-
Notifications
You must be signed in to change notification settings - Fork 1
chore(deps): update all non-major dependencies #7
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Open
renovate
wants to merge
1
commit into
main
Choose a base branch
from
renovate/all-minor-patch
base: main
Could not load branches
Branch not found: {{ refName }}
Loading
Could not load tags
Nothing to show
Loading
Are you sure you want to change the base?
Some commits from the old base branch may be removed from the timeline,
and old review comments may become outdated.
Conversation
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
5ebd878 to
463c632
Compare
463c632 to
f22c3a2
Compare
f22c3a2 to
bbe55b5
Compare
e6278b7 to
c35c0df
Compare
d0592f0 to
7fbf252
Compare
87e42ef to
91a9840
Compare
91a9840 to
a30b31f
Compare
a1cb84b to
764af7a
Compare
|
d823f02 to
903bf3d
Compare
903bf3d to
d8fc8fa
Compare
c5e9cbe to
1550181
Compare
9b8f0d5 to
3682fae
Compare
996e7b5 to
73a91ac
Compare
ee5b534 to
d8327e7
Compare
d8327e7 to
1768ff1
Compare
1768ff1 to
9350818
Compare
9350818 to
7348006
Compare
Detected SAST Vulnerabilities |
a885d6e to
6885345
Compare
6885345 to
5041eb0
Compare
5041eb0 to
3626a4c
Compare
3626a4c to
b392771
Compare
b392771 to
dfc8f24
Compare
adb1102 to
d371cdf
Compare
e0391a7 to
0893d9c
Compare
0893d9c to
56c30d1
Compare
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
4.0.0-alpha.2->4.12.21.0.0->1.0.18.10.101->8.10.15628.1.6->28.1.814.0.0->14.0.116.16.0->16.20.28.15.1->8.19.42.7.1->2.8.828.0.7->28.0.810.9.1->10.9.24.7.4->4.9.5Release Notes
apollographql/apollo-server (@apollo/server-integration-testsuite)
v4.12.2Compare Source
Patch Changes
#8070
0dee3c9Thanks @glasser! - Provide dual-build CJS and ESM for@apollo/server-integration-testsuite.We previously provided only a CJS build of this package, unlike
@apollo/serveritself and the other helper packages that come with it. We may make all of
Apollo Server ESM-only in AS5; this is a step in that direction. Specifically,
only providing this package for CJS makes it challenging to run the tests in
ts-jestin some ESM-only setups, because the copy of@apollo/serverfetcheddirectly in your ESM-based test may differ from the copy fetched indirectly via
@apollo/server-integration-testsuite, causing the "lockstep versioning" testto fail.
Updated dependencies:
v4.12.1Compare Source
Patch Changes
41f98d4]:v4.12.0Compare Source
Patch Changes
89e3f84,2550d9f]:v4.11.3Compare Source
Patch Changes
#8010
f4228e8Thanks @glasser! - Compatibility with Next.js Turbopack. Fixes #8004.Updated dependencies [
f4228e8,70eecce]:v4.11.2Compare Source
Patch Changes
#7879
b0fb33bThanks @renovate! - Update graphql-http dependency#7968
68977e2Thanks @glasser! - Upgrade supertest and superagent dependenciesUpdated dependencies []:
v4.11.1Compare Source
Patch Changes
#7952
bb81b2cThanks @glasser! - Upgrade dependencies so that automated scans don't detect a vulnerability.@apollo/serverdepends onexpresswhich depends oncookie. Versions ofexpressolder than v4.21.1 depend on a version ofcookievulnerable to CVE-2024-47764. Users of olderexpressversions who callres.cookie()orres.clearCookie()may be vulnerable to this issue.However, Apollo Server does not call this function directly, and it does not expose any object to user code that allows TypeScript users to call this function without an unsafe cast.
