Skip to content

Commit

Permalink
test: fix
Browse files Browse the repository at this point in the history
  • Loading branch information
zkochan committed May 17, 2024
1 parent 021516a commit faecada
Showing 1 changed file with 1 addition and 1 deletion.
2 changes: 1 addition & 1 deletion pkg-manager/resolve-dependencies/src/resolvePeers.ts
Original file line number Diff line number Diff line change
Expand Up @@ -141,6 +141,7 @@ export async function resolvePeers<T extends PartialResolvedPackage> (
for (const [alias, childNodeId] of Object.entries<NodeId>(node.childrenNodeIds)) {
node.children[alias] = pathsByNodeId.get(childNodeId) ?? (childNodeId as unknown as DepPath)
}
delete node.childrenNodeIds
})

const dependenciesByProjectId: DependenciesByProjectId = {}
Expand All @@ -161,7 +162,6 @@ export async function resolvePeers<T extends PartialResolvedPackage> (
const duplicates = Array.from(depPathsByPkgId.values()).filter((item) => item.size > 1)
const allDepPathsMap = deduplicateAll(depGraph, duplicates)
for (const { id } of opts.projects) {
dependenciesByProjectId[id] = {}
for (const [alias, depPath] of Object.entries(dependenciesByProjectId[id])) {
dependenciesByProjectId[id][alias] = allDepPathsMap[depPath] ?? depPath

Check warning

Code scanning / CodeQL

Prototype-polluting assignment Medium

This assignment may alter Object.prototype if a malicious '__proto__' string is injected from
library input
.
This assignment may alter Object.prototype if a malicious '__proto__' string is injected from
library input
.
This assignment may alter Object.prototype if a malicious '__proto__' string is injected from
library input
.
}
Expand Down

0 comments on commit faecada

Please sign in to comment.