Skip to content

Commit

Permalink
Merge pull request #3298 from microsoft/octogonz/minimist-vulnerability
Browse files Browse the repository at this point in the history
[rush] Upgrade "tar" dependency to eliminate (spurious) security warning
  • Loading branch information
iclanton committed Apr 23, 2022
2 parents 46a8ff5 + 9d301ee commit 817658b
Show file tree
Hide file tree
Showing 7 changed files with 38 additions and 24 deletions.
Original file line number Diff line number Diff line change
@@ -0,0 +1,10 @@
{
"changes": [
{
"packageName": "@microsoft/rush",
"comment": "Upgrade \"tar\" dependency to eliminate spurious security vulnerability for \"minimist\" package",
"type": "none"
}
],
"packageName": "@microsoft/rush"
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,10 @@
{
"changes": [
{
"packageName": "@rushstack/eslint-patch",
"comment": "",
"type": "none"
}
],
"packageName": "@rushstack/eslint-patch"
}
24 changes: 6 additions & 18 deletions common/config/rush/pnpm-lock.yaml

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

2 changes: 1 addition & 1 deletion common/config/rush/repo-state.json
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
// DO NOT MODIFY THIS FILE MANUALLY BUT DO COMMIT IT. It is generated and used by Rush.
{
"pnpmShrinkwrapHash": "44e287c291a5be7f5288a83d7e7d1c5087f8e9d7",
"pnpmShrinkwrapHash": "b896155b14345a8cc8e4bee41c8f067227e1cfe4",
"preferredVersionsHash": "d2a5d015a5e5f4861bc36581c3c08cb789ed7fab"
}
2 changes: 1 addition & 1 deletion eslint/eslint-patch/src/usage.ts
Original file line number Diff line number Diff line change
Expand Up @@ -6,4 +6,4 @@ throw new Error(
' See README.md for usage instructions.'
);

export {};
export {};
4 changes: 2 additions & 2 deletions libraries/rush-lib/package.json
Original file line number Diff line number Diff line change
Expand Up @@ -52,7 +52,7 @@
"ssri": "~8.0.0",
"strict-uri-encode": "~2.0.0",
"tapable": "2.2.1",
"tar": "~5.0.10",
"tar": "~6.1.11",
"true-case-path": "~2.2.1"
},
"devDependencies": {
Expand All @@ -74,7 +74,7 @@
"@types/semver": "7.3.5",
"@types/ssri": "~7.1.0",
"@types/strict-uri-encode": "2.0.0",
"@types/tar": "4.0.3"
"@types/tar": "6.1.1"
},
"publishOnlyDependencies": {
"@rushstack/rush-amazon-s3-build-cache-plugin": "workspace:*",
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -103,7 +103,10 @@ export class AzureStorageAuthentication {
* @param onlyIfExistingCredentialExpiresAfter - If specified, and a cached credential exists that is still valid
* after the date specified, no action will be taken.
*/
public async updateCachedCredentialInteractiveAsync(terminal: ITerminal, onlyIfExistingCredentialExpiresAfter?: Date): Promise<void> {
public async updateCachedCredentialInteractiveAsync(
terminal: ITerminal,
onlyIfExistingCredentialExpiresAfter?: Date
): Promise<void> {
await CredentialCache.usingAsync(
{
supportEditing: true
Expand All @@ -113,7 +116,10 @@ export class AzureStorageAuthentication {
const existingCredentialExpiration: Date | undefined = credentialsCache.tryGetCacheEntry(
this._credentialCacheId
)?.expires;
if (existingCredentialExpiration && existingCredentialExpiration > onlyIfExistingCredentialExpiresAfter) {
if (
existingCredentialExpiration &&
existingCredentialExpiration > onlyIfExistingCredentialExpiresAfter
) {
return;
}
}
Expand Down

0 comments on commit 817658b

Please sign in to comment.