This run took 22 seconds.
$ date --- stdout --- Thu Oct 16 01:06:51 UTC 2025 --- end --- $ git clone file:///srv/git/mediawiki-extensions-CirrusSearch.git repo --depth=1 -b REL1_43 --- stderr --- Cloning into 'repo'... --- stdout --- --- end --- $ git config user.name libraryupgrader --- stdout --- --- end --- $ git config user.email tools.libraryupgrader@tools.wmflabs.org --- stdout --- --- end --- $ git submodule update --init --- stdout --- --- end --- $ grr init --- stdout --- Installed commit-msg hook. --- end --- $ git show-ref refs/heads/REL1_43 --- stdout --- 3a9608283e9b43d4056bac6441711c22afae86fb refs/heads/REL1_43 --- end --- $ /usr/bin/npm audit --json --- stdout --- { "auditReportVersion": 2, "vulnerabilities": { "@cucumber/cucumber": { "name": "@cucumber/cucumber", "severity": "high", "isDirect": false, "via": [ "semver" ], "effects": [ "@wdio/cucumber-framework" ], "range": "8.0.0-rc.1 - 9.2.0", "nodes": [ "node_modules/@cucumber/cucumber" ], "fixAvailable": { "name": "@wdio/cucumber-framework", "version": "9.20.0", "isSemVerMajor": true } }, "@wdio/cli": { "name": "@wdio/cli", "severity": "high", "isDirect": true, "via": [ "inquirer", "webdriverio", "yarn-install" ], "effects": [ "@wdio/cucumber-framework", "@wdio/junit-reporter", "@wdio/local-runner", "@wdio/spec-reporter" ], "range": "<=9.0.0-alpha.426", "nodes": [ "node_modules/@wdio/cli" ], "fixAvailable": { "name": "@wdio/cli", "version": "9.20.0", "isSemVerMajor": true } }, "@wdio/codemod": { "name": "@wdio/codemod", "severity": "moderate", "isDirect": true, "via": [ "jscodeshift" ], "effects": [], "range": "*", "nodes": [ "node_modules/@wdio/codemod" ], "fixAvailable": false }, "@wdio/cucumber-framework": { "name": "@wdio/cucumber-framework", "severity": "critical", "isDirect": true, "via": [ "@cucumber/cucumber", "@wdio/cli", "mockery" ], "effects": [], "range": "<=8.15.10", "nodes": [ "node_modules/@wdio/cucumber-framework" ], "fixAvailable": { "name": "@wdio/cucumber-framework", "version": "9.20.0", "isSemVerMajor": true } }, "@wdio/junit-reporter": { "name": "@wdio/junit-reporter", "severity": "high", "isDirect": true, "via": [ "@wdio/cli", "validator" ], "effects": [], "range": "<=8.1.2", "nodes": [ "node_modules/@wdio/junit-reporter" ], "fixAvailable": { "name": "@wdio/junit-reporter", "version": "9.20.0", "isSemVerMajor": true } }, "@wdio/local-runner": { "name": "@wdio/local-runner", "severity": "high", "isDirect": true, "via": [ "@wdio/cli", "@wdio/runner" ], "effects": [], "range": "6.0.4 - 8.46.0", "nodes": [ "node_modules/@wdio/local-runner" ], "fixAvailable": { "name": "@wdio/local-runner", "version": "9.20.0", "isSemVerMajor": true } }, "@wdio/runner": { "name": "@wdio/runner", "severity": "high", "isDirect": false, "via": [ "webdriverio" ], "effects": [ "@wdio/local-runner" ], "range": "7.16.5 - 8.46.0", "nodes": [ "node_modules/@wdio/runner" ], "fixAvailable": { "name": "@wdio/local-runner", "version": "9.20.0", "isSemVerMajor": true } }, "@wdio/spec-reporter": { "name": "@wdio/spec-reporter", "severity": "high", "isDirect": true, "via": [ "@wdio/cli" ], "effects": [], "range": "6.0.4 - 8.0.0-alpha.631", "nodes": [ "node_modules/@wdio/spec-reporter" ], "fixAvailable": { "name": "@wdio/spec-reporter", "version": "9.20.0", "isSemVerMajor": true } }, "braces": { "name": "braces", "severity": "high", "isDirect": false, "via": [ { "source": 1098094, "name": "braces", "dependency": "braces", "title": "Uncontrolled resource consumption in braces", "url": "https://github.com/advisories/GHSA-grv7-fg5c-xmjg", "severity": "high", "cwe": [ "CWE-400", "CWE-1050" ], "cvss": { "score": 7.5, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, "range": "<3.0.3" } ], "effects": [ "micromatch" ], "range": "<3.0.3", "nodes": [ "node_modules/jscodeshift/node_modules/braces" ], "fixAvailable": false }, "cross-spawn": { "name": "cross-spawn", "severity": "high", "isDirect": false, "via": [ { "source": 1104663, "name": "cross-spawn", "dependency": "cross-spawn", "title": "Regular Expression Denial of Service (ReDoS) in cross-spawn", "url": "https://github.com/advisories/GHSA-3xgq-45jj-v275", "severity": "high", "cwe": [ "CWE-1333" ], "cvss": { "score": 7.5, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, "range": "<6.0.6" } ], "effects": [ "yarn-install" ], "range": "<6.0.6", "nodes": [ "node_modules/cross-spawn" ], "fixAvailable": { "name": "@wdio/cli", "version": "9.20.0", "isSemVerMajor": true } }, "devtools": { "name": "devtools", "severity": "high", "isDirect": false, "via": [ "puppeteer-core" ], "effects": [], "range": ">=7.16.5", "nodes": [ "node_modules/devtools" ], "fixAvailable": true }, "external-editor": { "name": "external-editor", "severity": "low", "isDirect": false, "via": [ "tmp" ], "effects": [ "inquirer" ], "range": ">=1.1.1", "nodes": [ "node_modules/external-editor" ], "fixAvailable": { "name": "@wdio/cli", "version": "9.20.0", "isSemVerMajor": true } }, "form-data": { "name": "form-data", "severity": "critical", "isDirect": false, "via": [ { "source": 1106509, "name": "form-data", "dependency": "form-data", "title": "form-data uses unsafe random function in form-data for choosing boundary", "url": "https://github.com/advisories/GHSA-fjxv-7rqg-78g4", "severity": "critical", "cwe": [ "CWE-330" ], "cvss": { "score": 0, "vectorString": null }, "range": "<2.5.4" } ], "effects": [ "request" ], "range": "<2.5.4", "nodes": [ "node_modules/form-data" ], "fixAvailable": false }, "inquirer": { "name": "inquirer", "severity": "low", "isDirect": false, "via": [ "external-editor" ], "effects": [ "@wdio/cli" ], "range": "3.0.0 - 8.2.6 || 9.0.0 - 9.3.7", "nodes": [ "node_modules/inquirer" ], "fixAvailable": { "name": "@wdio/cli", "version": "9.20.0", "isSemVerMajor": true } }, "jscodeshift": { "name": "jscodeshift", "severity": "moderate", "isDirect": false, "via": [ "micromatch" ], "effects": [ "@wdio/codemod" ], "range": "0.3.20 - 0.13.1", "nodes": [ "node_modules/jscodeshift" ], "fixAvailable": false }, "micromatch": { "name": "micromatch", "severity": "high", "isDirect": false, "via": [ { "source": 1098681, "name": "micromatch", "dependency": "micromatch", "title": "Regular Expression Denial of Service (ReDoS) in micromatch", "url": "https://github.com/advisories/GHSA-952p-6rrq-rcjv", "severity": "moderate", "cwe": [ "CWE-1333" ], "cvss": { "score": 5.3, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, "range": "<4.0.8" }, "braces" ], "effects": [ "jscodeshift" ], "range": "<=4.0.7", "nodes": [ "node_modules/jscodeshift/node_modules/micromatch" ], "fixAvailable": false }, "mockery": { "name": "mockery", "severity": "critical", "isDirect": false, "via": [ { "source": 1092753, "name": "mockery", "dependency": "mockery", "title": "mockery is vulnerable to prototype pollution", "url": "https://github.com/advisories/GHSA-gmwp-3pwc-3j3g", "severity": "critical", "cwe": [ "CWE-1321" ], "cvss": { "score": 9.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, "range": "<=2.1.0" } ], "effects": [ "@wdio/cucumber-framework" ], "range": "*", "nodes": [ "node_modules/mockery" ], "fixAvailable": { "name": "@wdio/cucumber-framework", "version": "9.20.0", "isSemVerMajor": true } }, "mwbot": { "name": "mwbot", "severity": "moderate", "isDirect": true, "via": [ "request" ], "effects": [ "wdio-mediawiki" ], "range": ">=0.1.6", "nodes": [ "node_modules/mwbot", "node_modules/wdio-mediawiki/node_modules/mwbot" ], "fixAvailable": false }, "puppeteer-core": { "name": "puppeteer-core", "severity": "high", "isDirect": false, "via": [ "tar-fs", "ws" ], "effects": [ "devtools", "webdriverio" ], "range": "10.0.0 - 22.11.1", "nodes": [ "node_modules/devtools/node_modules/puppeteer-core", "node_modules/puppeteer-core" ], "fixAvailable": { "name": "@wdio/cli", "version": "9.20.0", "isSemVerMajor": true } }, "request": { "name": "request", "severity": "critical", "isDirect": true, "via": [ { "source": 1096727, "name": "request", "dependency": "request", "title": "Server-Side Request Forgery in Request", "url": "https://github.com/advisories/GHSA-p8p7-x288-28g6", "severity": "moderate", "cwe": [ "CWE-918" ], "cvss": { "score": 6.1, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" }, "range": "<=2.88.2" }, "form-data", "tough-cookie" ], "effects": [ "mwbot", "request-promise-core", "request-promise-native" ], "range": "*", "nodes": [ "node_modules/request" ], "fixAvailable": false }, "request-promise-core": { "name": "request-promise-core", "severity": "moderate", "isDirect": false, "via": [ "request" ], "effects": [ "request-promise-native" ], "range": "*", "nodes": [ "node_modules/request-promise-core" ], "fixAvailable": { "name": "request-promise-native", "version": "0.0.0", "isSemVerMajor": true } }, "request-promise-native": { "name": "request-promise-native", "severity": "moderate", "isDirect": true, "via": [ "request", "request-promise-core" ], "effects": [], "range": ">=1.0.0", "nodes": [ "node_modules/request-promise-native" ], "fixAvailable": { "name": "request-promise-native", "version": "0.0.0", "isSemVerMajor": true } }, "restify": { "name": "restify", "severity": "low", "isDirect": true, "via": [ "send" ], "effects": [], "range": ">=8.1.0", "nodes": [ "node_modules/restify" ], "fixAvailable": { "name": "restify", "version": "8.0.0", "isSemVerMajor": true } }, "semver": { "name": "semver", "severity": "high", "isDirect": false, "via": [ { "source": 1101088, "name": "semver", "dependency": "semver", "title": "semver vulnerable to Regular Expression Denial of Service", "url": "https://github.com/advisories/GHSA-c2qf-rxjj-qqgw", "severity": "high", "cwe": [ "CWE-1333" ], "cvss": { "score": 7.5, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, "range": ">=7.0.0 <7.5.2" } ], "effects": [ "@cucumber/cucumber" ], "range": "7.0.0 - 7.5.1", "nodes": [ "node_modules/@cucumber/cucumber/node_modules/semver" ], "fixAvailable": { "name": "@wdio/cucumber-framework", "version": "9.20.0", "isSemVerMajor": true } }, "send": { "name": "send", "severity": "low", "isDirect": false, "via": [ { "source": 1100526, "name": "send", "dependency": "send", "title": "send vulnerable to template injection that can lead to XSS", "url": "https://github.com/advisories/GHSA-m6fv-jmcg-4jfg", "severity": "low", "cwe": [ "CWE-79" ], "cvss": { "score": 5, "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" }, "range": "<0.19.0" } ], "effects": [ "restify" ], "range": "<0.19.0", "nodes": [ "node_modules/send" ], "fixAvailable": { "name": "restify", "version": "8.0.0", "isSemVerMajor": true } }, "tar-fs": { "name": "tar-fs", "severity": "high", "isDirect": false, "via": [ { "source": 1106930, "name": "tar-fs", "dependency": "tar-fs", "title": "tar-fs can extract outside the specified dir with a specific tarball", "url": "https://github.com/advisories/GHSA-8cj5-5rvv-wf4v", "severity": "high", "cwe": [ "CWE-22" ], "cvss": { "score": 0, "vectorString": null }, "range": ">=2.0.0 <2.1.3" }, { "source": 1108293, "name": "tar-fs", "dependency": "tar-fs", "title": "tar-fs has a symlink validation bypass if destination directory is predictable