Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Lock versions of the dependencies #697

Closed
ematipico opened this issue Nov 27, 2018 · 10 comments · Fixed by #958
Closed

Lock versions of the dependencies #697

ematipico opened this issue Nov 27, 2018 · 10 comments · Fixed by #958

Comments

@ematipico
Copy link
Contributor

Due to the recent problems happened to the npm world, I'd propose to lock all the versions of our dependencies and development dependencies

It's not a bulletproof solution must at least it's something

Before:

"chalk": "^2.4.1" 

After:

"chalk": "2.4.1"
@dhruvdutt
Copy link
Member

Can you also suggest recommended security procedures for updating dependencies manually? One platform is snyk definitely.

@ematipico
Copy link
Contributor Author

ematipico commented Nov 27, 2018

It's already in place in our CI. Another check would be to run npm audit in our CI and fail it if there are vulnerabilities

@dhruvdutt
Copy link
Member

Yeah, we always check that while upgrading.
Not sure if we need to pin all dependencies explicitly.
@evenstensberg WDYT?

@evenstensberg
Copy link
Member

Let's discuss this

@ematipico
Copy link
Contributor Author

ematipico commented Nov 27, 2018

@evenstensberg This is the place to discuss it :) what do you think even?

@dhruvdutt during a dep installation, npm only installs the direct dependencies, no devs. So in theory only those should be fine, although hackers usually also put cryptocurrency scripts to get CPU clocks from the CIs. So let's just audit and security check everything and that's it.

@dhruvdutt
Copy link
Member

Hmmm, makes sense. We can try pinning dependencies.
I will take the responsibility for upgrading packages every fortnight with a proper audit. ✋

@sendilkumarn
Copy link
Member

Let us add dependabot here and pin the libraries. I think that makes sense with security.

@ematipico
Copy link
Contributor Author

ematipico commented Dec 15, 2018

@evenstensberg what are your thoughts about this?

@evenstensberg
Copy link
Member

We got snyk which I think is enough

@ematipico
Copy link
Contributor Author

It's enough for us but unfortunately it's not enough for the security for the users

We know that if we don't pin our dependencies and there's no lock and it's not been used properly, the consumers will get into their dependency tree all the minor releases/fixes even though it shouldn't be like this.

Change is for who consumes the library

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging a pull request may close this issue.

4 participants