Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Update all non-major dependencies #228

Merged
merged 1 commit into from
Nov 11, 2024
Merged

Conversation

renovate[bot]
Copy link
Contributor

@renovate renovate bot commented Nov 10, 2024

This PR contains the following updates:

Package Change Age Adoption Passing Confidence
@apollo/server (source) 4.11.0 -> 4.11.2 age adoption passing confidence
@apollo/server-integration-testsuite (source) 4.11.0 -> 4.11.2 age adoption passing confidence
@types/node (source) 18.19.59 -> 18.19.64 age adoption passing confidence
@typescript-eslint/eslint-plugin (source) 8.11.0 -> 8.13.0 age adoption passing confidence
@typescript-eslint/parser (source) 8.11.0 -> 8.13.0 age adoption passing confidence
next14 (source) 14.2.16 -> 14.2.17 age adoption passing confidence

Release Notes

apollographql/apollo-server (@​apollo/server)

v4.11.2

Compare Source

(No change; there is a change to the @apollo/server-integration-testsuite used to test integrations, and the two packages always have matching versions.)

v4.11.1

Compare Source

Patch Changes
  • #​7952 bb81b2c Thanks @​glasser! - Upgrade dependencies so that automated scans don't detect a vulnerability.

    @apollo/server depends on express which depends on cookie. Versions of express older than v4.21.1 depend on a version of cookie vulnerable to CVE-2024-47764. Users of older express versions who call res.cookie() or res.clearCookie() may be vulnerable to this issue.

    However, Apollo Server does not call this function directly, and it does not expose any object to user code that allows TypeScript users to call this function without an unsafe cast.

    The only way that this direct dependency can cause a vulnerability for users of Apollo Server is if you call startStandaloneServer with a context function that calls Express-specific methods such as res.cookie() or res.clearCookies() on the response object, which is a violation of the TypeScript types provided by startStandaloneServer (which only promise that the response object is a core Node.js http.ServerResponse rather than the Express-specific subclass). So this vulnerability can only affect Apollo Server users who use unsafe JavaScript or unsafe as typecasts in TypeScript.

    However, this upgrade will at least prevent vulnerability scanners from alerting you to this dependency, and we encourage all Express users to upgrade their project's own express dependency to v4.21.1 or newer.

apollographql/apollo-server (@​apollo/server-integration-testsuite)

v4.11.2

Compare Source

Patch Changes

v4.11.1

Compare Source

Patch Changes
  • #​7952 bb81b2c Thanks @​glasser! - Upgrade dependencies so that automated scans don't detect a vulnerability.

    @apollo/server depends on express which depends on cookie. Versions of express older than v4.21.1 depend on a version of cookie vulnerable to CVE-2024-47764. Users of older express versions who call res.cookie() or res.clearCookie() may be vulnerable to this issue.

    However, Apollo Server does not call this function directly, and it does not expose any object to user code that allows TypeScript users to call this function without an unsafe cast.

    The only way that this direct dependency can cause a vulnerability for users of Apollo Server is if you call startStandaloneServer with a context function that calls Express-specific methods such as res.cookie() or res.clearCookies() on the response object, which is a violation of the TypeScript types provided by startStandaloneServer (which only promise that the response object is a core Node.js http.ServerResponse rather than the Express-specific subclass). So this vulnerability can only affect Apollo Server users who use unsafe JavaScript or unsafe as typecasts in TypeScript.

    However, this upgrade will at least prevent vulnerability scanners from alerting you to this dependency, and we encourage all Express users to upgrade their project's own express dependency to v4.21.1 or newer.

  • Updated dependencies [bb81b2c]:

typescript-eslint/typescript-eslint (@​typescript-eslint/eslint-plugin)

v8.13.0

Compare Source

🚀 Features
  • eslint-plugin: [only-throw-error] add allow option (#​10221)
  • eslint-plugin: [prefer-nullish-coalescing] add option ignoreBooleanCoercion (#​9924)
  • eslint-plugin: disable no-class-assign rule in eslint-recommended config (#​10250)
🩹 Fixes
  • eslint-plugin: [switch-exhaustiveness-check] add support for covering a missing property with undefined (#​10232)
  • eslint-plugin: [consistent-type-definitions] don't leave trailing parens when fixing type to interface (#​10235)
  • eslint-plugin: [no-deprecated] report when exported class implements/extends deprecated entity (#​10259)
  • eslint-plugin: [no-deprecated] report on deprecated variables used inside dynamic imports (#​10261)
  • eslint-plugin: [no-unnecessary-condition] falsey bigint should be falsey (#​10205)
❤️ Thank You

You can read about our versioning strategy and releases on our website.

v8.12.2

Compare Source

🩹 Fixes
  • eslint-plugin: [switch-exhaustiveness-check] invert considerDefaultExhaustiveForUnions (#​10223)
❤️ Thank You

You can read about our versioning strategy and releases on our website.

v8.12.1

Compare Source

This was a version bump only for eslint-plugin to align it with other projects, there were no code changes.

You can read about our versioning strategy and releases on our website.

v8.12.0

Compare Source

🚀 Features
  • eslint-plugin: [no-base-to-string] handle String() (#​10005)
  • eslint-plugin: [switch-exhaustiveness-check] add allowDefaultCaseMatchUnionMember option (#​9954)
  • eslint-plugin: [consistent-indexed-object-style] report mapped types (#​10160)
  • eslint-plugin: [prefer-nullish-coalescing] add support for assignment expressions (#​10152)
❤️ Thank You

You can read about our versioning strategy and releases on our website.

typescript-eslint/typescript-eslint (@​typescript-eslint/parser)

v8.13.0

Compare Source

This was a version bump only for parser to align it with other projects, there were no code changes.

You can read about our versioning strategy and releases on our website.

v8.12.2

Compare Source

This was a version bump only for parser to align it with other projects, there were no code changes.

You can read about our versioning strategy and releases on our website.

v8.12.1

Compare Source

This was a version bump only for parser to align it with other projects, there were no code changes.

You can read about our versioning strategy and releases on our website.

v8.12.0

Compare Source

This was a version bump only for parser to align it with other projects, there were no code changes.

You can read about our versioning strategy and releases on our website.

vercel/next.js (next14)

v14.2.17

Compare Source


Configuration

📅 Schedule: Branch creation - "every weekend" (UTC), Automerge - At any time (no schedule defined).

🚦 Automerge: Enabled.

Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.

👻 Immortal: This PR will be recreated if closed unmerged. Get config help if that's undesired.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

@renovate renovate bot requested a review from a team as a code owner November 10, 2024 04:47
@renovate renovate bot enabled auto-merge (squash) November 10, 2024 04:47
@renovate renovate bot merged commit 5a3fc01 into main Nov 11, 2024
2 checks passed
@renovate renovate bot deleted the renovate/all-minor-patch branch November 11, 2024 00:16
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant