Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Bump @typescript-eslint/eslint-plugin from 7.18.0 to 8.18.0 #4673

Conversation

dependabot[bot]
Copy link
Contributor

@dependabot dependabot bot commented on behalf of github Dec 10, 2024

Bumps @typescript-eslint/eslint-plugin from 7.18.0 to 8.18.0.

Release notes

Sourced from @​typescript-eslint/eslint-plugin's releases.

v8.18.0

8.18.0 (2024-12-09)

🚀 Features

  • eslint-plugin: [no-deprecated] report on super call of deprecated constructor (#10397)
  • eslint-plugin: [switch-exhaustiveness-check] add support for "no default" comment (#10218)

🩹 Fixes

  • typescript peer dependency (#10373)
  • deps: update dependency eslint to v9.16.0 (#10471)
  • eslint-plugin: [no-deprecated] check if a JSX attribute is deprecated (#10374)
  • eslint-plugin: [no-base-to-string] handle more robustly when multiple toString() declarations are present for a type (#10432)
  • eslint-plugin: [use-unknown-in-catch-callback-variable] only flag function literals (#10436)

❤️ Thank You

You can read about our versioning strategy and releases on our website.

v8.17.0

8.17.0 (2024-12-02)

🚀 Features

  • eslint-plugin: [prefer-promise-reject-errors] options to allow any and unknown (#10392)
  • typescript-estree: add package version to ts version warning (#10343)

🩹 Fixes

  • eslint-plugin: [no-unnecessary-template-expressions] allow template expressions used to make trailing whitespace visible (#10363)
  • eslint-plugin: remove references to "extendDefaults" in no-restricted-types (#10401)
  • eslint-plugin: [promise-function-async] handle function overloading (#10304)
  • website: press the Report an Issue button makes error if eslintrc does not include rules (#10367)

❤️ Thank You

You can read about our versioning strategy and releases on our website.

... (truncated)

Changelog

Sourced from @​typescript-eslint/eslint-plugin's changelog.

8.18.0 (2024-12-09)

🚀 Features

  • eslint-plugin: [switch-exhaustiveness-check] add support for "no default" comment (#10218)
  • eslint-plugin: [no-deprecated] report on super call of deprecated constructor (#10397)

🩹 Fixes

  • eslint-plugin: [use-unknown-in-catch-callback-variable] only flag function literals (#10436)
  • eslint-plugin: [no-base-to-string] handle more robustly when multiple toString() declarations are present for a type (#10432)
  • eslint-plugin: [no-deprecated] check if a JSX attribute is deprecated (#10374)
  • typescript peer dependency (#10373)

❤️ Thank You

You can read about our versioning strategy and releases on our website.

8.17.0 (2024-12-02)

🚀 Features

  • eslint-plugin: [prefer-promise-reject-errors] options to allow any and unknown (#10392)

🩹 Fixes

  • eslint-plugin: [promise-function-async] handle function overloading (#10304)
  • eslint-plugin: remove references to "extendDefaults" in no-restricted-types (#10401)
  • eslint-plugin: [no-unnecessary-template-expressions] allow template expressions used to make trailing whitespace visible (#10363)

❤️ Thank You

You can read about our versioning strategy and releases on our website.

8.16.0 (2024-11-25)

🚀 Features

  • eslint-plugin: [no-base-to-string] check Array.prototype.join (#10287)
  • eslint-plugin: [max-params] add function overload and function type support (#10312)

... (truncated)

Commits
  • c60dbab chore(release): publish 8.18.0
  • 0d65f17 chore: enforce repo nullish check style (#10419)
  • a54a8e1 fix(eslint-plugin): [use-unknown-in-catch-callback-variable] only flag functi...
  • 24a1510 fix(eslint-plugin): [no-base-to-string] handle more robustly when multiple `t...
  • 47f1ab3 feat(eslint-plugin): [switch-exhaustiveness-check] add support for "no defaul...
  • 772bd43 fix(eslint-plugin): [no-deprecated] check if a JSX attribute is deprecated (#...
  • 4cb2cf8 fix: typescript peer dependency (#10373)
  • 0cc7919 feat(eslint-plugin): [no-deprecated] report on super call of deprecated const...
  • 2c8a75e chore(release): publish 8.17.0
  • 670df27 feat(eslint-plugin): [prefer-promise-reject-errors] options to allow any and ...
  • Additional commits viewable in compare view

Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot show <dependency name> ignore conditions will show all of the ignore conditions of the specified dependency
  • @dependabot ignore this major version will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this minor version will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)

Bumps [@typescript-eslint/eslint-plugin](https://github.com/typescript-eslint/typescript-eslint/tree/HEAD/packages/eslint-plugin) from 7.18.0 to 8.18.0.
- [Release notes](https://github.com/typescript-eslint/typescript-eslint/releases)
- [Changelog](https://github.com/typescript-eslint/typescript-eslint/blob/main/packages/eslint-plugin/CHANGELOG.md)
- [Commits](https://github.com/typescript-eslint/typescript-eslint/commits/v8.18.0/packages/eslint-plugin)

---
updated-dependencies:
- dependency-name: "@typescript-eslint/eslint-plugin"
  dependency-type: direct:production
  update-type: version-update:semver-major
...

Signed-off-by: dependabot[bot] <[email protected]>
@dependabot dependabot bot added the dependencies Pull requests that update a dependency file label Dec 10, 2024
Copy link

@github-actions github-actions bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@dependabot merge

Copy link
Contributor Author

dependabot bot commented on behalf of github Dec 10, 2024

Sorry, only users with push access can use that command.

@@ -35312,6 +40322,12 @@
"node": ">= 0.6"
}
},
"node_modules/http-cache-semantics": {

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Codacy found a critical Security issue: Insecure dependency [email protected] (CVE-2022-25881: http-cache-semantics: Regular Expression Denial of Service (ReDoS) vulnerability) (update to 4.1.1)

The issue identified by the Trivy linter is a security vulnerability in the http-cache-semantics package, specifically version 3.8.1. This vulnerability, designated as CVE-2022-25881, is a Regular Expression Denial of Service (ReDoS) vulnerability. It can potentially allow an attacker to exploit the regular expression processing in the package, leading to performance degradation or application denial of service.

To resolve this issue, you should update the http-cache-semantics package to a secure version. The recommended version is 4.1.1, which does not have this vulnerability.

Here is the code suggestion to fix the issue by updating the version of http-cache-semantics:

    "node_modules/http-cache-semantics": {
      "version": "4.1.1",

This change updates the version of the http-cache-semantics package to the secure version, mitigating the identified vulnerability.


This comment was generated by an experimental AI tool.

@@ -44899,6 +51043,146 @@
"node": ">=10"
}
},
"node_modules/mockery": {

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Codacy found a critical Security issue: Insecure dependency [email protected] (CVE-2022-37614: mockery is vulnerable to prototype pollution) (update to )

The issue identified by the Trivy linter is related to a security vulnerability in the mockery package, specifically version 2.1.0. This vulnerability, classified as CVE-2022-37614, allows for prototype pollution, which can lead to potential security risks such as unauthorized access or modification of object properties in JavaScript applications.

To address this issue, the recommended solution is to update the mockery package to a version that does not have this vulnerability. The latest version at the time of this response should be checked on the npm registry for a secure version.

Assuming that a newer, secure version of mockery is available (for example, 2.1.1 or later), the code suggestion to fix the issue would be:

Suggested change
"node_modules/mockery": {
"node_modules/mockery": { "version": "2.1.1", ...

Make sure to replace 2.1.1 with the actual latest secure version available.


This comment was generated by an experimental AI tool.

