From e62118a3f914e1764bbdfdaed132734c0cbfee9d Mon Sep 17 00:00:00 2001 From: Nick Novitski Date: Wed, 31 May 2023 12:38:46 -0700 Subject: [PATCH] bundlerUpdateScript: don't run bundler-audit Blocking updates on security warnings doesn't make sense; if an updated gem has dependencies with security warnings, then it's likely for the un-updated gem to have even more of them. --- .../ruby-modules/bundler-update-script/default.nix | 5 ++--- 1 file changed, 2 insertions(+), 3 deletions(-) diff --git a/pkgs/development/ruby-modules/bundler-update-script/default.nix b/pkgs/development/ruby-modules/bundler-update-script/default.nix index fce983a0e8ef..5d5ebfabce0e 100644 --- a/pkgs/development/ruby-modules/bundler-update-script/default.nix +++ b/pkgs/development/ruby-modules/bundler-update-script/default.nix @@ -1,11 +1,11 @@ -{ runtimeShell, lib, writeScript, bundix, bundler, bundler-audit, coreutils, git, nix }: +{ runtimeShell, lib, writeScript, bundix, bundler, coreutils, git, nix }: attrPath: let updateScript = writeScript "bundler-update-script" '' #!${runtimeShell} - PATH=${lib.makeBinPath [ bundler bundler-audit bundix coreutils git nix ]} + PATH=${lib.makeBinPath [ bundler bundix coreutils git nix ]} set -o errexit set -o nounset set -o pipefail @@ -19,7 +19,6 @@ let cd "$gemdir" bundler lock --update - bundler-audit check --update bundix ''; in [ updateScript attrPath ]