build(deps): bump ws, engine.io, socket.io-adapter and engine.io-client
Bumps ws, engine.io, socket.io-adapter and engine.io-client. These dependencies needed to be updated together.
Updates ws from 8.14.2 to 8.17.1
Release notes
Sourced from ws's releases.
8.17.1
Bug fixes
- Fixed a DoS vulnerability (#2231).
A request with a number of headers exceeding the[
server.maxHeadersCount][] threshold could be used to crash a ws server.const http = require('http'); const WebSocket = require('ws');const wss = new WebSocket.Server({ port: 0 }, function () { const chars = "!#$%&'*+-.0123456789abcdefghijklmnopqrstuvwxyz^_`|~".split(''); const headers = {}; let count = 0;
for (let i = 0; i < chars.length; i++) { if (count === 2000) break;
for (let j = 0; j < chars.length; j++) { const key = chars[i] + chars[j]; headers[key] = 'x';if (++count === 2000) break; }
}
headers.Connection = 'Upgrade'; headers.Upgrade = 'websocket'; headers['Sec-WebSocket-Key'] = 'dGhlIHNhbXBsZSBub25jZQ=='; headers['Sec-WebSocket-Version'] = '13';
const request = http.request({ headers: headers, host: '127.0.0.1', port: wss.address().port });
request.end(); });
The vulnerability was reported by Ryan LaPointe in websockets/ws#2230.
In vulnerable versions of ws, the issue can be mitigated in the following ways:
- Reduce the maximum allowed length of the request headers using the [
--max-http-header-size=size][] and/or the [maxHeaderSize][] options so that no more headers than theserver.maxHeadersCountlimit can be sent.
... (truncated)
Commits
3c56601[dist] 8.17.1e55e510[security] Fix crash when the Upgrade header cannot be read (#2231)6a00029[test] Increase code coverageddfe4a8[perf] Reduce the amount ofcrypto.randomFillSync()callsb73b118[dist] 8.17.029694a5[test] Use thehighWaterMarkvariable934c9d6[ci] Test on node 221817bac[ci] Do not test on node 2196c9b3d[major] Flip the default value ofallowSynchronousEvents(#2221)e5f32c7[fix] Emit at most one event per event loop iteration (#2218)- Additional commits viewable in compare view
Updates ws from 6.2.2 to 8.17.1
Release notes
Sourced from ws's releases.
8.17.1
Bug fixes
- Fixed a DoS vulnerability (#2231).
A request with a number of headers exceeding the[
server.maxHeadersCount][] threshold could be used to crash a ws server.const http = require('http'); const WebSocket = require('ws');const wss = new WebSocket.Server({ port: 0 }, function () { const chars = "!#$%&'*+-.0123456789abcdefghijklmnopqrstuvwxyz^_`|~".split(''); const headers = {}; let count = 0;
for (let i = 0; i < chars.length; i++) { if (count === 2000) break;
for (let j = 0; j < chars.length; j++) { const key = chars[i] + chars[j]; headers[key] = 'x';if (++count === 2000) break; }
}
headers.Connection = 'Upgrade'; headers.Upgrade = 'websocket'; headers['Sec-WebSocket-Key'] = 'dGhlIHNhbXBsZSBub25jZQ=='; headers['Sec-WebSocket-Version'] = '13';
const request = http.request({ headers: headers, host: '127.0.0.1', port: wss.address().port });
request.end(); });
The vulnerability was reported by Ryan LaPointe in websockets/ws#2230.
In vulnerable versions of ws, the issue can be mitigated in the following ways:
- Reduce the maximum allowed length of the request headers using the [
--max-http-header-size=size][] and/or the [maxHeaderSize][] options so that no more headers than theserver.maxHeadersCountlimit can be sent.
... (truncated)
Commits
3c56601[dist] 8.17.1e55e510[security] Fix crash when the Upgrade header cannot be read (#2231)6a00029[test] Increase code coverageddfe4a8[perf] Reduce the amount ofcrypto.randomFillSync()callsb73b118[dist] 8.17.029694a5[test] Use thehighWaterMarkvariable934c9d6[ci] Test on node 221817bac[ci] Do not test on node 2196c9b3d[major] Flip the default value ofallowSynchronousEvents(#2221)e5f32c7[fix] Emit at most one event per event loop iteration (#2218)- Additional commits viewable in compare view
Updates engine.io from 6.5.4 to 6.5.5
Release notes
Sourced from engine.io's releases.
6.5.5
This release contains a bump of the
wsdependency, which includes an important security fix.Advisory: https://github.com/advisories/GHSA-3h5v-q93c-6h6q
Bug Fixes
Links
- Diff: https://github.com/socketio/engine.io/compare/6.5.4...6.5.5
- Client release: -
ws@~8.17.1(diff)
Changelog
Sourced from engine.io's changelog.
6.5.5 (2024-06-18)
This release contains a bump of the
wsdependency, which includes an important security fix.Advisory: https://github.com/advisories/GHSA-3h5v-q93c-6h6q
Bug Fixes
Dependencies
3.6.2 (2024-06-18)
This release contains a bump of the
wsdependency, which includes an important security fix.Advisory: https://github.com/advisories/GHSA-3h5v-q93c-6h6q
Dependencies
Commits
Updates socket.io-adapter from 2.5.2 to 2.5.5
Release notes
Sourced from socket.io-adapter's releases.
