fix(deps): update all non-major dependencies #101
Merged
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
4.3.2
->4.3.3
2.25.2
->2.25.4
27.3.1
->27.4.7
13.1.4
->13.2.2
14.18.1
->14.18.3
Release Notes
visionmedia/debug
v4.3.3
Compare Source
Patch Release 4.3.3
This is a documentation-only release. Further, the repository was transferred. Please see notes below.
Thank you to @taylor1791 and @kristofkalocsai for their contributions.
Repository Migration Information
I've formatted this as a FAQ, please feel free to open an issue for any additional question and I'll add the response here.
Q: What impact will this have on me?
In most cases, you shouldn't notice any change.
The only exception I can think of is if you pull code directly from https://github.com/visionmedia/debug, e.g. via a
"debug": "visionmedia/debug"
-type version entry in your package.json - in which case, you should still be fine due to the automatic redirection Github sets up, but you should also update any references as soon as possible.Q: What are the security implications of this change?
If you pull code directly from the old URL, you should update the URL to https://github.com/debug-js/debug as soon as possible. The old organization has many approved owners and thus a new repository could (in theory) be created at the old URL, circumventing Github's automatic redirect that is in place now and serving malicious code. I (@qix-) also wouldn't have access to that repository, so while I don't think it would happen, it's still something to consider.
Even in such a case, however, the officially released package on npm (
debug
) would not be affected. That package is still very much under control (even more than it used to be).Q: What should I do if I encounter an issue related to the migration?
Search the issues first to see if someone has already reported it, and then open a new issue if someone has not.
Q: Why was this done as a 'patch' release? Isn't this breaking?
No, it shouldn't be breaking. The package on npm shouldn't be affected (aside from this patch release) and any references to the old repository should automatically redirect.
Thus, according to all of the "APIs" (loosely put) involved, nothing should have broken.
I understand there are a lot of edge cases so please open issues as needed so I can assist in any way necessary.
Q: Why was the repository transferred?
I'll just list them off in no particular order.
debug
ecosystem intends to grow beyond a single package, and since new packages could not be created in the old org (nor did it make sense for them to live there), a new org made the most sense - especially from a security point of view.Q: Was this approved?
Yes.[archive]
Q: Do I need to worry about another migration sometime in the future?
No.
import-js/eslint-plugin-import
v2.25.4
Compare Source
Fixed
importType
: avoid crashing on a non-string' ([#2305], thanks [@ljharb])first
]: prevent crash when parsing angular templates ([#2210], thanks [@ljharb])importType
: properly resolve@/*
-aliased imports as internal ([#2334], thanks [@ombene])named
]/ExportMap
: handle named imports from CJS modules that use dynamic import ([#2341], thanks [@ludofischer])Changed
no-default-import
]: report on the token "default" instead of the entire node ([#2299], thanks [@pmcelhaney])order
]: Remove duplicate mention of default ([#2280], thanks [@johnthagen])eslint-module-utils
v2.25.3
Compare Source
Fixed
extensions
]: ignore unresolveable type-only imports ([#2270], [#2271], thanks [@jablko])importType
: fixisExternalModule
calculation ([#2282], thanks [@mx-bernhard])no-import-module-exports
]: avoid false positives with a shadowedmodule
orexports
([#2297], thanks [@ljharb])Changed
order
]: add type to the default groups ([#2272], thanks [@charpeni])importType
: combine redundantisScoped
andisScopedModule
(thanks [@ljharb])facebook/jest
v27.4.7
Compare Source
Fixes
jest-config
Add missing@babel/core
dependency (#12216)v27.4.6
Compare Source
Fixes
[jest-environment-node]
AddAbortSignal
(#12157)[jest-environment-node]
Add Missing node globalperformance
(#12002)[jest-runtime]
Handle missingmocked
property (#12213)[@jest/transform]
Update dependency packagepirates
to 4.0.4 (#12002)Performance
jest-config
perf: only register ts-node once when loading TS config files (#12160)v27.4.5
Compare Source
Fixes
[jest-worker]
Stop explicitly passingprocess.env
(#12141)v27.4.4
Compare Source
Fixes
[babel-jest]
Addprocess.version
chunk to the cache key (#12122)[jest-environment]
Addmocked
tojest
object (#12133)[jest-worker]
Stop explicitly passingexecArgv
(#12128)Chore & Maintenance
[website]
Fix the card front that looks overlapping part of the card backv27.4.3
Compare Source
Fixes
[jest-environment-jsdom]
Remove@types/jsdom
dependency (and make itsdom
propertyprivate
) (#12107)v27.4.2
Compare Source
Fixes
[jest-worker]
Add additionalexecArgv
to filter (#12103)v27.4.1
Compare Source
Fixes
[jest-worker]
FilterexecArgv
correctly (#12097)v27.4.0
Compare Source
Features
[expect]
Enhancing thetoHaveProperty
matcher to support array selection (#12092)[jest-core]
Add support fortestResultsProcessor
written in ESM (#12006)[jest-diff, pretty-format]
AddcompareKeys
option for custom sorting of object keys (#11992)[jest-mock]
Addts-jest
mock util functions (#12089)Fixes
[expect]
Allow againexpect.Matchers
generic with single value (#11986)[jest-circus, jest-jasmine2]
Avoid false concurrent test failures due to unhandled promise rejections (#11987)[jest-config]
Add missingslash
dependency topackage.json
(#12080)[jest-core]
Incorrect detection of open ZLIB handles (#12022)[jest-diff]
Break dependency cycle (#10818)[jest-environment-jsdom]
Add@types/jsdom
dependency (#11999)[jest-environment-jsdom]
Do not reset the global.document too early on teardown (#11871)[jest-transform]
Improve error and warning messages (#11998)[jest-worker]
PassexecArgv
correctly toworker_threads
worker (#12069)Chore & Maintenance
[docs]
CLI options alphabetized (#11586)[jest-runner]
Add info regarding timers to forcedExit message(#12083)[*]
Replacedsubstr
method withsubstring
(#12066)[*]
Addtypes
entry to all export maps (#12073)nock/nock
v13.2.2
Compare Source
Bug Fixes
allowUnocked
not working with regex host + request body match (#2277) (ac7b4fd)v13.2.1
Compare Source
Bug Fixes
update
type for record mode (#2250) (e8f23b1), closes #2241v13.2.0
Compare Source
Features
update
mode (#2241) (1cb4880)nodejs/node
v14.18.3
Compare Source
This is a security release.
