|
28 | 28 | module DependencySpy
|
29 | 29 | class API
|
30 | 30 |
|
31 |
| - def self.check(path = Dir.pwd, files = nil, platform = nil, database_path = YAVDB::Constants::DEFAULT_YAVDB_DATABASE_PATH, offline = false) |
| 31 | + def self.check(options) |
| 32 | + verbose = options[:verbose] |
| 33 | + path = options[:path] || Dir.pwd |
| 34 | + files = options[:files] |
| 35 | + platform = options[:platform] |
| 36 | + database_path = options[:database_path] || YAVDB::Constants::DEFAULT_YAVDB_DATABASE_PATH |
| 37 | + offline = options[:offline] || false |
| 38 | + ignore = options[:ignore] || [] |
| 39 | + |
32 | 40 | if !File.exist?(database_path) && offline
|
33 | 41 | puts 'No local database found. Cannot obtain database since offline mode is enabled.'
|
34 | 42 | exit(10)
|
35 | 43 | elsif !offline
|
36 |
| - puts 'Going to update the local vulnerability database.' |
| 44 | + puts 'Going to update the local vulnerability database.' if verbose |
37 | 45 | YAVDB::API.download_database(false, YAVDB::Constants::DEFAULT_YAVDB_PATH)
|
38 | 46 | end
|
39 | 47 |
|
@@ -64,9 +72,13 @@ def self.check(path = Dir.pwd, files = nil, platform = nil, database_path = YAVD
|
64 | 72 | vulnerable = vuln.vulnerable_versions ? vuln.vulnerable_versions.any? { |vv| DependencySpy::SemVer.intersects(vv, version) } : false
|
65 | 73 | unaffected = vuln.unaffected_versions ? vuln.unaffected_versions.any? { |vu| DependencySpy::SemVer.intersects(vu, version) } : false
|
66 | 74 | patched = vuln.patched_versions ? vuln.patched_versions.any? { |vp| DependencySpy::SemVer.intersects(vp, version) } : false
|
| 75 | + ignored = ignore.include?(vuln.id) |
67 | 76 |
|
68 | 77 | if unaffected || patched
|
69 | 78 | false
|
| 79 | + elsif ignored |
| 80 | + puts "Skipping ignored vulnerability with #{vuln.id}." if verbose |
| 81 | + false |
70 | 82 | else
|
71 | 83 | vulnerable
|
72 | 84 | end
|
|
0 commit comments