$ date
--- stdout ---
Fri Mar 29 06:23:56 UTC 2024
--- end ---
$ git clone file:///srv/git/wikidata-query-builder.git repo --depth=1 -b master
--- stderr ---
Cloning into 'repo'...
--- stdout ---
--- end ---
$ git config user.name libraryupgrader
--- stdout ---
--- end ---
$ git config user.email tools.libraryupgrader@tools.wmflabs.org
--- stdout ---
--- end ---
$ git submodule update --init
--- stdout ---
--- end ---
$ grr init
--- stdout ---
Installed commit-msg hook.
--- end ---
$ git show-ref refs/heads/master
--- stdout ---
2ec402b8be855115e608194492d538fcaf4df80e refs/heads/master
--- end ---
$ /usr/bin/npm audit --json
--- stdout ---
{
"auditReportVersion": 2,
"vulnerabilities": {
"@vue/component-compiler-utils": {
"name": "@vue/component-compiler-utils",
"severity": "moderate",
"isDirect": false,
"via": [
"postcss"
],
"effects": [
"@vue/vue2-jest",
"vite-plugin-vue2"
],
"range": "*",
"nodes": [
"node_modules/@vue/component-compiler-utils"
],
"fixAvailable": false
},
"@vue/vue2-jest": {
"name": "@vue/vue2-jest",
"severity": "moderate",
"isDirect": true,
"via": [
"@vue/component-compiler-utils"
],
"effects": [],
"range": "*",
"nodes": [
"node_modules/@vue/vue2-jest"
],
"fixAvailable": false
},
"axios": {
"name": "axios",
"severity": "moderate",
"isDirect": false,
"via": [
{
"source": 1096526,
"name": "axios",
"dependency": "axios",
"title": "Axios Cross-Site Request Forgery Vulnerability",
"url": "https://github.com/advisories/GHSA-wf5p-g6vw-rhxx",
"severity": "moderate",
"cwe": [
"CWE-352"
],
"cvss": {
"score": 6.5,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
},
"range": ">=1.0.0 <1.6.0"
}
],
"effects": [],
"range": "1.0.0 - 1.5.1",
"nodes": [
"node_modules/netlify-cli/node_modules/axios"
],
"fixAvailable": true
},
"express": {
"name": "express",
"severity": "moderate",
"isDirect": false,
"via": [
{
"source": 1096820,
"name": "express",
"dependency": "express",
"title": "Express.js Open Redirect in malformed URLs",
"url": "https://github.com/advisories/GHSA-rv95-896h-c2vc",
"severity": "moderate",
"cwe": [
"CWE-601",
"CWE-1286"
],
"cvss": {
"score": 6.1,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
},
"range": "<4.19.2"
}
],
"effects": [
"netlify-cli"
],
"range": "<4.19.2",
"nodes": [
"node_modules/netlify-cli/node_modules/express"
],
"fixAvailable": {
"name": "netlify-cli",
"version": "15.0.2",
"isSemVerMajor": true
}
},
"follow-redirects": {
"name": "follow-redirects",
"severity": "moderate",
"isDirect": false,
"via": [
{
"source": 1096353,
"name": "follow-redirects",
"dependency": "follow-redirects",
"title": "Follow Redirects improperly handles URLs in the url.parse() function",
"url": "https://github.com/advisories/GHSA-jchw-25xp-jwwc",
"severity": "moderate",
"cwe": [
"CWE-20",
"CWE-601"
],
"cvss": {
"score": 6.1,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
},
"range": "<1.15.4"
},
{
"source": 1096781,
"name": "follow-redirects",
"dependency": "follow-redirects",
"title": "follow-redirects' Proxy-Authorization header kept across hosts",
"url": "https://github.com/advisories/GHSA-cxjh-pqwp-8mfp",
"severity": "moderate",
"cwe": [
"CWE-200"
],
"cvss": {
"score": 6.5,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
},
"range": "<=1.15.5"
}
],
"effects": [],
"range": "<=1.15.5",
"nodes": [
"node_modules/follow-redirects",
"node_modules/netlify-cli/node_modules/follow-redirects"
],
"fixAvailable": true
},
"netlify-cli": {
"name": "netlify-cli",
"severity": "moderate",
"isDirect": true,
"via": [
"express"
],
"effects": [],
"range": ">=15.0.3",
"nodes": [
"node_modules/netlify-cli"
],
"fixAvailable": {
"name": "netlify-cli",
"version": "15.0.2",
"isSemVerMajor": true
}
},
"postcss": {
"name": "postcss",
"severity": "moderate",
"isDirect": false,
"via": [
{
"source": 1094544,
"name": "postcss",
"dependency": "postcss",
"title": "PostCSS line return parsing error",
"url": "https://github.com/advisories/GHSA-7fh5-64p2-3v2j",
"severity": "moderate",
"cwe": [
"CWE-74",
"CWE-144"
],
"cvss": {
"score": 5.3,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
},
"range": "<8.4.31"
}
],
"effects": [
"@vue/component-compiler-utils"
],
"range": "<8.4.31",
"nodes": [
"node_modules/@vue/component-compiler-utils/node_modules/postcss",
"node_modules/netlify-cli/node_modules/postcss"
],
"fixAvailable": false
},
"vite": {
"name": "vite",
"severity": "high",
"isDirect": true,
"via": [
{
"source": 1089122,
"name": "vite",
"dependency": "vite",
"title": "Vitejs Vite before v2.9.13 vulnerable to directory traversal via crafted URL to victim's service",
"url": "https://github.com/advisories/GHSA-mv48-hcvh-8jj8",
"severity": "moderate",
"cwe": [
"CWE-22"
],
"cvss": {
"score": 4.3,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"
},
"range": "<2.9.13"
},
{
"source": 1094738,
"name": "vite",
"dependency": "vite",
"title": "Vite Server Options (server.fs.deny) can be bypassed using double forward-slash (//)",
"url": "https://github.com/advisories/GHSA-353f-5xf4-qw67",
"severity": "high",
"cwe": [
"CWE-50",
"CWE-200",
"CWE-706"
],
"cvss": {
"score": 7.5,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
},
"range": "<2.9.16"
},
{
"source": 1095469,
"name": "vite",
"dependency": "vite",
"title": "Vite dev server option `server.fs.deny` can be bypassed when hosted on case-insensitive filesystem",
"url": "https://github.com/advisories/GHSA-c24v-8rfc-w8vw",
"severity": "high",
"cwe": [
"CWE-178",
"CWE-200",
"CWE-284"
],
"cvss": {
"score": 7.5,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
},
"range": ">=2.7.0 <=2.9.16"
}
],
"effects": [],
"range": "<=2.9.16",
"nodes": [
"node_modules/vite"
],
"fixAvailable": {
"name": "vite",
"version": "2.9.18",
"isSemVerMajor": false
}
},
"vite-plugin-vue2": {
"name": "vite-plugin-vue2",
"severity": "moderate",
"isDirect": true,
"via": [
"@vue/component-compiler-utils"
],
"effects": [],
"range": "*",
"nodes": [
"node_modules/vite-plugin-vue2"
],
"fixAvailable": false
},
"word-wrap": {
"name": "word-wrap",
"severity": "moderate",
"isDirect": false,
"via": [
{
"source": 1095091,
"name": "word-wrap",
"dependency": "word-wrap",
"title": "word-wrap vulnerable to Regular Expression Denial of Service",
"url": "https://github.com/advisories/GHSA-j8xg-fqg3-53r7",
"severity": "moderate",
"cwe": [
"CWE-1333"
],
"cvss": {
"score": 5.3,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
},
"range": "<1.2.4"
}
],
"effects": [],
"range": "<1.2.4",
"nodes": [
"node_modules/netlify-cli/node_modules/word-wrap"
],
"fixAvailable": true
}
},
"metadata": {
"vulnerabilities": {
"info": 0,
"low": 0,
"moderate": 9,
"high": 1,
"critical": 0,
"total": 10
},
"dependencies": {
"prod": 103,
"dev": 2622,
"optional": 94,
"peer": 63,
"peerOptional": 0,
"total": 2724
}
}
}
--- end ---
Upgrading n:eslint-config-wikimedia from ^0.25.1 -> 0.26.0
$ /usr/bin/npm install
--- stderr ---
npm WARN ERESOLVE overriding peer dependency
npm WARN While resolving: @wmde/query-builder@1.0.0
npm WARN Found: eslint-config-wikimedia@0.25.1
npm WARN node_modules/eslint-config-wikimedia
npm WARN dev eslint-config-wikimedia@"0.26.0" from the root project
npm WARN 1 more (@wmde/eslint-config-wikimedia-typescript)
npm WARN
npm WARN Could not resolve dependency:
npm WARN peer eslint-config-wikimedia@"^0.25.1" from @wmde/eslint-config-wikimedia-typescript@0.2.6
npm WARN node_modules/@wmde/eslint-config-wikimedia-typescript
npm WARN dev @wmde/eslint-config-wikimedia-typescript@"^0.2.6" from the root project
npm WARN deprecated @types/rdf-js@4.0.2: This is a stub types definition. rdf-js provides its own type definitions, so you do not need this installed.
npm WARN deprecated @babel/plugin-proposal-nullish-coalescing-operator@7.18.6: This proposal has been merged to the ECMAScript standard and thus this plugin is no longer maintained. Please use @babel/plugin-transform-nullish-coalescing-operator instead.
npm WARN deprecated @babel/plugin-proposal-class-properties@7.18.6: This proposal has been merged to the ECMAScript standard and thus this plugin is no longer maintained. Please use @babel/plugin-transform-class-properties instead.
npm WARN deprecated source-map-url@0.4.1: See https://github.com/lydell/source-map-url#deprecated
npm WARN deprecated urix@0.1.0: Please see https://github.com/lydell/urix#deprecated
npm WARN deprecated @babel/plugin-proposal-optional-chaining@7.21.0: This proposal has been merged to the ECMAScript standard and thus this plugin is no longer maintained. Please use @babel/plugin-transform-optional-chaining instead.
npm WARN deprecated consolidate@0.16.0: Please upgrade to consolidate v1.0.0+ as it has been modernized with several long-awaited fixes implemented. Maintenance is supported by Forward Email at https://forwardemail.net ; follow/watch https://github.com/ladjs/consolidate for updates and release changelog
npm WARN deprecated consolidate@0.15.1: Please upgrade to consolidate v1.0.0+ as it has been modernized with several long-awaited fixes implemented. Maintenance is supported by Forward Email at https://forwardemail.net ; follow/watch https://github.com/ladjs/consolidate for updates and release changelog
npm WARN deprecated resolve-url@0.2.1: https://github.com/lydell/resolve-url#deprecated
npm WARN deprecated querystring@0.2.1: The querystring API is considered Legacy. new code should use the URLSearchParams API instead.
npm WARN deprecated @babel/plugin-proposal-object-rest-spread@7.20.7: This proposal has been merged to the ECMAScript standard and thus this plugin is no longer maintained. Please use @babel/plugin-transform-object-rest-spread instead.
npm WARN deprecated source-map-resolve@0.5.3: See https://github.com/lydell/source-map-resolve#deprecated
npm WARN deprecated sourcemap-codec@1.4.8: Please use @jridgewell/sourcemap-codec instead
--- stdout ---
added 2675 packages, and audited 2677 packages in 40s
338 packages are looking for funding
run `npm fund` for details
10 vulnerabilities (9 moderate, 1 high)
To address issues that do not require attention, run:
npm audit fix
To address all issues possible (including breaking changes), run:
npm audit fix --force
Some issues need review, and may require choosing
a different dependency.
Run `npm audit` for details.
--- end ---
$ package-lock-lint package-lock.json
--- stdout ---
Checking package-lock.json
node_modules/netlify-cli/tools/lint-rules@unknown: Neither "resolved" nor "version" are present
--- end ---
Traceback (most recent call last):
File "/venv/lib/python3.11/site-packages/runner-0.1.0-py3.11.egg/runner/__init__.py", line 1534, in main
libup.run(args.repo, args.output, args.branch)
File "/venv/lib/python3.11/site-packages/runner-0.1.0-py3.11.egg/runner/__init__.py", line 1472, in run
self.npm_upgrade(plan)
File "/venv/lib/python3.11/site-packages/runner-0.1.0-py3.11.egg/runner/__init__.py", line 1044, in npm_upgrade
self.check_package_lock()
File "/venv/lib/python3.11/site-packages/runner-0.1.0-py3.11.egg/runner/__init__.py", line 301, in check_package_lock
self.check_call(['package-lock-lint', 'package-lock.json'])
File "/venv/lib/python3.11/site-packages/runner-0.1.0-py3.11.egg/runner/shell2.py", line 54, in check_call
res.check_returncode()
File "/usr/lib/python3.11/subprocess.py", line 502, in check_returncode
raise CalledProcessError(self.returncode, self.args, self.stdout,
subprocess.CalledProcessError: Command '['package-lock-lint', 'package-lock.json']' returned non-zero exit status 1.