This run took 19 seconds.
$ date --- stdout --- Fri May 23 02:22:02 UTC 2025 --- end --- $ git clone file:///srv/git/mediawiki-services-cxserver.git repo --depth=1 -b master --- stderr --- Cloning into 'repo'... --- stdout --- --- end --- $ git config user.name libraryupgrader --- stdout --- --- end --- $ git config user.email tools.libraryupgrader@tools.wmflabs.org --- stdout --- --- end --- $ git submodule update --init --- stdout --- --- end --- $ grr init --- stdout --- Installed commit-msg hook. --- end --- $ git show-ref refs/heads/master --- stdout --- 7bd6cf223e8e1259b48a2463488d179dcddf8915 refs/heads/master --- end --- $ /usr/bin/npm audit --json --- stdout --- { "auditReportVersion": 2, "vulnerabilities": { "formidable": { "name": "formidable", "severity": "low", "isDirect": false, "via": [ { "source": 1104171, "name": "formidable", "dependency": "formidable", "title": "Formidable relies on hexoid to prevent guessing of filenames for untrusted executable content", "url": "https://github.com/advisories/GHSA-75v8-2h7p-7m2m", "severity": "low", "cwe": [ "CWE-338" ], "cvss": { "score": 3.1, "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" }, "range": ">=3.1.1-canary.20211030 <3.5.3" } ], "effects": [], "range": "3.1.1-canary.20211030 - 3.5.2", "nodes": [ "node_modules/formidable" ], "fixAvailable": true }, "tar-fs": { "name": "tar-fs", "severity": "high", "isDirect": false, "via": [ { "source": 1104677, "name": "tar-fs", "dependency": "tar-fs", "title": "tar-fs Vulnerable to Link Following and Path Traversal via Extracting a Crafted tar File", "url": "https://github.com/advisories/GHSA-pq67-2wwv-3xjx", "severity": "high", "cwe": [ "CWE-22" ], "cvss": { "score": 7.5, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" }, "range": ">=2.0.0 <2.1.2" } ], "effects": [], "range": "2.0.0 - 2.1.1", "nodes": [ "node_modules/tar-fs" ], "fixAvailable": true }, "undici": { "name": "undici", "severity": "low", "isDirect": true, "via": [ { "source": 1104500, "name": "undici", "dependency": "undici", "title": "undici Denial of Service attack via bad certificate data", "url": "https://github.com/advisories/GHSA-cxrh-j4jr-qwg3", "severity": "low", "cwe": [ "CWE-401" ], "cvss": { "score": 3.1, "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" }, "range": ">=6.0.0 <6.21.2" } ], "effects": [], "range": "6.0.0 - 6.21.1", "nodes": [ "node_modules/undici" ], "fixAvailable": true } }, "metadata": { "vulnerabilities": { "info": 0, "low": 2, "moderate": 0, "high": 1, "critical": 0, "total": 3 }, "dependencies": { "prod": 281, "dev": 528, "optional": 52, "peer": 1, "peerOptional": 0, "total": 860 } } } --- end --- Traceback (most recent call last): File "/venv/lib/python3.11/site-packages/runner-0.1.0-py3.11.egg/runner/__init__.py", line 2026, in main libup.run(args.repo, args.output, args.branch) File "/venv/lib/python3.11/site-packages/runner-0.1.0-py3.11.egg/runner/__init__.py", line 1961, in run plan = planner.check(repo) ^^^^^^^^^^^^^^^^^^^ File "/venv/lib/python3.11/site-packages/runner-0.1.0-py3.11.egg/runner/httpplan.py", line 38, in check resp.raise_for_status() File "/venv/lib/python3.11/site-packages/requests/models.py", line 1021, in raise_for_status raise HTTPError(http_error_msg, response=self) requests.exceptions.HTTPError: 502 Server Error: Bad Gateway for url: https://libup.wmcloud.org/plan.json?repository=mediawiki%2Fservices%2Fcxserver&branch=master