forked from dependabot/dependabot-script
-
Notifications
You must be signed in to change notification settings - Fork 0
/
generic-update-script.rb
288 lines (251 loc) · 8.64 KB
/
generic-update-script.rb
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
# This script is designed to loop through all dependencies in a GHE, GitLab or
# Azure DevOps project, creating PRs where necessary.
require "dependabot/file_fetchers"
require "dependabot/file_parsers"
require "dependabot/update_checkers"
require "dependabot/file_updaters"
require "dependabot/pull_request_creator"
require "dependabot/omnibus"
require "gitlab"
require "json"
require_relative "custom/custom_util"
credentials = [
{
"type" => "git_source",
"host" => "github.com",
"username" => "x-access-token",
"password" => ENV["GITHUB_ACCESS_TOKEN"] # A GitHub access token with read access to public repos
}
]
# Full name of the repo you want to create pull requests for.
repo_name = ENV["PROJECT_PATH"] # namespace/project
# Directory where the base dependency files are.
directory = ENV["DIRECTORY_PATH"] || "/"
# Branch to look at. Defaults to repo's default branch
branch = ENV["BRANCH"]
# Name of the package manager you'd like to do the update for. Options are:
# - bundler
# - pip (includes pipenv)
# - npm_and_yarn
# - maven
# - gradle
# - cargo
# - hex
# - composer
# - nuget
# - dep
# - go_modules
# - elm
# - submodules
# - docker
# - terraform
package_manager = ENV["PACKAGE_MANAGER"] || "bundler"
# Expected to be a JSON object passed to the underlying components
options = JSON.parse(ENV["OPTIONS"] || "{}", {:symbolize_names => true})
puts "Running with options: #{options}"
if ENV["GITHUB_ENTERPRISE_ACCESS_TOKEN"]
credentials << {
"type" => "git_source",
"host" => ENV["GITHUB_ENTERPRISE_HOSTNAME"], # E.g., "ghe.mydomain.com",
"username" => "x-access-token",
"password" => ENV["GITHUB_ENTERPRISE_ACCESS_TOKEN"] # A GHE access token with API permission
}
source = Dependabot::Source.new(
provider: "github",
hostname: ENV["GITHUB_ENTERPRISE_HOSTNAME"],
api_endpoint: "https://#{ENV['GITHUB_ENTERPRISE_HOSTNAME']}/api/v3/",
repo: repo_name,
directory: directory,
branch: branch,
)
elsif ENV["GITLAB_ACCESS_TOKEN"]
gitlab_hostname = ENV["GITLAB_HOSTNAME"] || "gitlab.com"
credentials << {
"type" => "git_source",
"host" => gitlab_hostname,
"username" => "x-access-token",
"password" => ENV["GITLAB_ACCESS_TOKEN"] # A GitLab access token with API permission
}
source = Dependabot::Source.new(
provider: "gitlab",
hostname: gitlab_hostname,
api_endpoint: "https://#{gitlab_hostname}/api/v4",
repo: repo_name,
directory: directory,
branch: branch,
)
elsif ENV["AZURE_ACCESS_TOKEN"]
azure_hostname = ENV["AZURE_HOSTNAME"] || "dev.azure.com"
credentials << {
"type" => "git_source",
"host" => azure_hostname,
"username" => "x-access-token",
"password" => ENV["AZURE_ACCESS_TOKEN"]
}
source = Dependabot::Source.new(
provider: "azure",
hostname: azure_hostname,
api_endpoint: "https://#{azure_hostname}/",
repo: repo_name,
directory: directory,
branch: branch,
)
elsif ENV["BITBUCKET_ACCESS_TOKEN"]
bitbucket_hostname = ENV["BITBUCKET_HOSTNAME"] || "bitbucket.org"
credentials << {
"type" => "git_source",
"host" => bitbucket_hostname,
"username" => "x-token-auth",
"token" => ENV["BITBUCKET_ACCESS_TOKEN"]
}
source = Dependabot::Source.new(
provider: "bitbucket",
hostname: bitbucket_hostname,
api_endpoint: ENV["BITBUCKET_API_URL"] || "https://api.bitbucket.org/2.0/",
repo: repo_name,
directory: directory,
branch: branch,
)
elsif ENV["BITBUCKET_APP_USERNAME"] && ENV["BITBUCKET_APP_PASSWORD"]
bitbucket_hostname = ENV["BITBUCKET_HOSTNAME"] || "bitbucket.org"
credentials << {
"type" => "git_source",
"host" => bitbucket_hostname,
"username" => ENV["BITBUCKET_APP_USERNAME"],
"password" => ENV["BITBUCKET_APP_PASSWORD"]
}
source = Dependabot::Source.new(
provider: "bitbucket",
hostname: bitbucket_hostname,
api_endpoint: ENV["BITBUCKET_API_URL"] || "https://api.bitbucket.org/2.0/",
repo: repo_name,
directory: directory,
branch: branch,
)
else
source = Dependabot::Source.new(
provider: "github",
repo: repo_name,
directory: directory,
branch: branch,
)
end
##############################
# Fetch the dependency files #
##############################
