This run took 81 seconds.
$ date --- stdout --- Sun Oct 6 13:32:02 UTC 2024 --- end --- $ git clone file:///srv/git/mediawiki-extensions-WikibaseMediaInfo.git repo --depth=1 -b REL1_42 --- stderr --- Cloning into 'repo'... --- stdout --- --- end --- $ git config user.name libraryupgrader --- stdout --- --- end --- $ git config user.email tools.libraryupgrader@tools.wmflabs.org --- stdout --- --- end --- $ git submodule update --init --- stdout --- --- end --- $ grr init --- stdout --- Installed commit-msg hook. --- end --- $ git show-ref refs/heads/REL1_42 --- stdout --- ebf8c608609a4a060d57e3121cbb143a1fbdeb66 refs/heads/REL1_42 --- end --- $ /usr/bin/npm audit --json --- stdout --- { "auditReportVersion": 2, "vulnerabilities": { "jpeg-js": { "name": "jpeg-js", "severity": "high", "isDirect": true, "via": [ { "source": 1088964, "name": "jpeg-js", "dependency": "jpeg-js", "title": "Infinite loop in jpeg-js", "url": "https://github.com/advisories/GHSA-xvf7-4v9q-58w6", "severity": "high", "cwe": [ "CWE-835" ], "cvss": { "score": 7.5, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, "range": "<0.4.4" }, { "source": 1093580, "name": "jpeg-js", "dependency": "jpeg-js", "title": "Uncontrolled resource consumption in jpeg-js", "url": "https://github.com/advisories/GHSA-w7q9-p3jq-fmhm", "severity": "moderate", "cwe": [ "CWE-400" ], "cvss": { "score": 5.5, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, "range": "<0.4.0" } ], "effects": [], "range": "<=0.4.3", "nodes": [ "node_modules/jpeg-js" ], "fixAvailable": { "name": "jpeg-js", "version": "0.4.4", "isSemVerMajor": true } }, "jquery": { "name": "jquery", "severity": "moderate", "isDirect": false, "via": [ { "source": 1094185, "name": "jquery", "dependency": "jquery", "title": "Potential XSS vulnerability in jQuery", "url": "https://github.com/advisories/GHSA-gxr4-xjj5-5px2", "severity": "moderate", "cwe": [ "CWE-79" ], "cvss": { "score": 6.9, "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:L/A:N" }, "range": ">=1.2.0 <3.5.0" }, { "source": 1097311, "name": "jquery", "dependency": "jquery", "title": "Potential XSS vulnerability in jQuery", "url": "https://github.com/advisories/GHSA-jpcq-cgw6-v4j6", "severity": "moderate", "cwe": [ "CWE-79" ], "cvss": { "score": 6.9, "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:L/A:N" }, "range": ">=1.0.3 <3.5.0" } ], "effects": [ "oojs-ui" ], "range": "<=3.4.1", "nodes": [ "node_modules/oojs-ui/node_modules/jquery" ], "fixAvailable": { "name": "oojs-ui", "version": "0.51.1", "isSemVerMajor": true } }, "jsdom": { "name": "jsdom", "severity": "moderate", "isDirect": true, "via": [ "request", "request-promise-native", "tough-cookie" ], "effects": [], "range": "0.1.20 || 0.2.0 - 16.5.3", "nodes": [ "node_modules/jsdom" ], "fixAvailable": { "name": "jsdom", "version": "25.0.1", "isSemVerMajor": true } }, "mockery": { "name": "mockery", "severity": "critical", "isDirect": true, "via": [ { "source": 1092753, "name": "mockery", "dependency": "mockery", "title": "mockery is vulnerable to prototype pollution", "url": "https://github.com/advisories/GHSA-gmwp-3pwc-3j3g", "severity": "critical", "cwe": [ "CWE-1321" ], "cvss": { "score": 9.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, "range": "<=2.1.0" } ], "effects": [], "range": "*", "nodes": [ "node_modules/mockery" ], "fixAvailable": false }, "oojs-ui": { "name": "oojs-ui", "severity": "moderate", "isDirect": true, "via": [ "jquery" ], "effects": [], "range": "0.11.0 - 0.38.1", "nodes": [ "node_modules/oojs-ui" ], "fixAvailable": { "name": "oojs-ui", "version": "0.51.1", "isSemVerMajor": true } }, "request": { "name": "request", "severity": "moderate", "isDirect": false, "via": [ { "source": 1096727, "name": "request", "dependency": "request", "title": "Server-Side Request Forgery in Request", "url": "https://github.com/advisories/GHSA-p8p7-x288-28g6", "severity": "moderate", "cwe": [ "CWE-918" ], "cvss": { "score": 6.1, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" }, "range": "<=2.88.2" }, "tough-cookie" ], "effects": [ "jsdom", "request-promise-core", "request-promise-native" ], "range": "*", "nodes": [ "node_modules/request" ], "fixAvailable": { "name": "jsdom", "version": "25.0.1", "isSemVerMajor": true } }, "request-promise-core": { "name": "request-promise-core", "severity": "moderate", "isDirect": false, "via": [ "request" ], "effects": [ "request-promise-native" ], "range": "*", "nodes": [ "node_modules/request-promise-core" ], "fixAvailable": { "name": "jsdom", "version": "25.0.1", "isSemVerMajor": true } }, "request-promise-native": { "name": "request-promise-native", "severity": "moderate", "isDirect": false, "via": [ "request", "request-promise-core", "tough-cookie" ], "effects": [ "jsdom" ], "range": ">=1.0.0", "nodes": [ "node_modules/request-promise-native" ], "fixAvailable": { "name": "jsdom", "version": "25.0.1", "isSemVerMajor": true } }, "tough-cookie": { "name": "tough-cookie", "severity": "moderate", "isDirect": false, "via": [ { "source": 1097682, "name": "tough-cookie", "dependency": "tough-cookie", "title": "tough-cookie Prototype Pollution vulnerability", "url": "https://github.com/advisories/GHSA-72xf-g2v4-qvf3", "severity": "moderate", "cwe": [ "CWE-1321" ], "cvss": { "score": 6.5, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" }, "range": "<4.1.3" } ], "effects": [ "jsdom", "request", "request-promise-native" ], "range": "<4.1.3", "nodes": [ "node_modules/tough-cookie" ], "fixAvailable": { "name": "jsdom", "version": "25.0.1", "isSemVerMajor": true } } }, "metadata": { "vulnerabilities": { "info": 0, "low": 0, "moderate": 7, "high": 1, "critical": 1, "total": 9 }, "dependencies": { "prod": 1, "dev": 686, "optional": 1, "peer": 12, "peerOptional": 0, "total": 686 } } } --- end --- $ /usr/bin/composer install --- stderr --- No composer.lock file present. Updating dependencies to latest instead of installing from lock file. See https://getcomposer.org/install for more information. Loading composer repositories with package information Updating dependencies Lock file operations: 40 installs, 0 updates, 0 removals - Locking composer/pcre (3.3.1) - Locking composer/semver (3.4.0) - Locking composer/spdx-licenses (1.5.8) - Locking composer/xdebug-handler (3.0.5) - Locking dealerdirect/phpcodesniffer-composer-installer (v1.0.0) - Locking doctrine/deprecations (1.1.3) - Locking felixfbecker/advanced-json-rpc (v3.2.1) - Locking mediawiki/mediawiki-codesniffer (v43.0.0) - Locking mediawiki/mediawiki-phan-config (0.14.0) - Locking mediawiki/minus-x (1.1.1) - Locking mediawiki/phan-taint-check-plugin (6.0.0) - Locking microsoft/tolerant-php-parser (v0.1.2) - Locking netresearch/jsonmapper (v4.5.0) - Locking phan/phan (5.4.3) - Locking php-parallel-lint/php-console-color (v1.0.1) - Locking php-parallel-lint/php-console-highlighter (v1.0.0) - Locking php-parallel-lint/php-parallel-lint (v1.3.2) - Locking phpcsstandards/phpcsextra (1.1.2) - Locking phpcsstandards/phpcsutils (1.0.9) - Locking phpdocumentor/reflection-common (2.2.0) - Locking phpdocumentor/reflection-docblock (5.4.1) - Locking phpdocumentor/type-resolver (1.8.2) - Locking phpstan/phpdoc-parser (1.32.0) - Locking psr/container (2.0.2) - Locking psr/log (2.0.0) - Locking sabre/event (5.1.7) - Locking serialization/serialization (4.0.0) - Locking squizlabs/php_codesniffer (3.8.1) - Locking symfony/console (v5.4.44) - Locking symfony/deprecation-contracts (v3.5.0) - Locking symfony/polyfill-ctype (v1.31.0) - Locking symfony/polyfill-intl-grapheme (v1.31.0) - Locking symfony/polyfill-intl-normalizer (v1.31.0) - Locking symfony/polyfill-mbstring (v1.31.0) - Locking symfony/polyfill-php73 (v1.31.0) - Locking symfony/polyfill-php80 (v1.31.0) - Locking symfony/service-contracts (v3.5.0) - Locking symfony/string (v6.4.12) - Locking tysonandre/var_representation_polyfill (0.1.3) - Locking webmozart/assert (1.11.0) Writing lock file Installing dependencies from lock file (including require-dev) Package operations: 40 installs, 0 updates, 0 removals 0 [>---------------------------] 0 [->--------------------------] - Installing squizlabs/php_codesniffer (3.8.1): Extracting archive - Installing dealerdirect/phpcodesniffer-composer-installer (v1.0.0): Extracting archive - Installing composer/pcre (3.3.1): Extracting archive - Installing symfony/polyfill-php80 (v1.31.0): Extracting archive - Installing phpcsstandards/phpcsutils (1.0.9): Extracting archive - Installing phpcsstandards/phpcsextra (1.1.2): Extracting archive - Installing symfony/polyfill-mbstring (v1.31.0): Extracting archive - Installing composer/spdx-licenses (1.5.8): Extracting archive - Installing composer/semver (3.4.0): Extracting archive - Installing mediawiki/mediawiki-codesniffer (v43.0.0): Extracting archive - Installing tysonandre/var_representation_polyfill (0.1.3): Extracting archive - Installing symfony/polyfill-intl-normalizer (v1.31.0): Extracting archive - Installing symfony/polyfill-intl-grapheme (v1.31.0): Extracting archive - Installing symfony/polyfill-ctype (v1.31.0): Extracting archive - Installing symfony/string (v6.4.12): Extracting archive - Installing symfony/deprecation-contracts (v3.5.0): Extracting archive - Installing psr/container (2.0.2): Extracting archive - Installing symfony/service-contracts (v3.5.0): Extracting archive - Installing symfony/polyfill-php73 (v1.31.0): Extracting archive - Installing symfony/console (v5.4.44): Extracting archive - Installing sabre/event (5.1.7): Extracting archive - Installing netresearch/jsonmapper (v4.5.0): Extracting archive - Installing microsoft/tolerant-php-parser (v0.1.2): Extracting archive - Installing webmozart/assert (1.11.0): Extracting archive - Installing phpstan/phpdoc-parser (1.32.0): Extracting archive - Installing phpdocumentor/reflection-common (2.2.0): Extracting archive - Installing doctrine/deprecations (1.1.3): Extracting archive - Installing phpdocumentor/type-resolver (1.8.2): Extracting archive - Installing phpdocumentor/reflection-docblock (5.4.1): Extracting archive - Installing felixfbecker/advanced-json-rpc (v3.2.1): Extracting archive - Installing psr/log (2.0.0): Extracting archive - Installing composer/xdebug-handler (3.0.5): Extracting archive - Installing phan/phan (5.4.3): Extracting archive - Installing mediawiki/phan-taint-check-plugin (6.0.0): Extracting archive - Installing mediawiki/mediawiki-phan-config (0.14.0): Extracting archive - Installing mediawiki/minus-x (1.1.1): Extracting archive - Installing php-parallel-lint/php-console-color (v1.0.1): Extracting archive - Installing php-parallel-lint/php-console-highlighter (v1.0.0): Extracting archive - Installing php-parallel-lint/php-parallel-lint (v1.3.2): Extracting archive - Installing serialization/serialization (4.0.0): Extracting archive 0/38 [>---------------------------] 0% 20/38 [==============>-------------] 52% 32/38 [=======================>----] 84% 38/38 [============================] 100% 3 package suggestions were added by new dependencies, use `composer suggest` to see details. Generating autoload files 16 packages you are using are looking for funding. Use the `composer fund` command to find out more! --- stdout --- PHP CodeSniffer Config installed_paths set to ../../mediawiki/mediawiki-codesniffer,../../phpcsstandards/phpcsextra,../../phpcsstandards/phpcsutils --- end --- $ /usr/bin/npm audit --json --- stdout --- { "auditReportVersion": 2, "vulnerabilities": { "jpeg-js": { "name": "jpeg-js", "severity": "high", "isDirect": true, "via": [ { "source": 1088964, "name": "jpeg-js", "dependency": "jpeg-js", "title": "Infinite loop in jpeg-js", "url": "https://github.com/advisories/GHSA-xvf7-4v9q-58w6", "severity": "high", "cwe": [ "CWE-835" ], "cvss": { "score": 7.5, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, "range": "<0.4.4" }, { "source": 1093580, "name": "jpeg-js", "dependency": "jpeg-js", "title": "Uncontrolled resource consumption in jpeg-js", "url": "https://github.com/advisories/GHSA-w7q9-p3jq-fmhm", "severity": "moderate", "cwe": [ "CWE-400" ], "cvss": { "score": 5.5, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, "range": "<0.4.0" } ], "effects": [], "range": "<=0.4.3", "nodes": [ "node_modules/jpeg-js" ], "fixAvailable": { "name": "jpeg-js", "version": "0.4.4", "isSemVerMajor": true } }, "jquery": { "name": "jquery", "severity": "moderate", "isDirect": false, "via": [ { "source": 1094185, "name": "jquery", "dependency": "jquery", "title": "Potential XSS vulnerability in jQuery", "url": "https://github.com/advisories/GHSA-gxr4-xjj5-5px2", "severity": "moderate", "cwe": [ "CWE-79" ], "cvss": { "score": 6.9, "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:L/A:N" }, "range": ">=1.2.0 <3.5.0" }, { "source": 1097311, "name": "jquery", "dependency": "jquery", "title": "Potential XSS vulnerability in jQuery", "url": "https://github.com/advisories/GHSA-jpcq-cgw6-v4j6", "severity": "moderate", "cwe": [ "CWE-79" ], "cvss": { "score": 6.9, "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:L/A:N" }, "range": ">=1.0.3 <3.5.0" } ], "effects": [ "oojs-ui" ], "range": "<=3.4.1", "nodes": [ "node_modules/oojs-ui/node_modules/jquery" ], "fixAvailable": { "name": "oojs-ui", "version": "0.51.1", "isSemVerMajor": true } }, "jsdom": { "name": "jsdom", "severity": "moderate", "isDirect": true, "via": [ "request", "request-promise-native", "tough-cookie" ], "effects": [], "range": "0.1.20 || 0.2.0 - 16.5.3", "nodes": [ "node_modules/jsdom" ], "fixAvailable": { "name": "jsdom", "version": "25.0.1", "isSemVerMajor": true } }, "mockery": { "name": "mockery", "severity": "critical", "isDirect": true, "via": [ { "source": 1092753, "name": "mockery", "dependency": "mockery", "title": "mockery is vulnerable to prototype pollution", "url": "https://github.com/advisories/GHSA-gmwp-3pwc-3j3g", "severity": "critical", "cwe": [ "CWE-1321" ], "cvss": { "score": 9.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, "range": "<=2.1.0" } ], "effects": [], "range": "*", "nodes": [ "node_modules/mockery" ], "fixAvailable": false }, "oojs-ui": { "name": "oojs-ui", "severity": "moderate", "isDirect": true, "via": [ "jquery" ], "effects": [], "range": "0.11.0 - 0.38.1", "nodes": [ "node_modules/oojs-ui" ], "fixAvailable": { "name": "oojs-ui", "version": "0.51.1", "isSemVerMajor": true } }, "request": { "name": "request", "severity": "moderate", "isDirect": false, "via": [ { "source": 1096727, "name": "request", "dependency": "request", "title": "Server-Side Request Forgery in Request", "url": "https://github.com/advisories/GHSA-p8p7-x288-28g6", "severity": "moderate", "cwe": [ "CWE-918" ], "cvss": { "score": 6.1, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" }, "range": "<=2.88.2" }, "tough-cookie" ], "effects": [ "jsdom", "request-promise-core", "request-promise-native" ], "range": "*", "nodes": [ "node_modules/request" ], "fixAvailable": { "name": "jsdom", "version": "25.0.1", "isSemVerMajor": true } }, "request-promise-core": { "name": "request-promise-core", "severity": "moderate", "isDirect": false, "via": [ "request" ], "effects": [ "request-promise-native" ], "range": "*", "nodes": [ "node_modules/request-promise-core" ], "fixAvailable": { "name": "jsdom", "version": "25.0.1", "isSemVerMajor": true } }, "request-promise-native": { "name": "request-promise-native", "severity": "moderate", "isDirect": false, "via": [ "request", "request-promise-core", "tough-cookie" ], "effects": [ "jsdom" ], "range": ">=1.0.0", "nodes": [ "node_modules/request-promise-native" ], "fixAvailable": { "name": "jsdom", "version": "25.0.1", "isSemVerMajor": true } }, "tough-cookie": { "name": "tough-cookie", "severity": "moderate", "isDirect": false, "via": [ { "source": 1097682, "name": "tough-cookie", "dependency": "tough-cookie", "title": "tough-cookie Prototype Pollution vulnerability", "url": "https://github.com/advisories/GHSA-72xf-g2v4-qvf3", "severity": "moderate", "cwe": [ "CWE-1321" ], "cvss": { "score": 6.5, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" }, "range": "<4.1.3" } ], "effects": [ "jsdom", "request", "request-promise-native" ], "range": "<4.1.3", "nodes": [ "node_modules/tough-cookie" ], "fixAvailable": { "name": "jsdom", "version": "25.0.1", "isSemVerMajor": true } } }, "metadata": { "vulnerabilities": { "info": 0, "low": 0, "moderate": 7, "high": 1, "critical": 1, "total": 9 }, "dependencies": { "prod": 1, "dev": 