jquery-client (main)

sourcepatches
From e97e951b912e12e674f761a37a0155ae07dfe90a Mon Sep 17 00:00:00 2001
From: libraryupgrader <tools.libraryupgrader@tools.wmflabs.org>
Date: Wed, 15 Apr 2026 00:11:51 +0000
Subject: [PATCH] build: Updating follow-redirects to 1.16.0

* https://github.com/advisories/GHSA-r4q5-vmmm-2653

Change-Id: Icc2c6e7cd9837a7ddd6c124efe71c076f28f8cd9
---
 package-lock.json | 6 +++---
 1 file changed, 3 insertions(+), 3 deletions(-)

diff --git a/package-lock.json b/package-lock.json
index ce1adc9..52a9090 100644
--- a/package-lock.json
+++ b/package-lock.json
@@ -2595,9 +2595,9 @@
 			"dev": true
 		},
 		"node_modules/follow-redirects": {
-			"version": "1.15.9",
-			"resolved": "https://registry.npmjs.org/follow-redirects/-/follow-redirects-1.15.9.tgz",
-			"integrity": "sha512-gew4GsXizNgdoRyqmyfMHyAmXsZDk6mHkSxZFCzW9gwlbtOW44CDtYavM+y+72qD/Vq2l550kMF52DT8fOLJqQ==",
+			"version": "1.16.0",
+			"resolved": "https://registry.npmjs.org/follow-redirects/-/follow-redirects-1.16.0.tgz",
+			"integrity": "sha512-y5rN/uOsadFT/JfYwhxRS5R7Qce+g3zG97+JrtFZlC9klX/W5hD7iiLzScI4nZqUS7DNUdhPgw4xI8W2LuXlUw==",
 			"dev": true,
 			"funding": [
 				{
-- 
2.47.3

$ date
--- stdout ---
Wed Apr 15 00:11:27 UTC 2026

--- end ---
$ git clone file:///srv/git/jquery-client.git /src/repo --depth=1 -b master
--- stderr ---
Cloning into '/src/repo'...
--- stdout ---

--- end ---
$ git config user.name libraryupgrader
--- stdout ---

--- end ---
$ git config user.email tools.libraryupgrader@tools.wmflabs.org
--- stdout ---

--- end ---
$ git submodule update --init
--- stdout ---

--- end ---
$ grr init
--- stdout ---
Installed commit-msg hook.

--- end ---
$ git show-ref refs/heads/master
--- stdout ---
7980f853617fea394a73614bc1fe7dc6894c8e8e refs/heads/master

--- end ---
$ /usr/bin/npm audit --json
--- stdout ---
{
  "auditReportVersion": 2,
  "vulnerabilities": {
    "follow-redirects": {
      "name": "follow-redirects",
      "severity": "moderate",
      "isDirect": false,
      "via": [
        {
          "source": 1116560,
          "name": "follow-redirects",
          "dependency": "follow-redirects",
          "title": "follow-redirects leaks Custom Authentication Headers to Cross-Domain Redirect Targets",
          "url": "https://github.com/advisories/GHSA-r4q5-vmmm-2653",
          "severity": "moderate",
          "cwe": [
            "CWE-200"
          ],
          "cvss": {
            "score": 0,
            "vectorString": null
          },
          "range": "<=1.15.11"
        }
      ],
      "effects": [],
      "range": "<=1.15.11",
      "nodes": [
        "node_modules/follow-redirects"
      ],
      "fixAvailable": true
    }
  },
  "metadata": {
    "vulnerabilities": {
      "info": 0,
      "low": 0,
      "moderate": 1,
      "high": 0,
      "critical": 0,
      "total": 1
    },
    "dependencies": {
      "prod": 1,
      "dev": 446,
      "optional": 1,
      "peer": 1,
      "peerOptional": 0,
      "total": 446
    }
  }
}

--- end ---
$ /usr/bin/npm audit --json
--- stdout ---
{
  "auditReportVersion": 2,
  "vulnerabilities": {
    "follow-redirects": {
      "name": "follow-redirects",
      "severity": "moderate",
      "isDirect": false,
      "via": [
        {
          "source": 1116560,
          "name": "follow-redirects",
          "dependency": "follow-redirects",
          "title": "follow-redirects leaks Custom Authentication Headers to Cross-Domain Redirect Targets",
          "url": "https://github.com/advisories/GHSA-r4q5-vmmm-2653",
          "severity": "moderate",
          "cwe": [
            "CWE-200"
          ],
          "cvss": {
            "score": 0,
            "vectorString": null
          },
          "range": "<=1.15.11"
        }
      ],
      "effects": [],
      "range": "<=1.15.11",
      "nodes": [
        "node_modules/follow-redirects"
      ],
      "fixAvailable": true
    }
  },
  "metadata": {
    "vulnerabilities": {
      "info": 0,
      "low": 0,
      "moderate": 1,
      "high": 0,
      "critical": 0,
      "total": 1
    },
    "dependencies": {
      "prod": 1,
      "dev": 446,
      "optional": 1,
      "peer": 1,
      "peerOptional": 0,
      "total": 446
    }
  }
}

