$ date
--- stdout ---
Thu Jul 3 20:29:00 UTC 2025
--- end ---
$ git clone file:///srv/git/mediawiki-services-mobileapps.git repo --depth=1 -b master
--- stderr ---
Cloning into 'repo'...
--- stdout ---
--- end ---
$ git config user.name libraryupgrader
--- stdout ---
--- end ---
$ git config user.email tools.libraryupgrader@tools.wmflabs.org
--- stdout ---
--- end ---
$ git submodule update --init
--- stdout ---
--- end ---
$ grr init
--- stdout ---
Installed commit-msg hook.
--- end ---
$ git show-ref refs/heads/master
--- stdout ---
539937b37a56f1649e88f702b36a790f2783b1a0 refs/heads/master
--- end ---
$ /usr/bin/npm audit --json
--- stdout ---
{
"auditReportVersion": 2,
"vulnerabilities": {
"0x": {
"name": "0x",
"severity": "high",
"isDirect": true,
"via": [
"d3-fg"
],
"effects": [],
"range": ">=4.1.5",
"nodes": [
"node_modules/0x"
],
"fixAvailable": {
"name": "0x",
"version": "4.1.4",
"isSemVerMajor": true
}
},
"cookie": {
"name": "cookie",
"severity": "low",
"isDirect": false,
"via": [
{
"source": 1103907,
"name": "cookie",
"dependency": "cookie",
"title": "cookie accepts cookie name, path, and domain with out of bounds characters",
"url": "https://github.com/advisories/GHSA-pxg6-pf52-xh8x",
"severity": "low",
"cwe": [
"CWE-74"
],
"cvss": {
"score": 0,
"vectorString": null
},
"range": "<0.7.0"
}
],
"effects": [
"mock-express-response"
],
"range": "<0.7.0",
"nodes": [
"node_modules/mock-express-response/node_modules/cookie"
],
"fixAvailable": false
},
"cross-spawn": {
"name": "cross-spawn",
"severity": "high",
"isDirect": false,
"via": [
{
"source": 1104663,
"name": "cross-spawn",
"dependency": "cross-spawn",
"title": "Regular Expression Denial of Service (ReDoS) in cross-spawn",
"url": "https://github.com/advisories/GHSA-3xgq-45jj-v275",
"severity": "high",
"cwe": [
"CWE-1333"
],
"cvss": {
"score": 7.5,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
},
"range": "<6.0.6"
}
],
"effects": [
"pre-commit"
],
"range": "<6.0.6",
"nodes": [
"node_modules/pre-commit/node_modules/cross-spawn"
],
"fixAvailable": {
"name": "pre-commit",
"version": "1.0.10",
"isSemVerMajor": true
}
},
"d3-color": {
"name": "d3-color",
"severity": "high",
"isDirect": false,
"via": [
{
"source": 1088594,
"name": "d3-color",
"dependency": "d3-color",
"title": "d3-color vulnerable to ReDoS",
"url": "https://github.com/advisories/GHSA-36jr-mh4h-2g58",
"severity": "high",
"cwe": [
"CWE-400"
],
"cvss": {
"score": 0,
"vectorString": null
},
"range": "<3.1.0"
}
],
"effects": [
"d3-interpolate",
"d3-transition"
],
"range": "<3.1.0",
"nodes": [
"node_modules/d3-color",
"node_modules/d3-transition/node_modules/d3-color",
"node_modules/d3-zoom/node_modules/d3-color"
],
"fixAvailable": {
"name": "0x",
"version": "4.1.4",
"isSemVerMajor": true
}
},
"d3-fg": {
"name": "d3-fg",
"severity": "high",
"isDirect": false,
"via": [
"d3-scale",
"d3-zoom"
],
"effects": [
"0x"
],
"range": ">=6.2.2",
"nodes": [
"node_modules/d3-fg"
],
"fixAvailable": {
"name": "0x",
"version": "4.1.4",
"isSemVerMajor": true
}
},
"d3-interpolate": {
"name": "d3-interpolate",
"severity": "high",
"isDirect": false,
"via": [
"d3-color"
],
"effects": [
"d3-scale",
"d3-transition",
"d3-zoom"
],
"range": "0.1.3 - 2.0.1",
"nodes": [
"node_modules/d3-interpolate",
"node_modules/d3-transition/node_modules/d3-interpolate",
"node_modules/d3-zoom/node_modules/d3-interpolate"
],
"fixAvailable": {
"name": "0x",
"version": "4.1.4",
"isSemVerMajor": true
}
},
"d3-scale": {
"name": "d3-scale",
"severity": "high",
"isDirect": false,
"via": [
"d3-interpolate"
],
"effects": [
"d3-fg"
],
"range": "0.1.5 - 3.3.0",
"nodes": [
"node_modules/d3-scale"
],
"fixAvailable": {
"name": "0x",
"version": "4.1.4",
"isSemVerMajor": true
}
},
"d3-transition": {
"name": "d3-transition",
"severity": "high",
"isDirect": false,
"via": [
"d3-color",
"d3-interpolate"
],
"effects": [],
"range": "0.0.7 - 2.0.0",
"nodes": [
"node_modules/d3-transition"
],
"fixAvailable": true
},
"d3-zoom": {
"name": "d3-zoom",
"severity": "high",
"isDirect": false,
"via": [
"d3-interpolate",
"d3-transition"
],
"effects": [],
"range": "0.0.2 - 2.0.0",
"nodes": [
"node_modules/d3-zoom"
],
"fixAvailable": true
},
"limitation": {
"name": "limitation",
"severity": "moderate",
"isDirect": false,
"via": [
"wikimedia-kad-fork"
],
"effects": [
"service-runner"
],
"range": ">=0.2.3",
"nodes": [
"node_modules/limitation"
],
"fixAvailable": {
"name": "service-runner",
"version": "3.0.0",
"isSemVerMajor": true
}
},
"mock-express-response": {
"name": "mock-express-response",
"severity": "low",
"isDirect": true,
"via": [
"cookie",
"send"
],
"effects": [],
"range": "*",
"nodes": [
"node_modules/mock-express-response"
],
"fixAvailable": false
},
"ms": {
"name": "ms",
"severity": "moderate",
"isDirect": false,
"via": [
{
"source": 1094419,
"name": "ms",
"dependency": "ms",
"title": "Vercel ms Inefficient Regular Expression Complexity vulnerability",
"url": "https://github.com/advisories/GHSA-w9mr-4mfr-499f",
"severity": "moderate",
"cwe": [
"CWE-1333"
],
"cvss": {
"score": 5.3,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
},
"range": "<2.0.0"
}
],
"effects": [
"wikimedia-kad-fork"
],
"range": "<2.0.0",
"nodes": [
"node_modules/wikimedia-kad-fork/node_modules/ms"
],
"fixAvailable": {
"name": "service-runner",
"version": "3.0.0",
"isSemVerMajor": true
}
},
"pre-commit": {
"name": "pre-commit",
"severity": "high",
"isDirect": true,
"via": [
"cross-spawn"
],
"effects": [],
"range": ">=1.1.0",
"nodes": [
"node_modules/pre-commit"
],
"fixAvailable": {
"name": "pre-commit",
"version": "1.0.10",
"isSemVerMajor": true
}
},
"preq": {
"name": "preq",
"severity": "high",
"isDirect": true,
"via": [
"request",
"requestretry"
],
"effects": [],
"range": "*",
"nodes": [
"node_modules/preq"
],
"fixAvailable": false
},
"request": {
"name": "request",
"severity": "moderate",
"isDirect": false,
"via": [
{
"source": 1096727,
"name": "request",
"dependency": "request",
"title": "Server-Side Request Forgery in Request",
"url": "https://github.com/advisories/GHSA-p8p7-x288-28g6",
"severity": "moderate",
"cwe": [
"CWE-918"
],
"cvss": {
"score": 6.1,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
},
"range": "<=2.88.2"
},
"tough-cookie"
],
"effects": [
"preq",
"requestretry"
],
"range": "*",
"nodes": [
"node_modules/request"
],
"fixAvailable": false
},
"requestretry": {
"name": "requestretry",
"severity": "high",
"isDirect": false,
"via": [
{
"source": 1090420,
"name": "requestretry",
"dependency": "requestretry",
"title": "Cookie exposure in requestretry",
"url": "https://github.com/advisories/GHSA-hjp8-2cm3-cc45",
"severity": "high",
"cwe": [
"CWE-200"
],
"cvss": {
"score": 7.5,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
},
"range": "<7.0.0"
},
"request"
],
"effects": [
"preq"
],
"range": "*",
"nodes": [
"node_modules/requestretry"
],
"fixAvailable": false
},
"send": {
"name": "send",
"severity": "low",
"isDirect": false,
"via": [
{
"source": 1100526,
"name": "send",
"dependency": "send",
"title": "send vulnerable to template injection that can lead to XSS",
"url": "https://github.com/advisories/GHSA-m6fv-jmcg-4jfg",
"severity": "low",
"cwe": [
"CWE-79"
],
"cvss": {
"score": 5,
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"
},
"range": "<0.19.0"
}
],
"effects": [],
"range": "<0.19.0",
"nodes": [
"node_modules/mock-express-response/node_modules/send"
],
"fixAvailable": true
},
"service-runner": {
"name": "service-runner",
"severity": "moderate",
"isDirect": true,
"via": [
"limitation"
],
"effects": [],
"range": ">=3.1.0",
"nodes": [
"node_modules/service-runner"
],
"fixAvailable": {
"name": "service-runner",
"version": "3.0.0",
"isSemVerMajor": true
}
},
"tough-cookie": {
"name": "tough-cookie",
"severity": "moderate",
"isDirect": false,
"via": [
{
"source": 1097682,
"name": "tough-cookie",
"dependency": "tough-cookie",
