This run took 20 seconds.
$ date --- stdout --- Sun Oct 5 18:54:57 UTC 2025 --- end --- $ git clone file:///srv/git/wikibase-javascript-api.git repo --depth=1 -b master --- stderr --- Cloning into 'repo'... --- stdout --- --- end --- $ git config user.name libraryupgrader --- stdout --- --- end --- $ git config user.email tools.libraryupgrader@tools.wmflabs.org --- stdout --- --- end --- $ git submodule update --init --- stdout --- --- end --- $ grr init --- stdout --- Installed commit-msg hook. --- end --- $ git show-ref refs/heads/master --- stdout --- 5b1c24ce3a4a6ceec1b270b1bf72119d36582f62 refs/heads/master --- end --- $ /usr/bin/npm audit --json --- stdout --- { "auditReportVersion": 2, "vulnerabilities": { "form-data": { "name": "form-data", "severity": "critical", "isDirect": false, "via": [ { "source": 1106509, "name": "form-data", "dependency": "form-data", "title": "form-data uses unsafe random function in form-data for choosing boundary", "url": "https://github.com/advisories/GHSA-fjxv-7rqg-78g4", "severity": "critical", "cwe": [ "CWE-330" ], "cvss": { "score": 0, "vectorString": null }, "range": "<2.5.4" } ], "effects": [ "request" ], "range": "<2.5.4", "nodes": [ "node_modules/form-data" ], "fixAvailable": false }, "phantomjs-prebuilt": { "name": "phantomjs-prebuilt", "severity": "moderate", "isDirect": true, "via": [ "request" ], "effects": [], "range": "*", "nodes": [ "node_modules/phantomjs-prebuilt" ], "fixAvailable": false }, "request": { "name": "request", "severity": "critical", "isDirect": false, "via": [ { "source": 1096727, "name": "request", "dependency": "request", "title": "Server-Side Request Forgery in Request", "url": "https://github.com/advisories/GHSA-p8p7-x288-28g6", "severity": "moderate", "cwe": [ "CWE-918" ], "cvss": { "score": 6.1, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" }, "range": "<=2.88.2" }, "form-data", "tough-cookie" ], "effects": [ "phantomjs-prebuilt" ], "range": "*", "nodes": [ "node_modules/request" ], "fixAvailable": false }, "tar-fs": { "name": "tar-fs", "severity": "high", "isDirect": false, "via": [ { "source": 1108293, "name": "tar-fs", "dependency": "tar-fs", "title": "tar-fs has a symlink validation bypass if destination directory is predictable with a specific tarball", "url": "https://github.com/advisories/GHSA-vj76-c3g6-qr5v", "severity": "high", "cwe": [ "CWE-22", "CWE-61" ], "cvss": { "score": 0, "vectorString": null }, "range": ">=2.0.0 <2.1.4" } ], "effects": [], "range": "2.0.0 - 2.1.3", "nodes": [ "node_modules/tar-fs" ], "fixAvailable": true }, "tough-cookie": { "name": "tough-cookie", "severity": "moderate", "isDirect": false, "via": [ { "source": 1097682, "name": "tough-cookie", "dependency": "tough-cookie", "title": "tough-cookie Prototype Pollution vulnerability", "url": "https://github.com/advisories/GHSA-72xf-g2v4-qvf3", "severity": "moderate", "cwe": [ "CWE-1321" ], "cvss": { "score": 6.5, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" }, "range": "<4.1.3" } ], "effects": [ "request" ], "range": "<4.1.3", "nodes": [ "node_modules/tough-cookie" ], "fixAvailable": false } }, "metadata": { "vulnerabilities": { "info": 0, "low": 0, "moderate": 2, "high": 1, "critical": 2, "total": 5 }, "dependencies": { "prod": 3, "dev": 478, "optional": 6, "peer": 5, "peerOptional": 0, "total": 480 } } } --- end --- $ /usr/bin/npm audit --json --- stdout --- { "auditReportVersion": 2, "vulnerabilities": { "form-data": { "name": "form-data", "severity": "critical", "isDirect": false, "via": [ { "source": 1106509, "name": "form-data", "dependency": "form-data", "title": "form-data uses unsafe random function in form-data for choosing boundary", "url": "https://github.com/advisories/GHSA-fjxv-7rqg-78g4", "severity": "critical", "cwe": [ "CWE-330" ], "cvss": { "score": 0, "vectorString": null }, "range": "<2.5.4" } ], "effects": [ "request" ], "range": "<2.5.4", "nodes": [ "node_modules/form-data" ], "fixAvailable": false }, "phantomjs-prebuilt": { "name": "phantomjs-prebuilt", "severity": "moderate", "isDirect": true, "via": [ "request" ], "effects": [], "range": "*", "nodes": [ "node_modules/phantomjs-prebuilt" ], "fixAvailable": false }, "request": { "name": "request", "severity": "critical", "isDirect": false, "via": [ { "source": 1096727, "name": "request", "dependency": "request", "title": "Server-Side Request Forgery in Request", "url": "https://github.com/advisories/GHSA-p8p7-x288-28g6", "severity": "moderate", "cwe": [ "CWE-918" ], "cvss": { "score": 6.1, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" }, "range": "<=2.88.2" }, "form-data", "tough-cookie" ], "effects": [ "phantomjs-prebuilt" ], "range": "*", "nodes": [ "node_modules/request" ], "fixAvailable": false }, "tar-fs": { "name": "tar-fs", "severity": "high", "isDirect": false, "via": [ { "source": 1108293, "name": "tar-fs", "dependency": "tar-fs", "title": "tar-fs has a symlink validation bypass if destination directory is predictable with a specific tarball", "url": "https://github.com/advisories/GHSA-vj76-c3g6-qr5v", "severity": "high", "cwe": [ "CWE-22", "CWE-61" ], "cvss": { "score": 0, "vectorString": null }, "range": ">=2.0.0 <2.1.4" } ], "effects": [], "range": "2.0.0 - 2.1.3", "nodes": [ "node_modules/tar-fs" ], "fixAvailable": true }, "tough-cookie": { "name": "tough-cookie", "severity": "moderate", "isDirect": false, "via": [ { "source": 1097682, "name": "tough-cookie", "dependency": "tough-cookie", "title": "tough-cookie Prototype Pollution vulnerability", "url": "https://github.com/advisories/GHSA-72xf-g2v4-qvf3", "severity": "moderate", "cwe": [ "CWE-1321" ], "cvss": { "score": 6.5, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" }, "range": "<4.1.3" } ], "effects": [ "request" ], "range": "<4.1.3", "nodes": [ "node_modules/tough-cookie" ], "fixAvailable": false } }, "metadata": { "vulnerabilities": { "info": 0, "low": 0, "moderate": 2, "high": 1, "critical": 2, "total": 5 }, "dependencies": { "prod": 3, "dev": 478, "optional": 6, "peer": 5, "peerOptional": 0, "total": 480 } } } --- end --- Attempting to npm audit fix $ /usr/bin/npm audit fix --dry-run --only=dev --json --- stderr --- npm WARN invalid config only="dev" set in command line options npm WARN invalid config Must be one of: null, prod, production --- stdout --- { "added": 480, "removed": 0, "changed": 0, "audited": 481, "funding": 93, "audit": { "auditReportVersion": 2, "vulnerabilities": { "form-data": { "name": "form-data", "severity": "critical", "isDirect": false, "via": [ { "source": 1106509, "name": "form-data", "dependency": "form-data", "title": "form-data uses unsafe random function in form-data for choosing boundary", "url": "https://github.com/advisories/GHSA-fjxv-7rqg-78g4", "severity": "critical", "cwe": [ "CWE-330" ], "cvss": { "score": 0, "vectorString": null }, "range": "<2.5.4" } ], "effects": [ "request" ], "range": "<2.5.4", "nodes": [ "node_modules/form-data" ], "fixAvailable": false }, "phantomjs-prebuilt": { "name": "phantomjs-prebuilt", "severity": "moderate", "isDirect": true, "via": [ "request" ], "effects": [], "range": "*", "nodes": [ "node_modules/phantomjs-prebuilt" ], "fixAvailable": false }, "request": { "name": "request", "severity": "critical", "isDirect": false, "via": [ { "source": 1096727, "name": "request", "dependency": "request", "title": "Server-Side