task/WG-215: addressing postcss vulnerability #201
Closed
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Overview:
Addressing postcss vulnerability issues by updating packages and changing dependencies of those packages.
Perviously there were 3 moderate vulnerabilities related to tacc-core-styles package.
PR Status:
Related Jira tickets:
Summary of Changes:
Testing Steps:
UI Photos:
Notes:
TO-DO: Running 'npm ci' command works for updated package-lock file. However, running 'npm install' command will overwrite these changes bc postcss-extend's individual package.json file has postcss version ^5.0.4 as its dependency range, therefore npm will overwrite (and the vulnerabilities will return) postcss's package-lock contents (postcss-extend is a nested dependency of postcss and tacc-core-styles pacakges). Looking for alternate solution for long-term fix.
Note: CEP is using tacc-core-styles: ^2.11.0 for their versioning. They're also using the postcss-extend-rule package instead of postcss-extend. Will look into this further as an option