"title": "tough-cookie Prototype Pollution vulnerability",
"url": "https://github.com/advisories/GHSA-72xf-g2v4-qvf3",
"severity": "moderate",
"cwe": [
"CWE-1321"
],
"cvss": {
"score": 6.5,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"
},
"range": "<4.1.3"
}
],
"effects": [
"request"
],
"range": "<4.1.3",
"nodes": [
"node_modules/tough-cookie"
],
"fixAvailable": false
},
"wikimedia-kad-fork": {
"name": "wikimedia-kad-fork",
"severity": "moderate",
"isDirect": false,
"via": [
"ms"
],
"effects": [
"limitation"
],
"range": "*",
"nodes": [
"node_modules/wikimedia-kad-fork"
],
"fixAvailable": {
"name": "service-runner",
"version": "3.0.0",
"isSemVerMajor": true
}
}
},
"metadata": {
"vulnerabilities": {
"info": 0,
"low": 3,
"moderate": 6,
"high": 11,
"critical": 0,
"total": 20
},
"dependencies": {
"prod": 517,
"dev": 558,
"optional": 23,
"peer": 1,
"peerOptional": 0,
"total": 1087
}
}
}
--- end ---
$ /usr/bin/npm audit --json
--- stdout ---
{
"auditReportVersion": 2,
"vulnerabilities": {
"0x": {
"name": "0x",
"severity": "high",
"isDirect": true,
"via": [
"d3-fg"
],
"effects": [],
"range": ">=4.1.5",
"nodes": [
"node_modules/0x"
],
"fixAvailable": {
"name": "0x",
"version": "4.1.4",
"isSemVerMajor": true
}
},
"cookie": {
"name": "cookie",
"severity": "low",
"isDirect": false,
"via": [
{
"source": 1103907,
"name": "cookie",
"dependency": "cookie",
"title": "cookie accepts cookie name, path, and domain with out of bounds characters",
"url": "https://github.com/advisories/GHSA-pxg6-pf52-xh8x",
"severity": "low",
"cwe": [
"CWE-74"
],
"cvss": {
"score": 0,
"vectorString": null
},
"range": "<0.7.0"
}
],
"effects": [
"mock-express-response"
],
"range": "<0.7.0",
"nodes": [
"node_modules/mock-express-response/node_modules/cookie"
],
"fixAvailable": false
},
"cross-spawn": {
"name": "cross-spawn",
"severity": "high",
"isDirect": false,
"via": [
{
"source": 1104663,
"name": "cross-spawn",
"dependency": "cross-spawn",
"title": "Regular Expression Denial of Service (ReDoS) in cross-spawn",
"url": "https://github.com/advisories/GHSA-3xgq-45jj-v275",
"severity": "high",
"cwe": [
"CWE-1333"
],
"cvss": {
"score": 7.5,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
},
"range": "<6.0.6"
}
],
"effects": [
"pre-commit"
],
"range": "<6.0.6",
"nodes": [
"node_modules/pre-commit/node_modules/cross-spawn"
],
"fixAvailable": {
"name": "pre-commit",
"version": "1.0.10",
"isSemVerMajor": true
}
},
"d3-color": {
"name": "d3-color",
"severity": "high",
"isDirect": false,
"via": [
{
"source": 1088594,
"name": "d3-color",
"dependency": "d3-color",
"title": "d3-color vulnerable to ReDoS",
"url": "https://github.com/advisories/GHSA-36jr-mh4h-2g58",
"severity": "high",
"cwe": [
"CWE-400"
],
"cvss": {
"score": 0,
"vectorString": null
},
"range": "<3.1.0"
}
],
"effects": [
"d3-interpolate",
"d3-transition"
],
"range": "<3.1.0",
"nodes": [
"node_modules/d3-color",
"node_modules/d3-transition/node_modules/d3-color",
"node_modules/d3-zoom/node_modules/d3-color"
],
"fixAvailable": {
"name": "0x",
"version": "4.1.4",
"isSemVerMajor": true
}
},
"d3-fg": {
"name": "d3-fg",
"severity": "high",
"isDirect": false,
"via": [
"d3-scale",
"d3-zoom"
],
"effects": [
"0x"
],
"range": ">=6.2.2",
"nodes": [
"node_modules/d3-fg"
],
"fixAvailable": {
"name": "0x",
"version": "4.1.4",
"isSemVerMajor": true
}
},
"d3-interpolate": {
"name": "d3-interpolate",
"severity": "high",
"isDirect": false,
"via": [
"d3-color"
],
"effects": [
"d3-scale",
"d3-transition",
"d3-zoom"
],
"range": "0.1.3 - 2.0.1",
"nodes": [
"node_modules/d3-interpolate",
"node_modules/d3-transition/node_modules/d3-interpolate",
"node_modules/d3-zoom/node_modules/d3-interpolate"
],
"fixAvailable": {
"name": "0x",
"version": "4.1.4",
"isSemVerMajor": true
}
},
"d3-scale": {
"name": "d3-scale",
"severity": "high",
"isDirect": false,
"via": [
"d3-interpolate"
],
"effects": [],
"range": "0.1.5 - 3.3.0",
"nodes": [
"node_modules/d3-scale"
],
"fixAvailable": true
},
"d3-transition": {
"name": "d3-transition",
"severity": "high",
"isDirect": false,
"via": [
"d3-color",
"d3-interpolate"
],
"effects": [],
"range": "0.0.7 - 2.0.0",
"nodes": [
"node_modules/d3-transition"
],
"fixAvailable": true
},
"d3-zoom": {
"name": "d3-zoom",
"severity": "high",
"isDirect": false,
"via": [
"d3-interpolate",
"d3-transition"
],
"effects": [
"d3-fg"
],
"range": "0.0.2 - 2.0.0",
"nodes": [
"node_modules/d3-zoom"
],
"fixAvailable": {
"name": "0x",
"version": "4.1.4",
"isSemVerMajor": true
}
},
"limitation": {
"name": "limitation",
"severity": "moderate",
"isDirect": false,
"via": [
"wikimedia-kad-fork"
],
"effects": [
"service-runner"
],
"range": ">=0.2.3",
"nodes": [
"node_modules/limitation"
],
"fixAvailable": {
"name": "service-runner",
"version": "3.0.0",
"isSemVerMajor": true
}
},
"mock-express-response": {
"name": "mock-express-response",
"severity": "low",
"isDirect": true,
"via": [
"cookie",
"send"
],
"effects": [],
"range": "*",
"nodes": [
"node_modules/mock-express-response"
],
"fixAvailable": false
},
"ms": {
"name": "ms",
"severity": "moderate",
"isDirect": false,
"via": [
{
"source": 1094419,
"name": "ms",
"dependency": "ms",
"title": "Vercel ms Inefficient Regular Expression Complexity vulnerability",
"url": "https://github.com/advisories/GHSA-w9mr-4mfr-499f",
"severity": "moderate",
"cwe": [
"CWE-1333"
],
"cvss": {
"score": 5.3,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
},
"range": "<2.0.0"
}
],
"effects": [
"wikimedia-kad-fork"
],
"range": "<2.0.0",
"nodes": [
"node_modules/wikimedia-kad-fork/node_modules/ms"
],
"fixAvailable": {
"name": "service-runner",
"version": "3.0.0",
"isSemVerMajor": true
}
},
"pre-commit": {
"name": "pre-commit",
"severity": "high",
"isDirect": true,
"via": [
"cross-spawn"
],
"effects": [],
"range": ">=1.1.0",
"nodes": [
"node_modules/pre-commit"
],
"fixAvailable": {
"name": "pre-commit",
"version": "1.0.10",
"isSemVerMajor": true
}
},
"preq": {
"name": "preq",
"severity": "high",
"isDirect": true,
"via": [
"request",
"requestretry"
],
"effects": [],
"range": "*",
"nodes": [
"node_modules/preq"
],
"fixAvailable": false
},
"request": {
"name": "request",
"severity": "moderate",
"isDirect": false,
"via": [
{
"source": 1096727,
"name": "request",
"dependency": "request",
"title": "Server-Side Request Forgery in Request",
"url": "https://github.com/advisories/GHSA-p8p7-x288-28g6",
"severity": "moderate",
"cwe": [
"CWE-918"
],
"cvss": {
"score": 6.1,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
},
"range": "<=2.88.2"
},
"tough-cookie"
],
"effects": [
"preq",
"requestretry"
],
"range": "*",
"nodes": [
"node_modules/request"
],
"fixAvailable": false
},
"requestretry": {
"name": "requestretry",
"severity": "high",
"isDirect": false,
"via": [
{
"source": 1090420,
"name": "requestretry",
"dependency": "requestretry",
"title": "Cookie exposure in requestretry",
"url": "https://github.com/advisories/GHSA-hjp8-2cm3-cc45",
"severity": "high",
"cwe": [
"CWE-200"
],
"cvss": {
"score": 7.5,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
},
"range": "<7.0.0"
},
"request"
],
"effects": [
"preq"
],
"range": "*",
"nodes": [
"node_modules/requestretry"
],
"fixAvailable": false
},
"send": {
"name": "send",
"severity": "low",
"isDirect": false,
"via": [
{
"source": 1100526,
"name": "send",
"dependency": "send",
"title": "send vulnerable to template injection that can lead to XSS",
"url": "https://github.com/advisories/GHSA-m6fv-jmcg-4jfg",
"severity": "low",
"cwe": [
"CWE-79"
],
"cvss": {
"score": 5,
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"
},
"range": "<0.19.0"
}
],
"effects": [],
"range": "<0.19.0",
"nodes": [
"node_modules/mock-express-response/node_modules/send"
],
"fixAvailable": true
},
"service-runner": {
"name": "service-runner",
"severity": "moderate",
"isDirect": true,
"via": [
"limitation"
],
"effects": [],
"range": ">=3.1.0",
"nodes": [
"node_modules/service-runner"
],
"fixAvailable": {
"name": "service-runner",
"version": "3.0.0",
"isSemVerMajor": true
}
},
"tough-cookie": {
"name": "tough-cookie",
"severity": "moderate",
"isDirect": false,
"via": [
{
"source": 1097682,
"name": "tough-cookie",
"dependency": "tough-cookie",
"title": "tough-cookie Prototype Pollution vulnerability",
"url": "https://github.com/advisories/GHSA-72xf-g2v4-qvf3",
"severity": "moderate",
"cwe": [
"CWE-1321"
],
"cvss": {
"score": 6.5,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"
},
"range": "<4.1.3"
}
],
"effects": [
"request"
],
"range": "<4.1.3",
"nodes": [
"node_modules/tough-cookie"
],
"fixAvailable": false
},
"wikimedia-kad-fork": {
"name": "wikimedia-kad-fork",
"severity": "moderate",
"isDirect": false,
"via": [
"ms"
],
"effects": [
"limitation"
],
"range": "*",
"nodes": [
"node_modules/wikimedia-kad-fork"
],
"fixAvailable": {
"name": "service-runner",
"version": "3.0.0",
"isSemVerMajor": true
}
}
},
"metadata": {
"vulnerabilities": {
"info": 0,
"low": 3,
"moderate": 6,
"high": 11,
"critical": 0,
"total": 20
},
"dependencies": {
"prod": 517,
"dev": 558,
"optional": 23,
"peer": 1,
"peerOptional": 0,
"total": 1087
}
}
}
--- end ---
Attempting to npm audit fix
$ /usr/bin/npm audit fix --dry-run --only=dev --json
--- stderr ---
npm WARN invalid config only="dev" set in command line options
npm WARN invalid config Must be one of: null, prod, production
--- stdout ---
{
"added": 1087,
"removed": 0,
"changed": 0,
"audited": 1088,
"funding": 144,
"audit": {
"auditReportVersion": 2,
"vulnerabilities": {
"0x": {
"name": "0x",
"severity": "high",
"isDirect": true,
"via": [
"d3-fg"
],
"effects": [],
"range": ">=4.1.5",
"nodes": [
"node_modules/0x"
],
"fixAvailable": {
"name": "0x",
"version": "4.1.4",
"isSemVerMajor": true
}
},
"cookie": {
"name": "cookie",
"severity": "low",
"isDirect": false,
"via": [
{
"source": 1103907,
"name": "cookie",
"dependency": "cookie",
"title": "cookie accepts cookie name, path, and domain with out of bounds characters",
"url": "https://github.com/advisories/GHSA-pxg6-pf52-xh8x",
"severity": "low",
"cwe": [
"CWE-74"
],
"cvss": {
"score": 0,
"vectorString": null
},
"range": "<0.7.0"
}
],
"effects": [
"mock-express-response"
],
"range": "<0.7.0",
"nodes": [
"node_modules/mock-express-response/node_modules/cookie"
],
"fixAvailable": false
},
"cross-spawn": {
"name": "cross-spawn",
"severity": "high",
"isDirect": false,
"via": [
{
"source": 1104663,
"name": "cross-spawn",
"dependency": "cross-spawn",
"title": "Regular Expression Denial of Service (ReDoS) in cross-spawn",
"url": "https://github.com/advisories/GHSA-3xgq-45jj-v275",
"severity": "high",
"cwe": [
"CWE-1333"
],
"cvss": {
"score": 7.5,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
},
"range": "<6.0.6"
}
],
"effects": [
"pre-commit"
],
"range": "<6.0.6",
"nodes": [
"node_modules/pre-commit/node_modules/cross-spawn"
],
"fixAvailable": {
"name": "pre-commit",
"version": "1.0.10",
"isSemVerMajor": true
}
},
"d3-color": {
"name": "d3-color",
"severity": "high",
"isDirect": false,
"via": [
{
"source": 1088594,
"name": "d3-color",
"dependency": "d3-color",
"title": "d3-color vulnerable to ReDoS",
"url": "https://github.com/advisories/GHSA-36jr-mh4h-2g58",
"severity": "high",
"cwe": [
"CWE-400"
],
"cvss": {
"score": 0,
"vectorString": null
},
"range": "<3.1.0"
}
],
"effects": [
"d3-interpolate",
"d3-transition"
],
"range": "<3.1.0",
"nodes": [
"node_modules/d3-color",
"node_modules/d3-transition/node_modules/d3-color",
"node_modules/d3-zoom/node_modules/d3-color"
],
"fixAvailable": {
"name": "0x",
"version": "4.1.4",
"isSemVerMajor": true
}
},
"d3-fg": {
"name": "d3-fg",
"severity": "high",
"isDirect": false,
"via": [
"d3-scale",
"d3-zoom"
],
"effects": [
"0x"
],
"range": ">=6.2.2",
"nodes": [
"node_modules/d3-fg"
],
"fixAvailable": {
"name": "0x",
"version": "4.1.4",
"isSemVerMajor": true
}
},
"d3-interpolate": {
"name": "d3-interpolate",
"severity": "high",
"isDirect": false,
"via": [
"d3-color"
],
"effects": [
"d3-scale",
"d3-transition",
"d3-zoom"
],
"range": "0.1.3 - 2.0.1",
"nodes": [
"node_modules/d3-interpolate",
"node_modules/d3-transition/node_modules/d3-interpolate",
"node_modules/d3-zoom/node_modules/d3-interpolate"
],
"fixAvailable": {
"name": "0x",
"version": "4.1.4",
"isSemVerMajor": true
}
},
"d3-scale": {
"name": "d3-scale",
"severity": "high",
"isDirect": false,
"via": [
"d3-interpolate"
],
"effects": [],
"range": "0.1.5 - 3.3.0",
"nodes": [
"node_modules/d3-scale"
],
"fixAvailable": true
},
"d3-transition": {
"name": "d3-transition",
"severity": "high",
"isDirect": false,
"via": [
"d3-color",
"d3-interpolate"
],
"effects": [],
"range": "0.0.7 - 2.0.0",
"nodes": [
"node_modules/d3-transition"
],
"fixAvailable": true
},
"d3-zoom": {
"name": "d3-zoom",
"severity": "high",
"isDirect": false,
"via": [
"d3-interpolate",
"d3-transition"
],
"effects": [
"d3-fg"
],
"range": "0.0.2 - 2.0.0",
"nodes": [
"node_modules/d3-zoom"
],
"fixAvailable": {
"name": "0x",
"version": "4.1.4",
"isSemVerMajor": true
}
},
"limitation": {
"name": "limitation",
"severity": "moderate",
"isDirect": false,
"via": [
"wikimedia-kad-fork"
],
"effects": [
"service-runner"
],
"range": ">=0.2.3",
"nodes": [
"node_modules/limitation"
],
"fixAvailable": {
"name": "service-runner",
"version": "3.0.0",
"isSemVerMajor": true
}
},
"mock-express-response": {
"name": "mock-express-response",
"severity": "low",
"isDirect": true,
"via": [
"cookie",
"send"
],
"effects": [],
"range": "*",
"nodes": [
"node_modules/mock-express-response"
],
"fixAvailable": false
},
"ms": {
"name": "ms",
"severity": "moderate",
"isDirect": false,
"via": [
{
"source": 1094419,
"name": "ms",
"dependency": "ms",
"title": "Vercel ms Inefficient Regular Expression Complexity vulnerability",
"url": "https://github.com/advisories/GHSA-w9mr-4mfr-499f",
"severity": "moderate",
"cwe": [
"CWE-1333"
],
"cvss": {
"score": 5.3,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
},
"range": "<2.0.0"
}
],
"effects": [
"wikimedia-kad-fork"
],
"range": "<2.0.0",
"nodes": [
"node_modules/wikimedia-kad-fork/node_modules/ms"
],
"fixAvailable": {
"name": "service-runner",
"version": "3.0.0",
"isSemVerMajor": true
}
},
"pre-commit": {
"name": "pre-commit",
"severity": "high",
"isDirect": true,
"via": [
"cross-spawn"
],
"effects": [],
"range": ">=1.1.0",
"nodes": [
"node_modules/pre-commit"
],
"fixAvailable": {
"name": "pre-commit",
"version": "1.0.10",
"isSemVerMajor": true
}
},
"preq": {
"name": "preq",
"severity": "high",
"isDirect": true,
"via": [
"request",
"requestretry"
],
"effects": [],
"range": "*",
"nodes": [
"node_modules/preq"
],
"fixAvailable": false
},
"request": {
"name": "request",
"severity": "moderate",
"isDirect": false,
"via": [
{
"source": 1096727,
"name": "request",
"dependency": "request",
"title": "Server-Side Request Forgery in Request",
"url": "https://github.com/advisories/GHSA-p8p7-x288-28g6",
"severity": "moderate",
"cwe": [
"CWE-918"
],
"cvss": {
"score": 6.1,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
},
"range": "<=2.88.2"
},
"tough-cookie"
],
"effects": [
"preq",
"requestretry"
],
"range": "*",
"nodes": [
"node_modules/request"
],
"fixAvailable": false
},
"requestretry": {
"name": "requestretry",
"severity": "high",
"isDirect": false,
"via": [
{
"source": 1090420,
"name": "requestretry",
"dependency": "requestretry",
"title": "Cookie exposure in requestretry",
"url": "https://github.com/advisories/GHSA-hjp8-2cm3-cc45",
"severity": "high",
"cwe": [
"CWE-200"
],
"cvss": {
"score": 7.5,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
},
"range": "<7.0.0"
},
"request"
],
"effects": [
"preq"
],
"range": "*",
"nodes": [
"node_modules/requestretry"
],
"fixAvailable": false
},
"send": {
"name": "send",
"severity": "low",
"isDirect": false,
"via": [
{
"source": 1100526,
