chore(deps): bump jsonpath-plus and @asyncapi/parser in /template #407
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Bumps jsonpath-plus to 10.1.0 and updates ancestor dependency @asyncapi/parser. These dependencies need to be updated together.
Updates
jsonpath-plus
from 7.1.0 to 10.1.0Release notes
Sourced from jsonpath-plus's releases.
Changelog
Sourced from jsonpath-plus's changelog.
... (truncated)
Commits
93612a3
chore: bump version4a16cbd
feat: add undefined, null literals to safe scriptf119fe3
feat: add typeof operator to safe scriptb70aa71
fix(security): preventconstructor
access in safe vm763ada0
fix(security): preventcall
/apply
invocation ofFunction
98a6b22
fix: remove overly aggressive disabling of native functions but disallow `__p...30194c7
fix(security): further prevent binding of Function calls which may evade dete...eac48fe
fix(security): prevent binding of Function calls which may evade detection34a836b
chore: bump version5a22e3f
fix(security): prevent Function calls outside of member expressionsUpdates
@asyncapi/parser
from 3.1.0 to 3.4.0Release notes
Sourced from
@asyncapi/parser
's releases.Commits
7c7c556
chore(release): version packages (#1059)e18f865
chore(deps): bump jsonpath-plus to ^10.0.0 to mitigate CVE-2024-21534 (#1058)dd8c9e8
docs: fix stringify example broken link in README (#1055)1560df3
chore(release): version packages (#1054)bebbd39
feat: create ruleasyncapi3-channel-no-query-nor-fragment
for v3 core rules...0d33904
chore(deps-dev): bump webpack from 5.93.0 to 5.94.0 (#1053)efc05af
fix: update@asyncapi/specs
to 6.8.0 version and others (#1052)6794729
chore(release): version packages (#1050)b700a65
fix: remove forceful normalization of YAML to JSON (#1044)6c215a8
docs: add multi-parser mention in the list of packages (#1049)Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting
@dependabot rebase
.Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR:
@dependabot rebase
will rebase this PR@dependabot recreate
will recreate this PR, overwriting any edits that have been made to it@dependabot merge
will merge this PR after your CI passes on it@dependabot squash and merge
will squash and merge this PR after your CI passes on it@dependabot cancel merge
will cancel a previously requested merge and block automerging@dependabot reopen
will reopen this PR if it is closed@dependabot close
will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually@dependabot show <dependency name> ignore conditions
will show all of the ignore conditions of the specified dependency@dependabot ignore this major version
will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)@dependabot ignore this minor version
will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)@dependabot ignore this dependency
will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)You can disable automated security fix PRs for this repo from the Security Alerts page.