Skip to content

Bump @contentful/f36-components from 4.0.17 to 4.56.2 in /subhub-link-checker#443

Open
dependabot[bot] wants to merge 2154 commits intomasterfrom
dependabot/npm_and_yarn/subhub-link-checker/contentful/f36-components-4.56.2
Open

Bump @contentful/f36-components from 4.0.17 to 4.56.2 in /subhub-link-checker#443
dependabot[bot] wants to merge 2154 commits intomasterfrom
dependabot/npm_and_yarn/subhub-link-checker/contentful/f36-components-4.56.2

Conversation

@dependabot
Copy link
Copy Markdown
Contributor

@dependabot dependabot bot commented on behalf of github Dec 18, 2023

Bumps @contentful/f36-components from 4.0.17 to 4.56.2.

Changelog

Sourced from @​contentful/f36-components's changelog.


title: What's new slug: '/whats-new' section: 'introduction'

The Changelog gives an overview of the changes we've made to Forma 36

12-12-2023

F36 Tokens v4.0.3

  • feat(Text): add letterSpacing support

F36 Typography v4.56.2

  • feat(Text): add letterSpacing support

09-12-2023

F36 Core v4.56.1

  • Map gap 'none' to 0px

07-12-2023

F36 Button v4.55.1

  • fix(Button): default padding for small size

F36 Badge v4.56.0

  • Allow passing icons to Badge component with small size

06-12-2023

F36 Copybutton v4.55.0

  • Make CopyButton component visual props less strict

02-12-2023

F36 Button v4.54.5

  • Consume density context on buttons

F36 Utils v4.24.2

... (truncated)

Commits

Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot show <dependency name> ignore conditions will show all of the ignore conditions of the specified dependency
  • @dependabot ignore this major version will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this minor version will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)

devslashnoel and others added 22 commits August 24, 2023 16:16
Fix failed start up due to Contentful type changes
…search-stage-url

RSM-3036: stage: replace search with url
Bumps [@contentful/f36-components](https://github.com/contentful/forma-36) from 4.0.17 to 4.56.2.
- [Release notes](https://github.com/contentful/forma-36/releases)
- [Changelog](https://github.com/contentful/forma-36/blob/main/CHANGELOG.md)
- [Commits](https://github.com/contentful/forma-36/compare/@contentful/f36-components@4.0.17...@contentful/f36-components@4.56.2)

---
updated-dependencies:
- dependency-name: "@contentful/f36-components"
  dependency-type: direct:production
  update-type: version-update:semver-minor
...

Signed-off-by: dependabot[bot] <support@github.com>
@dependabot dependabot bot added the dependencies Pull requests that update a dependency file label Dec 18, 2023
@lugn621 lugn621 force-pushed the dependabot/npm_and_yarn/subhub-link-checker/contentful/f36-components-4.56.2 branch from 6d65397 to b2854e5 Compare April 2, 2026 02:11
Comment on lines +15 to +36
name: Run linters
runs-on: ubuntu-latest

steps:
- name: Check out Git repository
uses: actions/checkout@v2

- name: Set up Node.js
uses: actions/setup-node@v1
with:
node-version: 18

- name: Install Node.js dependencies
working-directory: ./research-hub-web
run: npm ci --force

- name: Install Angular CLI
run: npm install -g @angular/cli

- name: ng lint
working-directory: ./research-hub-web
run: ng lint

Check warning

Code scanning / CodeQL

Workflow does not contain permissions Medium

Actions job or workflow does not limit the permissions of the GITHUB_TOKEN. Consider setting an explicit permissions block, using the following as a minimal starting point: {contents: read}

Copilot Autofix

AI 9 days ago

In general, this should be fixed by adding a permissions block that limits the GITHUB_TOKEN to the least privileges required. For a linting workflow that only checks out code and runs linters, read access to repository contents is sufficient, so contents: read is an appropriate minimal setting.

The best fix without changing existing functionality is to add a permissions block at the workflow root level, directly under the name: Lint line. This will apply to all jobs in the workflow (there is only run-linters), and restrict GITHUB_TOKEN to read-only contents access. No other code changes, imports, or steps are required.

Concretely, in .github/workflows/linting.yml, insert:

permissions:
  contents: read

between line 1 (name: Lint) and line 3 (on:). This documents the intended minimal permissions and ensures the workflow remains least-privilege even if repository or organization defaults change.

Suggested changeset 1
.github/workflows/linting.yml

Autofix patch

Autofix patch
Run the following command in your local git repository to apply this patch
cat << 'EOF' | git apply
diff --git a/.github/workflows/linting.yml b/.github/workflows/linting.yml
--- a/.github/workflows/linting.yml
+++ b/.github/workflows/linting.yml
@@ -1,4 +1,6 @@
 name: Lint
+permissions:
+  contents: read
 
 on:
   # Trigger the workflow on push or pull request,
EOF
@@ -1,4 +1,6 @@
name: Lint
permissions:
contents: read

on:
# Trigger the workflow on push or pull request,
Copilot is powered by AI and may make mistakes. Always verify output.
Comment on lines +14 to +33
name: Create Sentry Release
runs-on: ubuntu-latest

steps:
- name: Check out Git repository
uses: actions/checkout@v2
- name: Get Branch
id: var
run: echo ::set-output name=branch::${GITHUB_REF#refs/*/}
- name: Output Branch
run: echo ${{ steps.var.outputs.branch }}
- name: Notify Sentry
# https://github.com/getsentry/action-release
uses: getsentry/action-release@v1.1.6
env:
SENTRY_AUTH_TOKEN: ${{ secrets.SENTRY_AUTH_TOKEN }}
SENTRY_ORG: university-of-auckland-7o
SENTRY_PROJECT: research-hub
with:
environment: ${{ steps.var.outputs.branch }} No newline at end of file