"name": "send",
"dependency": "send",
"title": "send vulnerable to template injection that can lead to XSS",
"url": "https://github.com/advisories/GHSA-m6fv-jmcg-4jfg",
"severity": "low",
"cwe": [
"CWE-79"
],
"cvss": {
"score": 5,
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"
},
"range": "<0.19.0"
}
],
"effects": [],
"range": "<0.19.0",
"nodes": [
"node_modules/mock-express-response/node_modules/send"
],
"fixAvailable": true
},
"service-runner": {
"name": "service-runner",
"severity": "moderate",
"isDirect": true,
"via": [
"limitation"
],
"effects": [],
"range": ">=3.1.0",
"nodes": [
"node_modules/service-runner"
],
"fixAvailable": {
"name": "service-runner",
"version": "3.0.0",
"isSemVerMajor": true
}
},
"tough-cookie": {
"name": "tough-cookie",
"severity": "moderate",
"isDirect": false,
"via": [
{
"source": 1097682,
"name": "tough-cookie",
"dependency": "tough-cookie",
"title": "tough-cookie Prototype Pollution vulnerability",
"url": "https://github.com/advisories/GHSA-72xf-g2v4-qvf3",
"severity": "moderate",
"cwe": [
"CWE-1321"
],
"cvss": {
"score": 6.5,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"
},
"range": "<4.1.3"
}
],
"effects": [
"request"
],
"range": "<4.1.3",
"nodes": [
"node_modules/tough-cookie"
],
"fixAvailable": false
},
"wikimedia-kad-fork": {
"name": "wikimedia-kad-fork",
"severity": "moderate",
"isDirect": false,
"via": [
"ms"
],
"effects": [
"limitation"
],
"range": "*",
"nodes": [
"node_modules/wikimedia-kad-fork"
],
"fixAvailable": {
"name": "service-runner",
"version": "3.0.0",
"isSemVerMajor": true
}
}
},
"metadata": {
"vulnerabilities": {
"info": 0,
"low": 3,
"moderate": 6,
"high": 11,
"critical": 0,
"total": 20
},
"dependencies": {
"prod": 517,
"dev": 558,
"optional": 23,
"peer": 1,
"peerOptional": 0,
"total": 1087
}
}
}
}
--- end ---
{"added": 1087, "removed": 0, "changed": 0, "audited": 1088, "funding": 144, "audit": {"auditReportVersion": 2, "vulnerabilities": {"0x": {"name": "0x", "severity": "high", "isDirect": true, "via": ["d3-fg"], "effects": [], "range": ">=4.1.5", "nodes": ["node_modules/0x"], "fixAvailable": {"name": "0x", "version": "4.1.4", "isSemVerMajor": true}}, "cookie": {"name": "cookie", "severity": "low", "isDirect": false, "via": [{"source": 1103907, "name": "cookie", "dependency": "cookie", "title": "cookie accepts cookie name, path, and domain with out of bounds characters", "url": "https://github.com/advisories/GHSA-pxg6-pf52-xh8x", "severity": "low", "cwe": ["CWE-74"], "cvss": {"score": 0, "vectorString": null}, "range": "<0.7.0"}], "effects": ["mock-express-response"], "range": "<0.7.0", "nodes": ["node_modules/mock-express-response/node_modules/cookie"], "fixAvailable": false}, "cross-spawn": {"name": "cross-spawn", "severity": "high", "isDirect": false, "via": [{"source": 1104663, "name": "cross-spawn", "dependency": "cross-spawn", "title": "Regular Expression Denial of Service (ReDoS) in cross-spawn", "url": "https://github.com/advisories/GHSA-3xgq-45jj-v275", "severity": "high", "cwe": ["CWE-1333"], "cvss": {"score": 7.5, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}, "range": "<6.0.6"}], "effects": ["pre-commit"], "range": "<6.0.6", "nodes": ["node_modules/pre-commit/node_modules/cross-spawn"], "fixAvailable": {"name": "pre-commit", "version": "1.0.10", "isSemVerMajor": true}}, "d3-color": {"name": "d3-color", "severity": "high", "isDirect": false, "via": [{"source": 1088594, "name": "d3-color", "dependency": "d3-color", "title": "d3-color vulnerable to ReDoS", "url": "https://github.com/advisories/GHSA-36jr-mh4h-2g58", "severity": "high", "cwe": ["CWE-400"], "cvss": {"score": 0, "vectorString": null}, "range": "<3.1.0"}], "effects": ["d3-interpolate", "d3-transition"], "range": "<3.1.0", "nodes": ["node_modules/d3-color", "node_modules/d3-transition/node_modules/d3-color", "node_modules/d3-zoom/node_modules/d3-color"], "fixAvailable": {"name": "0x", "version": "4.1.4", "isSemVerMajor": true}}, "d3-fg": {"name": "d3-fg", "severity": "high", "isDirect": false, "via": ["d3-scale", "d3-zoom"], "effects": ["0x"], "range": ">=6.2.2", "nodes": ["node_modules/d3-fg"], "fixAvailable": {"name": "0x", "version": "4.1.4", "isSemVerMajor": true}}, "d3-interpolate": {"name": "d3-interpolate", "severity": "high", "isDirect": false, "via": ["d3-color"], "effects": ["d3-scale", "d3-transition", "d3-zoom"], "range": "0.1.3 - 2.0.1", "nodes": ["node_modules/d3-interpolate", "node_modules/d3-transition/node_modules/d3-interpolate", "node_modules/d3-zoom/node_modules/d3-interpolate"], "fixAvailable": {"name": "0x", "version": "4.1.4", "isSemVerMajor": true}}, "d3-scale": {"name": "d3-scale", "severity": "high", "isDirect": false, "via": ["d3-interpolate"], "effects": [], "range": "0.1.5 - 3.3.0", "nodes": ["node_modules/d3-scale"], "fixAvailable": true}, "d3-transition": {"name": "d3-transition", "severity": "high", "isDirect": false, "via": ["d3-color", "d3-interpolate"], "effects": [], "range": "0.0.7 - 2.0.0", "nodes": ["node_modules/d3-transition"], "fixAvailable": true}, "d3-zoom": {"name": "d3-zoom", "severity": "high", "isDirect": false, "via": ["d3-interpolate", "d3-transition"], "effects": ["d3-fg"], "range": "0.0.2 - 2.0.0", "nodes": ["node_modules/d3-zoom"], "fixAvailable": {"name": "0x", "version": "4.1.4", "isSemVerMajor": true}}, "limitation": {"name": "limitation", "severity": "moderate", "isDirect": false, "via": ["wikimedia-kad-fork"], "effects": ["service-runner"], "range": ">=0.2.3", "nodes": ["node_modules/limitation"], "fixAvailable": {"name": "service-runner", "version": "3.0.0", "isSemVerMajor": true}}, "mock-express-response": {"name": "mock-express-response", "severity": "low", "isDirect": true, "via": ["cookie", "send"], "effects": [], "range": "*", "nodes": ["node_modules/mock-express-response"], "fixAvailable": false}, "ms": {"name": "ms", "severity": "moderate", "isDirect": false, "via": [{"source": 1094419, "name": "ms", "dependency": "ms", "title": "Vercel ms Inefficient Regular Expression Complexity vulnerability", "url": "https://github.com/advisories/GHSA-w9mr-4mfr-499f", "severity": "moderate", "cwe": ["CWE-1333"], "cvss": {"score": 5.3, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}, "range": "<2.0.0"}], "effects": ["wikimedia-kad-fork"], "range": "<2.0.0", "nodes": ["node_modules/wikimedia-kad-fork/node_modules/ms"], "fixAvailable": {"name": "service-runner", "version": "3.0.0", "isSemVerMajor": true}}, "pre-commit": {"name": "pre-commit", "severity": "high", "isDirect": true, "via": ["cross-spawn"], "effects": [], "range": ">=1.1.0", "nodes": ["node_modules/pre-commit"], "fixAvailable": {"name": "pre-commit", "version": "1.0.10", "isSemVerMajor": true}}, "preq": {"name": "preq", "severity": "high", "isDirect": true, "via": ["request", "requestretry"], "effects": [], "range": "*", "nodes": ["node_modules/preq"], "fixAvailable": false}, "request": {"name": "request", "severity": "moderate", "isDirect": false, "via": [{"source": 1096727, "name": "request", "dependency": "request", "title": "Server-Side Request Forgery in Request", "url": "https://github.com/advisories/GHSA-p8p7-x288-28g6", "severity": "moderate", "cwe": ["CWE-918"], "cvss": {"score": 6.1, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}, "range": "<=2.88.2"}, "tough-cookie"], "effects": ["preq", "requestretry"], "range": "*", "nodes": ["node_modules/request"], "fixAvailable": false}, "requestretry": {"name": "requestretry", "severity": "high", "isDirect": false, "via": [{"source": 1090420, "name": "requestretry", "dependency": "requestretry", "title": "Cookie exposure in requestretry", "url": "https://github.com/advisories/GHSA-hjp8-2cm3-cc45", "severity": "high", "cwe": ["CWE-200"], "cvss": {"score": 