Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Bump @nx/next from 19.5.7 to 20.1.4 #4662

Open
wants to merge 1 commit into
base: master
Choose a base branch
from

Conversation

dependabot[bot]
Copy link
Contributor

@dependabot dependabot bot commented on behalf of github Dec 2, 2024

Bumps @nx/next from 19.5.7 to 20.1.4.

Release notes

Sourced from @​nx/next's releases.

20.1.4 (2024-11-28)

🚀 Features

  • misc: replace tutorials with social links in create-nx-workspace (#29085)
  • nx-dev: update top-level navbar (0f330590b7)

🩹 Fixes

  • angular: ngrx-root-store generator check ngModule path (#29068)
  • core: don't generate nxCloudId if running nx connect through nx console (#29060)
  • core: update to the async version of getting powerpack information (#29088)
  • misc: update artifact generator option descriptions and cleanup leftovers (#29077)
  • module-federation: use 'hoisted' runtime for node to prevent issues with eager sharing (#29104)
  • nest: Fix generators (guard, interceptor etc...) path to not duplicate when provided (#29084)
  • nest: update project config to enable artifacts to be built as dev (#29110)
  • nextjs: ensure next apps config is correctly checked when using jest (#29066)
  • nextjs: Add support for next.config.ts for executors (#29071)

❤️ Thank You

20.1.3 (2024-11-23)

🩹 Fixes

  • angular: make scam-to-standalone replace correct module (#29014)
  • core: ensure process is kept alive when plugin communication in progress (#28948)
  • core: add missing supported CI providers to NxCloud type (#29008)
  • core: gracefully handle non-existent files in find_imports (#29027)
  • core: handle self shutdown for plugin workers is orphaned before connections and loading (3003b66879)
  • linter: remove legacy dependencies during convert to flat config (#28981)
  • linter: move eslint-config-prettier to the end for proper override (#28503)
  • nextjs: fix next e2e test to ensure playwright installed (#29000)
  • nx-dev: disable notifier for now (95cdd7ce7a)
  • nx-dev: breadcrumb casing (#29032)
  • release: remove duplicate space character in changelog thank you header (#28664)
  • remix: remove tooling packages from generated package.json since they are installed in the root (#29009)

❤️ Thank You

... (truncated)

Commits
  • 58f0b17 fix(misc): update artifact generator option descriptions and cleanup leftover...
  • bf24839 fix(nextjs): Add support for next.config.ts for executors (#29071)
  • 316e8d2 server-next-executor-examples: minor typo documentation (#28830)
  • d4b9e0d fix(nextjs): update default next-env (#28861)
  • 39b0a6c chore(nextjs): bump Next.js version to 14.2.16 (#28782)
  • 0706c7f fix(nextjs): Formatting for pages (#28734)
  • 0ad7c6b fix(nextjs): do not generate spec files if unitTestRunner is not set programm...
  • b89a62e fix(nextjs): Fix json spread typo (#28728)
  • c2e3112 feat(core): Update plugin generators so that they are formatted by default (#...
  • ce05a98 fix(nextjs): Add deprecation message for svgr (#28705)
  • Additional commits viewable in compare view

Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot show <dependency name> ignore conditions will show all of the ignore conditions of the specified dependency
  • @dependabot ignore this major version will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this minor version will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)

Bumps [@nx/next](https://github.com/nrwl/nx/tree/HEAD/packages/next) from 19.5.7 to 20.1.4.
- [Release notes](https://github.com/nrwl/nx/releases)
- [Commits](https://github.com/nrwl/nx/commits/20.1.4/packages/next)

---
updated-dependencies:
- dependency-name: "@nx/next"
  dependency-type: direct:production
  update-type: version-update:semver-major
...

Signed-off-by: dependabot[bot] <[email protected]>
@dependabot dependabot bot added the dependencies Pull requests that update a dependency file label Dec 2, 2024
Copy link

@github-actions github-actions bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@dependabot merge

Copy link
Contributor Author

dependabot bot commented on behalf of github Dec 2, 2024

Sorry, only users with push access can use that command.

"node_modules/sprintf-js": {
"version": "1.0.3",
"resolved": "https://registry.npmjs.org/sprintf-js/-/sprintf-js-1.0.3.tgz",
"integrity": "sha512-D9cPgkvLlV3t3IzL0D0YLvGA9Ahk4PcvVwUbN0dSGr1aP0Nrt4AEnTUbuGvquEC0mA64Gqt1fzirlRs5ibXx8g==",
"license": "BSD-3-Clause"
},
"node_modules/ssh2": {

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Codacy found a critical Security issue: Insecure dependency [email protected] (CVE-2020-26301: nodejs-ssh2: Command injection by calling vulnerable method with untrusted input) (update to 1.4.0)

The issue identified by the Trivy linter is a security vulnerability in the ssh2 package version 0.8.9, which is associated with CVE-2020-26301. This vulnerability allows for command injection when untrusted input is passed to certain methods within the ssh2 library. To mitigate this risk, it is recommended to update the ssh2 package to a secure version, specifically version 1.4.0 or later, where this vulnerability has been addressed.

