-
Notifications
You must be signed in to change notification settings - Fork 265
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
chore(deps): update dependency firebase-tools to v13.6.0 [security] #2031
base: develop
Are you sure you want to change the base?
Conversation
e7a80be
to
dbb1157
Compare
21f2839
to
69428d1
Compare
69428d1
to
e68364c
Compare
e68364c
to
92fd0d0
Compare
6748277
to
12179ad
Compare
79414b9
to
0b0f4ea
Compare
0b0f4ea
to
203c7d7
Compare
203c7d7
to
a2deae4
Compare
a2deae4
to
7fb42e9
Compare
fc999e6
to
2a2fc85
Compare
752b876
to
32676bb
Compare
67b701e
to
e583aa5
Compare
2f38220
to
571d76c
Compare
7d2f058
to
551651b
Compare
f301d83
to
707fbed
Compare
707fbed
to
59e08fc
Compare
59e08fc
to
bb09e0c
Compare
a8ab34a
to
a4e3844
Compare
Important Review skippedBot user detected. To trigger a single review, invoke the You can disable this status message by setting the Thank you for using CodeRabbit. We offer it for free to the OSS community and would appreciate your support in helping us grow. If you find it useful, would you consider giving us a shout-out on your favorite social media? 🪧 TipsChatThere are 3 ways to chat with CodeRabbit:
Note: Be mindful of the bot's finite context window. It's strongly recommended to break down tasks such as reading entire modules into smaller chunks. For a focused discussion, use review comments to chat about specific files and their changes, instead of using the PR comments. CodeRabbit Commands (Invoked using PR comments)
Other keywords and placeholders
CodeRabbit Configuration File (
|
a4e3844
to
f6c9cc9
Compare
This PR contains the following updates:
13.4.0
->13.6.0
GitHub Vulnerability Alerts
CVE-2024-4128
This vulnerability was a potential CSRF attack. When running the Firebase emulator suite, there is an export endpoint that is used normally to export data from running emulators. If a user was running the emulator and navigated to a malicious website with the exploit on a browser that allowed calls to localhost (ie Chrome before v94), the website could exfiltrate emulator data. We recommend upgrading past version 13.6.0 or commit 068a2b08dc308c7ab4b569617f5fc8821237e3a0.
Release Notes
firebase/firebase-tools (firebase-tools)
v13.6.0
Compare Source
reset
endpoint for Datastore Mode.no_wrapper
options.v13.5.2
Compare Source
v13.5.1
Compare Source
v13.5.0
Compare Source
v13.4.1
Compare Source
GOOGLE_CLOUD_QUOTA_PROJECT
was not correctly respected. (#6801)Configuration
📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.