Skip to content

Bump aws-sdk from 2.1087.0 to 2.1528.0 in /hub-search-proxy#448

Open
dependabot[bot] wants to merge 2154 commits intomasterfrom
dependabot/npm_and_yarn/hub-search-proxy/aws-sdk-2.1528.0
Open

Bump aws-sdk from 2.1087.0 to 2.1528.0 in /hub-search-proxy#448
dependabot[bot] wants to merge 2154 commits intomasterfrom
dependabot/npm_and_yarn/hub-search-proxy/aws-sdk-2.1528.0

Conversation

@dependabot
Copy link
Copy Markdown
Contributor

@dependabot dependabot bot commented on behalf of github Jan 1, 2024

Bumps aws-sdk from 2.1087.0 to 2.1528.0.

Release notes

Sourced from aws-sdk's releases.

Release v2.1528.0

See changelog for more information.

Release v2.1527.0

See changelog for more information.

Release v2.1526.0

See changelog for more information.

Release v2.1525.0

See changelog for more information.

Release v2.1524.0

See changelog for more information.

Release v2.1523.0

See changelog for more information.

Release v2.1522.0

See changelog for more information.

Release v2.1521.0

See changelog for more information.

Release v2.1520.0

See changelog for more information.

Release v2.1519.0

See changelog for more information.

Release v2.1518.0

See changelog for more information.

Release v2.1517.0

See changelog for more information.

Release v2.1516.0

See changelog for more information.

Release v2.1515.0

See changelog for more information.

Release v2.1514.0

See changelog for more information.

Release v2.1513.0

See changelog for more information.

Release v2.1512.0

See changelog for more information.

... (truncated)

Commits
  • 669f942 Updates SDK to v2.1528.0
  • bcf7da5 docs: update readme to change maintenance announcement to early 2024 (#4564)
  • f09e1bf Updates SDK to v2.1527.0
  • 85c94d5 Updates SDK to v2.1526.0
  • c93f082 Updates SDK documentation
  • dd03b38 Updates SDK to v2.1525.0
  • a4346de Updates SDK to v2.1524.0
  • 23b1e6c Updates SDK to v2.1523.0
  • 42a1c02 Updates SDK to v2.1522.0
  • 1984f89 chore(console): skip neptunegraph from console repl (#4555)
  • Additional commits viewable in compare view

Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot show <dependency name> ignore conditions will show all of the ignore conditions of the specified dependency
  • @dependabot ignore this major version will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this minor version will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)

devslashnoel and others added 24 commits August 24, 2023 15:58
Fix failed start up due to Contentful type changes
…search-stage-url

RSM-3036: stage: replace search with url
Bumps [aws-sdk](https://github.com/aws/aws-sdk-js) from 2.1087.0 to 2.1528.0.
- [Release notes](https://github.com/aws/aws-sdk-js/releases)
- [Commits](aws/aws-sdk-js@v2.1087.0...v2.1528.0)

---
updated-dependencies:
- dependency-name: aws-sdk
  dependency-type: direct:production
  update-type: version-update:semver-minor
...

Signed-off-by: dependabot[bot] <support@github.com>
@dependabot dependabot bot added the dependencies Pull requests that update a dependency file label Jan 1, 2024
@dependabot @github
Copy link
Copy Markdown
Contributor Author

dependabot bot commented on behalf of github Jan 1, 2024

Dependabot tried to add @Trombach, @cakr322 and @eric-el-tan as reviewers to this PR, but received the following error from GitHub:

POST https://api.github.com/repos/UoA-eResearch/hub-stack/pulls/448/requested_reviewers: 422 - Reviews may only be requested from collaborators. One or more of the users or teams you specified is not a collaborator of the UoA-eResearch/hub-stack repository. // See: https://docs.github.com/rest/pulls/review-requests#request-reviewers-for-a-pull-request

@lugn621 lugn621 force-pushed the dependabot/npm_and_yarn/hub-search-proxy/aws-sdk-2.1528.0 branch from 70963d1 to 0f8932e Compare April 2, 2026 02:11
Comment on lines +15 to +36
name: Run linters
runs-on: ubuntu-latest

steps:
- name: Check out Git repository
uses: actions/checkout@v2

- name: Set up Node.js
uses: actions/setup-node@v1
with:
node-version: 18

- name: Install Node.js dependencies
working-directory: ./research-hub-web
run: npm ci --force

- name: Install Angular CLI
run: npm install -g @angular/cli

- name: ng lint
working-directory: ./research-hub-web
run: ng lint

Check warning

Code scanning / CodeQL

Workflow does not contain permissions Medium

Actions job or workflow does not limit the permissions of the GITHUB_TOKEN. Consider setting an explicit permissions block, using the following as a minimal starting point: {contents: read}

Copilot Autofix

AI 8 days ago

In general, the fix is to explicitly set a permissions block that grants only the minimal scopes required for this linting job. Since the job only checks out code and installs/runs Node-based tools, it only needs read access to repository contents.

The best minimally invasive fix is to add a permissions block at the workflow root (top level, alongside name and on) so that it applies to all jobs. This avoids touching the job structure or steps and documents that the workflow only needs read access. Concretely, in .github/workflows/linting.yml, insert:

permissions:
  contents: read

between the existing name: Lint and on: keys. No imports or other changes are needed, and existing functionality is unchanged because all current operations are compatible with read-only contents access.