with a specific tarball", "url": "https://github.com/advisories/GHSA-vj76-c3g6-qr5v", "severity": "high", "cwe": [ "CWE-22", "CWE-61" ], "cvss": { "score": 0, "vectorString": null }, "range": ">=2.0.0 <2.1.4" }, { "source": 1108411, "name": "tar-fs", "dependency": "tar-fs", "title": "tar-fs Vulnerable to Link Following and Path Traversal via Extracting a Crafted tar File", "url": "https://github.com/advisories/GHSA-pq67-2wwv-3xjx", "severity": "high", "cwe": [ "CWE-22" ], "cvss": { "score": 7.5, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" }, "range": ">=2.0.0 <2.1.2" } ], "effects": [ "puppeteer-core" ], "range": "2.0.0 - 2.1.3", "nodes": [ "node_modules/tar-fs" ], "fixAvailable": { "name": "@wdio/cli", "version": "9.20.0", "isSemVerMajor": true } }, "tmp": { "name": "tmp", "severity": "low", "isDirect": false, "via": [ { "source": 1106849, "name": "tmp", "dependency": "tmp", "title": "tmp allows arbitrary temporary file / directory write via symbolic link `dir` parameter", "url": "https://github.com/advisories/GHSA-52f5-9888-hmc6", "severity": "low", "cwe": [ "CWE-59" ], "cvss": { "score": 2.5, "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" }, "range": "<=0.2.3" } ], "effects": [ "external-editor" ], "range": "<=0.2.3", "nodes": [ "node_modules/@cucumber/cucumber/node_modules/tmp", "node_modules/tmp" ], "fixAvailable": { "name": "@wdio/cli", "version": "9.20.0", "isSemVerMajor": true } }, "tough-cookie": { "name": "tough-cookie", "severity": "moderate", "isDirect": false, "via": [ { "source": 1097682, "name": "tough-cookie", "dependency": "tough-cookie", "title": "tough-cookie Prototype Pollution vulnerability", "url": "https://github.com/advisories/GHSA-72xf-g2v4-qvf3", "severity": "moderate", "cwe": [ "CWE-1321" ], "cvss": { "score": 6.5, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" }, "range": "<4.1.3" } ], "effects": [ "request" ], "range": "<4.1.3", "nodes": [ "node_modules/tough-cookie" ], "fixAvailable": false }, "validator": { "name": "validator", "severity": "moderate", "isDirect": false, "via": [ { "source": 1108959, "name": "validator", "dependency": "validator", "title": "validator.js has a URL validation bypass vulnerability in its isURL function", "url": "https://github.com/advisories/GHSA-9965-vmph-33xx", "severity": "moderate", "cwe": [ "CWE-79" ], "cvss": { "score": 6.1, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" }, "range": "<=13.15.15" } ], "effects": [ "@wdio/junit-reporter" ], "range": "*", "nodes": [ "node_modules/validator" ], "fixAvailable": { "name": "@wdio/junit-reporter", "version": "9.20.0", "isSemVerMajor": true } }, "wdio-mediawiki": { "name": "wdio-mediawiki", "severity": "moderate", "isDirect": true, "via": [ "mwbot" ], "effects": [], "range": "*", "nodes": [ "node_modules/wdio-mediawiki" ], "fixAvailable": false }, "webdriverio": { "name": "webdriverio", "severity": "high", "isDirect": false, "via": [ "devtools", "puppeteer-core" ], "effects": [ "@wdio/cli", "@wdio/runner" ], "range": "7.16.5 - 8.46.0", "nodes": [ "node_modules/webdriverio" ], "fixAvailable": { "name": "@wdio/cli", "version": "9.20.0", "isSemVerMajor": true } }, "ws": { "name": "ws", "severity": "high", "isDirect": false, "via": [ { "source": 1098392, "name": "ws", "dependency": "ws", "title": "ws affected by a DoS when handling a request with many HTTP headers", "url": "https://github.com/advisories/GHSA-3h5v-q93c-6h6q", "severity": "high", "cwe": [ "CWE-476" ], "cvss": { "score": 7.5, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, "range": ">=8.0.0 <8.17.1" } ], "effects": [ "puppeteer-core" ], "range": "8.0.0 - 8.17.0", "nodes": [ "node_modules/devtools/node_modules/ws", "node_modules/ws" ], "fixAvailable": { "name": "@wdio/cli", "version": "9.20.0", "isSemVerMajor": true } }, "yarn-install": { "name": "yarn-install", "severity": "high", "isDirect": false, "via": [ "cross-spawn" ], "effects": [ "@wdio/cli" ], "range": "*", "nodes": [ "node_modules/yarn-install" ], "fixAvailable": { "name": "@wdio/cli", "version": "9.20.0", "isSemVerMajor": true } } }, "metadata": { "vulnerabilities": { "info": 0, "low": 5, "moderate": 8, "high": 16, "critical": 4, "total": 33 }, "dependencies": { "prod": 1, "dev": 1288, "optional": 12, "peer": 87, "peerOptional": 0, "total": 1288 } } } --- end --- $ /usr/bin/composer install --- stderr --- No composer.lock file present. Updating dependencies to latest instead of installing from lock file. See https://getcomposer.org/install for more information. Loading composer repositories with package information Updating dependencies Lock file operations: 41 installs, 0 updates, 0 removals - Locking composer/pcre (dev-main efd6881) - Locking composer/semver (3.4.3) - Locking composer/spdx-licenses (1.5.9) - Locking composer/xdebug-handler (3.0.5) - Locking dealerdirect/phpcodesniffer-composer-installer (v1.1.2) - Locking doctrine/deprecations (1.1.x-dev 61f750b) - Locking felixfbecker/advanced-json-rpc (v3.2.1) - Locking justinrainbow/json-schema (5.x-dev feb2ca6) - Locking mediawiki/mediawiki-codesniffer (v45.0.0) - Locking mediawiki/mediawiki-phan-config (0.14.0) - Locking mediawiki/minus-x (1.1.3) - Locking mediawiki/phan-taint-check-plugin (6.0.0) - Locking microsoft/tolerant-php-parser (v0.1.2) - Locking netresearch/jsonmapper (v4.5.0) - Locking phan/phan (5.4.3) - Locking php-parallel-lint/php-console-color (v1.0.1) - Locking php-parallel-lint/php-console-highlighter (v1.0.0) - Locking php-parallel-lint/php-parallel-lint (v1.4.0) - Locking phpcsstandards/phpcsextra (1.2.1) - Locking phpcsstandards/phpcsutils (1.0.12) - Locking phpdocumentor/reflection-common (dev-master a0eeab5) - Locking phpdocumentor/reflection-docblock (5.x-dev 94f8051) - Locking phpdocumentor/type-resolver (1.x-dev b52239c) - Locking phpstan/phpdoc-parser (2.3.x-dev bd6f207) - Locking psr/container (dev-master 7079847) - Locking psr/log (dev-master f16e1d5) - Locking sabre/event (5.1.x-dev f71ef91) - Locking squizlabs/php_codesniffer (3.10.3) - Locking symfony/console (7.4.x-dev c3da862) - Locking symfony/deprecation-contracts (dev-main 63afe74) - Locking symfony/polyfill-ctype (1.x-dev a3cc8b0) - Locking symfony/polyfill-intl-grapheme (1.x-dev 3808721) - Locking symfony/polyfill-intl-normalizer (1.x-dev 3833d72) - Locking symfony/polyfill-mbstring (1.x-dev 6d857f4) - Locking symfony/polyfill-php80 (1.x-dev 0cc9dd0) - Locking symfony/service-contracts (dev-main 4511256) - Locking symfony/string (8.0.x-dev f929ecc) - Locking tysonandre/var_representation_polyfill (dev-main e9116c2) - Locking webmozart/assert (1.11.0) - Locking wikimedia/lucene-explain-parser (2.0.0) - Locking wikimedia/textcat (2.0.0) Writing lock file Installing dependencies from lock file (including require-dev) Package operations: 41 installs, 0 updates, 0 removals 0 [>---------------------------] 0 [->--------------------------] - Installing squizlabs/php_codesniffer (3.10.3): Extracting archive - Installing dealerdirect/phpcodesniffer-composer-installer (v1.1.2): Extracting archive - Installing composer/pcre (dev-main efd6881): Extracting archive - Installing justinrainbow/json-schema (5.x-dev feb2ca6): Extracting archive - Installing symfony/polyfill-php80 (1.x-dev 0cc9dd0): Extracting archive - Installing phpcsstandards/phpcsutils (1.0.12): Extracting archive - Installing phpcsstandards/phpcsextra (1.2.1): Extracting archive - Installing symfony/polyfill-mbstring (1.x-dev 6d857f4): Extracting archive - Installing composer/spdx-licenses (1.5.9): Extracting archive - Installing composer/semver (3.4.3): Extracting archive - Installing mediawiki/mediawiki-codesniffer (v45.0.0): Extracting archive - Installing tysonandre/var_representation_polyfill (dev-main e9116c2): Extracting archive - Installing symfony/polyfill-intl-normalizer (1.x-dev 3833d72): Extracting archive - Installing symfony/polyfill-intl-grapheme (1.x-dev 3808721): Extracting archive - Installing symfony/polyfill-ctype (1.x-dev a3cc8b0): Extracting archive - Installing symfony/string (8.0.x-dev f929ecc): Extracting archive - Installing symfony/deprecation-contracts (dev-main 63afe74): Extracting archive - Installing psr/container (dev-master 7079847): Extracting archive - Installing symfony/service-contracts (dev-main 4511256): Extracting archive - Installing symfony/console (7.4.x-dev c3da862): Extracting archive - Installing sabre/event (5.1.x-dev f71ef91): Extracting archive - Installing netresearch/jsonmapper (v4.5.0): Extracting archive - Installing microsoft/tolerant-php-parser (v0.1.2): Extracting archive - Installing webmozart/assert (1.11.0): Extracting archive - Installing phpstan/phpdoc-parser (2.3.x-dev bd6f207): Extracting archive - Installing phpdocumentor/reflection-common (dev-master a0eeab5): Extracting archive - Installing doctrine/deprecations (1.1.x-dev 61f750b): Extracting archive - Installing phpdocumentor/type-resolver (1.x-dev b52239c): Extracting archive - Installing phpdocumentor/reflection-docblock (5.x-dev 94f8051): Extracting archive - Installing felixfbecker/advanced-json-rpc (v3.2.1): Extracting archive - Installing psr/log (dev-master f16e1d5): Extracting archive - Installing composer/xdebug-handler (3.0.5): Extracting archive - Installing phan/phan (5.4.3): Extracting archive - Installing mediawiki/phan-taint-check-plugin (6.0.0): Extracting archive - Installing mediawiki/mediawiki-phan-config (0.14.0): Extracting archive - Installing mediawiki/minus-x (1.1.3): Extracting archive - Installing php-parallel-lint/php-console-color (v1.0.1): Extracting archive - Installing php-parallel-lint/php-console-highlighter (v1.0.0): Extracting archive - Installing php-parallel-lint/php-parallel-lint (v1.4.0): Extracting archive - Installing wikimedia/lucene-explain-parser (2.0.0): Extracting archive - Installing wikimedia/textcat (2.0.0): Extracting archive 0/39 [>---------------------------] 0% 28/39 [====================>-------] 71% 37/39 [==========================>-] 94% 39/39 [============================] 100% Generating autoload files 17 packages you are using are looking for funding. Use the `composer fund` command to find out more! --- stdout --- PHP CodeSniffer Config installed_paths set to ../../mediawiki/mediawiki-codesniffer,../../phpcsstandards/phpcsextra,../../phpcsstandards/phpcsutils --- end --- Traceback (most recent call last): File "/venv/lib/python3.13/site-packages/runner/__init__.py", line 2030, in main libup.run(args.repo, args.output, args.branch) ~~~~~~~~~^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/venv/lib/python3.13/site-packages/runner/__init__.py", line 1965, in run plan = planner.check(repo) File "/venv/lib/python3.13/site-packages/runner/httpplan.py", line 38, in check resp.raise_for_status() ~~~~~~~~~~~~~~~~~~~~~^^ File "/venv/lib/python3.13/site-packages/requests/models.py", line 1026, in raise_for_status raise HTTPError(http_error_msg, response=self) requests.exceptions.HTTPError: 500 Server Error: INTERNAL SERVER ERROR for url: https://libup.wmcloud.org/plan.json?repository=mediawiki%2Fextensions%2FCirrusSearch&branch=REL1_43