UNPKG

snyk

Version:

snyk library and cli utility

315 lines (160 loc) • 11.4 kB
# Test ## Usage `snyk test [<OPTIONS>]` ## Description The `snyk test` command checks projects for open source vulnerabilities and license issues. The test command tries to auto-detect supported manifest files with dependencies and test those. ## Exit codes Possible exit codes and their meaning: **0**: success, no vulnerabilities found\ **1**: action_needed, vulnerabilities found\ **2**: failure, try to re-run command\ **3**: failure, no supported projects detected ## Configure the Snyk CLI You can use environment variables to configure the Snyk CLI and also set variables to configure the Snyk CLI to connect with the Snyk API. See [Configure the Snyk CLI](https://docs.snyk.io/features/snyk-cli/configure-the-snyk-cli). ## Debug Use the `-d` option to output the debug logs. ## Options See also subsequent sections for options for specific build environments, package managers, languages, and `[<CONTEXT-SPECIFIC OPTIONS>]` which you specify last. ### `--all-projects` Auto-detect all projects in the working directory (including Yarn workspaces). For more information see the article [Does the Snyk CLI support monorepos or multiple manifest files?](https://support.snyk.io/hc/en-us/articles/360000910577-Does-the-Snyk-CLI-support-monorepos-or-multiple-manifest-files-). ### `--detection-depth=<DEPTH>` Use with `--all-projects` or `--yarn-workspaces` to indicate how many sub-directories to search. `DEPTH` must be a number. Default: 4 (the current working directory and 3 sub-directories). Example: `--detection-depth=3` limits search to the specified directory (or the current directory if no `<PATH>` is specified) plus three levels of subdirectories. ### `--exclude=<DIRECTORY>[,<DIRECTORY>]...>` Can be used with `--all-projects` and `--yarn-workspaces` to indicate sub-directories and files to exclude. Must be comma separated. Use the `--exclude` option with `--detection-depth` to ignore directories at any depth. ### `--prune-repeated-subdependencies`, `-p` Prune dependency trees, removing duplicate sub-dependencies. Continues to find all vulnerabilities, but may not find all of the vulnerable paths. ### `--print-deps` Print the dependency tree before sending it for analysis. ### `--remote-repo-url=<URL>` Set or override the remote URL for the repository that you would like to monitor. ### `--dev` Include development-only dependencies. Applicable only for some package managers, for example, `devDependencies` in npm or `:development` dependencies in Gemfile. Default: scan only production dependencies. ### `--org=<ORG_ID>` Specify the `<ORG_ID>` to run Snyk commands tied to a specific organization. The `<ORG_ID>` influences some features availability and private test limits. If you have multiple organizations, you can set a default from the CLI using: `$ snyk config set org=<ORG_ID>` Set a default to ensure all newly tested projects are tested under your default organization. If you need to override the default, use the `--org=<ORG_ID>` option. Default: `<ORG_ID>` that is the current preferred organization in your [Account settings](https://app.snyk.io/account). For more information see the article [How to select the organization to use in the CLI](https://support.snyk.io/hc/en-us/articles/360000920738-How-to-select-the-organization-to-use-in-the-CLI). ### `--file=<FILE>` Specify a package file. When testing locally or monitoring a project, you can specify the file that Snyk should inspect for package information. When the file is not specified, Snyk tries to detect the appropriate file for your project. ### `--package-manager=<PACKAGE_MANAGER_NAME>` Specify the name of the package manager when the filename specified with the `--file=<FILE>` option is not standard. This allows Snyk to find the file. Example: `$ snyk test --file=req.txt --package-manager=pip` ### `--ignore-policy` Ignore all set policies, the current policy in the `.snyk` file, Org level ignores, and the project policy on snyk.io. ### `--trust-policies` Apply and use ignore rules from the Snyk policies your dependencies; otherwise ignore rules in the dependencies are only shown as a suggestion. ### `--show-vulnerable-paths=<none|some|all>` Display the dependency paths from the top level dependencies down to the vulnerable packages. Does not affect output when using JSON `--json` output. Default: `some` (a few example paths shown). `false` is an alias for `none`. Example: `--show-vulnerable-paths=none` ### `--project-name=<PROJECT_NAME>` Specify a custom Snyk project name. ### `--target-reference=<TARGET_REFERENCE>` Specify a reference which differentiates this project, for example, a branch name or version. Projects having the same reference can be grouped based on that reference. Only supported for Snyk Open Source. For more information see [Separating projects by branch or version](https://docs.snyk.io/snyk-cli/secure-your-projects-in-the-long-term/grouping-projects-by-branch-or-version). ### `--policy-path=<PATH_TO_POLICY_FILE>` Manually pass a path to a `.snyk` policy file. ### `--json` Print results in JSON format. Example: `$ snyk test --json-file-output=vuln.json` ### `--json-file-output=<OUTPUT_FILE_PATH>` Save test output in JSON format directly to the specified file, regardless of whether or not you use the `--json` option. This is especially useful if you want to display the human-readable test output using stdout and at the same time save the JSON format output to a file. ### `--sarif` Return results in SARIF format. ### `--sarif-file-output=<OUTPUT_FILE_PATH>` Save test output in SARIF format