Request Forgery in Request", "url": "https://github.com/advisories/GHSA-p8p7-x288-28g6", "severity": "moderate", "cwe": [ "CWE-918" ], "cvss": { "score": 6.1, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" }, "range": "<=2.88.2" }, "form-data", "tough-cookie" ], "effects": [ "phantomjs-prebuilt" ], "range": "*", "nodes": [ "node_modules/request" ], "fixAvailable": false }, "tar-fs": { "name": "tar-fs", "severity": "high", "isDirect": false, "via": [ { "source": 1108293, "name": "tar-fs", "dependency": "tar-fs", "title": "tar-fs has a symlink validation bypass if destination directory is predictable with a specific tarball", "url": "https://github.com/advisories/GHSA-vj76-c3g6-qr5v", "severity": "high", "cwe": [ "CWE-22", "CWE-61" ], "cvss": { "score": 0, "vectorString": null }, "range": ">=2.0.0 <2.1.4" } ], "effects": [], "range": "2.0.0 - 2.1.3", "nodes": [ "" ], "fixAvailable": true }, "tough-cookie": { "name": "tough-cookie", "severity": "moderate", "isDirect": false, "via": [ { "source": 1097682, "name": "tough-cookie", "dependency": "tough-cookie", "title": "tough-cookie Prototype Pollution vulnerability", "url": "https://github.com/advisories/GHSA-72xf-g2v4-qvf3", "severity": "moderate", "cwe": [ "CWE-1321" ], "cvss": { "score": 6.5, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" }, "range": "<4.1.3" } ], "effects": [ "request" ], "range": "<4.1.3", "nodes": [ "node_modules/tough-cookie" ], "fixAvailable": false } }, "metadata": { "vulnerabilities": { "info": 0, "low": 0, "moderate": 2, "high": 1, "critical": 2, "total": 5 }, "dependencies": { "prod": 3, "dev": 478, "optional": 6, "peer": 5, "peerOptional": 0, "total": 480 } } } } --- end --- {"added": 480, "removed": 0, "changed": 0, "audited": 481, "funding": 93, "audit": {"auditReportVersion": 2, "vulnerabilities": {"form-data": {"name": "form-data", "severity": "critical", "isDirect": false, "via": [{"source": 1106509, "name": "form-data", "dependency": "form-data", "title": "form-data uses unsafe random function in form-data for choosing boundary", "url": "https://github.com/advisories/GHSA-fjxv-7rqg-78g4", "severity": "critical", "cwe": ["CWE-330"], "cvss": {"score": 0, "vectorString": null}, "range": "<2.5.4"}], "effects": ["request"], "range": "<2.5.4", "nodes": ["node_modules/form-data"], "fixAvailable": false}, "phantomjs-prebuilt": {"name": "phantomjs-prebuilt", "severity": "moderate", "isDirect": true, "via": ["request"], "effects": [], "range": "*", "nodes": ["node_modules/phantomjs-prebuilt"], "fixAvailable": false}, "request": {"name": "request", "severity": "critical", "isDirect": false, "via": [{"source": 1096727, "name": "request", "dependency": "request", "title": "Server-Side Request Forgery in Request", "url": "https://github.com/advisories/GHSA-p8p7-x288-28g6", "severity": "moderate", "cwe": ["CWE-918"], "cvss": {"score": 6.1, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}, "range": "<=2.88.2"}, "form-data", "tough-cookie"], "effects": ["phantomjs-prebuilt"], "range": "*", "nodes": ["node_modules/request"], "fixAvailable": false}, "tar-fs": {"name": "tar-fs", "severity": "high", "isDirect": false, "via": [{"source": 1108293, "name": "tar-fs", "dependency": "tar-fs", "title": "tar-fs has a symlink validation bypass if destination directory is predictable with a specific tarball", "url": "https://github.com/advisories/GHSA-vj76-c3g6-qr5v", "severity": "high", "cwe": ["CWE-22", "CWE-61"], "cvss": {"score": 0, "vectorString": null}, "range": ">=2.0.0 <2.1.4"}], "effects": [], "range": "2.0.0 - 2.1.3", "nodes": [""], "fixAvailable": true}, "tough-cookie": {"name": "tough-cookie", "severity": "moderate", "isDirect": false, "via": [{"source": 