-
Notifications
You must be signed in to change notification settings - Fork 1
FFL-1633 chore: upgrade dependencies to resolve audit warnings #94
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
greghuels
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
It looks like you ran yarn upgrade, which should work so long as authors of the libraries of our dependencies respect backwards compatibility. If you want a more surgical approach, I would run yarn upgrade express, which will only upgrade express and will still upgrade the qs transitive dependency to 6.14.1.
|
I would vote for the surgical approach, also we should get the CI/CD passing. It's unclear to me why it is not 🤔 |
|
Is there any reason you prefer "surgical" approach?
|
|
It looks like CI is failing because it's trying to pull from the wrong repository (this one instead of my fork): react-native-sdk/.github/workflows/ci.yml Lines 32 to 36 in ad436d1
Can someone add me to the repo (or the org), so I can reopen? |
|
My impression is that we should update I've added you to the repository (didn't realize the datadog-specific user name) so hopefully we'll be good to go on that front. Note that this is has an example app, please test with that using a QA base url and key and ensure it makes a non-default assignment successfully. If you need help with that, happy to pair! |
46fb1f0 to
7bdb495
Compare
|
oh.... pushing the same commit to base repo has fixed the CI 🤪 so I guess we can continue here
Given that the vulnerable dependency is transitive (not in our direct dependencies), I don't think we should do that. We just need to make sure that our dependency constraints in
oh, this change does not affect the example app 🙂. The example has its own lock file which is still vulnerable (in another way). I've updated it too and tested that example app still works 🫡 |
Ah I see what you are saying now! Ok this makes sense... carry on! |
Eppo Internal:
🎟️ Fixes FFL-1633
Motivation and Context
Upgrade dependencies to fix all audit warnings.
Description
How has this been documented?
How has this been tested?