directly to the \<OUTPUT_FILE_PATH> file, regardless of whether or not you use the `--sarif` option. This is especially useful if you want to display the human-readable test output using stdout and at the same time save the SARIF format output to a file. ### `--severity-threshold=<low|medium|high|critical>` Report only vulnerabilities at the specified level or higher. ### `--fail-on=<all|upgradable|patchable>` Fail only when there are vulnerabilities that can be fixed. - `all`: fail when there is at least one vulnerability that can be either upgraded or patched. - `upgradable`: fail when there is at least one vulnerability that can be upgraded. - `patchable`: fail when there is at least one vulnerability that can be patched. If vulnerabilities do not have a fix and this option is being used, tests pass. ## Options for Maven projects For more information about Maven CLI options see [Snyk for Java and Kotlin](https://docs.snyk.io/products/snyk-open-source/language-and-package-manager-support/snyk-for-java-gradle-maven). ### `--scan-all-unmanaged` Auto-detect maven jars, aars, and wars in given directory. To test individually use `--file=<JAR_FILE_NAME>`. **Note**: Custom-built jar files, even with open source dependencies, are out of scope. ### `--reachable` Analyze your source code to find which vulnerable functions and packages are called. Cannot be used with `--all-projects`. ### `--reachable-timeout=<TIMEOUT>` Specify the amount of time (in seconds) to wait for Snyk to gather reachability data. If it takes longer than `<TIMEOUT>`, reachable vulnerabilities are not reported. This does not affect regular test or monitor output. Default: 300 (5 minutes). ## Options for Gradle projects For more information about Gradle CLI options see [Snyk for Java and Kotlin](https://docs.snyk.io/products/snyk-open-source/language-and-package-manager-support/snyk-for-java-gradle-maven). ### `--sub-project=<NAME>`, `--gradle-sub-project=<NAME>` For Gradle "multi project" configurations, test a specific sub-project. ### `--all-sub-projects` For "multi project" configurations, test all sub-projects. ### `--configuration-matching=<CONFIGURATION_REGEX>` Resolve dependencies using only configuration(s) that match the specified Java regular expression Example: `^releaseRuntimeClasspath$`. ### `--configuration-attributes=<ATTRIBUTE>[,<ATTRIBUTE>]...` Select certain values of configuration attributes to install dependencies and perform dependency resolution. Eexample: `buildtype:release,usage:java-runtime`. ### `--reachable` Analyze your source code to find which vulnerable functions and packages are called. ### `--reachable-timeout=<TIMEOUT>` Specify the amount of time (in seconds) to wait for Snyk to gather reachability data. If it takes longer than `<TIMEOUT>`, reachable vulnerabilities are not reported. This does not affect regular test or monitor output. Default: 300 (5 minutes). ### `--init-script=<FILE` Use for projects that contain a Gradle initialization script. ## Options for NuGet projects ### `--assets-project-name` When monitoring a .NET project using NuGet `PackageReference` use the project name in project.assets.json, if found. ### `--packages-folder` Specify a custom path to the packages folder. ### `--project-name-prefix=<PREFIX_STRING>` When monitoring a .NET project, use this option to add a custom prefix to the name of files inside a project along with any desired separators. Example: `snyk monitor --file=my-project.sln --project-name-prefix=my-group/`.&#x20; This is useful when you have multiple projects with the same name in other `.sln` files. ## Option for npm projects ### `--strict-out-of-sync=true|false` Control testing out-of-sync lockfiles. Default: true ## Options for Yarn projects ### `--strict-out-of-sync=true|false` Control testing out-of-sync lockfiles. Default: true ### `--yarn-workspaces` Detect and scan Yarn workspaces. You can specify how many sub-directories to search using `--detection-depth` and exclude directories and files using `--exclude`. Alternatively scan Yarn workspaces with other projects using `--all-projects`. ## Option for CocoaPods projects ### `--strict-out-of-sync=true|false` Control testing out-of-sync lockfiles. Default: false ## Options for Python projects ### `--command=<COMMAND>` Indicate which specific Python commands to use based on Python version. The default is `python` which executes your default python version. Run 'python -V' to find out what version it is. If you are using multiple Python versions, use this parameter to specify the correct Python command for execution. Default: `python` Example: `--command=python3` ### `--skip-unresolved=true|false` Allow skipping packages that are not found in the environment. ## Options for Go projects Currently the following options are not supported: `--fail-on=<all|upgradable|patchable>` ## Options for C/C++ projects ### `--unmanaged` Scan C/C++ source code for vulnerabilities. For more information see [Snyk for C/C++](https://docs.snyk.io/products/snyk-open-source/language-and-package-manager-support/snyk-for-c-c++). ## `-- [<CONTEXT-SPECIFIC_OPTIONS>]` Use context-specific options to pass extra arguments directly to Gradle, Maven, or other build tools. These options are specified last. Example: `snyk test -- --build-cache` ## Examples for the snyk test command Test a project in the current folder for known vulnerabilities: `$ snyk test` Test a specific dependency for vulnerabilities: `$ snyk test ionic@1.6.5` Test the latest version of an npm package: `$ snyk test lodash` Test a public GitHub repository: `$ snyk test https://github.com/snyk-labs/nodejs-goof`