-
Notifications
You must be signed in to change notification settings - Fork 9
fix(ci): replace retired pnpm audit endpoint #103
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Changes from all commits
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
| Original file line number | Diff line number | Diff line change | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|
@@ -29,8 +29,8 @@ jobs: | |||||||||||||
| - name: Type Check | ||||||||||||||
| run: pnpm type-check | ||||||||||||||
|
|
||||||||||||||
| - name: Security Audit | ||||||||||||||
| run: pnpm audit --prod | ||||||||||||||
| - name: Registry Signatures Audit | ||||||||||||||
| run: npm audit signatures | ||||||||||||||
|
Contributor
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more.
The PR description's verification line
Comment on lines
+32
to
+33
Contributor
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more.
If unblocking the HTTP 410 error is the immediate goal and CVE coverage should be preserved, you could run both:
Suggested change
|
||||||||||||||
|
|
||||||||||||||
| test: | ||||||||||||||
| name: Functional Tests | ||||||||||||||
|
|
||||||||||||||
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
npm audit signatureslikely fails withoutpackage-lock.jsonThis repo has only
pnpm-lock.yaml— nopackage-lock.json. The npm v10 docs state: "By default npm requires a package-lock or shrinkwrap in order to run the audit." Runningnpm audit signatures(which uses the same underlying arborist machinery) without a lockfile may exit with an error rather than silently passing.Beyond the lockfile, pnpm's virtual store places packages under
node_modules/.pnpm/behind symlinks. npm'sarboristwalker is designed for npm's flatnode_moduleslayout; with pnpm's structure it may only see the top-level symlinks (direct dependencies) and silently skip the full transitive dependency tree in.pnpm/, giving an incomplete audit even if it does not error out.A pnpm-native alternative that doesn't require a
package-lock.json:Or, if signature-provenance verification (not CVE checking) is the goal, generate a throwaway lockfile first: