Skip to content

chore: dependency update#172

Open
cs-raj wants to merge 2 commits into
mainfrom
fix/DX-7891
Open

chore: dependency update#172
cs-raj wants to merge 2 commits into
mainfrom
fix/DX-7891

Conversation

@cs-raj
Copy link
Copy Markdown
Contributor

@cs-raj cs-raj commented May 21, 2026

Summary

Fixes unit test failures in CI caused by Jest loading ESM-only uuid@14 from @contentstack/cli-utilities without transformation.

Problem

After dependency updates, connect-stack.test.ts and process-stack.test.ts failed in the Run Unit Tests workflow with:

@contentstack/cli-utilities@1.18.3 depends on uuid@^14.0.0, which publishes ESM under dist-node/. Jest was configured to transform only *.ts / *.tsx via ts-jest and ignored node_modules by default, so uuid was required as CommonJS and parsing failed.

Suites that mock @contentstack/cli-utilities (e.g. generate-output.test.ts) continued to pass.

Solution

Update Jest configuration to handle uuid only:

  1. transformIgnorePatterns — exclude uuid from the default node_modules ignore so it can be transformed.
  2. Scoped babel-jest transform — compile uuid .js files to CommonJS using @babel/preset-env.
  3. @babel/preset-env — added as a devDependency to support the transform.

No changes to application source or test mocks.

Files changed

File Change
jest.config.ts transformIgnorePatterns + babel-jest transform for uuid
package.json Add @babel/preset-env devDependency
package-lock.json Lockfile update

@cs-raj cs-raj requested a review from a team as a code owner May 21, 2026 12:47
@github-actions
Copy link
Copy Markdown

🔒 Security Scan Results

ℹ️ Note: Only vulnerabilities with available fixes (upgrades or patches) are counted toward thresholds.

Check Type Count (with fixes) Without fixes Threshold Result
🔴 Critical Severity 0 0 10 ✅ Passed
🟠 High Severity 0 0 25 ✅ Passed
🟡 Medium Severity 0 1 500 ✅ Passed
🔵 Low Severity 0 0 1000 ✅ Passed

⏱️ SLA Breach Summary

⚠️ Warning: The following vulnerabilities have exceeded their SLA thresholds (days since publication).

Severity Breaches (with fixes) Breaches (no fixes) SLA Threshold (with/no fixes) Status
🔴 Critical 0 0 15 / 30 days ✅ Passed
🟠 High 0 0 30 / 120 days ✅ Passed
🟡 Medium 0 1 90 / 365 days ⚠️ Warning
🔵 Low 0 0 180 / 365 days ✅ Passed

ℹ️ Vulnerabilities Without Available Fixes (Informational Only)

The following vulnerabilities were detected but do not have fixes available (no upgrade or patch). These are excluded from failure thresholds:

  • Critical without fixes: 0
  • High without fixes: 0
  • Medium without fixes: 1
  • Low without fixes: 0

⚠️ BUILD PASSED WITH WARNINGS - SLA breaches detected for issues without available fixes

Consider reviewing these vulnerabilities when fixes become available.

netrajpatel
netrajpatel previously approved these changes May 21, 2026
@cs-raj cs-raj dismissed stale reviews from netrajpatel and naman-contentstack via cd0c4ad May 21, 2026 13:10
@github-actions
Copy link
Copy Markdown

🔒 Security Scan Results

ℹ️ Note: Only vulnerabilities with available fixes (upgrades or patches) are counted toward thresholds.

Check Type Count (with fixes) Without fixes Threshold Result
🔴 Critical Severity 0 0 10 ✅ Passed
🟠 High Severity 0 0 25 ✅ Passed
🟡 Medium Severity 0 1 500 ✅ Passed
🔵 Low Severity 0 0 1000 ✅ Passed

⏱️ SLA Breach Summary

⚠️ Warning: The following vulnerabilities have exceeded their SLA thresholds (days since publication).

Severity Breaches (with fixes) Breaches (no fixes) SLA Threshold (with/no fixes) Status
🔴 Critical 0 0 15 / 30 days ✅ Passed
🟠 High 0 0 30 / 120 days ✅ Passed
🟡 Medium 0 1 90 / 365 days ⚠️ Warning
🔵 Low 0 0 180 / 365 days ✅ Passed

ℹ️ Vulnerabilities Without Available Fixes (Informational Only)

The following vulnerabilities were detected but do not have fixes available (no upgrade or patch). These are excluded from failure thresholds:

  • Critical without fixes: 0
  • High without fixes: 0
  • Medium without fixes: 1
  • Low without fixes: 0

⚠️ BUILD PASSED WITH WARNINGS - SLA breaches detected for issues without available fixes

Consider reviewing these vulnerabilities when fixes become available.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants