Skip to content

Force update axios to resolve sec vuln #1491

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Closed
wants to merge 3 commits into from

Conversation

rnkaufman
Copy link

Closes #1481.

Make sure these boxes are checked! 📦✅

  • You have the latest version of rustfmt installed
$ rustup component add rustfmt
  • You ran cargo fmt on the code base before submitting
  • You reference which issue is being closed in the PR text

✨✨ 😄 Thanks so much for contributing to wasm-pack! 😄 ✨✨

@rnkaufman
Copy link
Author

rnkaufman commented Apr 9, 2025

linux-stable test failing with:

Compiling wasm-bindgen v0.2.74
error: older versions of the `wasm-bindgen` crate are incompatible with current versions of Rust; please update to `wasm-bindgen` v0.2.88

error: could not compile `wasm-bindgen` (lib) due to 1 previous error
Error: Compiling your crate to WebAssembly failed
Caused by: Compiling your crate to WebAssembly failed
Caused by: failed to execute `cargo build`: exited with exit status: 101
  full command: cd \"/home/runner/work/wasm-pack/wasm-pack/target/t/.tmpEj08tZ/wasm-pack\" && \"cargo\" \"build\" \"--lib\" \"--target\" \"wasm32-unknown-unknown\"

This still doesn't remove the 0.26 version from the package.lock
unfortunately - `binary-install` still requires it...
@rnkaufman
Copy link
Author

It looks like binary-install needs to be updated as well - I'm going to close this out temporarily while I figure out what's going on there..

@rnkaufman rnkaufman closed this Apr 11, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Upgrade axios to 0.30.0 for security vulnerability patch
1 participant