Bump the npm_and_yarn group across 1 directory with 8 updates #29
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Bumps the npm_and_yarn group with 6 updates in the / directory:
3.0.93.0.113.0.23.0.34.19.24.21.23.1.23.1.34.0.34.0.45.28.45.29.0Updates
base-xfrom 3.0.9 to 3.0.11Commits
043a8883.0.112705ddd[backport 3.x] Prohibit char codes that would overflow theBASE_MAP3d43c0e3.0.100a35446Improve decoding performanceUpdates
bracesfrom 3.0.2 to 3.0.3Commits
74b2db23.0.388f1429update eslint. lint, fix unit tests.415d660Snyk js braces 6838727 (#40)190510ffix tests, skip 1 test in test/braces.expand716eb9freadme bumpa5851e5Merge pull request #37 from coderaiser/fix/vulnerability2092bd1feature: braces: add maxSymbols (https://github.com/micromatch/braces/issues/...9f5b4cffix: vulnerability (https://security.snyk.io/vuln/SNYK-JS-BRACES-6838727)98414f9remove funding file665ab5dupdate keepEscaping doc (#27)Updates
expressfrom 4.19.2 to 4.21.2Release notes
Sourced from express's releases.
... (truncated)
Changelog
Sourced from express's changelog.
Commits
1faf2284.21.22e0fb64deps: bump [email protected] (#6209)59fc270deps: [email protected] (#5956)51fc39cdocs: add funding (#6065)8e229f94.21.1a024c8afix(deps): [email protected]7e562c64.21.01bcde96fix(deps): [email protected] (#5946)7d36477fix(deps): [email protected] (#5951)40d2d8ffix(deps): [email protected]Maintainer changes
This version was pushed to npm by jonchurch, a new releaser for express since your current version.
Updates
pbkdf2from 3.1.2 to 3.1.3Changelog
Sourced from pbkdf2's changelog.
Commits
3e40827v3.1.3e3102a8[Refactor] useto-buffer7431b57Revert "[Tests] fix tests in node < 3"19ea57b[meta] skip publishing benchmarksa2c7d93[Tests] remove unused travis file645e252[Dev Deps] add missing peer dep796c38d[meta] addauto-changelogd0d534b[Tests] add coverage7f31fbc[meta] switch fromfilestonpmignorefca0c9d[readme] improve badgesMaintainer changes
This version was pushed to npm by ljharb, a new releaser for pbkdf2 since your current version.
Updates
secp256k1from 4.0.3 to 4.0.4Commits
756fce14.0.48bd6446elliptic: fix key verification in loadCompressedPublicKey840834eUpdate elliptic to 6.5.7 (CVE-2024-42461) (#206)Updates
sendfrom 0.18.0 to 0.19.0Release notes
Sourced from send's releases.
Changelog
Sourced from send's changelog.
Commits
9d2db990.19.0ae4f298Merge commit from forkMaintainer changes
This version was pushed to npm by ulisesgascon, a new releaser for send since your current version.
Updates
serve-staticfrom 1.15.0 to 1.16.2Release notes
Sourced from serve-static's releases.
Changelog
Sourced from serve-static's changelog.
Commits
ec9c5ec1.16.2f454d37fix(deps): encodeurl@~2.0.077a82551.16.14263f49fix(deps): [email protected]48c73971.16.00c11fadMerge commit from forkMaintainer changes
This version was pushed to npm by wesleytodd, a new releaser for serve-static since your current version.
Updates
undicifrom 5.28.4 to 5.29.0Release notes
Sourced from undici's releases.
Commits
9528f68Bumped v5.29.0f1d75a4increase timeout for redirect test2d31ed6remove fuzzing tests6b36d49fix redirect test in Node v16648dd8fmore fix for the wpt runner on Windowsa0516badon't use internal header state for cookies (#3295)87ce4affix test/client for node 20c2c8fd5fix: accept v20 SSL specific error for alpn selection in http/282200bd[v6.x] fix wpts on windows (#4093)47546fatest: fix windows wpt (#4050)Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting
@dependabot rebase.Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR:
@dependabot rebasewill rebase this PR@dependabot recreatewill recreate this PR, overwriting any edits that have been made to it@dependabot mergewill merge this PR after your CI passes on it@dependabot squash and mergewill squash and merge this PR after your CI passes on it@dependabot cancel mergewill cancel a previously requested merge and block automerging@dependabot reopenwill reopen this PR if it is closed@dependabot closewill close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually@dependabot show <dependency name> ignore conditionswill show all of the ignore conditions of the specified dependency@dependabot ignore <dependency name> major versionwill close this group update PR and stop Dependabot creating any more for the specific dependency's major version (unless you unignore this specific dependency's major version or upgrade to it yourself)@dependabot ignore <dependency name> minor versionwill close this group update PR and stop Dependabot creating any more for the specific dependency's minor version (unless you unignore this specific dependency's minor version or upgrade to it yourself)@dependabot ignore <dependency name>will close this group update PR and stop Dependabot creating any more for the specific dependency (unless you unignore this specific dependency or upgrade to it yourself)@dependabot unignore <dependency name>will remove all of the ignore conditions of the specified dependency@dependabot unignore <dependency name> <ignore condition>will remove the ignore condition of the specified dependency and ignore conditionsYou can disable automated security fix PRs for this repo from the Security Alerts page.