initializer-for-laravel
initializer-for-laravel copied to clipboard
Bump composer/composer from 2.5.5 to 2.6.4
Bumps composer/composer from 2.5.5 to 2.6.4.
Release notes
Sourced from composer/composer's releases.
2.6.4
- Security: Fixed possible remote code execution vulnerability if composer.phar is publicly accessible, executable as PHP, and register_argc_argv is enabled in php.ini (GHSA-jm6m-4632-36hf / CVE-2023-43655)
- Fixed json output of abandoned packages in audit command (#11647)
- Performance improvement in pool optimization step (#11638)
- Performance improvement in
show -a <packagename>(#11659)2.6.3
- Added audit.abandoned config setting. Can be set to
ignore,report(current default) orfail(future default in 2.7) to make the audit command report abandoned packages as a security problem (#11639)- Added a warning when duplicates
filesautoload rules are detected (#11109)- Fixed unhandled promise rejection regression (#11620)
- Fixed loading of root aliases on path repo packages when doing partial updates (#11632)
- Fixed
archivecommand not producing the correct output if the temp dir is a symlink (#11636)- Fixed some replaced packages being incorrectly missing when unlocked in a partial update (#11629)
2.6.2
- Reverted "Fixed binary proxies causing scripts inspecting
$_SERVER['SCRIPT_NAME']to detect them, they are now more transparent (#11562)" which caused a regression (#11617)- Fixed non-zero exit code on failed audits to only apply to
install --auditruns and not implicit audits withrequire,create-projectorupdatecommands (#11616)- Fixed
create-projectinfinite post-install loop in some circumstances (#11613)2.6.1
- Reverted "Fixed executability of non-php binaries which are not marked executable (#11557)" which caused a regression (#11612)
2.6.0
- Added audit.ignore config setting to ignore security advisories by id or CVE id (#11556, #11605)
- Added
rmalias to theremovecommand (#11367)- Added runtime platform check to verify the php-64bit requirement is met (#11334)
- Added platform package detection for lib-pq-libpq and lib-rdkafka-librdkafka (#11418)
- Added
--dry-runtodump-autoloadcommand to allow running --strict-psr checks without modifying the filesystem (#11608)- Added support for
bumping patch level in~1.2.3constraints (#11590)- Added prompt in
requireif the package name is not found but similar ones exist (#11284)- Added support for env vars and
~in repository paths for vcs and artifact repositories (#11453)- Added support for local directory paths for repositories of type
composer(#11526)- Added links to package homepages in
why/why-notcommand output (#11308)- Added a
securitykey to thesupportkey of composer.json to set the URL to the vulnerability disclosure policy (#11271)- Added support for gathering security advisories from multiple repositories for a single package (#11436)
- Fixed
installexit code to be non-zero (5) if a requested security audit failed (#11362)Fixed binary proxies causing scripts inspecting(Reverted in 2.6.2)$_SERVER['SCRIPT_NAME']to detect them, they are now more transparent (#11562)Fixed executability of non-php binaries which are not marked executable (#11557)(Reverted in 2.6.1)- Fixed
mtimemodification of the vendor dir to only happen when packages are modified, and not require lock file modification to happen (#11593)- Fixed
create-projectusing the wrong composer.json file if one was set via theCOMPOSERenv var (#11493)- Fixed json editing to preserve indentation when updating json files (#11390)
- Fixed handling of broken junctions on windows (#11550)
- Fixed parsing of lib-curl-openssl version with OSX SecureTransport (#11534)
- Fixed svn repo parsing in some edge cases (#11350)
- Fixed handling of archive URLs without file extension (#11520)
- Performance improvement in pool optimization step (#11449, #11450)
2.5.8
... (truncated)
Changelog
Sourced from composer/composer's changelog.
[2.6.4] 2023-09-29
- Security: Fixed possible remote code execution vulnerability if composer.phar is publicly accessible, executable as PHP, and register_argc_argv is enabled in php.ini (GHSA-jm6m-4632-36hf / CVE-2023-43655)
- Fixed json output of abandoned packages in audit command (#11647)
- Performance improvement in pool optimization step (#11638)
- Performance improvement in
show -a <packagename>(#11659)[2.6.3] 2023-09-15
- Added audit.abandoned config setting. Can be set to
ignore,report(current default) orfail(future default in 2.7) to make the audit command report abandoned packages as a security problem (#11639)- Added a warning when duplicates
filesautoload rules are detected (#11109)- Fixed unhandled promise rejection regression (#11620)
- Fixed loading of root aliases on path repo packages when doing partial updates (#11632)
- Fixed
archivecommand not producing the correct output if the temp dir is a symlink (#11636)- Fixed some replaced packages being incorrectly missing when unlocked in a partial update (#11629)
[2.6.2] 2023-09-03
- Reverted "Fixed binary proxies causing scripts inspecting
$_SERVER['SCRIPT_NAME']to detect them, they are now more transparent (#11562)" which caused a regression (#11617)- Fixed non-zero exit code on failed audits to only apply to
install --auditruns and not implicit audits withrequire,create-projectorupdatecommands (#11616)- Fixed
create-projectinfinite post-install loop in some circumstances (#11613)[2.6.1] 2023-09-01
- Reverted "Fixed executability of non-php binaries which are not marked executable (#11557)" which caused a regression (#11612)
[2.6.0] 2023-09-01
- Added audit.ignore config setting to ignore security advisories by id or CVE id (#11556, #11605)
- Added
rmalias to theremovecommand (#11367)- Added runtime platform check to verify the php-64bit requirement is met (#11334)
- Added platform package detection for lib-pq-libpq and lib-rdkafka-librdkafka (#11418)
- Added
--dry-runtodump-autoloadcommand to allow running --strict-psr checks without modifying the filesystem (#11608)- Added support for
bumping patch level in~1.2.3constraints (#11590)- Added prompt in
requireif the package name is not found but similar ones exist (#11284)- Added support for env vars and
~in repository paths for vcs and artifact repositories (#11453)- Added support for local directory paths for repositories of type
composer(#11526)- Added links to package homepages in
why/why-notcommand output (#11308)- Added a
securitykey to thesupportkey of composer.json to set the URL to the vulnerability disclosure policy (#11271)- Added support for gathering security advisories from multiple repositories for a single package (#11436)
- Fixed
installexit code to be non-zero (5) if a requested security audit failed (#11362)Fixed binary proxies causing scripts inspecting(Reverted in 2.6.2)$_SERVER['SCRIPT_NAME']to detect them, they are now more transparent (#11562)Fixed executability of non-php binaries which are not marked executable (#11557)(Reverted in 2.6.1)- Fixed
mtimemodification of the vendor dir to only happen when packages are modified, and not require lock file modification to happen (#11593)- Fixed
create-projectusing the wrong composer.json file if one was set via theCOMPOSERenv var (#11493)- Fixed json editing to preserve indentation when updating json files (#11390)
- Fixed handling of broken junctions on windows (#11550)
- Fixed parsing of lib-curl-openssl version with OSX SecureTransport (#11534)
- Fixed svn repo parsing in some edge cases (#11350)
- Fixed handling of archive URLs without file extension (#11520)
... (truncated)
Commits
d75d17cRelease 2.6.4081ec4aUpdate changelog955a48eMerge pull request from GHSA-jm6m-4632-36hfb608b8efeat: improve Composer's output reproducibility (#11663)77fadf0Update changelog892eaacOptimize show -a by loading only the requested package (#11659)c7e696dBump dependenciesf6ce834Use CompilingMatcher in DefaultPolicy for performance reasons (#11638)755de04Fix abandoned package list JSON serialization (#11647)1f9f91cChanged psr/logger to psr/log (#11652)- Additional commits viewable in compare view
Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.
Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR:
@dependabot rebasewill rebase this PR@dependabot recreatewill recreate this PR, overwriting any edits that have been made to it@dependabot mergewill merge this PR after your CI passes on it@dependabot squash and mergewill squash and merge this PR after your CI passes on it@dependabot cancel mergewill cancel a previously requested merge and block automerging@dependabot reopenwill reopen this PR if it is closed@dependabot closewill close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually@dependabot show <dependency name> ignore conditionswill show all of the ignore conditions of the specified dependency@dependabot ignore this major versionwill close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)@dependabot ignore this minor versionwill close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)@dependabot ignore this dependencywill close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself) You can disable automated security fix PRs for this repo from the Security Alerts page.
Codecov Report
All modified lines are covered by tests :white_check_mark:
Comparison is base (
adf1398) 0.00% compared to head (ca19a78) 0.00%.
Additional details and impacted files
@@ Coverage Diff @@
## main #376 +/- ##
=======================================
Coverage 0.00% 0.00%
Complexity 371 371
=======================================
Files 130 130
Lines 1611 1611
=======================================
Misses 1611 1611
:umbrella: View full report in Codecov by Sentry.
:loudspeaker: Have feedback on the report? Share it here.