
499
|
required=False
|
|
496
500
|
)
|
|
501
|
+
advanced_group.add_argument(
|
|
502
|
+
"--allow-unverified",
|
|
503
|
+
action="store_true",
|
|
504
|
+
help="Disable SSL certificate verification for API requests"
|
|
505
|
+
)
|
|
497
506
|
config_group.add_argument(
|
|
498
507
|
"--include-module-folders",
|
|
499
508
|
dest="include_module_folders",
|
|
@@ -560,6 +569,12 @@ def create_argument_parser() -> argparse.ArgumentParser:
|
|
|
560
569
|
action="store_true",
|
|
561
570
|
help="Disable analytics sharing for reachability analysis"
|
|
562
571
|
)
|
|
572
|
+
reachability_group.add_argument(
|
|
573
|
+
"--reach-disable-analysis-splitting",
|
|
574
|
+
dest="reach_disable_analysis_splitting",
|
|
575
|
+
action="store_true",
|
|
576
|
+
help="Disable analysis splitting/bucketing for reachability analysis"
|
|
577
|
+
)
|
|
563
578
|
reachability_group.add_argument(
|
|
564
579
|
"--reach-output-file",
|
|
565
580
|
dest="reach_output_file",
|
|
@@ -567,6 +582,20 @@ def create_argument_parser() -> argparse.ArgumentParser:
|
|
|
567
582
|
default=".socket.facts.json",
|
|
568
583
|
help="Output file path for reachability analysis results (default: .socket.facts.json)"
|
|
569
584
|
)
|
|
585
|
+
reachability_group.add_argument(
|
|
586
|
+
"--reach-concurrency",
|
|
587
|
+
dest="reach_concurrency",
|
|
588
|
+
type=int,
|
|
589
|
+
metavar="<number>",
|
|
590
|
+
help="Concurrency level for reachability analysis (must be >= 1)"
|
|
591
|
+
)
|
|
592
|
+
reachability_group.add_argument(
|
|
593
|
+
"--reach-additional-params",
|
|
594
|
+
dest="reach_additional_params",
|
|
595
|
+
nargs='+',
|
|
596
|
+
metavar="<param>",
|
|
597
|
+
help="Additional parameters to pass to the coana CLI (e.g., --reach-additional-params --other-param value --another-param value2)"
|
|
598
|
+
)
|
|
570
599
|
reachability_group.add_argument(
|
|
571
600
|
"--only-facts-file",
|
|
572
601
|
dest="only_facts_file",
|
|
@@ -20,7 +20,7 @@ class ReachabilityAnalyzer:
|
|
|
20
20
|
Check if @coana-tech/cli is installed, and install/update it if needed.
|
|
21
21
|
|
|
22
22
|
Args:
|
|
23
|
-
version: Specific version to install (e.g., '1.2.3'). If None, updates to latest.
|
|
23
|
+
version: Specific version to install (e.g., '1.2.3'). If None, always updates to latest.
|
|
24
24
|
|
|
25
25
|
Returns:
|
|
26
26
|
str: The package specifier to use with npx
|
|
@@ -48,6 +48,7 @@ class ReachabilityAnalyzer:
|
|
|
48
48
|
log.debug(f"Could not check for existing @coana-tech/cli installation: {e}")
|
|
49
49
|
|
|
50
50
|
# Install or update the package
|
|
51
|
+
# When no version is specified, always try to update to latest
|
|
51
52
|
if version:
|
|
52
53
|
log.info(f"Installing reachability analysis plugin (@coana-tech/cli@{version})...")
|
|
53
54
|
else:
|
|
@@ -92,9 +93,13 @@ class ReachabilityAnalyzer:
|
|
|
92
93
|
min_severity: Optional[str] = None,
|
|
93
94
|
skip_cache: bool = False,
|
|
94
95
|
disable_analytics: bool = False,
|
|
96
|
+
disable_analysis_splitting: bool = False,
|
|
95
97
|
repo_name: Optional[str] = None,
|
|
96
98
|
branch_name: Optional[str] = None,
|
|
97
99
|
version: Optional[str] = None,
|
|
100
|
+
concurrency: Optional[int] = None,
|
|
101
|
+
additional_params: Optional[List[str]] = None,
|
|
102
|
+
allow_unverified: bool = False,
|
|
98
103
|
) -> Dict[str, Any]:
|
|
99
104
|
"""
|
|
100
105
|
Run reachability analysis.