7.5, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}, "range": "<7.0.0"}, "request"], "effects": ["preq"], "range": "*", "nodes": ["node_modules/requestretry"], "fixAvailable": false}, "send": {"name": "send", "severity": "low", "isDirect": false, "via": [{"source": 1100526, "name": "send", "dependency": "send", "title": "send vulnerable to template injection that can lead to XSS", "url": "https://github.com/advisories/GHSA-m6fv-jmcg-4jfg", "severity": "low", "cwe": ["CWE-79"], "cvss": {"score": 5, "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}, "range": "<0.19.0"}], "effects": [], "range": "<0.19.0", "nodes": ["node_modules/mock-express-response/node_modules/send"], "fixAvailable": true}, "service-runner": {"name": "service-runner", "severity": "moderate", "isDirect": true, "via": ["limitation"], "effects": [], "range": ">=3.1.0", "nodes": ["node_modules/service-runner"], "fixAvailable": {"name": "service-runner", "version": "3.0.0", "isSemVerMajor": true}}, "tough-cookie": {"name": "tough-cookie", "severity": "moderate", "isDirect": false, "via": [{"source": 1097682, "name": "tough-cookie", "dependency": "tough-cookie", "title": "tough-cookie Prototype Pollution vulnerability", "url": "https://github.com/advisories/GHSA-72xf-g2v4-qvf3", "severity": "moderate", "cwe": ["CWE-1321"], "cvss": {"score": 6.5, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"}, "range": "<4.1.3"}], "effects": ["request"], "range": "<4.1.3", "nodes": ["node_modules/tough-cookie"], "fixAvailable": false}, "wikimedia-kad-fork": {"name": "wikimedia-kad-fork", "severity": "moderate", "isDirect": false, "via": ["ms"], "effects": ["limitation"], "range": "*", "nodes": ["node_modules/wikimedia-kad-fork"], "fixAvailable": {"name": "service-runner", "version": "3.0.0", "isSemVerMajor": true}}}, "metadata": {"vulnerabilities": {"info": 0, "low": 3, "moderate": 6, "high": 11, "critical": 0, "total": 20}, "dependencies": {"prod": 517, "dev": 558, "optional": 23, "peer": 1, "peerOptional": 0, "total": 1087}}}}
$ /usr/bin/npm audit fix --only=dev
--- stderr ---
npm WARN invalid config only="dev" set in command line options
npm WARN invalid config Must be one of: null, prod, production
npm WARN deprecated @types/long@5.0.0: This is a stub types definition. long provides its own type definitions, so you do not need this installed.
npm WARN deprecated inflight@1.0.6: This module is not supported, and leaks memory. Do not use it. Check out lru-cache if you want a good and tested way to coalesce async requests by a key value, which is much more comprehensive and powerful.
npm WARN deprecated kad-fs@0.0.4: This package is no longer maintained.
npm WARN deprecated rimraf@2.4.5: Rimraf versions prior to v4 are no longer supported
npm WARN deprecated har-validator@5.1.5: this library is no longer supported
npm WARN deprecated @humanwhocodes/config-array@0.11.14: Use @eslint/config-array instead
npm WARN deprecated rimraf@3.0.2: Rimraf versions prior to v4 are no longer supported
npm WARN deprecated kad-memstore@0.0.1: This package is no longer maintained.
npm WARN deprecated @humanwhocodes/object-schema@2.0.3: Use @eslint/object-schema instead
npm WARN deprecated glob@7.2.3: Glob versions prior to v9 are no longer supported
npm WARN deprecated glob@7.2.3: Glob versions prior to v9 are no longer supported
npm WARN deprecated glob@7.2.3: Glob versions prior to v9 are no longer supported
npm WARN deprecated glob@6.0.4: Glob versions prior to v9 are no longer supported
npm WARN deprecated glob@8.1.0: Glob versions prior to v9 are no longer supported
npm WARN deprecated glob@7.2.3: Glob versions prior to v9 are no longer supported
npm WARN deprecated sourcemap-codec@1.4.8: Please use @jridgewell/sourcemap-codec instead
npm WARN deprecated uuid@3.4.0: Please upgrade to version 7 or higher. Older versions may use Math.random() in certain circumstances, which is known to be problematic. See https://v8.dev/blog/math-random for details.
npm WARN deprecated uuid@3.4.0: Please upgrade to version 7 or higher. Older versions may use Math.random() in certain circumstances, which is known to be problematic. See https://v8.dev/blog/math-random for details.
npm WARN deprecated request@2.88.2: request has been deprecated, see https://github.com/request/request/issues/3142
--- stdout ---
added 1086 packages, and audited 1087 packages in 13s
144 packages are looking for funding
run `npm fund` for details
# npm audit report
cookie <0.7.0
cookie accepts cookie name, path, and domain with out of bounds characters - https://github.com/advisories/GHSA-pxg6-pf52-xh8x
No fix available
node_modules/mock-express-response/node_modules/cookie
mock-express-response *
Depends on vulnerable versions of cookie
Depends on vulnerable versions of send
node_modules/mock-express-response
cross-spawn <6.0.6
Severity: high
Regular Expression Denial of Service (ReDoS) in cross-spawn - https://github.com/advisories/GHSA-3xgq-45jj-v275
fix available via `npm audit fix --force`
Will install pre-commit@1.0.10, which is a breaking change
node_modules/pre-commit/node_modules/cross-spawn
pre-commit >=1.1.0
Depends on vulnerable versions of cross-spawn
node_modules/pre-commit
d3-color <3.1.0
Severity: high
d3-color vulnerable to ReDoS - https://github.com/advisories/GHSA-36jr-mh4h-2g58
fix available via `npm audit fix --force`
Will install 0x@4.1.4, which is a breaking change
node_modules/d3-color
node_modules/d3-transition/node_modules/d3-color
node_modules/d3-zoom/node_modules/d3-color
d3-interpolate 0.1.3 - 2.0.1
Depends on vulnerable versions of d3-color
node_modules/d3-interpolate
node_modules/d3-transition/node_modules/d3-interpolate
node_modules/d3-zoom/node_modules/d3-interpolate
d3-scale 0.1.5 - 3.3.0
Depends on vulnerable versions of d3-interpolate
node_modules/d3-scale
d3-fg >=6.2.2
Depends on vulnerable versions of d3-scale
Depends on vulnerable versions of d3-zoom
node_modules/d3-fg
0x >=4.1.5
Depends on vulnerable versions of d3-fg
node_modules/0x
d3-transition 0.0.7 - 2.0.0
Depends on vulnerable versions of d3-color
Depends on vulnerable versions of d3-interpolate
node_modules/d3-transition
d3-zoom 0.0.2 - 2.0.0
Depends on vulnerable versions of d3-interpolate
Depends on vulnerable versions of d3-transition
node_modules/d3-zoom
ms <2.0.0
Severity: moderate
Vercel ms Inefficient Regular Expression Complexity vulnerability - https://github.com/advisories/GHSA-w9mr-4mfr-499f
fix available via `npm audit fix --force`
Will install service-runner@3.0.0, which is a breaking change
node_modules/wikimedia-kad-fork/node_modules/ms
wikimedia-kad-fork *
Depends on vulnerable versions of ms
node_modules/wikimedia-kad-fork
limitation >=0.2.3
Depends on vulnerable versions of wikimedia-kad-fork
node_modules/limitation
service-runner >=3.1.0
Depends on vulnerable versions of limitation
node_modules/service-runner
request *
Severity: moderate
Server-Side Request Forgery in Request - https://github.com/advisories/GHSA-p8p7-x288-28g6
Depends on vulnerable versions of tough-cookie
No fix available
node_modules/request
preq *
Depends on vulnerable versions of request
Depends on vulnerable versions of requestretry
node_modules/preq
requestretry *
Depends on vulnerable versions of request
node_modules/requestretry
send <0.19.0
send vulnerable to template injection that can lead to XSS - https://github.com/advisories/GHSA-m6fv-jmcg-4jfg
fix available via `npm audit fix`
node_modules/mock-express-response/node_modules/send
tough-cookie <4.1.3
Severity: moderate
tough-cookie Prototype Pollution vulnerability - https://github.com/advisories/GHSA-72xf-g2v4-qvf3
No fix available
node_modules/tough-cookie
20 vulnerabilities (3 low, 6 moderate, 11 high)
To address issues that do not require attention, run:
npm audit fix
To address all issues possible (including breaking changes), run:
npm audit fix --force
Some issues need review, and may require choosing
a different dependency.
--- end ---
Verifying that tests still pass
$ /usr/bin/npm ci
--- stderr ---
npm WARN deprecated @types/long@5.0.0: This is a stub types definition. long provides its own type definitions, so you do not need this installed.
npm WARN deprecated inflight@1.0.6: This module is not supported, and leaks memory. Do not use it. Check out lru-cache if you want a good and tested way to coalesce async requests by a key value, which is much more comprehensive and powerful.
npm WARN deprecated kad-fs@0.0.4: This package is no longer maintained.
npm WARN deprecated rimraf@2.4.5: Rimraf versions prior to v4 are no longer supported
npm WARN deprecated har-validator@5.1.5: this library is no longer supported
npm WARN deprecated @humanwhocodes/config-array@0.11.14: Use @eslint/config-array instead
npm WARN deprecated rimraf@3.0.2: Rimraf versions prior to v4 are no longer supported
npm WARN deprecated kad-memstore@0.0.1: This package is no longer maintained.
npm WARN deprecated @humanwhocodes/object-schema@2.0.3: Use @eslint/object-schema instead
npm WARN deprecated glob@7.2.3: Glob versions prior to v9 are no longer supported
npm WARN deprecated glob@7.2.3: Glob versions prior to v9 are no longer supported
npm WARN deprecated glob@7.2.3: Glob versions prior to v9 are no longer supported
npm WARN deprecated glob@6.0.4: Glob versions prior to v9 are no longer supported
npm WARN deprecated glob@8.1.0: Glob versions prior to v9 are no longer supported
npm WARN deprecated glob@7.2.3: Glob versions prior to v9 are no longer supported
npm WARN deprecated sourcemap-codec@1.4.8: Please use @jridgewell/sourcemap-codec instead
npm WARN deprecated uuid@3.4.0: Please upgrade to version 7 or higher. Older versions may use Math.random() in certain circumstances, which is known to be problematic. See https://v8.dev/blog/math-random for details.
npm WARN deprecated uuid@3.4.0: Please upgrade to version 7 or higher. Older versions may use Math.random() in certain circumstances, which is known to be problematic. See https://v8.dev/blog/math-random for details.
npm WARN deprecated request@2.88.2: request has been deprecated, see https://github.com/request/request/issues/3142
--- stdout ---
added 1086 packages, and audited 1087 packages in 19s
144 packages are looking for funding
run `npm fund` for details
20 vulnerabilities (3 low, 6 moderate, 11 high)
To address issues that do not require attention, run:
npm audit fix
To address all issues possible (including breaking changes), run:
npm audit fix --force
Some issues need review, and may require choosing
a different dependency.
Run `npm audit` for details.
--- end ---
$ /usr/bin/npm test
--- stderr ---
(node:436) Warning: "version" is a reserved word.
Please do one of the following:
- Disable version with `yargs.version(false)` if using "version" as an option
- Use the built-in `yargs.version` method instead (if applicable)
- Use a different option key
https://yargs.js.org/docs/#api-reference-version
(Use `node --trace-warnings ...` to show where the warning was created)
--- stdout ---
> mobileapps@0.3.0 test
> PREQ_CONNECT_TIMEOUT=15 mocha 'test/{,!(diff)/**}/*.js' && npm run lint
express app
✔ should get robots.txt
✔ should set CORS headers
✔ should set CSP headers
✔ should set x-request-id in response headers
Swagger spec
✔ get the spec (71ms)
✔ spec validation
validate responses against schema
✔ summary response should conform to schema (11067ms)
✔ media-list response should conform to schema (660ms)
validate spec examples
Expected:
true
Result:
false
- Should validate tests
Expected:
200
Result:
undefined
Cache config
✔ should parse config and adapt ca value
Cached endpoints
✔ should call cache get for cached summary output
✔ should call cache set for non-cached summary page (546ms)
✔ should call cache get for cached mobile-html output
✔ should call cache set for non-cached mobile-html page (1157ms)
Caching events
✔ should generate resource change and purge events
Caching hooks
✔ should call hit hook on content hit
✔ should call update hook on content update (717ms)
Language variants - cache GET
✔ should call cache GET without language variants for language without variants
✔ should call cache GET without language variants for language without variants with bogus accept-language
✔ should call cache GET with language variants for language with variants
✔ should call cache GET with language variants for language with variants with valid accept-language
✔ should call cache GET with default language variants for language with variants with bogus accept-language
Language variants - cache DELETE
✔ should not call delete for language without variants
✔ should call delete for language with variants
✔ should call delete for language with variants with accept-language
✔ should call delete for language with variants with bogus accept-language
✔ should call delete for language with variants with valid prefix accept-language
Caching headers - vary
✔ should not add accept-language in vary header for domain without language variants (632ms)
1) should add accept-language in vary header for domain with language variants
Pregeneration request headers
✔ should return true for cache-control no-cache
✔ should return false for cache-control other than no-cache
definition
✔ missing definitions (60ms)
✔ non-term page (181ms)
✔ unsupported language (126ms)
✔ non-English term on English Wiktionary returns valid results (156ms)
✔ translingual term (1197ms)
✔ sets content-language header (102ms)
description
✔ delete local description (51ms)
GET
✔ missing description, enwiki (79ms)
✔ missing description, other wiki (80ms)
✔ ok description, enwiki (129ms)
✔ ok description, ru wiki (153ms)
PUT
✔ failed fetching token, central
✔ failed fetching token, local
✔ failed fetching page, local
✔ missing required parameter
✔ set central description: fail
✔ set central description
✔ set central description, variant
✔ set local description
DELETE
✔ failed fetching token, central
✔ failed fetching token, local
✔ failed fetching page, local
✔ delete description
service information
✔ should get the service name
✔ should get the service version
✔ should redirect to the service home page
✔ should get the service info
media
✔ Media-list resources should be the same on mobile-html (474ms)
mobile-html-offline-resources
✔ Response should be array with JS and CSS resources
mobile-html
✔ HTML should be sectioned (914ms)
✔ mobile-html headers not compatible with restbase output (185ms)
✔ mobile-html headers compatible with restbase output (199ms)
✔ mobile-html should have css links + viewport set (216ms)
✔ mobile-html should have lead paragraph moved up (8299ms)
✔ mobile-html should not have navboxes (684ms)
✔ mobile-html should have meta tags indicating page protection (294ms)
✔ mobile-html from parse should have meta tags indicating page protection (350ms)
✔ mobile-html should not enable edit talk page button by default (730ms)
transform/html/to/mobile-html
✔ simple html convertion should work properly (112ms)
✔ single html convertion should work properly (109ms)
✔ empty section with id=0 convertion should work properly (134ms)
transform/wikitext/to/mobile-html
✔ simple wikitext conversion should work properly (309ms)
✔ should transform wikitext to mobile-html, propagating output flags (348ms)
summary
✔ should respond with expected properties in payload (714ms)
✔ should respond with content-language header (445ms)
✔ empty summary should be sent for empty page (228ms)
✔ main page should return empty summary and type should be 'mainpage' (268ms)
✔ main page in non-mainspace should also return type: 'mainpage' (267ms)
✔ summary should come from first real content paragraph (2848ms)
✔ Empty extracts should be returned for a file page
✔ Empty extracts should be returned for a talk page
✔ Empty extracts should be returned for a redirected page
Expected:
"no-extract"
Result:
"standard"
✔ timestamp should refer to the requested revision, not the latest revision (2918ms)
✔ 404 for a page that doesn't exist (291ms)
- 404 for a page with invalid title
✔ Description from local wiki should be used (272ms)
✔ Summary URLs do not contain un-encoded special characters (T216739) (321ms)
✔ Stray leading citation and template are stripped before parsing intro (T225474) (1345ms)
✔ Non wikitext content model should have timestamp in summary (193ms)
lib:apiUtil
✔ checkForQueryPagesInResponse should return 504 when query.pages are absent
✔ batching works correctly
✔ order is preserved when Array.reduce is called on resolved BBPromise.all batches
✔ MW API request expanded from template includes Accept-Language header
✔ Checks header for explicit parsoid backend exists and its false
✔ Checks header for explicit parsoid backend exists and its true
✔ Checks header for explicit parsoid backend true (case insensitive)
✔ Checks header for explicit parsoid backend doesnt exist
lib:core-api-compat unit tests
✔ should create a HTTPTitleRedirectError
✔ redirect middleware should redirect if configured
✔ redirect middleware should not redirect if error not matching
✔ redirect middleware should not redirect if not reverse url defined
PCS configured to redirect
✔ mobile-html should redirect to the resolved page (121ms)
✔ mobile-html should redirect to the resolved page when using action=parse (4512ms)
✔ mobile-html-offline-resources should not redirect to the resolved page
PCS configured to redirect with absolute URLs
✔ mobile-html should redirect to the resolved page
PCS configured to not redirect
✔ mobile-html should not redirect and should parse the resolved response (667ms)
✔ should fixup missing content-language header (499ms)
Following redirects should stop after max redirects
✔ should raise a max redirects error (47ms)
✔ should follow 5 redirects
lib:dateUtil