686, "optional": 1, "peer": 12, "peerOptional": 0, "total": 686 } } } --- end --- Attempting to npm audit fix $ /usr/bin/npm audit fix --dry-run --only=dev --json --- stderr --- npm WARN invalid config only="dev" set in command line options npm WARN invalid config Must be one of: null, prod, production --- stdout --- { "added": 686, "removed": 0, "changed": 0, "audited": 687, "funding": 99, "audit": { "auditReportVersion": 2, "vulnerabilities": { "jpeg-js": { "name": "jpeg-js", "severity": "high", "isDirect": true, "via": [ { "source": 1088964, "name": "jpeg-js", "dependency": "jpeg-js", "title": "Infinite loop in jpeg-js", "url": "https://github.com/advisories/GHSA-xvf7-4v9q-58w6", "severity": "high", "cwe": [ "CWE-835" ], "cvss": { "score": 7.5, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, "range": "<0.4.4" }, { "source": 1093580, "name": "jpeg-js", "dependency": "jpeg-js", "title": "Uncontrolled resource consumption in jpeg-js", "url": "https://github.com/advisories/GHSA-w7q9-p3jq-fmhm", "severity": "moderate", "cwe": [ "CWE-400" ], "cvss": { "score": 5.5, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, "range": "<0.4.0" } ], "effects": [], "range": "<=0.4.3", "nodes": [ "node_modules/jpeg-js" ], "fixAvailable": { "name": "jpeg-js", "version": "0.4.4", "isSemVerMajor": true } }, "jquery": { "name": "jquery", "severity": "moderate", "isDirect": false, "via": [ { "source": 1094185, "name": "jquery", "dependency": "jquery", "title": "Potential XSS vulnerability in jQuery", "url": "https://github.com/advisories/GHSA-gxr4-xjj5-5px2", "severity": "moderate", "cwe": [ "CWE-79" ], "cvss": { "score": 6.9, "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:L/A:N" }, "range": ">=1.2.0 <3.5.0" }, { "source": 1097311, "name": "jquery", "dependency": "jquery", "title": "Potential XSS vulnerability in jQuery", "url": "https://github.com/advisories/GHSA-jpcq-cgw6-v4j6", "severity": "moderate", "cwe": [ "CWE-79" ], "cvss": { "score": 6.9, "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:L/A:N" }, "range": ">=1.0.3 <3.5.0" } ], "effects": [ "oojs-ui" ], "range": "<=3.4.1", "nodes": [ "node_modules/oojs-ui/node_modules/jquery" ], "fixAvailable": { "name": "oojs-ui", "version": "0.51.1", "isSemVerMajor": true } }, "jsdom": { "name": "jsdom", "severity": "moderate", "isDirect": true, "via": [ "request", "request-promise-native", "tough-cookie" ], "effects": [], "range": "0.1.20 || 0.2.0 - 16.5.3", "nodes": [ "node_modules/jsdom" ], "fixAvailable": { "name": "jsdom", "version": "25.0.1", "isSemVerMajor": true } }, "mockery": { "name": "mockery", "severity": "critical", "isDirect": true, "via": [ { "source": 1092753, "name": "mockery", "dependency": "mockery", "title": "mockery is vulnerable to prototype pollution", "url": "https://github.com/advisories/GHSA-gmwp-3pwc-3j3g", "severity": "critical", "cwe": [ "CWE-1321" ], "cvss": { "score": 9.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, "range": "<=2.1.0" } ], "effects": [], "range": "*", "nodes": [ "node_modules/mockery" ], "fixAvailable": false }, "oojs-ui": { "name": "oojs-ui", "severity": "moderate", "isDirect": true, "via": [ "jquery" ], "effects": [], "range": "0.11.0 - 0.38.1", "nodes": [ "node_modules/oojs-ui" ], "fixAvailable": { "name": "oojs-ui", "version": "0.51.1", "isSemVerMajor": true } }, "request": { "name": "request", "severity": "moderate", "isDirect": false, "via": [ { "source": 1096727, "name": "request", "dependency": "request", "title": "Server-Side Request Forgery in Request", "url": "https://github.com/advisories/GHSA-p8p7-x288-28g6", "severity": "moderate", "cwe": [ "CWE-918" ], "cvss": { "score": 6.1, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" }, "range": "<=2.88.2" }, "tough-cookie" ], "effects": [ "jsdom", "request-promise-core", "request-promise-native" ], "range": "*", "nodes": [ "node_modules/request" ], "fixAvailable": { "name": "jsdom", "version": "25.0.1", "isSemVerMajor": true } }, "request-promise-core": { "name": "request-promise-core", "severity": "moderate", "isDirect": false, "via": [ "request" ], "effects": [ "request-promise-native" ], "range": "*", "nodes": [ "node_modules/request-promise-core" ], "fixAvailable": { "name": "jsdom", "version": "25.0.1", "isSemVerMajor": true } }, "request-promise-native": { "name": "request-promise-native", "severity": "moderate", "isDirect": false, "via": [ "request", "request-promise-core", "tough-cookie" ], "effects": [ "jsdom" ], "range": ">=1.0.0", "nodes": [ "node_modules/request-promise-native" ], "fixAvailable": { "name": "jsdom", "version": "25.0.1", "isSemVerMajor": true } }, "tough-cookie": { "name": "tough-cookie", "severity": "moderate", "isDirect": false, "via": [ { "source": 1097682, "name": "tough-cookie", "dependency": "tough-cookie", "title": "tough-cookie Prototype Pollution vulnerability", "url": "https://github.com/advisories/GHSA-72xf-g2v4-qvf3", "severity": "moderate", "cwe": [ "CWE-1321" ], "cvss": { "score": 6.5, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" }, "range": "<4.1.3" } ], "effects": [ "jsdom", "request", "request-promise-native" ], "range": "<4.1.3", "nodes": [ "node_modules/tough-cookie" ], "fixAvailable": { "name": "jsdom", "version": "25.0.1", "isSemVerMajor": true } } }, "metadata": { "vulnerabilities": { "info": 0, "low": 0, "moderate": 7, "high": 1, "critical": 1, "total": 9 }, "dependencies": { "prod": 1, "dev": 686, "optional": 1, "peer": 12, "peerOptional": 