@@ -57672,6 +66771,112 @@
"integrity": "sha512-x00IRNXNy63jwGkJmzPigoySHbaqpNuzKbBOmzK+g2OdZpQ9w+sxCN+VSB3ja7IAge2OP2qpfxTjeNcyjmW1uw==",
"license": "ISC"
},
"node_modules/utile": {

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

ℹ️ Codacy found a minor Security issue: Insecure dependency [email protected] (NSWG-ECO-445: Out-of-bounds Read) (no fix available)

The issue identified by the Trivy linter refers to a security vulnerability in the utile package version 0.3.0, specifically an "Out-of-bounds Read" vulnerability. This type of vulnerability can allow an attacker to read data beyond the bounds of allocated memory, potentially leading to information leakage or application crashes. Since there is no fix available for this version, it is advisable to remove or replace the vulnerable package.

A common approach to handle such vulnerabilities is to upgrade to a more secure version of the package or to remove it altogether if it is not critical to the application. However, since utile is a dependency that may be used by other packages, a more practical solution is to remove it from the dependency tree.

To address the issue, you can remove the utile package from your package.json file. Here’s the single line change you could make:

Suggested change
"node_modules/utile": {
"node_modules/utile": null,

This indicates that utile should be removed as a dependency, effectively mitigating the security risk associated with it. However, keep in mind that you will need to ensure that any code relying on utile is updated accordingly.


This comment was generated by an experimental AI tool.

"node_modules/sprintf-js": {
"version": "1.0.3",
"resolved": "https://registry.npmjs.org/sprintf-js/-/sprintf-js-1.0.3.tgz",
"integrity": "sha512-D9cPgkvLlV3t3IzL0D0YLvGA9Ahk4PcvVwUbN0dSGr1aP0Nrt4AEnTUbuGvquEC0mA64Gqt1fzirlRs5ibXx8g==",
"license": "BSD-3-Clause"
},
"node_modules/ssh2": {

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Codacy found a critical Security issue: Insecure dependency [email protected] (CVE-2020-26301: nodejs-ssh2: Command injection by calling vulnerable method with untrusted input) (update to 1.4.0)

The issue reported by the Trivy linter is related to a security vulnerability in the ssh2 package version 0.8.9, specifically identified by CVE-2020-26301. This vulnerability allows for command injection when using certain methods with untrusted input, potentially leading to unauthorized command execution on the server. To mitigate this risk, it is recommended to update the ssh2 package to a secure version, which in this case is version 1.4.0 or higher.

To fix the issue, you can update the ssh2 dependency in your package.json file to the recommended version. Here’s the code suggestion:

Suggested change
"node_modules/ssh2": {
"ssh2": "^1.4.0"

Make sure to run npm install after making this change to update your dependencies and ensure that the vulnerable version is replaced with the secure one.


This comment was generated by an experimental AI tool.

@@ -58379,6 +67645,16 @@
"node": ">=4.0.0"
}
},
"node_modules/vue-template-compiler": {

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

⚠️ Codacy found a medium Security issue: Insecure dependency [email protected] (CVE-2024-6783: vue-template-compiler vulnerable to client-side Cross-Site Scripting (XSS)) (update to 3.0.0)

The issue identified by the Trivy linter is a known vulnerability in the vue-template-compiler package, specifically version 2.6.12, which is susceptible to a client-side Cross-Site Scripting (XSS) attack. This vulnerability can allow an attacker to inject malicious scripts into web pages viewed by other users, potentially compromising user data and security.

To mitigate this vulnerability, it is recommended to update the vue-template-compiler to a secure version, such as 3.0.0 or higher, where this issue has been addressed.

Here is the code suggestion to fix the issue by updating the version of vue-template-compiler:

    "node_modules/vue-template-compiler": {
      "version": "3.0.0",

This comment was generated by an experimental AI tool.

@@ -36079,6 +41668,12 @@
"url": "https://github.com/sindresorhus/invert-kv?sponsor=1"
}
},
"node_modules/ip": {

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

ℹ️ Codacy found a minor Security issue: Insecure dependency [email protected] (CVE-2023-42282: nodejs-ip: arbitrary code execution via the isPublic() function) (update to 1.1.9)

The issue identified by the Trivy linter is a security vulnerability in the ip package version 1.1.5, specifically related to CVE-2023-42282. This vulnerability allows for arbitrary code execution through the isPublic() function in the ip package. To mitigate this risk, it is recommended to update the ip package to a safer version, specifically version 1.1.9 or later.