1097682, "name": "tough-cookie", "dependency": "tough-cookie", "title": "tough-cookie Prototype Pollution vulnerability", "url": "https://github.com/advisories/GHSA-72xf-g2v4-qvf3", "severity": "moderate", "cwe": ["CWE-1321"], "cvss": {"score": 6.5, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"}, "range": "<4.1.3"}], "effects": ["request"], "range": "<4.1.3", "nodes": ["node_modules/tough-cookie"], "fixAvailable": false}}, "metadata": {"vulnerabilities": {"info": 0, "low": 0, "moderate": 2, "high": 1, "critical": 2, "total": 5}, "dependencies": {"prod": 3, "dev": 478, "optional": 6, "peer": 5, "peerOptional": 0, "total": 480}}}} $ /usr/bin/npm audit fix --only=dev --- stderr --- npm WARN invalid config only="dev" set in command line options npm WARN invalid config Must be one of: null, prod, production npm WARN deprecated har-validator@5.1.5: this library is no longer supported npm WARN deprecated uuid@3.4.0: Please upgrade to version 7 or higher. Older versions may use Math.random() in certain circumstances, which is known to be problematic. See https://v8.dev/blog/math-random for details. npm WARN deprecated phantomjs-prebuilt@2.1.16: this package is now deprecated npm WARN deprecated request@2.88.2: request has been deprecated, see https://github.com/request/request/issues/3142 npm WARN deprecated puppeteer@5.5.0: Version no longer supported. Upgrade to @latest npm ERR! code 1 npm ERR! path /src/repo/node_modules/phantomjs-prebuilt npm ERR! command failed npm ERR! command sh -c node install.js npm ERR! PhantomJS not found on PATH npm ERR! Downloading https://github.com/Medium/phantomjs/releases/download/v2.1.1/phantomjs-2.1.1-linux-x86_64.tar.bz2 npm ERR! Saving to /tmp/phantomjs/phantomjs-2.1.1-linux-x86_64.tar.bz2 npm ERR! Receiving... npm ERR! npm ERR! Received 22866K total. npm ERR! Extracting tar contents (via spawned process) npm ERR! Error extracting archive npm ERR! Phantom installation failed Error: Command failed: tar jxf /tmp/phantomjs/phantomjs-2.1.1-linux-x86_64.tar.bz2 npm ERR! tar (child): bzip2: Cannot exec: No such file or directory npm ERR! tar (child): Error is not recoverable: exiting now npm ERR! tar: Child returned status 2 npm ERR! tar: Error is not recoverable: exiting now npm ERR! npm ERR! at genericNodeError (node:internal/errors:984:15) npm ERR! at wrappedFn (node:internal/errors:538:14) npm ERR! at ChildProcess.exithandler (node:child_process:422:12) npm ERR! at ChildProcess.emit (node:events:524:28) npm ERR! at maybeClose (node:internal/child_process:1104:16) npm ERR! at ChildProcess._handle.onexit (node:internal/child_process:304:5) { npm ERR! code: 2, npm ERR! killed: false, npm ERR! signal: null, npm ERR! cmd: 'tar jxf /tmp/phantomjs/phantomjs-2.1.1-linux-x86_64.tar.bz2' npm ERR! } Error: Command failed: tar jxf /tmp/phantomjs/phantomjs-2.1.1-linux-x86_64.tar.bz2 npm ERR! tar (child): bzip2: Cannot exec: No such file or directory npm ERR! tar (child): Error is not recoverable: exiting now npm ERR! tar: Child returned status 2 npm ERR! tar: Error is not recoverable: exiting now npm ERR! npm ERR! at genericNodeError (node:internal/errors:984:15) npm ERR! at wrappedFn (node:internal/errors:538:14) npm ERR! at ChildProcess.exithandler (node:child_process:422:12) npm ERR! at ChildProcess.emit (node:events:524:28) npm ERR! at maybeClose (node:internal/child_process:1104:16) npm ERR! at ChildProcess._handle.onexit (node:internal/child_process:304:5) npm ERR! A complete log of this run can be found in: npm ERR! /cache/_logs/2025-10-05T18_55_02_712Z-debug-0.log --- stdout --- --- end --- Verifying that tests still pass $ /usr/bin/npm ci --- stderr --- npm WARN deprecated har-validator@5.1.5: this library is no longer supported npm WARN deprecated uuid@3.4.0: Please upgrade to version 7 or higher. Older versions may use Math.random() in certain circumstances, which is known to be problematic. See https://v8.dev/blog/math-random for details. npm WARN deprecated phantomjs-prebuilt@2.1.16: this package is now deprecated npm WARN deprecated request@2.88.2: request has been deprecated, see https://github.com/request/request/issues/3142 npm WARN deprecated puppeteer@5.5.0: Version no longer supported. Upgrade to @latest npm ERR! code 1 npm ERR! path /src/repo/node_modules/phantomjs-prebuilt npm ERR! command failed npm ERR! command sh -c node install.js npm ERR! PhantomJS not found on PATH npm ERR! Download already available at /tmp/phantomjs/phantomjs-2.1.1-linux-x86_64.tar.bz2 npm ERR! Verified checksum of previously downloaded file npm ERR! Extracting tar contents (via spawned process) npm ERR! Error extracting archive npm ERR! Phantom installation failed Error: Command failed: tar jxf /tmp/phantomjs/phantomjs-2.1.1-linux-x86_64.tar.bz2 npm ERR! tar (child): bzip2: Cannot exec: No such file or directory npm ERR! tar (child): Error is not recoverable: exiting now npm ERR! tar: Child returned status 2 npm ERR! tar: Error is not recoverable: exiting now npm ERR! npm ERR! at genericNodeError (node:internal/errors:984:15) npm ERR! at wrappedFn (node:internal/errors:538:14) npm ERR! at ChildProcess.exithandler (node:child_process:422:12) npm ERR! at ChildProcess.emit (node:events:524:28) npm ERR! at maybeClose (node:internal/child_process:1104:16) npm ERR! at ChildProcess._handle.onexit (node:internal/child_process:304:5) { npm ERR! code: 2, npm ERR! killed: false, npm ERR! signal: null, npm ERR! cmd: 'tar jxf /tmp/phantomjs/phantomjs-2.1.1-linux-x86_64.tar.bz2' npm ERR! } Error: Command failed: tar jxf /tmp/phantomjs/phantomjs-2.1.1-linux-x86_64.tar.bz2 npm ERR! tar (child): bzip2: Cannot exec: No such file or directory npm ERR! tar (child): Error is not recoverable: exiting now npm ERR! tar: Child returned status 2 npm ERR! tar: Error is not recoverable: exiting now npm ERR! npm ERR! at genericNodeError (node:internal/errors:984:15) npm ERR! at wrappedFn (node:internal/errors:538:14) npm ERR! at ChildProcess.exithandler (node:child_process:422:12) npm ERR! at ChildProcess.emit (node:events:524:28) npm ERR! at maybeClose (node:internal/child_process:1104:16) npm ERR! at ChildProcess._handle.onexit (node:internal/child_process:304:5) npm ERR! A complete log of this run can be found in: npm ERR! /cache/_logs/2025-10-05T18_55_09_865Z-debug-0.log --- stdout --- --- end --- Traceback (most recent call last): File "/venv/lib/python3.13/site-packages/runner/__init__.py", line 2030, in main libup.run(args.repo, args.output, args.branch) ~~~~~~~~~^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/venv/lib/python3.13/site-packages/runner/__init__.py", line 1972, in run self.npm_audit_fix(new_npm_audit) ~~~~~~~~~~~~~~~~~~^^^^^^^^^^^^^^^ File "/venv/lib/python3.13/site-packages/runner/__init__.py", line 274, in npm_audit_fix self.npm_test() ~~~~~~~~~~~~~^^ File "/venv/lib/python3.13/site-packages/runner/__init__.py", line 321, in npm_test self.check_call(["npm", "ci"]) ~~~~~~~~~~~~~~~^^^^^^^^^^^^^^^ File "/venv/lib/python3.13/site-packages/runner/shell2.py", line 63, in check_call res.check_returncode() ~~~~~~~~~~~~~~~~~~~~^^ File "/usr/lib/python3.13/subprocess.py", line 508, in check_returncode raise CalledProcessError(self.returncode, self.args, self.stdout, self.stderr) subprocess.CalledProcessError: Command '['/usr/bin/npm', 'ci']' returned non-zero exit status 1.