0, "total": 686 } } } } --- end --- {"added": 686, "removed": 0, "changed": 0, "audited": 687, "funding": 99, "audit": {"auditReportVersion": 2, "vulnerabilities": {"jpeg-js": {"name": "jpeg-js", "severity": "high", "isDirect": true, "via": [{"source": 1088964, "name": "jpeg-js", "dependency": "jpeg-js", "title": "Infinite loop in jpeg-js", "url": "https://github.com/advisories/GHSA-xvf7-4v9q-58w6", "severity": "high", "cwe": ["CWE-835"], "cvss": {"score": 7.5, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}, "range": "<0.4.4"}, {"source": 1093580, "name": "jpeg-js", "dependency": "jpeg-js", "title": "Uncontrolled resource consumption in jpeg-js", "url": "https://github.com/advisories/GHSA-w7q9-p3jq-fmhm", "severity": "moderate", "cwe": ["CWE-400"], "cvss": {"score": 5.5, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}, "range": "<0.4.0"}], "effects": [], "range": "<=0.4.3", "nodes": ["node_modules/jpeg-js"], "fixAvailable": {"name": "jpeg-js", "version": "0.4.4", "isSemVerMajor": true}}, "jquery": {"name": "jquery", "severity": "moderate", "isDirect": false, "via": [{"source": 1094185, "name": "jquery", "dependency": "jquery", "title": "Potential XSS vulnerability in jQuery", "url": "https://github.com/advisories/GHSA-gxr4-xjj5-5px2", "severity": "moderate", "cwe": ["CWE-79"], "cvss": {"score": 6.9, "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:L/A:N"}, "range": ">=1.2.0 <3.5.0"}, {"source": 1097311, "name": "jquery", "dependency": "jquery", "title": "Potential XSS vulnerability in jQuery", "url": "https://github.com/advisories/GHSA-jpcq-cgw6-v4j6", "severity": "moderate", "cwe": ["CWE-79"], "cvss": {"score": 6.9, "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:L/A:N"}, "range": ">=1.0.3 <3.5.0"}], "effects": ["oojs-ui"], "range": "<=3.4.1", "nodes": ["node_modules/oojs-ui/node_modules/jquery"], "fixAvailable": {"name": "oojs-ui", "version": "0.51.1", "isSemVerMajor": true}}, "jsdom": {"name": "jsdom", "severity": "moderate", "isDirect": true, "via": ["request", "request-promise-native", "tough-cookie"], "effects": [], "range": "0.1.20 || 0.2.0 - 16.5.3", "nodes": ["node_modules/jsdom"], "fixAvailable": {"name": "jsdom", "version": "25.0.1", "isSemVerMajor": true}}, "mockery": {"name": "mockery", "severity": "critical", "isDirect": true, "via": [{"source": 1092753, "name": "mockery", "dependency": "mockery", "title": "mockery is vulnerable to prototype pollution", "url": "https://github.com/advisories/GHSA-gmwp-3pwc-3j3g", "severity": "critical", "cwe": ["CWE-1321"], "cvss": {"score": 9.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "range": "<=2.1.0"}], "effects": [], "range": "*", "nodes": ["node_modules/mockery"], "fixAvailable": false}, "oojs-ui": {"name": "oojs-ui", "severity": "moderate", "isDirect": true, "via": ["jquery"], "effects": [], "range": "0.11.0 - 0.38.1", "nodes": ["node_modules/oojs-ui"], "fixAvailable": {"name": "oojs-ui", "version": "0.51.1", "isSemVerMajor": true}}, "request": {"name": "request", "severity": "moderate", "isDirect": false, "via": [{"source": 1096727, "name": "request", "dependency": "request", "title": "Server-Side Request Forgery in Request", "url": "https://github.com/advisories/GHSA-p8p7-x288-28g6", "severity": "moderate", "cwe": ["CWE-918"], "cvss": {"score": 6.1, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}, "range": "<=2.88.2"}, "tough-cookie"], "effects": ["jsdom", "request-promise-core", "request-promise-native"], "range": "*", "nodes": ["node_modules/request"], "fixAvailable": {"name": "jsdom", "version": "25.0.1", "isSemVerMajor": true}}, "request-promise-core": {"name": "request-promise-core", "severity": "moderate", "isDirect": false, "via": ["request"], "effects": ["request-promise-native"], "range": "*", "nodes": ["node_modules/request-promise-core"], "fixAvailable": {"name": "jsdom", "version": "25.0.1", "isSemVerMajor": true}}, "request-promise-native": {"name": "request-promise-native", "severity": "moderate", "isDirect": false, "via": ["request", "request-promise-core", "tough-cookie"], "effects": ["jsdom"], "range": ">=1.0.0", "nodes": ["node_modules/request-promise-native"], "fixAvailable": {"name": "jsdom", "version": "25.0.1", "isSemVerMajor": true}}, "tough-cookie": {"name": "tough-cookie", "severity": "moderate", "isDirect": false, "via": [{"source": 1097682, "name": "tough-cookie", "dependency": "tough-cookie", "title": "tough-cookie Prototype Pollution vulnerability", "url": "https://github.com/advisories/GHSA-72xf-g2v4-qvf3", "severity": "moderate", "cwe": ["CWE-1321"], "cvss": {"score": 6.5, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"}, "range": "<4.1.3"}], "effects": ["jsdom", "request", "request-promise-native"], "range": "<4.1.3", "nodes": ["node_modules/tough-cookie"], "fixAvailable": {"name": "jsdom", "version": "25.0.1", "isSemVerMajor": true}}}, "metadata": {"vulnerabilities": {"info": 0, "low": 0, "moderate": 7, "high": 1, "critical": 1, "total": 9}, "dependencies": {"prod": 1, "dev": 686, "optional": 1, "peer": 12, "peerOptional": 0, "total": 686}}}} $ /usr/bin/npm audit fix --only=dev --- stderr --- npm WARN invalid config only="dev" set in command line options npm WARN invalid config Must be one of: null, prod, production npm WARN deprecated request-promise-native@1.0.9: request-promise-native has been deprecated because it extends the now deprecated request package, see https://github.com/request/request/issues/3142 npm WARN deprecated har-validator@5.1.5: this library is no longer supported npm WARN deprecated uuid@3.4.0: Please upgrade to version 7 or higher. Older versions may use Math.random() in certain circumstances, which is known to be problematic. See https://v8.dev/blog/math-random for details. npm WARN deprecated uuid@3.4.0: Please upgrade to version 7 or higher. Older versions may use Math.random() in certain circumstances, which is known to be problematic. See https://v8.dev/blog/math-random for details. npm WARN deprecated uuid@3.4.0: Please upgrade to version 7 or higher. Older versions may use Math.random() in certain circumstances, which is known to be problematic. See https://v8.dev/blog/math-random for details. npm WARN deprecated request@2.88.2: request has been deprecated, see https://github.com/request/request/issues/3142 npm WARN deprecated stylelint-stylistic@0.4.3: This package has been deprecated in favor of @stylistic/stylelint-plugin --- stdout --- added 686 packages, and audited 687 packages in 8s 99 packages are looking for funding run `npm fund` for details # npm audit report jpeg-js <=0.4.3 Severity: high Infinite loop in jpeg-js - https://github.com/advisories/GHSA-xvf7-4v9q-58w6 Uncontrolled resource consumption in jpeg-js - https://github.com/advisories/GHSA-w7q9-p3jq-fmhm fix available via `npm audit fix --force` Will install jpeg-js@0.4.4, which is a breaking change node_modules/jpeg-js jquery <=3.4.1 Severity: moderate Potential XSS vulnerability in jQuery - https://github.com/advisories/GHSA-gxr4-xjj5-5px2 Potential XSS vulnerability in jQuery - https://github.com/advisories/GHSA-jpcq-cgw6-v4j6 fix available via `npm audit fix --force` Will install oojs-ui@0.51.1, which is a breaking change node_modules/oojs-ui/node_modules/jquery oojs-ui 0.11.0 - 0.38.1 Depends on vulnerable versions of jquery node_modules/oojs-ui mockery * Severity: critical mockery is vulnerable to prototype pollution - https://github.com/advisories/GHSA-gmwp-3pwc-3j3g No fix available node_modules/mockery request * Severity: moderate Server-Side Request Forgery in Request - https://github.com/advisories/GHSA-p8p7-x288-28g6 Depends on vulnerable versions of tough-cookie fix available via `npm audit fix --force` Will install jsdom@25.0.1, which is a breaking change node_modules/request jsdom 0.1.20 || 0.2.0 - 16.5.3 Depends on vulnerable versions of request Depends on vulnerable versions of request-promise-native Depends on vulnerable versions of tough-cookie node_modules/jsdom request-promise-core * Depends on vulnerable versions of request node_modules/request-promise-core request-promise-native >=1.0.0 Depends on vulnerable versions of request Depends on vulnerable versions of request-promise-core Depends on vulnerable versions of tough-cookie node_modules/request-promise-native tough-cookie <4.1.3 Severity: moderate tough-cookie Prototype Pollution vulnerability - https://github.com/advisories/GHSA-72xf-g2v4-qvf3 fix available via `npm audit fix --force` Will install jsdom@25.0.1, which is a breaking change node_modules/tough-cookie 9 vulnerabilities (7 moderate, 1 high, 1 critical) To address all issues possible (including breaking changes), run: npm audit fix --force Some issues need review, and may require choosing a different dependency. --- end --- Verifying that tests still pass $ /usr/bin/npm ci --- stderr --- npm WARN deprecated request-promise-native@1.0.9: request-promise-native has been deprecated because it extends the now deprecated request package, see https://github.com/request/request/issues/3142 npm WARN deprecated har-validator@5.1.5: this library is no longer supported npm WARN deprecated uuid@3.4.0: Please upgrade to version 7 or higher. Older versions may use Math.random() in certain circumstances, which is known to be problematic. See https://v8.dev/blog/math-random for details. npm WARN deprecated uuid@3.4.0: Please upgrade to version 7 or higher. Older versions may use Math.random() in certain circumstances, which is known to be problematic. See https://v8.dev/blog/math-random for details. npm WARN deprecated uuid@3.4.0: Please upgrade to version 7 or higher. Older versions may use Math.random() in certain circumstances, which is known to be problematic. See https://v8.dev/blog/math-random for details. npm WARN deprecated request@2.88.2: request has been deprecated, see https://github.com/request/request/issues/3142 npm WARN deprecated stylelint-stylistic@0.4.3: This package has been deprecated in favor of @stylistic/stylelint-plugin --- stdout --- > wikibase-media-info@0.1.0 install > rm -rf node_modules/mediawiki && git clone -q --depth=1 https://gerrit.wikimedia.org/r/mediawiki/core node_modules/mediawiki added 686 packages, and audited 687 packages in 18s 99 packages are looking for funding run `npm fund` for details 9 vulnerabilities (7 moderate, 1 high, 1 critical) To address all issues possible (including breaking changes), run: npm audit fix --force Some issues need review, and may require choosing a different dependency. Run `npm audit` for details. --- end --- $ /usr/bin/npm test --- stderr --- jQuery.Deferred exception: navigator is not defined ReferenceError: navigator is not defined at OO.ui.WindowManager.togglePreventIosScrolling (/src/repo/node_modules/oojs-ui/dist/oojs-ui.js:24215:37) at /src/repo/node_modules/oojs-ui/dist/oojs-ui.js:23931:15 at mightThrow (/src/repo/node_modules/jquery/dist/jquery.js:3489:29) at Window.process (/src/repo/node_modules/jquery/dist/jquery.js:3557:12) at Timeout.callback [as _onTimeout] (/src/repo/node_modules/jsdom/lib/jsdom/browser/Window.js:665:19) at listOnTimeout (node:internal/timers:569:17) at process.processTimers (node:internal/timers:512:7) undefined --- stdout --- > wikibase-media-info@0.1.0 test > grunt test && npm run test:unit Running "eslint:all" (eslint) task Running "banana:WikibaseMediaInfo" (banana) task >> 1 message directory checked. Running "stylelint:all" (stylelint) task >> Linted 19 files without errors Done. > wikibase-media-info@0.1.0 test:unit > qunit "tests/node-qunit/**/*.test.js" TAP version 13 ok 1 ExampleComponentWidget > Edit mode enabled ok 2 ExampleComponentWidget > Edit mode disabled ok 3 TemplatingFeatures > Toggle edit mode ok 4 BestPractices > Valid data roundtrip ok 5 Setting other data triggers a change event ok 6 Setting same data does not trigger a change event ok 7 ComponentWidget > Widget renders with default state ok 8 ComponentWidget > Widget rerenders with new state ok 9 ComponentWidget > Widget renders with changed template data ok 10 ComponentWidget > Widget renders with async changed template data ok 11 ComponentWidget > Widget will not rerender on state change if stopped ok 12 ComponentWidget > Widget will only rerender once when multiple state changes happen during previous render ok 13 DOMLessGroupWidget > Test item is added to group ok 14 DOMLessGroupWidget > Test item DOM is not changed after inserting into group ok 15 CaptionsPanel > When pre-existing statements are present on page > initialization works without errors ok 16 CaptionsPanel > When pre-existing statements are present on page > user languages are added to DOM ok 17 LicenseDialogWidget > constructor ok 18 LicenseDialogWidget > User is not logged in and has not accepted license > getLicenseConfirmation returns zero ok 19 LicenseDialogWidget > User is not logged in and has not accepted license > storeLicenseConfirmation sets value of the appropriate key to 1 ok 20 LicenseDialogWidget > User is logged in and has not accepted license > getLicenseConfirmation returns zero ok 21 LicenseDialogWidget > User is logged in and has not accepted license > storeLicenseConfirmation saves to user preferences ok 22 ProtectionMsgWidget > constructor ok 23 ProtectionMsgWidget > Page is not protected > Protection message widget does not display ok 24 ProtectionMsgWidget > Page is protected > Protection message widget displays ok 25 StatementPanel > When no pre-existing statements are present on page > constructor ok 26 StatementPanel > When no pre-existing statements are present on page > isEditable() is false by default ok 27 StatementPanel > When no pre-existing statements are present on page > User is not logged in and has not accepted license > LicenseDialogWidget is displayed when user attempts to edit ok 28 mediainfo.template.mustache+dom > Render mustache templates ok 29 mediainfo.template.mustache+dom > Mustache templates with HTMLElement > Nodes are parsed into template ok 30 mediainfo.template.mustache+dom > Mustache templates with HTMLElement > Events triggered from template-based HTML propagate to original element handlers ok 31 mediainfo.template.mustache+dom > Mustache templates with HTMLElement > Changes to node later on propagate into DOM rendered by template ok 32 mediainfo.template.mustache+dom > Mustache templates with jQuery nodes > Nodes are parsed into template ok 33 mediainfo.template.mustache+dom > Mustache templates with jQuery nodes > Events triggered from template-based HTML propagate to original element handlers ok 34 mediainfo.template.mustache+dom > Mustache templates with jQuery nodes > Changes to node later on propagate into DOM rendered by template ok 35 mediainfo.template.mustache+dom > Mustache templates with OOUI widgets > Nodes are parsed into template ok 36 mediainfo.template.mustache+dom > Mustache templates with OOUI widgets > Events triggered from template-based HTML propagate to original element handlers ok 37 mediainfo.template.mustache+dom > Mustache templates with OOUI widgets > Changes to node later on propagate into DOM rendered by template ok 38 AddPropertyWidget > Adding property ids changes the filters ok 39 AddPropertyWidget > Property input widget & remove are only visible in edit mode ok 40 ItemWidget > Valid data roundtrip ok 41 ItemWidget > Setting other data triggers a change event ok 42 ItemWidget > Setting same data does not trigger a change event ok 43 ItemWidget > Widget updates snak widgets with new data ok 44 ItemWidget > Test enabling edit state ok 45 ItemWidget > Test disabling edit state ok 46 ItemWidget > Toggling item prominence changes item rank ok 47 ItemWidget > Valid data roundtrip with somevalue snak ok 48 ItemWidget > Valid data roundtrip with novalue snak ok 49 LinkNoticeWidget > constructor ok 50 LinkNoticeWidget > User is not logged in. > Widget should be visible if not previously dismissed ok 51 LinkNoticeWidget > User is not logged in. > Widget should not be visible if previously dismissed ok 52 LinkNoticeWidget > User is not logged in. > dismiss method should store data in local storage for anon users ok 53 LinkNoticeWidget > User is not logged in. > dismiss method should dismiss the widget ok 54 LinkNoticeWidget > User is logged-in > Widget should be visible if not previously dismissed ok 55 LinkNoticeWidget > User is logged-in > Widget should not be visible if previously dismissed ok 56 LinkNoticeWidget > User is logged-in > dismiss method should store data in user preferences for logged in users ok 57 SnakListWidget > Valid data roundtrip ok 58 SnakListWidget > Setting other data triggers a change event ok 59 SnakListWidget > Setting same data does not trigger a change event ok 60 SnakListWidget > createWidget() returns a new SnakWidget ok 61 SnakListWidget > createWidget sets SnakWidget data when snak is provided ok 62 SnakListWidget > addWidget creates a new SnakWidget every time it is called ok 63 SnakListWidget > Valid data roundtrip with somevalue snak ok 64 SnakListWidget > Valid data roundtrip with novalue snak ok 65 SnakWidget > Valid data roundtrip ok 66 SnakWidget > Setting other data triggers a change event ok 67 SnakWidget > Setting same data does not trigger a change event ok 68 SnakWidget > setData() sets property ID in the PropertyInput widget ok 69 SnakWidget > setData() sets value data in the valueInput widget ok 70 SnakWidget > Property labels are available after API calls complete ok 71 SnakWidget > Test enabling edit state ok 72 SnakWidget > Test disabling edit state ok 73 SnakWidget > Valid data roundtrip with somevalue snak ok 74 SnakWidget > Valid data roundtrip with novalue snak ok 75 StatementWidget > Valid data roundtrip ok 76 StatementWidget > Setting other data triggers a change event ok 77 StatementWidget > Setting same data does not trigger a change event ok 78 StatementWidget > Test detection of changes ok 79 StatementWidget > Test enabling edit state ok 80 StatementWidget > Test disabling edit state ok 81 StatementWidget > Widget can handle multiple errors ok 82 EntityInputWidget > Valid data roundtrip ok 83 EntityInputWidget > Setting other data triggers a change event ok 84 EntityInputWidget > Setting same data does not trigger a change event ok 85 GlobeCoordinateInputWidget > Valid data roundtrip ok 86 GlobeCoordinateInputWidget > Setting other data triggers a change event ok 87 GlobeCoordinateInputWidget > Setting same data does not trigger a change event ok 88 MonolingualText > Valid data roundtrip ok 89 MonolingualText > Setting other data triggers a change event ok 90 MonolingualText > Setting same data does not trigger a change event ok 91 MonolingualText > Widget has no button in qualifier mode ok 92 MonolingualText > Widget has button in statement mode ok 93 MultiTypeInputWrapperWidget > Valid data roundtrip (wikibase-entityid) ok 94 MultiTypeInputWrapperWidget > Valid data roundtrip (string) ok 95 MultiTypeInputWrapperWidget > Valid data roundtrip (monolingualtext) ok 96 MultiTypeInputWrapperWidget > Valid data roundtrip (quantity) ok 97 MultiTypeInputWrapperWidget > Valid data roundtrip (time) ok 98 MultiTypeInputWrapperWidget > Valid data roundtrip (globecoordinate) ok 99 MultiTypeInputWrapperWidget > Valid data roundtrip (unsupported) ok 100 MultiTypeInputWrapperWidget > Setting other data triggers a change event ok 101 MultiTypeInputWrapperWidget > Setting same data does not trigger a change event ok 102 MultiTypeInputWrapperWidget > Changing to same input type leaves existing value unaltered ok 103 MultiTypeInputWrapperWidget > Changing to other input type (and back) wipes out existing data ok 104 MultiTypeInputWrapperWidget > Widget creates the correct input type ok 105 MultiTypeInputWrapperWidget > add event is fired when child input emits add ok 106 MultiTypeInputWrapperWidget > setErrors adds MessageWidget to UI and flags string input as invalid ok 107 MultiTypeInputWrapperWidget > Widget can handle multiple errors ok 108 MultiTypeInputWrapperWidget > Setting snak type to somevalue changes input to disabled string input ok 109 MultiTypeInputWrapperWidget > Setting snak type to novalue changes input to disabled string input ok 110 MultiTypeInputWrapperWidget > Setting snak type to value changes input to original type ok 111 MultiTypeInputWrapperWidget > Datatype can be set explicitly ok 112 QuantityInputWidget > Valid data roundtrip ok 113 QuantityInputWidget > Setting other data triggers a change event ok 114 QuantityInputWidget > Setting same data does not trigger a change event ok 115 QuantityInputWidget > Widget has no button in qualifier mode ok 116 QuantityInputWidget > Widget has button in statement mode ok 117 QuantityInputWidget > Widget displays no options by default ok 118 QuantityInputWidget > Widget displays button to add unit when focused ok 119 QuantityInputWidget > Widget displays custom unit when it has one ok 120 StringInputWidget > Valid data roundtrip ok 121 StringInputWidget > Setting other data triggers a change event ok 122 StringInputWidget > Setting same data does not trigger a change event ok 123 StringInputWidget > Widget has no button in qualifier mode ok 124 StringInputWidget > Widget has button in statement mode ok 125 TimeInputWidget > Valid data roundtrip ok 126 TimeInputWidget > Setting other data triggers a change event ok 127 TimeInputWidget > Setting same data does not trigger a change event ok 128 TimeInputWidget > Widget has no button in qualifier mode ok 129 TimeInputWidget > Widget has button in statement mode 1..129 # pass 129 # skip 0 # todo 0 # fail 0 --- end --- $ package-lock-lint package-lock.json --- stdout --- Checking package-lock.json --- end --- [DNM] there are no updates $ git add . --- stdout --- --- end --- $ git commit -F /tmp/tmpazc5cu2_ --- stdout --- On branch REL1_42 Your branch is up to date with 'origin/REL1_42'. nothing to commit, working tree clean --- end ---