bundler-audit: init at 0.6.1

This commit is contained in:
Michael Weiss 2019-04-02 17:21:22 +02:00
parent 69555825f8
commit 4572e79ef9
No known key found for this signature in database
GPG key ID: 5BE487C4D4771D83
5 changed files with 65 additions and 0 deletions

View file

@ -0,0 +1,2 @@
source 'https://rubygems.org'
gem 'bundler-audit'

View file

@ -0,0 +1,16 @@
GEM
remote: https://rubygems.org/
specs:
bundler-audit (0.6.1)
bundler (>= 1.2.0, < 3)
thor (~> 0.18)
thor (0.20.3)
PLATFORMS
ruby
DEPENDENCIES
bundler-audit
BUNDLED WITH
1.14.6

View file

@ -0,0 +1,26 @@
{ bundlerEnv, ruby, lib }:
bundlerEnv rec {
name = "${pname}-${version}";
pname = "bundler-audit";
version = (import ./gemset.nix).bundler-audit.version;
inherit ruby;
gemdir = ./.;
meta = with lib; {
description = "Patch-level verification for Bundler";
longDescription = ''
Features:
- Checks for vulnerable versions of gems in Gemfile.lock.
- Checks for insecure gem sources (http://).
- Allows ignoring certain advisories that have been manually worked around.
- Prints advisory information.
- Does not require a network connection.
'';
homepage = https://github.com/rubysec/bundler-audit;
license = licenses.gpl3Plus;
maintainers = with maintainers; [ primeos ];
platforms = platforms.unix;
};
}

View file

@ -0,0 +1,19 @@
{
bundler-audit = {
dependencies = ["thor"];
source = {
remotes = ["https://rubygems.org"];
sha256 = "0pm22xpn3xyymsainixnrk8v3l3xi9bzwkjkspx00cfzp84xvxbq";
type = "gem";
};
version = "0.6.1";
};
thor = {
source = {
remotes = ["https://rubygems.org"];
sha256 = "1yhrnp9x8qcy5vc7g438amd5j9sw83ih7c30dr6g6slgw9zj3g29";
type = "gem";
};
version = "0.20.3";
};
}

View file

@ -8285,6 +8285,8 @@ in
bundlerEnv = callPackage ../development/ruby-modules/bundler-env { };
bundlerApp = callPackage ../development/ruby-modules/bundler-app { };
bundler-audit = callPackage ../tools/security/bundler-audit { };
solargraph = callPackage ../development/ruby-modules/solargraph { };
inherit (callPackage ../development/interpreters/ruby {