Notable changes
Improper handling of URI Subject Alternative Names (Medium)(CVE-2021-44531)
Accepting arbitrary Subject Alternative Name (SAN) types, unless a PKI is specifically defined to use a particular SAN type, can result in bypassing name-constrained intermediates. Node.js was accepting URI SAN types, which PKIs are often not defined to use. Additionally, when a protocol allows URI SANs, Node.js did not match the URI correctly.
Versions of Node.js with the fix for this disable the URI SAN type when checking a certificate against a hostname. This behavior can be reverted through the
--security-revert
command-line option.More details will be available at CVE-2021-44531 after publication.
Certificate Verification Bypass via String Injection (Medium)(CVE-2021-44532)
Node.js converts SANs (Subject Alternative Names) to a string format. It uses this string to check peer certificates against hostnames when validating connections. The string format was subject to an injection vulnerability when name constraints were used within a certificate chain, allowing the bypass of these name constraints.
Versions of Node.js with the fix for this escape SANs containing the problematic characters in order to prevent the injection. This behavior can be reverted through the
--security-revert
command-line option.More details will be available at CVE-2021-44532 after publication.
Incorrect handling of certificate subject and issuer fields (Medium)(CVE-2021-44533)
Node.js did not handle multi-value Relative Distinguished Names correctly. Attackers could craft certificate subjects containing a single-value Relative Distinguished Name that would be interpreted as a multi-value Relative Distinguished Name, for example, in order to inject a Common Name that would allow bypassing the certificate subject verification.
Affected versions of Node.js do not accept multi-value Relative Distinguished Names and are thus not vulnerable to such attacks themselves. However, third-party code that uses node's ambiguous presentation of certificate subjects may be vulnerable.
More details will be available at CVE-2021-44533 after publication.
Prototype pollution via
console.table
properties (Low)(CVE-2022-21824)Due to the formatting logic of the
console.table()
function it was not safe to allow user controlled input to be passed to theproperties
parameter while simultaneously passing a plain object with at least one property as the first parameter, which could be__proto__
. The prototype pollution has very limited control, in that it only allows an empty string to be assigned numerical keys of the object prototype.Versions of Node.js with the fix for this use a null protoype for the object these properties are being assigned to.
More details will be available at CVE-2022-21824 after publication.
Thanks to Patrik Oldsberg (rugvip) for reporting this vulnerability.
Commits
e2a74f3c99
] - console: fix prototype pollution via console.table (Tobias Nießen) nodejs-private/node-private#307df1b2c33f6
] - crypto,tls: implement safe x509 GeneralName format (Tobias Nießen and Akshay Kumar) nodejs-private/node-private#3009f2c52617f
] - src: add cve reverts and associated tests (Michael Dawson and Akshay Kumar) nodejs-private/node-private#300b14be42518
] - src: remove unused x509 functions (Tobias Nießen and Akshay Kumar) nodejs-private/node-private#30083d8f880bb
] - tls: fix handling of x509 subject and issuer (Tobias Nießen and Akshay Kumar) nodejs-private/node-private#300461a0c674b
] - tls: drop support for URI alternative names (Tobias Nießen and Akshay Kumar) nodejs-private/node-private#300v14.18.2
Compare Source
Notable changes
This release contains a c-ares update to fix a regression introduced in
Node.js 14.17.5 resolving CNAME records containing underscores
#39780.
Also included are commits to allow Node.js 14 to continue to build and
pass tests on our Jenkins CI, including adding Python 3.10 to the list
of allowable Python versions for building.
Commits
7923c61a62
] - build: pin build-docs workflow to Node.js 14 (Richard Lau) #40939da356128fb
] - build: support Python 3.10.0 (FrankQiu) #402969c3a85d279
] - deps: update c-ares to 1.18.1 (Richard Lau) #40660cd7c340545
] - deps: V8: patch jinja2 for Python 3.10 compat (Michaël Zasso) #402966330d435f5
] - doc: mark Node.js 10 as End-of-Life (Richard Lau) #384828ca082ec71
] - doc: fix CJS-ESM selector in Safari (Bradley Farias) #4013592490d1c89
] - doc: add macOS arm64 experimental status (Michael Rienstra) #401278894bdd4d8
] - lib: fix regular expression to detect `/` and `\` (Francesco Trotta) #40325704989b698
] - test: deflake child-process-pipe-dataflow (Luigi Pinca) #40838df401cd346
] - test: update upload.zip to be uncorrupted (Greg Ziskind) #37294aa947f7dbf
] - tools: add script to update c-ares (Richard Lau) #406606b7b2bba41
] - tools: patch jinja2 for Python 3.10 compat (Michaël Zasso) #4029639583f77d8
] - worker: avoid potential deadlock on NearHeapLimit (Santiago Gimeno) #38403Configuration
📅 Schedule: "after 3am and before 10pm" (UTC).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
👻 Immortal: This PR will be recreated if closed unmerged. Get config help if that's undesired.
This PR has been generated by WhiteSource Renovate. View repository job log here.