2017 © Pedro Peláez
 

metapackage drupal-security-advisories

Prevents installation of composer packages with known security vulnerabilities

image

drupal-composer/drupal-security-advisories

Prevents installation of composer packages with known security vulnerabilities

  • Wednesday, July 25, 2018
  • by webflo
  • Repository
  • 6 Watchers
  • 21 Stars
  • 139,539 Installations
  • PHP
  • 3 Dependents
  • 0 Suggesters
  • 4 Forks
  • 3 Open issues
  • 3 Versions
  • 10 % Grown

The README.md

Drupal Security Advisories for Composer

This package ensures that your application doesn't have installed dependencies with known security vulnerabilities. Inspired by Roave Security Advisories., (*1)

Circle CI, (*2)

Installation

Drupal 8 (composer.json)

~$ composer require drupal-composer/drupal-security-advisories:8.x-dev

Drupal 7 (composer.json)

~$ composer require drupal-composer/drupal-security-advisories:7.x-dev

Usage

This package does not provide any API or usable classes: its only purpose is to prevent installation of software with known and documented security issues., (*3)

Stability

This package can only be required in its dev-* version: there will never be stable/tagged versions because of the nature of the problem being targeted. Security issues are in fact a moving target, and locking your project to a specific tagged version of the package would not make any sense., (*4)

This package is therefore only suited for installation in the root of your deployable project., (*5)

Handling Failures

In the rare event that a security release does not affect your project, and upgrading to latest release is undesireable, you can suppress a build failure by specifying a particular SHA project in composer.json. For example, assume that drupal/dynamic_entity_reference 8.1.0-beta2 just came out as a Security release. In order to keep using 8.1.0-beta1, you can specify the following in composer.json:, (*6)

``` "require": { "drupal/dynamic_entity_reference": "dev-8.x-1.x#8713890" },, (*7)

```, (*8)

Note: that this approach opts your package out of any future security releases. You can check for future security releases with drush pm:security (drush9) or drush pm-updatestatus (drush8)., (*9)

Sources

This packages gets information form Drupal.org APIs., (*10)

Build command: ./build/build.sh, (*11)

The Versions

25/07 2018

7.x-dev

7.9999999.9999999.9999999-dev

Prevents installation of composer packages with known security vulnerabilities

  Sources   Download

GPL-2.0+ GPL-2.0-or-later

11/07 2018

8.x-dev

8.9999999.9999999.9999999-dev

Prevents installation of composer packages with known security vulnerabilities

  Sources   Download

GPL-2.0+ GPL-2.0-or-later

21/06 2018

dev-master

9999999-dev

  Sources   Download

GPL-2.0+ GPL-2.0-or-later