Check warning

Code scanning / CodeQL

Workflow does not contain permissions Medium

Actions job or workflow does not limit the permissions of the GITHUB_TOKEN. Consider setting an explicit permissions block, using the following as a minimal starting point: {contents: read}

Copilot Autofix

AI 9 days ago

To fix the problem, add an explicit permissions block that restricts the GITHUB_TOKEN to the least privilege needed. Since this workflow only checks out the code and then calls Sentry’s release action (which uses an explicit Sentry token, not GITHUB_TOKEN), it should be sufficient to grant read-only access to repository contents.

The best, minimal-impact fix is to add a workflow‑level permissions section directly under the name (or on) key, so it applies to all jobs by default. In .github/workflows/sentry.yml, between lines 1–3 (after name: Sentry Release and before on:), insert:

permissions:
  contents: read

No imports or extra definitions are required. This change documents the workflow’s needs and ensures the GITHUB_TOKEN remains read‑only even if org/repo defaults change.

Suggested changeset 1
.github/workflows/sentry.yml

Autofix patch

Autofix patch
Run the following command in your local git repository to apply this patch
cat << 'EOF' | git apply
diff --git a/.github/workflows/sentry.yml b/.github/workflows/sentry.yml
--- a/.github/workflows/sentry.yml
+++ b/.github/workflows/sentry.yml
@@ -1,5 +1,8 @@
 name: Sentry Release
 
+permissions:
+  contents: read
+
 on:
   push:
     branches:
EOF
@@ -1,5 +1,8 @@
name: Sentry Release

permissions:
contents: read

on:
push:
branches:
Copilot is powered by AI and may make mistakes. Always verify output.
run: echo ${{ steps.var.outputs.branch }}
- name: Notify Sentry
# https://github.com/getsentry/action-release
uses: getsentry/action-release@v1.1.6

Check warning

Code scanning / CodeQL

Unpinned tag for a non-immutable Action in workflow Medium

Unpinned 3rd party Action 'Sentry Release' step
Uses Step
uses 'getsentry/action-release' with ref 'v1.1.6', not a pinned commit hash

module.exports.search = async (event, context) => {
try {
console.log(`Received query: ${event.body}`);

Check warning

Code scanning / CodeQL

Log injection Medium

Log entry depends on a
user-provided value
.

Copilot Autofix

AI 9 days ago

In general, to fix log injection you should avoid writing raw user input directly to logs. At minimum, remove characters that can affect log structure (like \n and \r), and clearly label user-controlled sections in log messages. For logs that might be rendered as HTML, HTML-encode user inputs before logging.

For this specific case in hub-search-proxy/handler.js, the best fix is to sanitize event.body before interpolating it into the log message. We can create a sanitized version of the string by converting event.body to a string (to be safe) and removing any newline and carriage return characters using String.prototype.replace with a regular expression. Then log the sanitized string instead of the raw body. This change should be done immediately before the console.log call at line 53, and no new imports are necessary. Existing behavior is preserved, except that log output will no longer contain embedded line breaks injected by the caller.

Concretely:

  • In the module.exports.search function, replace the direct console.log(\Received query: ${event.body}`);` with:
    • A new local variable, e.g. const safeBody = String(event.body).replace(/[\r\n]/g, '');
    • A log statement using safeBody instead of event.body.
      No other parts of the function need to change.
Suggested changeset 1
hub-search-proxy/handler.js

Autofix patch

Autofix patch
Run the following command in your local git repository to apply this patch
cat << 'EOF' | git apply
diff --git a/hub-search-proxy/handler.js b/hub-search-proxy/handler.js
--- a/hub-search-proxy/handler.js
+++ b/hub-search-proxy/handler.js
@@ -50,7 +50,8 @@
 
 module.exports.search = async (event, context) => {
     try {
-        console.log(`Received query: ${event.body}`);
+        const safeBody = String(event.body).replace(/[\r\n]/g, '');
+        console.log(`Received query: ${safeBody}`);
         const requestBody = JSON.parse(event.body);
         let queryString = '';
         let size = 10;
EOF
@@ -50,7 +50,8 @@

module.exports.search = async (event, context) => {
try {
console.log(`Received query: ${event.body}`);
const safeBody = String(event.body).replace(/[\r\n]/g, '');
console.log(`Received query: ${safeBody}`);
const requestBody = JSON.parse(event.body);
let queryString = '';
let size = 10;
Copilot is powered by AI and may make mistakes. Always verify output.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

dependencies Pull requests that update a dependency file

Projects

None yet

Development

Successfully merging this pull request may close these issues.

7 participants