2.5.4
Bug Fixes
- ensure the order of the commands (a13f35f)
- types: ensure compatibility with TypeScript < 4.5 (ca397f3)
Links
2.5.3
Two abstract classes were imported from the Redis adapter repository:
- the
ClusterAdapterclass, which manages the messages sent between the server instances of the cluster- the
ClusterAdapterWithHeartbeatclass, which extends theClusterAdapterand adds a heartbeat mechanism in order to check the healthiness of the other instancesOther adapters can then just extend those classes and only have to implement the pub/sub mechanism (and not the internal chit-chat protocol):
class MyAdapter extends ClusterAdapterWithHeartbeat { constructor(nsp, pubSub, opts) { super(nsp, opts); this.pubSub = pubSub; pubSub.subscribe("main-channel", (message) => this.onMessage(message)); pubSub.subscribe("specific-channel#" + this.uid, (response) => this.onResponse(response)); }doPublish(message) { return this.pubSub.publish("main-channel", message); }
doPublishResponse(requesterUid, response) { return this.pubSub.publish("specific-channel#" + requesterUid, response); } }
Besides, the number of "timeout reached: only x responses received out of y" errors (which can happen when a server instance leaves the cluster) should be greatly reduced by this commit.
Bug Fixes
- cluster: fix count in fetchSockets() method (80af4e9)
- cluster: notify the other nodes when closing (0e23ff0)
Performance Improvements
- cluster: use timer.refresh() (d99a71b)
... (truncated)
Changelog
Sourced from socket.io-adapter's changelog.
2.5.5 (2024-06-18)
This release contains a bump of the
wsdependency, which includes an important security fix.Advisory: https://github.com/advisories/GHSA-3h5v-q93c-6h6q
2.5.4 (2024-02-22)
Bug Fixes
- ensure the order of the commands (a13f35f)
- types: ensure compatibility with TypeScript < 4.5 (ca397f3)
2.5.3 (2024-02-21)
Two abstract classes were imported from the Redis adapter repository:
- the
ClusterAdapterclass, which manages the messages sent between the server instances of the cluster- the
ClusterAdapterWithHeartbeatclass, which extends theClusterAdapterand adds a heartbeat mechanism in order to check the healthiness of the other instancesOther adapters can then just extend those classes and only have to implement the pub/sub mechanism (and not the internal chit-chat protocol):
class MyAdapter extends ClusterAdapterWithHeartbeat { constructor(nsp, pubSub, opts) { super(nsp, opts); this.pubSub = pubSub; pubSub.subscribe("main-channel", (message) => this.onMessage(message)); pubSub.subscribe("specific-channel#" + this.uid, (response) => this.onResponse(response)); }doPublish(message) { return this.pubSub.publish("main-channel", message); }
doPublishResponse(requesterUid, response) { return this.pubSub.publish("specific-channel#" + requesterUid, response); } }
Besides, the number of "timeout reached: only x responses received out of y" errors (which can happen when a server instance leaves the cluster) should be greatly reduced by this commit.
Bug Fixes
... (truncated)
Commits
05a190achore(release): 6.5.593fe190chore(deps): bump ws from 8.11.0 to 8.17.1 (#93)5eae5a0chore(release): 2.5.4005d546ci: test with older TypeScript versiona13f35ffix: ensure the order of the commands207c0dbrefactor: break circular dependency (2)abc93a9refactor: break circular dependency (1)9d4c4a7refactor(cluster): export ClusterAdapterOptions and MessageType typesca397f3fix(types): ensure compatibility with TypeScript < 4.5549156cchore(release): 2.5.3- Additional commits viewable in compare view
Updates engine.io-client from 6.5.3 to 6.5.4
Release notes
Sourced from engine.io-client's releases.
6.5.4
This release contains a bump of the
wsdependency, which includes an important security fix.Advisory: https://github.com/advisories/GHSA-3h5v-q93c-6h6q
Links
- Diff: https://github.com/socketio/engine.io-client/compare/6.5.3...6.5.4
- Server release: -
ws@~8.17.1(diff)
Changelog
Sourced from engine.io-client's changelog.
6.5.4 (2024-06-18)
This release contains a bump of the
wsdependency, which includes an important security fix.Advisory: https://github.com/advisories/GHSA-3h5v-q93c-6h6q
Dependencies
3.5.4 (2024-06-18)
This release contains a bump of the
wsdependency, which includes an important security fix.Advisory: https://github.com/advisories/GHSA-3h5v-q93c-6h6q
Dependencies
Commits
454940dchore(release): 6.5.40eb956bchore: bump ws to version 8.17.1- See full diff in compare view
You can trigger a rebase of this PR by commenting @dependabot rebase.
Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR:
@dependabot rebasewill rebase this PR@dependabot recreatewill recreate this PR, overwriting any edits that have been made to it@dependabot mergewill merge this PR after your CI passes on it@dependabot squash and mergewill squash and merge this PR after your CI passes on it@dependabot cancel mergewill cancel a previously requested merge and block automerging@dependabot reopenwill reopen this PR if it is closed@dependabot closewill close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually@dependabot show <dependency name> ignore conditionswill show all of the ignore conditions of the specified dependency@dependabot ignore this major versionwill close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)@dependabot ignore this minor versionwill close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)@dependabot ignore this dependencywill close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself) You can disable automated security fix PRs for this repo from the Security Alerts page.
Note Automatic rebases have been disabled on this pull request as it has been open for over 30 days.
☁️ Nx Cloud Report
CI is running/has finished running commands for commit 76b42848a6334d95de3731f5fc87b296051c01e7. As they complete they will appear below. Click to see the status, the terminal output, and the build insights.
📂 See all runs for this CI Pipeline Execution
✅ Successfully ran 1 target
Sent with 💌 from NxCloud.
This PR has been automatically marked as stale because it has not had recent activity for 6 months. It will be closed if no further activity occurs. Thank you for your contributions.
Closing this PR due to no activity for 6 months.
OK, I won't notify you again about this release, but will get in touch when a new version is available.
If you change your mind, just re-open this PR and I'll resolve any conflicts on it.