The only way that this direct dependency can cause a vulnerability for users of Apollo Server is if you call
startStandaloneServerwith a context function that calls Express-specific methods such asres.cookie()orres.clearCookies()on the response object, which is a violation of the TypeScript types provided bystartStandaloneServer(which only promise that the response object is a core Node.jshttp.ServerResponserather than the Express-specific subclass). So this vulnerability can only affect Apollo Server users who use unsafe JavaScript or unsafeastypecasts in TypeScript.However, this upgrade will at least prevent vulnerability scanners from alerting you to this dependency, and we encourage all Express users to upgrade their project's own
expressdependency to v4.21.1 or newer.Updated dependencies [
bb81b2c]:v4.11.0Compare Source
Patch Changes
4686454]:v4.10.5Compare Source
Patch Changes
#7821
b2e15e7Thanks @renovate! - Non-major dependency updates#7900
86d7111Thanks @trevor-scheer! - Inline a small dependency that was causing build issues for ESM projectsUpdated dependencies [
b2e15e7,86d7111]:v4.10.4Compare Source
Patch Changes
18a3827]:v4.10.3Compare Source
Patch Changes
5f335a5]:v4.10.2Compare Source
Patch Changes
c7e514c]:v4.10.1Compare Source
Patch Changes
72f568e]:v4.10.0Compare Source
Minor Changes
869ec98Thanks @ganemone! - Restore missing v1skipValidationoption asdangerouslyDisableValidation. Note that enabling this option exposes your server to potential security and unexpected runtime issues. Apollo will not support issues that arise as a result of using this option.Patch Changes
#7740
fe68c1bThanks @barnisanov! - Uninstalledbody-parserand usedexpressbuilt-inbody-parserfunctionality instead(mainly the json middleware)Updated dependencies [
869ec98,9bd7748,63dc50f,fe68c1b,e9a0d6e]:v4.9.5Compare Source
Patch Changes
#7717
681bdd0dcThanks @renovate! - Update graphql-http dependencyUpdated dependencies [
07585fe39,4fac1628c]:v4.9.4Compare Source
Patch Changes
ddce036e1]:v4.9.3Compare Source
Patch Changes
a1c725eaf]:v4.9.2Compare Source
Patch Changes
62e7d940d]:v4.9.1Compare Source
Patch Changes
ebfde0007]:v4.9.0Compare Source
Patch Changes
#7659
4784f46fbThanks @renovate! - Update graphql-http dependencyUpdated dependencies [
4ff81ca50,4784f46fb]:v4.8.1Compare Source
Patch Changes
#7636
42fc65cb2Thanks @trevor-scheer! - Update test suite for compatibility with Node v20Updated dependencies [
42fc65cb2]:v4.8.0Compare Source
Patch Changes
#7649
d33acdfddThanks @mastrzyz! - Add missingsupertestdependency#7632
64f8177abThanks @renovate! - Update graphql-http dependencyUpdated dependencies [
f8a8ea08f]:v4.7.5Compare Source
Patch Changes
4fadf3ddc]:v4.7.4Compare Source
Patch Changes
#7604
aeb511c7dThanks @renovate! - Updategraphql-httpdependency0adaf80d1Thanks @trevor-scheer! - Address Content Security Policy issuesThe previous implementation of CSP nonces within the landing pages did not take full advantage of the security benefit of using them. Nonces should only be used once per request, whereas Apollo Server was generating one nonce and reusing it for the lifetime of the instance. The reuse of nonces degrades the security benefit of using them but does not pose a security risk on its own. The CSP provides a defense-in-depth measure against a potential XSS, so in the absence of a known XSS vulnerability there is likely no risk to the user.
The mentioned fix also coincidentally addresses an issue with using crypto functions on startup within Cloudflare Workers. Crypto functions are now called during requests only, which resolves the error that Cloudflare Workers were facing. A recent change introduced a
precomputedNonceconfiguration option to mitigate this issue, but it was an incorrect approach given the nature of CSP nonces. This configuration option is now deprecated and should not be used for any reason since it suffers from the previously mentioned issue of reusing nonces.Additionally, this change adds other applicable CSPs for the scripts, styles, images, manifest, and iframes that the landing pages load.
A final consequence of this change is an extension of the
renderLandingPageplugin hook. This hook can now return an object with anhtmlproperty which returns aPromise<string>in addition to astring(which was the only option before).Updated dependencies [
0adaf80d1]:v4.7.3Compare Source
Patch Changes
75b668d9e]:v4.7.2Compare Source
Patch Changes
c3f04d050]:v4.7.1Compare Source
Patch Changes
5d3c45be9]:v4.7.0Compare Source
Patch Changes
#7509
5c20aa02eThanks @renovate! - Updategraphql-httpdependency#7475
b9ac2d6b2Thanks @renovate! - Update graphql-http dependencyUpdated dependencies [
22a5be934]:v4.6.0Compare Source
Patch Changes
#7454
f6e3ae021Thanks @trevor-scheer! - Start building packages with TS 5.x, which should have no effect for usersUpdated dependencies [
1e808146a,f6e3ae021,e0db95b96]:v4.5.0Compare Source
Patch Changes
7cc163ac8,8cbc61406,b694bb1dd]:v4.4.1Compare Source
Patch Changes
#7381
29038a4d3Thanks @renovate! - Update graphql-http dependencyUpdated dependencies [
021460e95]:v4.4.0Compare Source
Patch Changes
f2d433b4f]:v4.3.3Compare Source
Patch Changes
#7338
01bc39838Thanks @trevor-scheer! - Update graphql-http to 1.13.0Updated dependencies [
9de18b34c,8c635d104]:v4.3.2Compare Source
Patch Changes
#7316
37d884650Thanks @renovate! - Update graphql-http dependencyUpdated dependencies [
f246ddb71,e25cb58ff]:v4.3.1Compare Source
Patch Changes
#7285
35fa72bddThanks @glasser! - Adds an integration test verifying that Rover's introspection query works. This should not break any integration that passes other tests.#7276
15c912f4cThanks @renovate! - Update graphql-http dependencyUpdated dependencies [
ec28b4b33,322b5ebbc,3b0ec8529]:v4.3.0Compare Source
Patch Changes
#7228
f97e55304Thanks @dnalborczyk! - Improve compatibility with Cloudflare workers by avoiding the use of the Nodeurlpackage. This change is intended to be a no-op.Updated dependencies [
3a4823e0d,d057e2ffc,f97e55304,d7e9b9759,d7e9b9759]:v4.2.2Compare Source
Patch Changes
#7203
2042ee761Thanks @glasser! - Fix v4.2.0 (#7171) regression where"operationName": null,"variables": null, and"extensions": nullin POST bodies were improperly rejected.Updated dependencies [
2042ee761]:v4.2.1Compare Source
Patch Changes
#7187
3fd7b5f26Thanks @trevor-scheer! - Update@apollo/utils.keyvaluecachedependency to the latest patch which correctly specifies its version oflru-cache.Updated dependencies [
3fd7b5f26]:v4.2.0Compare Source
Minor Changes
#7171
37b3b7fb5Thanks @glasser! - If a POST body contains a non-stringoperationNameor a non-objectvariablesorextensions, fail with status code 400 instead of ignoring the field.In addition to being a reasonable idea, this provides more compliance with the "GraphQL over HTTP" spec.
This is a backwards incompatible change, but we are still early in the Apollo Server 4 adoption cycle and this is in line with the change already made in Apollo Server 4 to reject requests providing
variablesorextensionsas strings. If this causes major problems for users who have already upgraded to Apollo Server 4 in production, we can consider reverting or partially reverting this change.Patch Changes
#7170
4ce738193Thanks @trevor-scheer! - Update @apollo/utils packages to v2 (dropping node 12 support)#7179
c8129c23fThanks @renovate! - Fix a few tests to support (but not require) TypeScript 4.9.#7171
37b3b7fb5Thanks @glasser! - The integration test suite now incorporates thegraphql-httppackage's audit suite for the "GraphQL over HTTP" specification.#7183
46af8255cThanks @glasser! - Apollo Server tries to detect if execution errors are variable coercion errors in order to give them acodeextension ofBAD_USER_INPUTrather thanINTERNAL_SERVER_ERROR. Previously this would unconditionally set thecode; now, it only sets thecodeif nocodeis already set, so that (for example) custom scalarparseValuemethods can throw errors with specificcodes. (Note that a separate graphql-js bug can lead to these extensions being lost; see graphql/graphql-js#3785 for details.)Updated dependencies [
4ce738193,37b3b7fb5,b1548c1d6,7ff96f533,46af8255c]:v4.1.1Compare Source
Patch Changes
c835637be]:v4.1.0Compare Source
Minor Changes
2a2d1e3b4Thanks @glasser! - Thecache-controlHTTP response header set by the cache control plugin now properly reflects the cache policy of all operations in a batched HTTP request. (If you write thecache-controlresponse header via a different mechanism to a format that the plugin would not produce, the plugin no longer writes the header.) For more information, see advisory GHSA-8r69-3cvp-wxc3.2a2d1e3b4Thanks @glasser! - Plugins processing multiple operations in a batched HTTP request now have a sharedrequestContext.request.httpobject. Changes to HTTP response headers and HTTP status code made by plugins operating on one operation can be immediately seen by plugins operating on other operations in the same HTTP request.2a2d1e3b4Thanks @glasser! - New fieldGraphQLRequestContext.requestIsBatchedavailable to plugins.#7114
c1651bfacThanks @trevor-scheer! - Directly depend on Apollo Server rather than as a peerPatch Changes
2a2d1e3b4,2a2d1e3b4,2a2d1e3b4]:v4.0.5Compare Source
Patch Changes
15d8d65e0,e4e7738be,e4e7738be,15d8d65e0]:v4.0.4Compare Source
Patch Changes
#7080
540f3d97cThanks @martinnabhan! - Recognize malformed JSON error messages from Next.js.Updated dependencies []:
v4.0.3Compare Source
Patch Changes
#7073
e7f524eacThanks @glasser! - Never interpretGETrequests as batched. In previous versions of Apollo Server 4, aGETrequest whose body was a JSON array with N elements would be interpreted as a batch of the operation specified in the query string repeated N times. Now we just ignore the body forGETrequests (like in Apollo Server 3), and never treat them as batched.#7071
0ed389ce8Thanks @glasser! - Fix v4 regression: gateway implementations should be able to set HTTP response headers and the status code.Updated dependencies [
e7f524eac,0ed389ce8]:v4.0.2Compare Source
Patch Changes
#7035
b3f400063Thanks @barryhagan! - Errors resulting from an attempt to use introspection when it is not enabled now have an additionalvalidationErrorCode: 'INTROSPECTION_DISABLED'extension; this value is part of a new enumApolloServerValidationErrorCodeexported from@apollo/server/errors.#7066
f11d55a83Thanks @trevor-scheer! - Add a test to validate error message and code for invalid operation names via GET#7055
d0d8f4be7Thanks @trevor-scheer! - Fix build configuration issue and align on CJS correctlyUpdated dependencies [
b3f400063]:v4.0.1Compare Source
Patch Changes
#7049
3daee02c6Thanks @glasser! - Raise minimumenginesrequirement from Node.js v14.0.0 to v14.16.0. This is the minimum version of Node 14 supported by theenginesrequirement of[email protected].Updated dependencies [
3daee02c6,3daee02c6]:v4.0.0Compare Source
Initial release of
@apollo/server-integration-testsuite.v4.0.0-rc.18Compare Source
Patch Changes
#7001
63d568d13Thanks @glasser! - Test the behavior of didResolveOperation hooks throwing.Updated dependencies []:
v4.0.0-rc.17Compare Source
Patch Changes
233b44eea]:Configuration
📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).
🚦 Automerge: Enabled.
♻ Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.
👻 Immortal: This PR will be recreated if closed unmerged. Get config help if that's undesired.
This PR was generated by Mend Renovate. View the repository job log.