To address this issue, you can update the version of the ip package in your package.json file. Here is the single line change you should make:

Suggested change
"node_modules/ip": {
"node_modules/ip": { "version": "1.1.9", ... }

Make sure to run npm install after making this change to ensure that the updated version is installed.


This comment was generated by an experimental AI tool.

"object-assign": "^4.1.1"
}
},
"node_modules/@teambit/legacy/node_modules/semver": {

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Codacy found a critical Security issue: Insecure dependency [email protected] (CVE-2022-25883: nodejs-semver: Regular expression denial of service) (update to 7.5.2, 6.3.1, 5.7.2)

The issue identified by the Trivy linter is related to a known security vulnerability in the semver package version 7.3.4, specifically CVE-2022-25883. This vulnerability is categorized as a Regular Expression Denial of Service (ReDoS) issue, which can potentially allow an attacker to cause a denial of service by exploiting certain regular expressions used in the library. To mitigate this risk, it is recommended to update the semver package to a version that is not affected by this vulnerability, such as 7.5.2, 6.3.1, or 5.7.2.

To fix the issue, you can update the version of semver in your package.json or wherever this dependency is defined. Here is a single line change that achieves this:

Suggested change
"node_modules/@teambit/legacy/node_modules/semver": {
"node_modules/@teambit/legacy/node_modules/semver": { "version": "7.5.2", ...

This change updates the version of semver to 7.5.2, which is a secure version and resolves the identified vulnerability.


This comment was generated by an experimental AI tool.

"pjv": "bin/pjv"
}
},
"node_modules/package-json-validator/node_modules/minimist": {

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

⚠️ Codacy found a medium Security issue: Insecure dependency [email protected] (CVE-2020-7598: nodejs-minimist: prototype pollution allows adding or modifying properties of Object.prototype using a constructor or proto payload) (update to 0.2.1)

The issue identified by the Trivy linter is related to the minimist package, specifically version 0.0.10. This version is vulnerable to a security flaw known as prototype pollution, which allows an attacker to add or modify properties of Object.prototype. This can lead to unexpected behavior in applications that rely on the integrity of JavaScript objects. The recommended action is to update minimist to a version that is not affected by this vulnerability, specifically to version 0.2.1 or higher.

To fix this issue, you should update the minimist dependency in the package-json-validator package to a secure version. Since minimist is a sub-dependency of optimist, you may need to update optimist to a version that depends on a secure version of minimist.

Here's the suggested change to update the minimist version:

    "node_modules/package-json-validator/node_modules/minimist": {
          "version": "0.2.1",
          "resolved": "https://registry.npmjs.org/minimist/-/minimist-0.2.1.tgz",
          "integrity": "sha512-<new-integrity-hash>",
          "peer": true
        },

Note: You would need to replace <new-integrity-hash> with the actual integrity hash for the updated version of minimist. Additionally, ensure that you update the optimist dependency if it does not already require a secure version of minimist.


This comment was generated by an experimental AI tool.

@@ -36079,6 +41668,12 @@
"url": "https://github.com/sindresorhus/invert-kv?sponsor=1"
}
},
"node_modules/ip": {

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Codacy found a critical Security issue: Insecure dependency [email protected] (CVE-2023-42282: nodejs-ip: arbitrary code execution via the isPublic() function) (update to 2.0.1, 1.1.9)

The issue identified by the Trivy linter pertains to a security vulnerability in the ip package, specifically version 1.1.8, which is susceptible to arbitrary code execution via the isPublic() function. This vulnerability is documented under CVE-2023-42282. To mitigate this risk, it is recommended to update the ip package to a non-vulnerable version, either 2.0.1 or 1.1.9.