✔ getRequestedDate(2016-04-15) should return a valid Date object
✔ iso8601DateFromYYYYMMDD
✔ addDays positive
✔ addDays zero
✔ addDays negative
✔ addDays immutable
✔ formatYYYYMMDD
✔ isWithinLast3Days
✔ date format validation should reject invalid formats
lib:definitions
Level 2 headers
✔ extracts them to language code keys
parts of speech
✔ is set
language
✔ is set on each entry
examples
parsed
formatted with MediaWiki markup (#:/#::)
✔ extracts usage examples
formatted with microformats
✔ extracts usage examples
unparsed/old format
formatted with MediaWiki markup (#:/#::)
✔ extracts usage examples
formatted with microformats
✔ extracts usage examples
lib:definitions:parseExamples
formatted with microformats
✔ extracts usage examples
formatted with plain MediaWiki markup
✔ extracts usage examples
lib:definitions:parseMicroformats
✔ parses a simple microformat
✔ filters specific formats
Local description template editing
✔ Simple param, only template
✔ Simple param, in the beginning
✔ Simple param, in the middle
✔ Named param
✔ Unnamed param, multiple params, unnamed
✔ Unnamed param, multiple params, named
✔ named param, multiple params, unnamed
✔ named param, multiple params, named
✔ Empty wikitext
✔ Respects lowercase
✔ no template
lib:domUtil
isRTL
✔ isRTL should return false for LTR doc (84ms)
✔ isRTL should return true for RTL doc
getBaseUri()
✔ returns URL without protocol
getHttpsBaseUri()
✔ returns URL with https protocol
getParsoidPlainTitle
✔ getParsoidPlainTitle should return normalized title
getParsoidLinkTitle
✔ getParsoidLinkTitle should return DB title
✔ getParsoidLinkTitle should percent-decode title
lib:media expected items are included or excluded
✔ items should be found for expected selectors
✔ items should not be found for other selectors
✔ false positives should be filtered
lib:media metadata is correctly parsed from HTML
✔ all expected captions are present
✔ all expected data-mw properties are present
✔ all expected derivative properties are present
✔ media file derivative with no codecs in type attribute is parsed correctly
✔ spoken Wikipedia file is correctly identified
- pronunciation audio file is correctly identified
✔ section is correctly identified
✔ titles are decoded after parsing from HTML
- pronunciation titles are decoded after parsing from HTML
✔ items without imageinfo properties (e.g., deleted items) are filtered
lib:media parse structured artist info
✔ all info is parsed from common HTML structure
✔ 'html' and 'name' fields are returned from plain text input
✔ only html returned for site other than Commons
✔ only html returned if additional text is present
✔ only html returned if non-namespace portion of the title !== html.textContent
✔ parses html with lang from metadata object
✔ parses html with lang (non-English) from metadata object
✔ undefined result if input is an empty string
lib:media:getCodecs
✔ codecs are parsed from type attributes without errors
lib:media:getStructuredSrcSet
✔ should return structured srcset values
✔ should return structured srcset and src values
✔ should return 1x if no scale is present in the srcset values
✔ should return empty array if srcset is empty
lib:metadata buildTableOfContents
✔ should have same form as MediaWiki parser-generated TOC
lib:metadata
✔ augmentCategories handles undefined categories
augmentLangLinks
✔ handles undefined langlinks
✔ bails out if an empty title is found
✔ bails out if an empty title is found (and nonempty title exists)
✔ creates augmented langlink if input is good
metadata:preprocessing
✔ strips comments
✔ strips span[typeof=mw:FallbackId]
✔ strips span:empty
lib:mobile-util
✔ mwApiTrue handles formatversions 1 and 2
✔ domainForLangCode swaps in lang code if domain has >2 levels
✔ createDocument should accept an empty string
✔ createDocument should not block the event loop (308ms)
setLanguageHeaders
✔ passes through headers (lower-case names in original)
✔ passes through headers (upper-case names in original)
✔ strips 'accept' from vary value with other values present
✔ strips 'Accept' from vary value with other values present
✔ strips vary header if set to 'Accept' only
✔ strips vary header if set to 'accept' only
lib:mobile/mobile-request-util
✔ getOutputMode should return defaults when provided nonsense string
✔ getOutputMode should return defaults when provided undefined
✔ getOutputMode should return defaults when provided null
✔ getOutputMode should return the requested item when it is the first member of the array
✔ getOutputMode should return the requested item when it is a non-first member of the array
lib:MobileHTML
✔ does not block the event loop (639ms)
✔ detects mwids
✔ detects https
✔ detects header tags
✔ detects single bracket spans
✔ detects infobox classes
✔ detects infobox exclusion classes
✔ detects new class
✔ detects images to exclude from widening class
✔ detects reference text
✔ detects forbidden element classes
✔ detects forbidden element class substrings
✔ detects forbidden div classes
✔ detects forbidden span classes
✔ detects forbidden element ids
✔ was worth it to write these regexes (235ms)
✔ truncates reference links properly
lib:mobileview-html
buildSection
✔ section 0
✔ section 1
✔ Chinese heading
rewriteWikiLinks
✔ single link
wrapImagesInSpanElements
✔ single image
lib:mwapi:getFlaggedOrLatestRevision
✔ Test de.wikipedia.org with flagged revision extension (74ms)
✔ Test pt.wikipedia.org without flagged revision extension
✔ Test ta.wikinews.org with flagged revision extension (109ms)
✔ Test pl.wikinews.org without flagged revision extension
✔ Test de.wikiquote.org with flagged revision extension (104ms)
✔ Test pl.wikiquote.org without flagged revision extension
✔ Test pl.wikisource.org with flagged revision extension (98ms)
✔ Test en.wikisource.org without flagged revision extension
✔ Test is.wiktionary.org with flagged revision extension (61ms)
✔ Test en.wiktionary.org without flagged revision extension
✔ Test en.wikibooks.org with flagged revision extension (69ms)
✔ Test de.wikibooks.org without flagged revision extension
✔ Test non-flagged article from test2.wikipedia.org (109ms)
✔ Test pending change article from test2.wikipedia.org (109ms)
lib:mwapi:getPrimaryEarthCoordinates
✔ gets primary earth coordinates (single coordinate input)
✔ gets primary earth coordinates (multiple coordinate input)
✔ secondary coordinates are ignored
✔ non-earth coordinates are ignored
lib:mwapi
✔ scaled thumb URL returned if initial URL is a thumb URL and original width > desired width
lib:mwapi buildLeadImageUrls
✔ 2000px thumb should be resized for all widths
✔ 555px thumb should return 320 and 555 for rest
✔ 750px thumb should return 320, 640, and 750 for rest
✔ 200px thumb should return 200px URL for all thumb sizes
✔ should ignore non-thumbnail URLs
✔ should ignore 'thumb' when not a path segment
✔ should create thumb URLs correctly if width regex pattern is in original filename
✔ should handle edge case thumb filename patterns
✔ should handle edge case thumb filename patterns with width regex in original name
lib:mwapi:queryForMetadata
✔ ensure that displaytitle is always requested (129ms)
lib:mwapi:simplifyProtectionObject
✔ simplifyProtectionObject should simplify
✔ simplifyProtectionObject should remove duplicates
✔ simplifyProtectionObject should keep non-duplicates
✔ simplifyProtectionObject should return empty object for empty list
lib:parsePronunciation
✔ has pronunciation file v1
✔ has pronunciation file v2
✔ no pronunciation file
lib:parseSpokenWikipedia
✔ one spoken file
✔ multiple spoken files
✔ no spoken files
lib:parsoid-access etag handling
correctly parses and handles etags
✔ gets strong etag with no quotes
✔ strips prefix from weak etags
✔ gets revision from etag
✔ gets revision and tid from etag
✔ getEtagFromHeaders handles undefined input
✔ getRevisionFromEtag handles undefined input
✔ getRevAndTidFromEtag handles undefined input
parses modified timestamp
✔ parses timestamp from domino Document
lib:parsoid-sections (section elements)
✔ getSectionsText(empty) should produce an empty lead section
✔ getSectionsText() with just text should produce a lead section
✔ getSectionsText() with one h2 should produce two sections
✔ getSectionsText() with one h2 and h3 should produce three sections
✔ getSectionsText() with h2 inside lead should produce one section
✔ getSectionsText() with one h2 inside div should not produce another section
✔ getSectionsText() with one h3 inside div should not produce another section
✔ section inside lead section should not be part of lead section
✔ div/section inside lead section should be part of lead section
✔ should not warn for page containing only a lead section
✔ should warn for non-lead section without heading properties
✔ should not warn if id & anchor are found for all sections after the lead section
✔ should not warn for non-lead non-editable section without heading properties
✔ should not warn if a non-editable section precedes the true lead section
✔ should throw if sectionObj is invalid
✔ validatePreviousSection should log a warning if appropriate
✔ non-editable sections are flagged
justLeadSection
✔ should just return the first section
✔ should skip non-editable section
✔ should return empty string if no lead section exists
✔ should skip malformed section tag with no data-mw-section-id
✔ should ignore data-mw-section-id multiples of 10
should exclude traffic
✔ should return true for allowed user-agent
✔ should return false for not allowed user-agent
✔ should return 403 for excluded domains with excluded UA
✔ should not call send for excluded domain with allowed UA
✔ should not call send for allowed domains
✔ should not call send with default config
lib:summary
buildExtracts
✔ Applies stripUnneededMarkup
✔ Don't select scribunto errors.
