Bump glob from 10.3.15 to 10.5.0 in /sdks/nodejs
Bumps glob from 10.3.15 to 10.5.0.
Changelog
Sourced from glob's changelog.
changeglob
12
- Remove the unsafe
--shelloption. The--shelloption is now ONLY supported on known shells where the behavior can be implemented safely.11.1
- Add the
--shelloption for the command line, with a warning that this is unsafe. (It will be removed in v12.)- Add the
--cmd-arg/-gas a way to safely add positional arguments to the command provided to the CLI tool.- Detect commands with space or quote characters on known shells, and pass positional arguments to them safely, avoiding
shell:trueexecution.11.0
- Drop support for node before v20
10.4
- Add
includeChildMatches: falseoption- Export the
Ignoreclass10.3
- Add
--default -pflag to provide a default pattern- exclude symbolic links to directories when
followandnodirare both set10.2
- Add glob cli
10.1
- Return
'.'instead of the empty string''when the current working directory is returned as a match.- Add
posix: trueoption to return/delimited paths, even on Windows.10.0.0
- No default exports, only named exports
... (truncated)
Commits
56774ef10.5.01e4e297bin: Do not expose filenames to shell expansion1f0c1ca10.4.5eaf31dcwhatever, just allow any engines782751610.4.4d06c8f8restore support for node 14.latest and 16.latestc14b78710.4.38a69defnode 14 no longer supportedeef7ea310.4.2c76a7d2use package-json-from-dist to look up package.json- Additional commits viewable in compare view
Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.
Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR:
-
@dependabot rebasewill rebase this PR -
@dependabot recreatewill recreate this PR, overwriting any edits that have been made to it -
@dependabot mergewill merge this PR after your CI passes on it -
@dependabot squash and mergewill squash and merge this PR after your CI passes on it -
@dependabot cancel mergewill cancel a previously requested merge and block automerging -
@dependabot reopenwill reopen this PR if it is closed -
@dependabot closewill close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually -
@dependabot show <dependency name> ignore conditionswill show all of the ignore conditions of the specified dependency -
@dependabot ignore this major versionwill close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself) -
@dependabot ignore this minor versionwill close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself) -
@dependabot ignore this dependencywill close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself) You can disable automated security fix PRs for this repo from the Security Alerts page.
Nice try @dependabot 😄 You updated the package-lock file but you most probably wanted to update the package.json dependencies right ?
Did you meant to update these dependencies ?
"dependencies": {
"@grpc/grpc-js": "1.14.1", // previously 1.10.9
"google-protobuf": "4.0.1" // previously 3.21.2
},
"devDependencies": {
"eslint": "^9.39.1", // previously ^8.57.0
"jasmine": "^5.12.0", // previously ^5.1.0
"nyc": "^17.1.0" // previously ^15.1.0
},
glob and js-yaml are dependencies of jasmine and eslint respectively
@steven-supersolid - what's the right approach here for the JS dependabot updates?
@steven-supersolid - what's the right approach here for the JS dependabot updates?
When installing with npm install the dependencies in package-lock.json will apply provided they are considered valid in package.json. As these are transitive dependencies this will be fine because the package maintainer has set a range.
So this is fine as a security update.
The dependencies mentioned by @lacroixthomas can be updated as a manual process especially as some a major version updates to likely introduce a breaking change. This would be an maintenance task. It is only required if we want to take advantage of new features or if a security update requires a new direct dependency update. A lighter maintenance task would be to only update to the latest minor version as in theory there should be no breaking changes. Running npm update afterwards would also then update transitive dependencies to their latest allowed version. If this introduces incompatibilities then npm audit fix will only update the insecure dependencies.