To fix the issue, you can update the ssh2 dependency in your package.json file. Here’s the single line change that you need to make:

Suggested change
"node_modules/ssh2": {
"ssh2": "^1.4.0",

This change ensures that the project uses a secure version of the ssh2 package, thereby eliminating the vulnerability.


This comment was generated by an experimental AI tool.

@@ -35312,6 +41430,12 @@
"node": ">= 0.6"
}
},
"node_modules/http-cache-semantics": {

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Codacy found a critical Security issue: Insecure dependency [email protected] (CVE-2022-25881: http-cache-semantics: Regular Expression Denial of Service (ReDoS) vulnerability) (update to 4.1.1)

The issue identified by the Trivy linter is a security vulnerability in the http-cache-semantics package, specifically version 3.8.1. This version has a known vulnerability (CVE-2022-25881) that exposes the application to a Regular Expression Denial of Service (ReDoS) attack. A ReDoS attack can exploit certain regular expressions that take a long time to evaluate, potentially causing the application to hang or crash under certain conditions. The recommended action is to update the package to a more secure version, which in this case is 4.1.1.

To fix this issue, you should update the version of the http-cache-semantics package in your project. The change can be made in your package.json file or wherever the dependency is defined.

Here's the single line change to update the version:

    "node_modules/http-cache-semantics": {
      "version": "4.1.1",

This comment was generated by an experimental AI tool.

@@ -36079,6 +42775,12 @@
"url": "https://github.com/sindresorhus/invert-kv?sponsor=1"
}
},
"node_modules/ip": {

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

ℹ️ Codacy found a minor Security issue: Insecure dependency [email protected] (CVE-2023-42282: nodejs-ip: arbitrary code execution via the isPublic() function) (update to 1.1.9)

The issue described by the Trivy linter indicates that the ip package version 1.1.5 has a known vulnerability (CVE-2023-42282) that allows for arbitrary code execution through the isPublic() function. This vulnerability poses a significant security risk, and it is recommended to update the package to a secure version, specifically 1.1.9 or later.

To resolve this issue, you should update the version of the ip package in your package.json file. The change would involve modifying the dependency version to 1.1.9.

Here is the code suggestion to fix the issue:

Suggested change
"node_modules/ip": {
"node_modules/ip": { "version": "1.1.9", ...

Make sure to run npm install after making this change to update your dependencies accordingly.


This comment was generated by an experimental AI tool.

"pjv": "bin/pjv"
}
},
"node_modules/package-json-validator/node_modules/minimist": {

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Codacy found a critical Security issue: Insecure dependency [email protected] (CVE-2020-7598: nodejs-minimist: prototype pollution allows adding or modifying properties of Object.prototype using a constructor or proto payload) (update to 0.2.1, 1.2.3)

The issue identified by the Trivy linter is related to a security vulnerability in the minimist package, specifically version 0.0.10. This version is susceptible to prototype pollution, which is a type of vulnerability that allows an attacker to manipulate the properties of Object.prototype. This can lead to unexpected behavior in the application, including potential denial of service or data corruption.

To resolve this issue, you should update the minimist dependency to a secure version that is not affected by this vulnerability. The suggested versions to upgrade to are 0.2.1 or 1.2.3.

Here’s the single line change you can make to update the minimist dependency:

Suggested change
"node_modules/package-json-validator/node_modules/minimist": {
"node_modules/package-json-validator/node_modules/minimist": { "version": "1.2.3", ...

This change updates the version of minimist to 1.2.3, which addresses the security vulnerability.


This comment was generated by an experimental AI tool.

@@ -58379,6 +68757,16 @@
"node": ">=4.0.0"
}
},
"node_modules/vue-template-compiler": {

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

⚠️ Codacy found a medium Security issue: Insecure dependency [email protected] (CVE-2024-6783: vue-template-compiler vulnerable to client-side Cross-Site Scripting (XSS)) (update to 3.0.0)

The issue reported by the Trivy linter indicates that the vue-template-compiler package version 2.6.12 has a known vulnerability (CVE-2024-6783) related to client-side Cross-Site Scripting (XSS). This vulnerability can potentially allow attackers to inject malicious scripts into web applications, posing a significant security risk.

To address this vulnerability, the recommended action is to upgrade the vue-template-compiler package to a secure version, specifically version 3.0.0 or later, which has resolved this security issue.

Here is the code suggestion to fix the issue:

    "node_modules/vue-template-compiler": {
      "version": "3.0.0",

This comment was generated by an experimental AI tool.

@@ -36079,6 +42775,12 @@
"url": "https://github.com/sindresorhus/invert-kv?sponsor=1"
}
},
"node_modules/ip": {

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Codacy found a critical Security issue: Insecure dependency [email protected] (CVE-2023-42282: nodejs-ip: arbitrary code execution via the isPublic() function) (update to 2.0.1, 1.1.9)

The issue reported by the Trivy linter indicates that the ip package version 1.1.5 has a known vulnerability (CVE-2023-42282) that allows for arbitrary code execution through the isPublic() function. This vulnerability can potentially be exploited if an attacker is able to manipulate the input to this function, leading to severe security risks in applications that depend on this package.

To address this security vulnerability, you should update the ip package to a safe version. The linter suggests updating to either version 2.0.1 or 1.1.9, both of which have resolved the security issue.

The code suggestion to fix the issue would be to update the version of the ip package in your package.json file.

Suggested change
"node_modules/ip": {
"ip": "^1.1.9",

This change will ensure that your project uses a version of the ip package that is not vulnerable to the reported security issue. After making this change, don't forget to run npm install to update the package in your node_modules.


This comment was generated by an experimental AI tool.

@@ -57672,6 +67883,112 @@
"integrity": "sha512-x00IRNXNy63jwGkJmzPigoySHbaqpNuzKbBOmzK+g2OdZpQ9w+sxCN+VSB3ja7IAge2OP2qpfxTjeNcyjmW1uw==",
"license": "ISC"
},
"node_modules/utile": {

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

ℹ️ Codacy found a minor Security issue: Insecure dependency [email protected] (NSWG-ECO-445: Out-of-bounds Read) (no fix available)

The issue identified by the Trivy linter pertains to the utile package version 0.3.0, which has been flagged for an "Out-of-bounds Read" vulnerability. This type of vulnerability can lead to potential security risks such as data leakage or crashes, as it allows an attacker to read memory outside of the intended bounds of an array or buffer. Since there is no fix available for this specific version, the recommended approach is to remove the vulnerable package or upgrade to a secure alternative if possible.

To address this issue, a single line change in your package.json file can be made to remove the utile package entirely. Here’s how you can do that:

Suggested change
"node_modules/utile": {
"node_modules/utile": null,

However, it's important to note that simply setting it to null in the package.json will not remove the dependency. Instead, you should either directly remove the package from your package.json file or run a command to uninstall it. If you want to ensure the package is removed, you can run:

Suggested change
"node_modules/utile": {
npm uninstall utile

After uninstalling, make sure to review any other dependencies that might rely on utile and consider replacing them with safer alternatives.


This comment was generated by an experimental AI tool.

@@ -44899,6 +52152,146 @@
"node": ">=10"
}
},
"node_modules/mockery": {

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Codacy found a critical Security issue: Insecure dependency [email protected] (CVE-2022-37614: mockery is vulnerable to prototype pollution) (update to )

The issue reported by the Trivy linter indicates that the mockery package version 2.1.0 has a known vulnerability (CVE-2022-37614) related to prototype pollution. Prototype pollution is a security vulnerability where an attacker can manipulate an object's prototype, potentially leading to unexpected behavior or security breaches in an application.

To address this issue, the recommended action is to update the mockery package to a version that does not have this vulnerability. The latest version of the package should ideally be used, assuming it resolves the security issue.

Here's the code suggestion to fix the issue by updating the mockery dependency:

Suggested change
"node_modules/mockery": {
"node_modules/mockery": { "version": "2.1.1", ...

Make sure to check the latest version of mockery in the npm registry to ensure that it resolves the vulnerability before applying the change.


This comment was generated by an experimental AI tool.

"resolved": "https://registry.npmjs.org/@typescript-eslint/parser/-/parser-4.4.1.tgz",
"integrity": "sha512-S0fuX5lDku28Au9REYUsV+hdJpW/rNW0gWlc4SXzF/kdrRaAVX9YCxKpziH7djeWT/HFAjLZcnY7NJD8xTeUEg==",
"license": "BSD-2-Clause",
"node_modules/@teambit/legacy/node_modules/minimatch": {

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Codacy found a critical Security issue: Insecure dependency [email protected] (CVE-2022-3517: nodejs-minimatch: ReDoS via the braceExpand function) (update to 3.0.5)

The issue identified by the Trivy linter is a known security vulnerability in the minimatch package version 3.0.4. Specifically, this vulnerability (CVE-2022-3517) relates to a Regular Expression Denial of Service (ReDoS) issue that can be exploited through the braceExpand function. Attackers can craft specific input that takes an excessive amount of time to process, leading to potential denial of service.

