Conversation
Select dependency environments with --only, --also and --production for reports as well, instead of just for audit fix. Still reports the filtered advisories, but changes the exit code (as is done with advisories below --audit-level). Tests need updating due to the new way of counting vulnerabilities. See https://npm.community/t/3959
|
Thanks very much for doing this.
Maybe I've misunderstood, but if I run |
@sneakypete81 I know, but that requires either modifying the audit report, which could have unintended side effects, or changing all the reporters. Since |
|
Anxiously awaiting merge. Thanks, @larsgw |
|
I did a quick test of I would expect these flags to be passed along to the reporters and for them to act appropriately, such as @sneakypete81 suggests when I say Looks like |
|
As Adam suggests, docs should be added to Reporter filters go in https://github.com/npm/npm-audit-report/pulls and should be PRed there (please add a note here when they are) |
|
I added the docs. Details |
db63b89 to
b09bc8c
Compare
The security script might come back when this is merged and released: npm/cli#125
The security script might come back when this is merged and released: npm/cli#125
The security script might come back when this is merged and released: npm/cli#125
The security script might come back when this is merged and released: npm/cli#125
The security script might come back when this is merged and released: npm/cli#125
|
Any movement on this? Is there something I can do to help speeding this up? This is one of my most wanted features for npm audit since launch. Seeing CI builds fail because of dev dependencies is becoming a real annoyance. |
The security check might come back when this is merged and released: npm/cli#125
The security script might come back when this is merged and released: npm/cli#125
…d and gone The security check might come back when this is merged and released: npm/cli#125
The security script might come back when this is merged and released: npm/cli#125
|
Is it similar to implemented “Enable production flag for npm audit #202 ”? |
|
Are there updates on this at all? I've got builds failing on our pipeline (and similarly don't want to auto fix them during the build), but it's all because of |
|
@IPWright83 there is now a production flag for |
|
Even though the |
* feat: add Application Default Credentials (ADC) support (npm#103) Extends the credential chain in get_token() to include ADC as a 4th source: 1. GOOGLE_WORKSPACE_CLI_CREDENTIALS_FILE env var 2. Encrypted credentials (~/.config/gws/credentials.enc) 3. Plaintext credentials (~/.config/gws/credentials.json) 4. ADC — GOOGLE_APPLICATION_CREDENTIALS env var, then ~/.config/gcloud/application_default_credentials.json Both authorized_user and service_account ADC formats are detected via the 'type' field and parsed accordingly. This means users can authenticate with: gcloud auth application-default login --client-id-file=client_secret.json and gws will automatically pick up those credentials. Closes npm#103 Co-Authored-By: Claude <noreply@anthropic.com> * fix(auth): address review feedback on ADC support - Extract duplicated JSON credential parsing into parse_credential_file() helper to reduce duplication between GOOGLE_WORKSPACE_CLI_CREDENTIALS_FILE and ADC code paths; uses serde_json::from_value to avoid second string parse - Fix well-known ADC path on macOS: dirs::config_dir() returns ~/Library/Application Support on macOS, not ~/.config; use dirs::home_dir().join('.config/gcloud/...') instead - Hard-error when GOOGLE_APPLICATION_CREDENTIALS points to a missing file (was: silently fall through to 'No credentials found') - Add test_load_credentials_adc_env_var_service_account covering service account credentials loaded via GOOGLE_APPLICATION_CREDENTIALS - Remove unnecessary unsafe blocks from env var tests (set_var/remove_var are not unsafe functions; thread safety is already handled by serial_test) - Update changeset to include GOOGLE_WORKSPACE_CLI_TOKEN at top of lookup order and clarify ADC fallback behaviour Addresses review feedback from jpoehnelt on npm#125. Co-Authored-By: Claude <noreply@anthropic.com> --------- Co-authored-by: Claude <noreply@anthropic.com>
Select dependency environments with --only, --also and --production for
reports as well, instead of just for audit fix. Still reports the
filtered advisories, but changes the exit code (as is done with
advisories below --audit-level). Tests need updating due to the new way
of counting vulnerabilities.
See https://npm.community/t/3959