getSummaryType
✔ identifies main page
✔ identifies disambig page
✔ defaults to "standard"
✔ type for ns > 0 is no-extract
✔ type for non-wikitext content model is no-extract
✔ type for redirect is no-extract
lib:talk
parseUserTalkPageDocIntoTopicsWithReplies
✔ two h2 topics return first topic ID 1
✔ text before first h2 returns separate topic ID 0
✔ h3 section is given it's own topic
✔ empty h2 with title returns separate topic
✔ empty h2 without title is filtered out
✔ handles empty links
✔ removes figures
✔ does not block the event loop (114ms)
lib:escape + unescape parentheses
Latin parentheses escaping
✔ properly escapes Latin parentheses
✔ properly unescapes Latin parentheses
Non-Latin parentheses escaping
✔ properly escapes non-Latin parentheses
✔ properly unescapes non-Latin parentheses
lib:flattenElements
✔ replaces a with span, keeps class attribute
✔ replaces a with span, keeps style attribute
✔ replaces a tag with plain text if no attributes to keep
✔ retains HTML inside elements
✔ does not change the text content of the node
✔ drops `mw-redirect` class
✔ drops `new` class
✔ keeps `foo` class
extractHatnotes
✔ .hatnote element
✔ .dablink element
✔ hatnote not in lead section
✔ multiple hatnotes
✔ no hatnotes
✔ dewiki hatnotes
extractLeadIntroduction
✔ isEmptyChild
✔ matches the spec
✔ Trailing text content is escaped
extractPageIssues
✔ single issue
✔ multiple issues
✔ issue in non-lead section
✔ no issues
lib:addPageHeader
✔ addPageHeader should add header element with description (108ms)
✔ addPageHeader handles documents with no section elements
lib:pcsHideRedLinks
✔ hideRedLinks should drop <a> elements with class="new" (120ms)
lib:moveReferenceListStyles
✔ empty document
✔ one list, one template style
✔ style outside ref list stays
✔ one list, two template styles; +basic deduplication
✔ two lists, two template styles; +basic deduplication
lib:sanitizeSummary
regular expressions
✔ ANY_REGEX matches
✔ ANY_REGEX does not match
✔ DECIMAL_REGEX matches
✔ DECIMAL_REGEX does not match
✔ CSS_SIZE_REGEX matches
✔ CSS_SIZE_REGEX does not match
✔ SINGLE_STRING_REGEX matches
✔ SINGLE_STRING_REGEX does not match
✔ HEX_REGEX matches
✔ HEX_REGEX does not match
✔ RGB_REGEX matches
✔ RGB_REGEX does not match
✔ HSL_REGEX matches
✔ HSL_REGEX does not match
via sanitize-html
✔ removes anchor tags but keeps content (not in allowedTags list)
✔ removes script tags (in nonTextTags list)
✔ keeps blockquote
✔ but removes blockquote.cite attribute
✔ keeps abbr with .alt .aria-hidden and .class
✔ keeps span.style border
✔ removes audio tags
✔ removes video tags
✔ keeps img.src, .srcset, .width and .height attributes
✔ removes disallowed schemes
✔ removes background url"
lib:stripGermanIPA
✔ removes German IPA text (outer text)
✔ removes German IPA text (outer text, Placeholder)
✔ removes German IPA text (outer span)
lib:summarize follows spec
✔ keeps spaces before closing spans
✔ removes really all double spaces, even the ones caused due to unmatched tags
✔ removes spaces before commas
✔ flattens spans with ` ` -- removes extra spaces around it, too.
✔ flattens spans with multiple ` ` -- removes extra spaces around it, too.
✔ flattening spans before the `(` enables this parenthetical to be removed
✔ removes audio, video, and track tags
✔ ignores parens inside attributes by escaping them earlier
✔ ignores parens inside attributes by escaping them earlier (non-latin parentheses)
✔ reduces multiple spaces to single space
✔ removes problematic elements including their content
✔ removes unwanted attributes
✔ keeps white-listed attributes
✔ removes comments
✔ flattens empty nodes
✔ flattens links
✔ removes .noexcerpt elements
✔ removes .noprint elements
✔ keeps sup elements
✔ removes .mw-ref elements
✔ removes .reference elements - T176519
✔ removes math elements but any math images are shown
✔ keeps elements with style="display:none;"
✔ removes parentheticals
✔ removes multiple parentheticals
✔ keeps parentheticals without spaces
✔ keeps parentheticals without spaces even if there are spaces in the HTML syntax
✔ keeps parentheticals when they contain more complex formulas or links
✔ keeps all parentheticals when they contain complex formulas or links
✔ removes empty parentheticals also when nested parenthetical stripping is suspended
✔ keeps some nested parentheticals with formulas intact
✔ removes nested parentheticals without spaces
✔ removes nested parentheticals without other characters between the ()
✔ removes nested parentheticals with leading (or space)
✔ removes trailing spaces after punctuation before closing tag
✔ flattens nested empty spans
✔ removes some IPAs in nested partentheses
✔ ignores parentheticals inside a data-mw attribute
✔ removes content in parentheticals + double spaces
✔ removes birth and death dates inside parentheticals
✔ removes parentheticals contain '*' symbols
✔ removes content inside Chinese parentheticals
✔ removes content inside Japanese parentheticals
✔ removes content inside Cantonese parentheticals
✔ removes content inside parentheticals written in `wuu` language variant
✔ removes content inside parentheticals written in `gan` language variant
✔ keeps parentheticals if it doesn't include any spaces
✔ keeps parentheticals with single word and leading space inside and out
✔ removes parentheticals with multiple words and leading space inside and out
✔ removes empty parentheticals with leading comma
✔ removes parentheticals beginning and ending with spaces
✔ removes nested parentheticals for non-Latin parens
✔ removes parentheticals with multiple words and leading
✔ parentheticals stripping is not greedy
✔ full stops do not impact the summary length (T173640)
✔ keeps bold elements
✔ reduces multiple spaces to single space
✔ strip space before punctuation followed by tags
✔ keeps bold elementsa and regular text that contain parentheses
✔ keeps bold elements that contain parentheses
✔ keeps bold elements that contain parentheses and single quotes and spaces
lib:summarize regex fun
✔ detects complex chemical formulas
✔ detects single character with italic symbols inside parentheses
✔ but skips areas
lib:wrapSections
✔ should expand into multiple sections when action=parse (en) (109ms)
✔ should expand into multiple sections when action=parse (zh) (95ms)
lib:app-transforms
✔ fixVideoAnchor should skip video tags just holding audio
✔ fixVideoAnchor should transform actual videos
lib:size-transforms
✔ rmBracketSpans should remove the spans around brackets
✔ rmElements should remove the spans with style="display:none"
lib:transforms
✔ shortenPageInternalLinks should remove the title in the href
✔ shortenPageInternalLinks with single quote and space
✔ shortenPageInternalLinks with colon and single quote
✔ shortenPageInternalLinks with special chars
✔ shortenPageInternalLinks with double quote
✔ shortenPageInternalLinks with single quote and startsWith ./
summary:preprocessing
✔ removes IPA speaker symbols (de): IPA in span
✔ removes IPA speaker symbols (en): IPAc-en in span
✔ removes spans with style display:none
rmMwIdAttributes
✔ removes id attribute with -
✔ removes id attribute with _
✔ does not remove id attribute with id not starting with mw
✔ does not remove id attribute with id too long
lib:wikiLanguage
✔ parses accept language headers
✔ parses accept language headers without spaces
✔ parses accept language headers with inconsistent spaces
✔ returns relevant srwiki language codes
✔ returns relevant zhwiki language codes
✔ falls back on the provided language code
✔ removes duplicates
✔ handles invalid input
✔ handles legacy input
✔ identifies languages with variants
✔ parses the language code from a domain
✔ returns the right language variant from request object
✔ falls back to language code when accept-language invalid
✔ falls back to language code when no accept-language header sent
Default wmf projects middleware
✔ should allow an allowed domain
✔ should return 404 for a disallowed domain
Summary wmf projects middleware
✔ should allow an allowed domain
✔ should return 404 for a disallowed domain
468 passing (54s)
4 pending
1 failing
1) Caching headers - vary
should add accept-language in vary header for domain with language variants:
Error: Timeout of 2000ms exceeded. For async tests and hooks, ensure "done()" is called; if returning a Promise, ensure it resolves. (/src/repo/test/features/caching.js)
at listOnTimeout (node:internal/timers:569:17)
at process.processTimers (node:internal/timers:512:7)
--- end ---
Traceback (most recent call last):
File "/venv/lib/python3.11/site-packages/runner-0.1.0-py3.11.egg/runner/__init__.py", line 2026, in main
libup.run(args.repo, args.output, args.branch)
File "/venv/lib/python3.11/site-packages/runner-0.1.0-py3.11.egg/runner/__init__.py", line 1968, in run
self.npm_audit_fix(new_npm_audit)
File "/venv/lib/python3.11/site-packages/runner-0.1.0-py3.11.egg/runner/__init__.py", line 275, in npm_audit_fix
self.npm_test()
File "/venv/lib/python3.11/site-packages/runner-0.1.0-py3.11.egg/runner/__init__.py", line 325, in npm_test
self.check_call(["npm", "test"])
File "/venv/lib/python3.11/site-packages/runner-0.1.0-py3.11.egg/runner/shell2.py", line 63, in check_call
res.check_returncode()
File "/usr/lib/python3.11/subprocess.py", line 502, in check_returncode
raise CalledProcessError(self.returncode, self.args, self.stdout,
subprocess.CalledProcessError: Command '['/usr/bin/npm', 'test']' returned non-zero exit status 1.