|
|
@@ -111,9 +116,13 @@ class ReachabilityAnalyzer:
|
|
|
111
116
|
min_severity: Minimum severity level (info, low, moderate, high, critical)
|
|
112
117
|
skip_cache: Skip cache usage
|
|
113
118
|
disable_analytics: Disable analytics sharing
|
|
119
|
+
disable_analysis_splitting: Disable analysis splitting
|
|
114
120
|
repo_name: Repository name
|
|
115
121
|
branch_name: Branch name
|
|
116
122
|
version: Specific version of @coana-tech/cli to use
|
|
123
|
+
concurrency: Concurrency level for analysis (must be >= 1)
|
|
124
|
+
additional_params: Additional parameters to pass to coana CLI
|
|
125
|
+
allow_unverified: Disable SSL certificate verification (sets NODE_TLS_REJECT_UNAUTHORIZED=0)
|
|
117
126
|
|
|
118
127
|
Returns:
|
|
119
128
|
Dict containing scan_id and report_path
|
|
@@ -142,6 +151,9 @@ class ReachabilityAnalyzer:
|
|
|
142
151
|
if disable_analytics:
|
|
143
152
|
cmd.append("--disable-analytics-sharing")
|
|
144
153
|
|
|
154
|
+
if disable_analysis_splitting:
|
|
155
|
+
cmd.append("--disable-analysis-splitting")
|
|
156
|
+
|
|
145
157
|
# KEY POINT: Only add manifest tar hash if we have one
|
|
146
158
|
if tar_hash:
|
|
147
159
|
cmd.extend(["--run-without-docker", "--manifests-tar-hash", tar_hash])
|
|
@@ -158,6 +170,13 @@ class ReachabilityAnalyzer:
|
|
|
158
170
|
if skip_cache:
|
|
159
171
|
cmd.append("--skip-cache-usage")
|
|
160
172
|
|
|
173
|
+
if concurrency:
|
|
174
|
+
cmd.extend(["--concurrency", str(concurrency)])
|
|
175
|
+
|
|
176
|
+
# Add any additional parameters provided by the user
|
|
177
|
+
if additional_params:
|
|
178
|
+
cmd.extend(additional_params)
|
|
179
|
+
|
|
161
180
|
# Set up environment variables
|
|
162
181
|
env = os.environ.copy()
|
|
163
182
|
|
|
@@ -172,6 +191,10 @@ class ReachabilityAnalyzer:
|
|
|
172
191
|
if branch_name:
|
|
173
192
|
env["SOCKET_BRANCH_NAME"] = branch_name
|
|
174
193
|
|
|
194
|
+
# Set NODE_TLS_REJECT_UNAUTHORIZED=0 if allow_unverified is True
|
|
195
|
+
if allow_unverified:
|
|
196
|
+
env["NODE_TLS_REJECT_UNAUTHORIZED"] = "0"
|
|
197
|
+
|
|
175
198
|
# Execute CLI
|
|
176
199
|
log.info("Running reachability analysis...")
|
|
177
200
|
log.debug(f"Reachability command: {' '.join(cmd)}")
|
|
@@ -2,6 +2,7 @@ import json
|
|
|
2
2
|
import sys
|
|
3
3
|
import traceback
|
|
4
4
|
import shutil
|
|
5
|
+
import warnings
|
|
5
6
|
|
|
6
7
|
from dotenv import load_dotenv
|
|
7
8
|
from git import InvalidGitRepositoryError, NoSuchPathError
|
|
@@ -55,7 +56,13 @@ def main_code():
|
|
|
55
56
|
"2. Environment variable: SOCKET_SECURITY_API_KEY")
|
|
56
57
|
sys.exit(3)
|
|
57
58
|
|
|
58
|
-
sdk = socketdev(token=config.api_token)
|
|
59
|
+
sdk = socketdev(token=config.api_token, allow_unverified=config.allow_unverified)
|
|
60
|
+
|
|
61
|
+
# Suppress urllib3 InsecureRequestWarning when using --allow-unverified
|
|
62
|
+
if config.allow_unverified:
|
|
63
|
+
import urllib3
|
|
64
|
+
urllib3.disable_warnings(urllib3.exceptions.InsecureRequestWarning)
|
|
65
|
+
|
|
59
66
|
output_handler = OutputHandler(config, sdk)
|
|
60
67
|
log.debug("sdk loaded")
|
|
61
68
|
|
|
@@ -275,9 +282,13 @@ def main_code():
|
|
|
275
282
|
min_severity=config.reach_min_severity,
|
|
276
283
|
skip_cache=config.reach_skip_cache or False,