Suggested changeset 1
.github/workflows/linting.yml

Autofix patch

Autofix patch
Run the following command in your local git repository to apply this patch
cat << 'EOF' | git apply
diff --git a/.github/workflows/linting.yml b/.github/workflows/linting.yml
--- a/.github/workflows/linting.yml
+++ b/.github/workflows/linting.yml
@@ -1,5 +1,8 @@
 name: Lint
 
+permissions:
+  contents: read
+
 on:
   # Trigger the workflow on push or pull request,
   # but only for the main branch
EOF
@@ -1,5 +1,8 @@
name: Lint

permissions:
contents: read

on:
# Trigger the workflow on push or pull request,
# but only for the main branch
Copilot is powered by AI and may make mistakes. Always verify output.
Comment on lines +14 to +33
name: Create Sentry Release
runs-on: ubuntu-latest

steps:
- name: Check out Git repository
uses: actions/checkout@v2
- name: Get Branch
id: var
run: echo ::set-output name=branch::${GITHUB_REF#refs/*/}
- name: Output Branch
run: echo ${{ steps.var.outputs.branch }}
- name: Notify Sentry
# https://github.com/getsentry/action-release
uses: getsentry/action-release@v1.1.6
env:
SENTRY_AUTH_TOKEN: ${{ secrets.SENTRY_AUTH_TOKEN }}
SENTRY_ORG: university-of-auckland-7o
SENTRY_PROJECT: research-hub
with:
environment: ${{ steps.var.outputs.branch }} No newline at end of file

Check warning

Code scanning / CodeQL

Workflow does not contain permissions Medium

Actions job or workflow does not limit the permissions of the GITHUB_TOKEN. Consider setting an explicit permissions block, using the following as a minimal starting point: {contents: read}

Copilot Autofix

AI 8 days ago

In general, the fix is to add an explicit permissions block either at the workflow root (applies to all jobs) or inside the specific job, restricting GITHUB_TOKEN to the least privileges required. For this workflow, the actions used (actions/checkout and getsentry/action-release) need read access to the repository contents to check out the code and to associate releases/commits, but do not require write access to the repository itself. Therefore, contents: read is an appropriate minimal permission.

The single best fix without changing existing functionality is to add a permissions block at the workflow root, just under the name: line and before the on: key, setting contents: read. This will apply to the sentry-release job (and any future jobs without their own permissions block), ensuring the GITHUB_TOKEN is restricted. No imports or additional definitions are needed; this is a purely declarative GitHub Actions YAML change. Concretely, edit .github/workflows/sentry.yml to insert:

permissions:
  contents: read

after line 1 (name: Sentry Release).

Suggested changeset 1
.github/workflows/sentry.yml

Autofix patch

Autofix patch
Run the following command in your local git repository to apply this patch
cat << 'EOF' | git apply
diff --git a/.github/workflows/sentry.yml b/.github/workflows/sentry.yml
--- a/.github/workflows/sentry.yml
+++ b/.github/workflows/sentry.yml
@@ -1,4 +1,6 @@
 name: Sentry Release
+permissions:
+  contents: read
 
 on:
   push:
EOF
@@ -1,4 +1,6 @@
name: Sentry Release
permissions:
contents: read

on:
push:
Copilot is powered by AI and may make mistakes. Always verify output.
run: echo ${{ steps.var.outputs.branch }}
- name: Notify Sentry
# https://github.com/getsentry/action-release
uses: getsentry/action-release@v1.1.6

Check warning

Code scanning / CodeQL

Unpinned tag for a non-immutable Action in workflow Medium

Unpinned 3rd party Action 'Sentry Release' step
Uses Step
uses 'getsentry/action-release' with ref 'v1.1.6', not a pinned commit hash

module.exports.search = async (event, context) => {
try {
console.log(`Received query: ${event.body}`);

Check warning

Code scanning / CodeQL

Log injection Medium

Log entry depends on a
user-provided value
.

Copilot Autofix

AI 8 days ago

In general, the fix is to sanitize user-controlled data before logging it, especially by removing or neutralizing newline (\n) and carriage return (\r) characters that can break log structure. Logging should also clearly delimit user input.

For this specific case, the best minimal fix is:

  • Create a sanitized version of event.body where \n and \r are stripped (or otherwise made safe).
  • Use that sanitized value in the log message instead of the raw event.body.
  • Keep the rest of the logic unchanged so that JSON.parse(event.body) still operates on the original event data (no behavioral changes for request handling).

Concretely, in hub-search-proxy/handler.js, inside module.exports.search, just before logging, create a local variable (e.g., sanitizedBody) that:

  • Coerces event.body to string (to be robust if it is undefined or non-string).
  • Replaces all \r and \n characters with empty strings using String.prototype.replace and a suitable regular expression.
    Then change the console.log to use this sanitized variable. No external dependencies are needed; all can be done with built-in string methods.
Suggested changeset 1
hub-search-proxy/handler.js

Autofix patch

Autofix patch
Run the following command in your local git repository to apply this patch
cat << 'EOF' | git apply
diff --git a/hub-search-proxy/handler.js b/hub-search-proxy/handler.js
--- a/hub-search-proxy/handler.js
+++ b/hub-search-proxy/handler.js
@@ -50,7 +50,8 @@
 
 module.exports.search = async (event, context) => {
     try {
-        console.log(`Received query: ${event.body}`);
+        const sanitizedBody = String(event.body).replace(/[\r\n]/g, '');
+        console.log(`Received query: ${sanitizedBody}`);
         const requestBody = JSON.parse(event.body);
         let queryString = '';
         let size = 10;
EOF
@@ -50,7 +50,8 @@

module.exports.search = async (event, context) => {
try {
console.log(`Received query: ${event.body}`);
const sanitizedBody = String(event.body).replace(/[\r\n]/g, '');
console.log(`Received query: ${sanitizedBody}`);
const requestBody = JSON.parse(event.body);
let queryString = '';
let size = 10;
Copilot is powered by AI and may make mistakes. Always verify output.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

dependencies Pull requests that update a dependency file

Projects

None yet

Development

Successfully merging this pull request may close these issues.

7 participants