puts "Fetching #{package_manager} dependency files for #{repo_name}"
fetcher = Dependabot::FileFetchers.for_package_manager(package_manager).new(
source: source,
credentials: credentials,
options: options,
)
files = fetcher.files
commit = fetcher.commit
##############################
# Parse the dependency files #
##############################
puts "Parsing dependencies information"
parser = Dependabot::FileParsers.for_package_manager(package_manager).new(
dependency_files: files,
source: source,
credentials: credentials,
options: options,
)
dependencies = parser.parse
custom_util = CustomUtil.new(package_manager, dependencies)
#Before checking dependencies, put reminders to old merge requests and issues (including non-dependabot)
custom_util.reminder_old_mrs(source)
custom_util.reminder_old_issues(source)
dependencies.select(&:top_level?).each do |dep|
#########################################
# Get update details for the dependency #
#########################################
ignored_versions = custom_util.ignored_versions_for(dep)
checker = Dependabot::UpdateCheckers.for_package_manager(package_manager).new(
dependency: dep,
dependency_files: files,
credentials: credentials,
options: options,
ignored_versions: ignored_versions,
)
print "Check dependency: #{dep.name} (#{dep.version})"
puts ignored_versions.length()==0 ? "" : " - With ignored versions: #{ignored_versions}"
#ignore this dependency if was included in the IGNORE environment variable
if custom_util.ignore_dependencies_for(dep)
puts " - Ignoring #{dep.name} (from #{dep.version}) - excluded as set by IGNORE environment variable"
next
end
#check if package is vulnerable to set the appropriate labels in the PR or submit an issue if can not be updated
package_is_vulnerable = custom_util.package_is_vulnerable?(dep, files, credentials, ignored_versions)
if checker.up_to_date? && package_is_vulnerable
custom_util.create_issue_for_vulnerable(source, dep)
next
end
next if checker.up_to_date?
requirements_to_unlock =
if !checker.requirements_unlocked_or_can_be?
if checker.can_update?(requirements_to_unlock: :none) then :none
else :update_not_possible
end
elsif checker.can_update?(requirements_to_unlock: :own) then :own
elsif checker.can_update?(requirements_to_unlock: :all) then :all
else :update_not_possible
end
next if requirements_to_unlock == :update_not_possible
updated_deps = checker.updated_dependencies(
requirements_to_unlock: requirements_to_unlock
)
#####################################
# Generate updated dependency files #
#####################################
print " - Updating #{dep.name} (from #{dep.version})…"
updater = Dependabot::FileUpdaters.for_package_manager(package_manager).new(
dependencies: updated_deps,
dependency_files: files,
credentials: credentials,
options: options,
)
updated_files = updater.updated_dependency_files
#additional log info
print "(to #{updater.dependencies[0].version})" + (package_is_vulnerable ? " [SECURITY-UPDATE]" : "")
# skip PR submission if dry_run
if custom_util.dry_run?
puts " - not submitted as set by DRY_RUN environment variable"
next
end
########################################
# Create a pull request for the update #
########################################
assignee = (ENV["PULL_REQUESTS_ASSIGNEE"] || ENV["GITLAB_ASSIGNEE_ID"])&.to_i
assignees = assignee ? [assignee] : assignee
pr_creator = Dependabot::PullRequestCreator.new(
source: source,
base_commit: commit,
dependencies: updated_deps,
files: updated_files,
credentials: credentials,
assignees: assignees,
author_details: { name: "Dependabot", email: "no-reply@github.com" },
label_language: true,
custom_labels: custom_util.get_labels(package_is_vulnerable),
commit_message_options: custom_util.get_message_options(package_is_vulnerable),
)
pull_request = pr_creator.create
puts " - submitted"
next unless pull_request
# Enable GitLab "merge when pipeline succeeds" feature.
# Merge requests created and successfully tested will be merge automatically.
if ENV["GITLAB_AUTO_MERGE"]
g = Gitlab.client(
endpoint: source.api_endpoint,
private_token: ENV["GITLAB_ACCESS_TOKEN"]
)
g.accept_merge_request(
source.repo,
pull_request.iid,
merge_when_pipeline_succeeds: true,
should_remove_source_branch: true
)
end
end
puts "Done"