|
|
277
284
|
disable_analytics=config.reach_disable_analytics or False,
|
|
285
|
+
disable_analysis_splitting=config.reach_disable_analysis_splitting or False,
|
|
278
286
|
repo_name=config.repo,
|
|
279
287
|
branch_name=config.branch,
|
|
280
|
-
version=config.reach_version
|
|
288
|
+
version=config.reach_version,
|
|
289
|
+
concurrency=config.reach_concurrency,
|
|
290
|
+
additional_params=config.reach_additional_params,
|
|
291
|
+
allow_unverified=config.allow_unverified
|
|
281
292
|
)
|
|
282
293
|
|
|
283
294
|
log.info(f"Reachability analysis completed successfully")
|
socketsecurity-2.2.27/Dockerfile
DELETED
|
@@ -1,41 +0,0 @@
|
|
|
1
|
-
FROM python:3-alpine
|
|
2
|
-
LABEL org.opencontainers.image.authors="socket.dev"
|
|
3
|
-
ARG CLI_VERSION
|
|
4
|
-
ARG SDK_VERSION
|
|
5
|
-
ARG PIP_INDEX_URL=https://pypi.org/simple
|
|
6
|
-
ARG PIP_EXTRA_INDEX_URL=https://pypi.org/simple
|
|
7
|
-
ARG USE_LOCAL_INSTALL=false
|
|
8
|
-
|
|
9
|
-
RUN apk update \
|
|
10
|
-
&& apk add --no-cache git nodejs npm yarn curl \
|
|
11
|
-
&& npm install @coana-tech/cli -g
|
|
12
|
-
|
|
13
|
-
# Install uv
|
|
14
|
-
COPY --from=ghcr.io/astral-sh/uv:latest /uv /usr/local/bin/uv
|
|
15
|
-
|
|
16
|
-
# Install CLI based on build mode
|
|
17
|
-
RUN if [ "$USE_LOCAL_INSTALL" = "true" ]; then \
|
|
18
|
-
echo "Using local development install"; \
|
|
19
|
-
else \
|
|
20
|
-
for i in $(seq 1 10); do \
|
|
21
|
-
echo "Attempt $i/10: Installing socketsecurity==$CLI_VERSION"; \
|
|
22
|
-
if pip install --index-url ${PIP_INDEX_URL} --extra-index-url ${PIP_EXTRA_INDEX_URL} socketsecurity==$CLI_VERSION; then \
|
|
23
|
-
break; \
|
|
24
|
-
fi; \
|
|
25
|
-
echo "Install failed, waiting 30s before retry..."; \
|
|
26
|
-
sleep 30; \
|
|
27
|
-
done && \
|
|
28
|
-
if [ ! -z "$SDK_VERSION" ]; then \
|
|
29
|
-
pip install --index-url ${PIP_INDEX_URL} --extra-index-url ${PIP_EXTRA_INDEX_URL} socketdev==${SDK_VERSION}; \
|
|
30
|
-
fi; \
|
|
31
|
-
fi
|
|
32
|
-
|
|
33
|
-
# Copy local source and install in editable mode if USE_LOCAL_INSTALL is true
|
|
34
|
-
COPY . /app
|
|
35
|
-
WORKDIR /app
|
|
36
|
-
RUN if [ "$USE_LOCAL_INSTALL" = "true" ]; then \
|
|
37
|
-
pip install --upgrade -e .; \
|
|
38
|
-
pip install --upgrade socketdev; \
|
|
39
|
-
fi
|
|
40
|
-
|
|
41
|
-
# ENTRYPOINT ["socketcli"]
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
{socketsecurity-2.2.27 → socketsecurity-2.2.33}/.github/PULL_REQUEST_TEMPLATE/improvement.md
RENAMED
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
{socketsecurity-2.2.27 → socketsecurity-2.2.33}/tests/data/fullscans/diff/stream_diff_full.json
RENAMED
|
File without changes
|
{socketsecurity-2.2.27 → socketsecurity-2.2.33}/tests/data/fullscans/head_scan/metadata.json
RENAMED
|
File without changes
|
{socketsecurity-2.2.27 → socketsecurity-2.2.33}/tests/data/fullscans/head_scan/stream_scan.json
RENAMED
|
File without changes
|
{socketsecurity-2.2.27 → socketsecurity-2.2.33}/tests/data/fullscans/head_scan/stream_scan_full.json
RENAMED
|
File without changes
|
|
File without changes
|
{socketsecurity-2.2.27 → socketsecurity-2.2.33}/tests/data/fullscans/new_scan/stream_scan.json
RENAMED
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|