To address this issue, you can update the version of the ip package in your package.json file. Here’s the single line change you would make:

Suggested change
"node_modules/ip": {
"ip": "^1.1.9",

This change specifies that the ip package should be updated to version 1.1.9 or higher, which resolves the security vulnerability.


This comment was generated by an experimental AI tool.

"integrity": "sha512-GpVkmM8vF2vQUkj2LvZmD35JxeJOLCwJ9cUkugyk2nuhbv3+mJvpLYYt+0+USMxE+oj+ey/lJEnhZw75x/OMcQ==",
"peer": true
},
"node_modules/moment": {

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Codacy found a critical Security issue: Insecure dependency [email protected] (CVE-2022-24785: Moment.js: Path traversal in moment.locale) (update to 2.29.2)

The issue identified by the Trivy linter pertains to a security vulnerability in the moment library, specifically version 2.29.1. The vulnerability, tracked as CVE-2022-24785, involves a path traversal issue in the moment.locale function, which could potentially allow an attacker to manipulate file paths in certain scenarios. To mitigate this vulnerability, it is recommended to update the moment library to a secure version, which in this case is 2.29.2 or later.

To fix the issue, you can update the version of the moment dependency in your package.json file. Here’s the suggested change:

    "node_modules/moment": {
      "version": "2.29.2",

This comment was generated by an experimental AI tool.

"node": ">=10"
}
},
"node_modules/@teambit/legacy/node_modules/minimatch": {

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Codacy found a critical Security issue: Insecure dependency [email protected] (CVE-2022-3517: nodejs-minimatch: ReDoS via the braceExpand function) (update to 3.0.5)

The issue identified by the Trivy linter pertains to a known vulnerability in the minimatch package, specifically version 3.0.4. This vulnerability, identified as CVE-2022-3517, is related to a Regular Expression Denial of Service (ReDoS) that can be exploited through the braceExpand function. Essentially, this means that an attacker could potentially craft input that takes an excessive amount of time to process, leading to denial of service for the application using this package.

To resolve this issue, you should update the minimatch package to a secure version that does not have this vulnerability. The recommended version is 3.0.5 or higher.

Here’s the single line change to update the version of minimatch:

Suggested change
"node_modules/@teambit/legacy/node_modules/minimatch": {
"minimatch": "^3.0.5"

This comment was generated by an experimental AI tool.

"pjv": "bin/pjv"
}
},
"node_modules/package-json-validator/node_modules/minimist": {

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Codacy found a critical Security issue: Insecure dependency [email protected] (CVE-2020-7598: nodejs-minimist: prototype pollution allows adding or modifying properties of Object.prototype using a constructor or proto payload) (update to 0.2.1, 1.2.3)

The issue identified by the Trivy linter is related to a security vulnerability in the minimist package, specifically version 0.0.10. This version is affected by a prototype pollution vulnerability (CVE-2020-7598), which allows an attacker to manipulate the properties of Object.prototype through crafted input, potentially leading to unexpected behavior or security issues. The recommended action is to update minimist to a safer version, such as 0.2.1 or 1.2.3, which have addressed this vulnerability.

To fix the issue, you can update the version of minimist in your package.json or the relevant dependency tree. Here’s the single line change you can make:

Suggested change
"node_modules/package-json-validator/node_modules/minimist": {
"node_modules/package-json-validator/node_modules/minimist": { "version": "0.2.1", ... }

Make sure to replace the ... with the other properties that were originally present in that object to maintain the integrity of the configuration.


This comment was generated by an experimental AI tool.

Copy link
Contributor Author

dependabot bot commented on behalf of github Dec 19, 2024

Superseded by #4683.

@dependabot dependabot bot closed this Dec 19, 2024
@dependabot dependabot bot deleted the dependabot/npm_and_yarn/typescript-eslint/eslint-plugin-8.18.0 branch December 19, 2024 07:56
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
dependencies Pull requests that update a dependency file
Projects
None yet
Development

Successfully merging this pull request may close these issues.

0 participants