To resolve this issue, you should update the minimatch dependency to a patched version (3.0.5 or higher) that addresses the vulnerability.

Here is the code suggestion for the update:

    "node_modules/@teambit/legacy/node_modules/minimatch": {
      "version": "3.0.5",

This change updates the version of minimatch from 3.0.4 to 3.0.5, which should mitigate the identified security risk.


This comment was generated by an experimental AI tool.

"object-assign": "^4.1.1"
}
},
"node_modules/@teambit/legacy/node_modules/semver": {

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Codacy found a critical Security issue: Insecure dependency [email protected] (CVE-2022-25883: nodejs-semver: Regular expression denial of service) (update to 7.5.2, 6.3.1, 5.7.2)

The issue identified by the Trivy linter is a known vulnerability in the semver package version 7.3.4, which is susceptible to a Regular Expression Denial of Service (ReDoS) attack (CVE-2022-25883). This vulnerability can allow an attacker to exploit certain regular expressions in the package, potentially leading to performance degradation or denial of service.

To resolve this issue, you should update the semver dependency to a version that is not affected by this vulnerability. The recommended versions are 7.5.2, 6.3.1, or 5.7.2.

Here's the single line change needed to fix the issue:

Suggested change
"node_modules/@teambit/legacy/node_modules/semver": {
"node_modules/@teambit/legacy/node_modules/semver": { "version": "7.5.2", ...

This change updates the semver version from 7.3.4 to 7.5.2, which is a secure version.


This comment was generated by an experimental AI tool.

"pjv": "bin/pjv"
}
},
"node_modules/package-json-validator/node_modules/minimist": {

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

⚠️ Codacy found a medium Security issue: Insecure dependency [email protected] (CVE-2020-7598: nodejs-minimist: prototype pollution allows adding or modifying properties of Object.prototype using a constructor or proto payload) (update to 0.2.1)

The issue identified by the Trivy linter relates to a security vulnerability in the minimist package, specifically version 0.0.10. This vulnerability, documented as CVE-2020-7598, allows for prototype pollution, which can enable an attacker to add or modify properties of Object.prototype. This could lead to unexpected behavior in the application, potentially allowing for further exploits.

To resolve this issue, you should update the minimist dependency to a safer version that does not have this vulnerability. According to the recommendation, you should update it to at least version 0.2.1.

Here's the single line change needed to fix this issue:

Suggested change
"node_modules/package-json-validator/node_modules/minimist": {
"node_modules/package-json-validator/node_modules/minimist": { "version": "0.2.1", ...

Make sure to also update any references or dependencies that rely on minimist to ensure compatibility with the new version.


This comment was generated by an experimental AI tool.

"integrity": "sha512-GpVkmM8vF2vQUkj2LvZmD35JxeJOLCwJ9cUkugyk2nuhbv3+mJvpLYYt+0+USMxE+oj+ey/lJEnhZw75x/OMcQ==",
"peer": true
},
"node_modules/moment": {

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Codacy found a critical Security issue: Insecure dependency [email protected] (CVE-2022-24785: Moment.js: Path traversal in moment.locale) (update to 2.29.2)

The security issue identified by Trivy relates to a vulnerability in the Moment.js library, specifically in version 2.29.1. The vulnerability (CVE-2022-24785) involves a path traversal issue in the moment.locale function, which could potentially allow an attacker to access sensitive files on the server or client. To mitigate this risk, it is recommended to update Moment.js to a secure version, specifically to 2.29.2 or later.

To address this vulnerability, you can modify the version of the Moment.js dependency in your package.json file to the recommended version. Here’s the suggested code change:

    "node_modules/moment": {
      "version": "2.29.2",
      "resolved": "https://registry.npmjs.org/moment/-/moment-2.29.2.tgz",
      "integrity": "sha512-<new-integrity-hash>",
      "peer": true,
      "engines": {
        "node": "*"
      }
    }

(Note: You will need to replace <new-integrity-hash> with the actual integrity hash for version 2.29.2, which can be found in the npm registry after updating the package.)

Alternatively, if you have a package.json file, you can simply run npm install [email protected] to update the dependency.


This comment was generated by an experimental AI tool.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
dependencies Pull requests that update a dependency file
Projects
None yet
Development

Successfully merging this pull request may close these issues.

0 participants