Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Release/2023 02 20 12 00 #400

Merged
merged 9 commits into from
Feb 20, 2023
Merged

Release/2023 02 20 12 00 #400

merged 9 commits into from
Feb 20, 2023

Conversation

kanej
Copy link
Member

@kanej kanej commented Feb 20, 2023

0.6.10 - 2023-02-15

Changed

  • Optimize initial indexing by only analysing local files (#302)
  • Reduced deps for coc-solidity (#373)

Fixed

  • Mimic foundry solc input mapping (#377)

antico5 and others added 8 commits February 7, 2023 15:11
…abled flag (#379)

* refactor: change state and notifications to have a single telemetryEnabled flag

* fix: block transactions behind telemetry flag

---------

Co-authored-by: John Kane <john@kanej.me>
* optimization: only analyze local files on initialization

* extract lookup to function
This is a nomic wide change. Now that npm supports workspaces we can
leverage it and drop the requirement for `yarn`.

To enable all analyzer deps across platforms to be installed we have
included a `.npmrc` with the force flag.

The versions of `@types/node` have been changed to be consistent.
The generation of the vsix file is based on the package.json, this is
now the client package.json.

The client takes the server as a workspace dependency. The bundling
operates within client on the server package through `node_modules`.

To support the CI on testing an ugly hack is needed to force install the
windows ia32 version of the solidity analyzer. This is the architecture
that vscode extension host claims to run under, though the windows arch
according to node will be x64. This hack is in the root package.json as
a `postinstall` script.
@socket-security
Copy link

Socket Security Pull Request Report

Dependency issues detected: If you merge this pull request, you will not be alerted to the instances of these issues again.

📜 Install scripts

Install scripts are run when the package is installed. The majority of malware in npm is hidden in install scripts.

Packages should not be running non-essential scripts during install and there are often solutions to problems people solve with install scripts that can be run at publish time instead.

Package Script field Source
keytar@7.9.0 (upgraded) install package-lock.json via @vscode/vsce@2.17.0
core-js-pure@3.27.2 (upgraded) postinstall test/protocol/projects/hardhat/package-lock.json via hardhat@2.9.1
core-js-pure@3.28.0 (upgraded) postinstall test/e2e/projects/main/package-lock.json via hardhat@2.9.1
esbuild@0.16.17 (upgraded) postinstall package-lock.json, coc/package.json
Pull request report summary
Issue Status
Install scripts ⚠️ 4 issues
Native code ✅ 0 issues
Bin script confusion ✅ 0 issues
Bin script shell injection ✅ 0 issues
Unresolved require ✅ 0 issues
Invalid package.json ✅ 0 issues
HTTP dependency ✅ 0 issues
Git dependency ✅ 0 issues
Potential typo squat ✅ 0 issues
Known Malware ✅ 0 issues
Telemetry ✅ 0 issues
Protestware/Troll package ✅ 0 issues
Bot Commands

To ignore an alert, reply with a comment starting with @SocketSecurity ignore followed by a space separated list of package-name@version specifiers. e.g. @SocketSecurity ignore foo@1.0.0 bar@2.4.2

  • @SocketSecurity ignore keytar@7.9.0
  • @SocketSecurity ignore core-js-pure@3.27.2
  • @SocketSecurity ignore core-js-pure@3.28.0
  • @SocketSecurity ignore esbuild@0.16.17

⚠️ Please accept the latest app permissions to ensure bot commands work properly. Accept the new permissions here.

Powered by socket.dev

Update the package version and changelog for the `0.6.10 - 2023-02-20`
release.
@kanej kanej force-pushed the release/2023-02-20-12_00 branch from 5ea9a86 to 0afbdd6 Compare February 20, 2023 12:10
@codecov-commenter
Copy link

codecov-commenter commented Feb 20, 2023

Codecov Report

Merging #400 (3d60827) into main (965a25a) will decrease coverage by 0.10%.
The diff coverage is n/a.

❗ Current head 3d60827 differs from pull request most recent head 0afbdd6. Consider uploading reports for the commit 0afbdd6 to get more accurate results

📣 This organization is not using Codecov’s GitHub App Integration. We recommend you install it so Codecov can continue to function properly for your repositories. Learn more

@@            Coverage Diff             @@
##             main     #400      +/-   ##
==========================================
- Coverage   55.83%   55.74%   -0.10%     
==========================================
  Files         176      175       -1     
  Lines        4461     4463       +2     
  Branches      738      735       -3     
==========================================
- Hits         2491     2488       -3     
- Misses       1735     1743       +8     
+ Partials      235      232       -3     
Impacted Files Coverage Δ
...c/services/initialization/indexWorkspaceFolders.ts 30.20% <0.00%> (-1.66%) ⬇️
src/frameworks/Foundry/FoundryProject.ts 34.02% <0.00%> (-1.09%) ⬇️
src/services/initialization/onInitialize.ts 86.36% <0.00%> (-0.88%) ⬇️
src/frameworks/base/Project.ts 100.00% <0.00%> (ø)
src/parser/common/types/index.ts 85.04% <0.00%> (ø)
src/parser/analyzer/SolFileEntry.ts 100.00% <0.00%> (ø)
src/frameworks/Hardhat/HardhatProject.ts 33.08% <0.00%> (ø)
src/utils/getOrInitialiseSolFileEntry.ts 100.00% <0.00%> (ø)
src/frameworks/Hardhat/worker/WorkerProcess.ts 0.00% <0.00%> (ø)
src/frameworks/Hardhat/worker/WorkerProtocol.ts 49.20% <0.00%> (ø)
... and 4 more

Help us with your feedback. Take ten seconds to tell us how you rate us. Have a feature suggestion? Share it here.

@kanej kanej merged commit a3944ab into main Feb 20, 2023
@kanej kanej deleted the release/2023-02-20-12_00 branch February 20, 2023 14:32
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
Status: Done
Development

Successfully merging this pull request may close these issues.

3 participants