--- end ---
Attempting to npm audit fix
$ /usr/bin/npm audit fix --dry-run --only=dev --json
--- stderr ---
npm WARN invalid config only="dev" set in command line options
npm WARN invalid config Must be one of: null, prod, production
--- stdout ---
{
  "added": 446,
  "removed": 0,
  "changed": 0,
  "audited": 447,
  "funding": 95,
  "audit": {
    "auditReportVersion": 2,
    "vulnerabilities": {
      "follow-redirects": {
        "name": "follow-redirects",
        "severity": "moderate",
        "isDirect": false,
        "via": [
          {
            "source": 1116560,
            "name": "follow-redirects",
            "dependency": "follow-redirects",
            "title": "follow-redirects leaks Custom Authentication Headers to Cross-Domain Redirect Targets",
            "url": "https://github.com/advisories/GHSA-r4q5-vmmm-2653",
            "severity": "moderate",
            "cwe": [
              "CWE-200"
            ],
            "cvss": {
              "score": 0,
              "vectorString": null
            },
            "range": "<=1.15.11"
          }
        ],
        "effects": [],
        "range": "<=1.15.11",
        "nodes": [
          ""
        ],
        "fixAvailable": true
      }
    },
    "metadata": {
      "vulnerabilities": {
        "info": 0,
        "low": 0,
        "moderate": 1,
        "high": 0,
        "critical": 0,
        "total": 1
      },
      "dependencies": {
        "prod": 1,
        "dev": 446,
        "optional": 1,
        "peer": 1,
        "peerOptional": 0,
        "total": 446
      }
    }
  }
}

--- end ---
{"added": 446, "removed": 0, "changed": 0, "audited": 447, "funding": 95, "audit": {"auditReportVersion": 2, "vulnerabilities": {"follow-redirects": {"name": "follow-redirects", "severity": "moderate", "isDirect": false, "via": [{"source": 1116560, "name": "follow-redirects", "dependency": "follow-redirects", "title": "follow-redirects leaks Custom Authentication Headers to Cross-Domain Redirect Targets", "url": "https://github.com/advisories/GHSA-r4q5-vmmm-2653", "severity": "moderate", "cwe": ["CWE-200"], "cvss": {"score": 0, "vectorString": null}, "range": "<=1.15.11"}], "effects": [], "range": "<=1.15.11", "nodes": [""], "fixAvailable": true}}, "metadata": {"vulnerabilities": {"info": 0, "low": 0, "moderate": 1, "high": 0, "critical": 0, "total": 1}, "dependencies": {"prod": 1, "dev": 446, "optional": 1, "peer": 1, "peerOptional": 0, "total": 446}}}}
$ /usr/bin/npm audit fix --only=dev
--- stderr ---
npm WARN invalid config only="dev" set in command line options
npm WARN invalid config Must be one of: null, prod, production
npm WARN deprecated inflight@1.0.6: This module is not supported, and leaks memory. Do not use it. Check out lru-cache if you want a good and tested way to coalesce async requests by a key value, which is much more comprehensive and powerful.
npm WARN deprecated @humanwhocodes/config-array@0.13.0: Use @eslint/config-array instead
npm WARN deprecated rimraf@3.0.2: Rimraf versions prior to v4 are no longer supported
npm WARN deprecated glob@7.2.3: Glob versions prior to v9 are no longer supported
npm WARN deprecated @humanwhocodes/object-schema@2.0.3: Use @eslint/object-schema instead
npm WARN deprecated eslint@8.57.1: This version is no longer supported. Please see https://eslint.org/version-support for other options.
--- stdout ---

added 445 packages, and audited 446 packages in 5s

95 packages are looking for funding
  run `npm fund` for details

found 0 vulnerabilities

--- end ---
Verifying that tests still pass
$ /usr/bin/npm ci
--- stderr ---
npm WARN deprecated inflight@1.0.6: This module is not supported, and leaks memory. Do not use it. Check out lru-cache if you want a good and tested way to coalesce async requests by a key value, which is much more comprehensive and powerful.
npm WARN deprecated @humanwhocodes/config-array@0.13.0: Use @eslint/config-array instead
npm WARN deprecated rimraf@3.0.2: Rimraf versions prior to v4 are no longer supported
npm WARN deprecated glob@7.2.3: Glob versions prior to v9 are no longer supported
npm WARN deprecated @humanwhocodes/object-schema@2.0.3: Use @eslint/object-schema instead
npm WARN deprecated eslint@8.57.1: This version is no longer supported. Please see https://eslint.org/version-support for other options.
--- stdout ---

added 445 packages, and audited 446 packages in 5s

95 packages are looking for funding
  run `npm fund` for details

found 0 vulnerabilities

--- end ---
$ /usr/bin/npm test
--- stderr ---
[baseline-browser-mapping] The data in this module is over two months old.  To ensure accurate Baseline data, please update: `npm i baseline-browser-mapping@latest -D`
[baseline-browser-mapping] The data in this module is over two months old.  To ensure accurate Baseline data, please update: `npm i baseline-browser-mapping@latest -D`
--- stdout ---

