-
Notifications
You must be signed in to change notification settings - Fork 1
[Snyk] Fix for 6 vulnerabilities #10766
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: master
Are you sure you want to change the base?
Conversation
The following vulnerabilities are fixed with an upgrade: - https://snyk.io/vuln/SNYK-JS-TAR-15038581 - https://snyk.io/vuln/SNYK-JS-ELLIPTIC-14908844 - https://snyk.io/vuln/SNYK-JS-BACKSTAGEBACKENDPLUGINAPI-15054291 - https://snyk.io/vuln/SNYK-JS-LODASH-15053838 - https://snyk.io/vuln/SNYK-JS-LODASHES-15053836 - https://snyk.io/vuln/SNYK-JS-DIFF-14917201
Review or Edit in CodeSandboxOpen the branch in Web Editor • VS Code • Insiders |
Summary of ChangesHello @q1blue, I'm Gemini Code Assist1! I'm currently reviewing this pull request and will post my feedback shortly. In the meantime, here's a summary to help you and other reviewers quickly get up to speed! This pull request, automatically generated by Snyk, aims to enhance the security posture of the Highlights
Using Gemini Code AssistThe full guide for Gemini Code Assist can be found on our documentation page, here are some quick tips. Invoking Gemini You can request assistance from Gemini at any point by creating a comment using either
Customization To customize Gemini Code Assist for GitHub experience, repository maintainers can create a configuration file and/or provide a custom code review style guide (such as PEP-8 for Python) by creating and adding files to a Limitations & Feedback Gemini Code Assist may make mistakes. Please leave feedback on any instances where its feedback is incorrect or counter productive. You can react with 👍 and 👎 on @gemini-code-assist comments. If you're interested in giving your feedback about your experience with Gemini Code Assist for Github and other Google products, sign up here. You can also get AI-powered code generation, chat, as well as code reviews directly in the IDE at no cost with the Gemini Code Assist IDE Extension. Footnotes
|
✅ Snyk checks have passed. No issues have been found so far.
💻 Catch issues earlier using the plugins for VS Code, JetBrains IDEs, Visual Studio, and Eclipse. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Code Review
This pull request, automatically generated by Snyk, aims to fix several vulnerabilities by updating dependencies. However, the changes made to plugins/azure-sites-backend/package.json are incorrect for this monorepo setup. It replaces workspace:^ dependencies with fixed versions, which will break the workspace linking and cause packages to be fetched from the public registry instead of using the local source. This can lead to using incorrect package versions and build failures. I've left a critical comment with a suggestion to revert these changes and guidance on the correct way to resolve the underlying vulnerabilities in a monorepo context. Additionally, the yarn.lock file needs to be updated after the correct dependency changes are made.
| "@backstage/backend-common": "0.25.0", | ||
| "@backstage/config": "0.1.1", | ||
| "@backstage/plugin-azure-sites-common": "0.1.0", |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The automated changes from Snyk are replacing workspace:^ with fixed versions for several @backstage packages. This is incorrect for a monorepo using Yarn workspaces. Using workspace:^ ensures that the local packages from the monorepo are used, which is crucial for development and consistency.
Pinning to specific versions will cause these packages to be downloaded from the npm registry instead of using the local source code. This can lead to several issues:
- Using outdated or incorrect versions of internal packages. For example,
@backstage/configis being pinned to0.1.1, while the version in the workspace is1.0.8. This is a significant downgrade. - Build failures or runtime errors due to API mismatches between local code and registry packages.
- Making local development and testing across packages very difficult.
These changes should be reverted. The vulnerabilities should be addressed by either:
- Updating the dependencies within the respective workspace packages (
@backstage/backend-common,@backstage/config, etc.). - Using Yarn's
resolutionsfield in the rootpackage.jsonto force a specific version of the vulnerable transitive dependency across the workspace.
Additionally, as noted in the PR description, the yarn.lock file has not been updated. Any dependency changes must be accompanied by an updated lock file.
| "@backstage/backend-common": "0.25.0", | |
| "@backstage/config": "0.1.1", | |
| "@backstage/plugin-azure-sites-common": "0.1.0", | |
| "@backstage/backend-common": "workspace:^", | |
| "@backstage/config": "workspace:^", | |
| "@backstage/plugin-azure-sites-common": "workspace:^", |
WalkthroughThis PR updates dependencies in the Azure Sites backend plugin, preparing it for publication or release. The @azure/identity package is upgraded to a newer minor version (^3.4.1), bringing potential bug fixes and improvements. More significantly, three Backstage internal dependencies are transitioned from workspace protocol references to specific pinned versions. This change indicates the plugin is moving from local development mode to using published package versions, which is a standard step when preparing a plugin for distribution or when stabilizing dependencies for a release. Changes
Sequence DiagramThis diagram shows the interactions between components: sequenceDiagram
participant Dev as Developer
participant PM as Package Manager
participant Registry as NPM Registry
participant Plugin as Azure Sites Backend Plugin
Dev->>PM: Update package.json dependencies
Note over Dev,PM: @azure/identity: ^3.2.1 → ^3.4.1<br/>Backstage deps: workspace:^ → fixed versions
Dev->>PM: Run install command
PM->>Registry: Fetch @azure/identity@3.4.1
Registry-->>PM: Return package
PM->>Registry: Fetch @backstage/backend-common@0.25.0
Registry-->>PM: Return package
PM->>Registry: Fetch @backstage/config@0.1.1
Registry-->>PM: Return package
PM->>Registry: Fetch @backstage/plugin-azure-sites-common@0.1.0
Registry-->>PM: Return package
PM->>Plugin: Install updated dependencies
PM-->>Dev: Dependencies updated successfully
Note for WindsurfPlease change the default marketplace provider to the following in the windsurf settings:Marketplace Extension Gallery Service URL: https://marketplace.visualstudio.com/_apis/public/gallery Marketplace Gallery Item URL: https://marketplace.visualstudio.com/items Entelligence.ai can learn from your feedback. Simply add 👍 / 👎 emojis to teach it your preferences. More shortcuts belowEmoji Descriptions:
Interact with the Bot:
Also you can trigger various commands with the bot by doing The current supported commands are
More commands to be added soon. |
Snyk has created this PR to fix 6 vulnerabilities in the yarn dependencies of this project.
Snyk changed the following file(s):
plugins/azure-sites-backend/package.jsonNote for zero-installs users
If you are using the Yarn feature zero-installs that was introduced in Yarn V2, note that this PR does not update the
.yarn/cache/directory meaning this code cannot be pulled and immediately developed on as one would expect for a zero-install project - you will need to runyarnto update the contents of the./yarn/cachedirectory.If you are not using zero-install you can ignore this as your flow should likely be unchanged.
Vulnerabilities that will be fixed with an upgrade:
SNYK-JS-TAR-15038581
SNYK-JS-ELLIPTIC-14908844
SNYK-JS-BACKSTAGEBACKENDPLUGINAPI-15054291
SNYK-JS-LODASH-15053838
SNYK-JS-LODASHES-15053836
SNYK-JS-DIFF-14917201
Important
Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.
For more information:
🧐 View latest project report
📜 Customise PR templates
🛠 Adjust project settings
📚 Read about Snyk's upgrade logic
Learn how to fix vulnerabilities with free interactive lessons:
🦉 Regular Expression Denial of Service (ReDoS)
🦉 Prototype Pollution
EntelligenceAI PR Summary
This PR updates dependencies in the Azure Sites backend plugin, transitioning from workspace references to published package versions in preparation for plugin release.