> jquery-client@3.0.0 test
> npm run lint . && karma start && npm run doc


> jquery-client@3.0.0 lint
> eslint --cache --max-warnings 0 .

15 04 2026 00:11:47.768:INFO [karma-server]: Karma v6.4.3 server started at http://localhost:9876/
15 04 2026 00:11:47.769:INFO [launcher]: Launching browsers FirefoxHeadless with concurrency unlimited
15 04 2026 00:11:47.775:INFO [launcher]: Starting browser FirefoxHeadless
15 04 2026 00:11:50.285:INFO [Firefox 140.0 (Linux x86_64)]: Connected on socket xsVgST9hom45q2oDAAAB with id 76361143
................................................
Firefox 140.0 (Linux x86_64): Executed 48 of 48 SUCCESS (0.011 secs / 0.016 secs)

=============================== Coverage summary ===============================
Statements   : 95.91% ( 94/98 )
Branches     : 88.31% ( 68/77 )
Functions    : 100% ( 4/4 )
Lines        : 95.83% ( 92/96 )
================================================================================

> jquery-client@3.0.0 doc
> jsdoc -c jsdoc.json


--- end ---
{"1116560": {"source": 1116560, "name": "follow-redirects", "dependency": "follow-redirects", "title": "follow-redirects leaks Custom Authentication Headers to Cross-Domain Redirect Targets", "url": "https://github.com/advisories/GHSA-r4q5-vmmm-2653", "severity": "moderate", "cwe": ["CWE-200"], "cvss": {"score": 0, "vectorString": null}, "range": "<=1.15.11"}}
Upgrading n:follow-redirects from 1.15.9 -> 1.16.0
$ package-lock-lint /src/repo/package-lock.json
--- stdout ---
Checking /src/repo/package-lock.json

--- end ---
build: Updating follow-redirects to 1.16.0

* https://github.com/advisories/GHSA-r4q5-vmmm-2653

$ git add .
--- stdout ---

--- end ---
$ git commit -F /tmp/tmpe01qg1da
--- stdout ---
[master e97e951] build: Updating follow-redirects to 1.16.0
 1 file changed, 3 insertions(+), 3 deletions(-)

--- end ---
$ git format-patch HEAD~1 --stdout
--- stdout ---
From e97e951b912e12e674f761a37a0155ae07dfe90a Mon Sep 17 00:00:00 2001
From: libraryupgrader <tools.libraryupgrader@tools.wmflabs.org>
Date: Wed, 15 Apr 2026 00:11:51 +0000
Subject: [PATCH] build: Updating follow-redirects to 1.16.0

* https://github.com/advisories/GHSA-r4q5-vmmm-2653

Change-Id: Icc2c6e7cd9837a7ddd6c124efe71c076f28f8cd9
---
 package-lock.json | 6 +++---
 1 file changed, 3 insertions(+), 3 deletions(-)

diff --git a/package-lock.json b/package-lock.json
index ce1adc9..52a9090 100644
--- a/package-lock.json
+++ b/package-lock.json
@@ -2595,9 +2595,9 @@
 			"dev": true
 		},
 		"node_modules/follow-redirects": {
-			"version": "1.15.9",
-			"resolved": "https://registry.npmjs.org/follow-redirects/-/follow-redirects-1.15.9.tgz",
-			"integrity": "sha512-gew4GsXizNgdoRyqmyfMHyAmXsZDk6mHkSxZFCzW9gwlbtOW44CDtYavM+y+72qD/Vq2l550kMF52DT8fOLJqQ==",
+			"version": "1.16.0",
+			"resolved": "https://registry.npmjs.org/follow-redirects/-/follow-redirects-1.16.0.tgz",
+			"integrity": "sha512-y5rN/uOsadFT/JfYwhxRS5R7Qce+g3zG97+JrtFZlC9klX/W5hD7iiLzScI4nZqUS7DNUdhPgw4xI8W2LuXlUw==",
 			"dev": true,
 			"funding": [
 				{
-- 
2.47.3


--- end ---

npm dependencies

Development dependencies

Logs

Source code is licensed under the AGPL.