Skip to content

chore(deps): update all non-major dependencies#39

Open
renovate[bot] wants to merge 1 commit into
mainfrom
renovate/all-minor-patch
Open

chore(deps): update all non-major dependencies#39
renovate[bot] wants to merge 1 commit into
mainfrom
renovate/all-minor-patch

Conversation

@renovate
Copy link
Copy Markdown
Contributor

@renovate renovate Bot commented Dec 29, 2025

ℹ️ Note

This PR body was truncated due to platform limits.

This PR contains the following updates:

Package Change Age Confidence
@typescript/native-preview (source) 7.0.0-dev.20260122.37.0.0-dev.20260519.1 age confidence
pnpm (source) 11.0.911.1.3 age confidence
tsdown (source) ^0.20.0^0.22.0 age confidence
tsdown-preset-sxzz ^0.3.1^0.6.0 age confidence

Release Notes

microsoft/typescript-go (@​typescript/native-preview)

v7.0.0-dev.20260519.1

Compare Source

v7.0.0-dev.20260518.1

Compare Source

v7.0.0-dev.20260517.1

Compare Source

v7.0.0-dev.20260516.1

Compare Source

v7.0.0-dev.20260515.1

Compare Source

v7.0.0-dev.20260514.1

Compare Source

v7.0.0-dev.20260513.1

Compare Source

v7.0.0-dev.20260512.1

Compare Source

v7.0.0-dev.20260511.1

Compare Source

v7.0.0-dev.20260510.1

Compare Source

v7.0.0-dev.20260509.2

Compare Source

v7.0.0-dev.20260508.1

Compare Source

v7.0.0-dev.20260507.1

Compare Source

v7.0.0-dev.20260506.1

Compare Source

v7.0.0-dev.20260505.1

Compare Source

v7.0.0-dev.20260504.1

Compare Source

v7.0.0-dev.20260503.1

Compare Source

v7.0.0-dev.20260502.1

Compare Source

v7.0.0-dev.20260501.1

Compare Source

v7.0.0-dev.20260430.1

Compare Source

v7.0.0-dev.20260429.1

Compare Source

v7.0.0-dev.20260428.1

Compare Source

v7.0.0-dev.20260427.1

Compare Source

v7.0.0-dev.20260426.1

Compare Source

v7.0.0-dev.20260425.1

Compare Source

v7.0.0-dev.20260424.2

Compare Source

v7.0.0-dev.20260424.1

Compare Source

v7.0.0-dev.20260423.1

Compare Source

v7.0.0-dev.20260422.1

Compare Source

v7.0.0-dev.20260421.2

Compare Source

v7.0.0-dev.20260421.1

Compare Source

v7.0.0-dev.20260420.1

Compare Source

v7.0.0-dev.20260419.1

Compare Source

v7.0.0-dev.20260418.1

Compare Source

v7.0.0-dev.20260417.1

Compare Source

v7.0.0-dev.20260416.2

Compare Source

v7.0.0-dev.20260416.1

Compare Source

v7.0.0-dev.20260415.1

Compare Source

v7.0.0-dev.20260414.1

Compare Source

v7.0.0-dev.20260413.1

Compare Source

v7.0.0-dev.20260412.1

Compare Source

v7.0.0-dev.20260411.1

Compare Source

v7.0.0-dev.20260410.1

Compare Source

v7.0.0-dev.20260409.1

Compare Source

v7.0.0-dev.20260408.1

Compare Source

v7.0.0-dev.20260407.1

Compare Source

v7.0.0-dev.20260406.1

Compare Source

v7.0.0-dev.20260405.1

Compare Source

v7.0.0-dev.20260404.1

Compare Source

v7.0.0-dev.20260403.1

Compare Source

v7.0.0-dev.20260401.1

Compare Source

v7.0.0-dev.20260331.1

Compare Source

v7.0.0-dev.20260330.1

Compare Source

v7.0.0-dev.20260329.1

Compare Source

v7.0.0-dev.20260328.1

Compare Source

v7.0.0-dev.20260327.2

Compare Source

v7.0.0-dev.20260326.1

Compare Source

v7.0.0-dev.20260325.1

Compare Source

v7.0.0-dev.20260324.1

Compare Source

v7.0.0-dev.20260323.1

Compare Source

v7.0.0-dev.20260322.1

Compare Source

v7.0.0-dev.20260321.1

Compare Source

v7.0.0-dev.20260320.1

Compare Source

v7.0.0-dev.20260319.1

Compare Source

v7.0.0-dev.20260318.1

Compare Source

v7.0.0-dev.20260317.1

Compare Source

v7.0.0-dev.20260316.1

Compare Source

v7.0.0-dev.20260315.1

Compare Source

v7.0.0-dev.20260314.1

Compare Source

v7.0.0-dev.20260313.1

Compare Source

v7.0.0-dev.20260312.1

Compare Source

v7.0.0-dev.20260311.1

Compare Source

v7.0.0-dev.20260310.1

Compare Source

v7.0.0-dev.20260309.1

Compare Source

v7.0.0-dev.20260308.1

Compare Source

v7.0.0-dev.20260307.1

Compare Source

v7.0.0-dev.20260306.1

Compare Source

v7.0.0-dev.20260305.1

Compare Source

v7.0.0-dev.20260304.1

Compare Source

v7.0.0-dev.20260303.1

Compare Source

v7.0.0-dev.20260302.1

Compare Source

v7.0.0-dev.20260301.1

Compare Source

v7.0.0-dev.20260228.1

Compare Source

v7.0.0-dev.20260227.1

Compare Source

v7.0.0-dev.20260226.1

Compare Source

v7.0.0-dev.20260225.1

Compare Source

v7.0.0-dev.20260224.1

Compare Source

v7.0.0-dev.20260223.1

Compare Source

v7.0.0-dev.20260222.1

Compare Source

v7.0.0-dev.20260221.1

Compare Source

v7.0.0-dev.20260220.1

Compare Source

v7.0.0-dev.20260219.1

Compare Source

v7.0.0-dev.20260218.1

Compare Source

v7.0.0-dev.20260217.1

Compare Source

v7.0.0-dev.20260216.1

Compare Source

v7.0.0-dev.20260215.1

Compare Source

v7.0.0-dev.20260214.1

Compare Source

v7.0.0-dev.20260213.1

Compare Source

v7.0.0-dev.20260212.1

Compare Source

v7.0.0-dev.20260211.1

Compare Source

v7.0.0-dev.20260210.1

Compare Source

v7.0.0-dev.20260209.1

Compare Source

v7.0.0-dev.20260208.1

Compare Source

v7.0.0-dev.20260207.1

Compare Source

v7.0.0-dev.20260206.1

Compare Source

v7.0.0-dev.20260205.1

Compare Source

v7.0.0-dev.20260204.1

Compare Source

v7.0.0-dev.20260203.1

Compare Source

v7.0.0-dev.20260202.1

Compare Source

v7.0.0-dev.20260201.1

Compare Source

v7.0.0-dev.20260131.1

Compare Source

v7.0.0-dev.20260130.1

Compare Source

v7.0.0-dev.20260129.1

Compare Source

v7.0.0-dev.20260128.1

Compare Source

v7.0.0-dev.20260127.1

Compare Source

v7.0.0-dev.20260126.1

Compare Source

v7.0.0-dev.20260124.1

Compare Source

v7.0.0-dev.20260123.3

Compare Source

v7.0.0-dev.20260122.4

Compare Source

pnpm/pnpm (pnpm)

v11.1.3

Compare Source

Patch Changes
  • pnpm install now re-validates pnpm-lock.yaml entries against the active minimumReleaseAge and trustPolicy: 'no-downgrade' policies before any tarball is fetched. Lockfiles resolved elsewhere (committed to the repo, restored from a CI cache, produced by an older pnpm) under a weaker or absent policy can no longer install a freshly-published or trust-downgraded version silently. Violating entries abort the install with ERR_PNPM_MINIMUM_RELEASE_AGE_VIOLATION, ERR_PNPM_TRUST_DOWNGRADE, or the generic ERR_PNPM_LOCKFILE_RESOLUTION_VERIFICATION when both policies trip in the same batch; minimumReleaseAgeExclude and trustPolicyExclude are honored. Verification results are cached so repeat installs against an unchanged lockfile take a fast path, and pnpm shows a transient progress line while the registry round-trip runs.

    When fresh resolution picks an immature version, the behavior depends on minimumReleaseAgeStrict:

    • Loose mode — the default, in effect whenever minimumReleaseAge keeps its built-in 24-hour value — auto-adds the immature picks to minimumReleaseAgeExclude in pnpm-workspace.yaml and lets the install proceed. A single info message lists what was persisted.
    • Strict mode in an interactive terminal collects every immature direct AND transitive pick in one pass and prompts once with the full list. Approving adds them to minimumReleaseAgeExclude and the install continues; declining aborts before the lockfile, package.json, or node_modules is touched.
    • Strict mode in CI (or any non-TTY context) aborts with ERR_PNPM_NO_MATURE_MATCHING_VERSION listing every offending entry, instead of failing on the first one the resolver hit.

    minimumReleaseAgeStrict auto-enables whenever the user explicitly sets minimumReleaseAge (CLI flag, env var, global config.yaml, or pnpm-workspace.yaml); set minimumReleaseAgeStrict: false to keep loose-mode auto-collect even with an explicit minimumReleaseAge value. Closes #​10438, #​10488, #​11687.

  • Allow redundant trailing base64 padding in .npmrc auth values and report invalid auth base64 with a pnpm error.

  • Make pnpm self-update respect minimumReleaseAge (and minimumReleaseAgeExclude) when resolving which pnpm version to install.

    When the latest dist-tag points to a version newer than the configured age threshold, self-update now selects the newest mature version instead unless excluded by minimumReleaseAgeExclude.

    Also makes dlx and outdated surface invalid minimumReleaseAgeExclude patterns under the same ERR_PNPM_INVALID_MINIMUM_RELEASE_AGE_EXCLUDE error code already used by install, instead of leaking the internal ERR_PNPM_INVALID_VERSION_UNION / ERR_PNPM_NAME_PATTERN_IN_VERSION_UNION codes.

  • Global installs respect global config build policy (e.g., dangerouslyAllowAllBuilds from config.yaml) when GVS is enabled #​9249.

    The global virtual-store (GVS) default allowBuilds = {} was applied before workspace manifest settings were read and before global config values (stripped by extractAndRemoveDependencyBuildOptions) were re-applied via globalDepsBuildConfig. This caused hasDependencyBuildOptions to return true (because {} is not null), blocking restoration of global config values like dangerouslyAllowAllBuilds. As a result, global installs skipped all build scripts even when the config explicitly allowed them.

    This fix moves the GVS default to after workspace manifest reading and globalDepsBuildConfig re-application, so that:

    1. Workspace manifest allowBuilds takes precedence (if present)
    2. Global config dangerouslyAllowAllBuilds is properly restored (if set and no workspace policy exists)
    3. Empty {} is only applied as a last resort when no policy is configured anywhere
  • Honor --silent when verifyDepsBeforeRun: install auto-installs dependencies before pnpm run or pnpm exec, preventing install output from being written to stdout #​11636.

  • Fix lockfile parsing failures when pnpm-lock.yaml contains CRLF line endings and multiple YAML documents #​11612.

  • Anchor the side-effects-cache key and global-virtual-store hash to the project's script-runner Node — engines.runtime pin when present, shell node otherwise — instead of pnpm's own runtime.

    ENGINE_NAME (the <platform>;<arch>;node<major> prefix used as the side-effects-cache key and the engine portion of the GVS hash) was computed from process.version — the Node that runs pnpm itself. That was wrong in two situations:

    1. @pnpm/exe SEA bundle. The bundle has its own embedded Node, not the node on the user's PATH that actually spawns lifecycle scripts. Two pnpm installations on the same machine (one SEA, one npm-package) therefore disagreed on the cache key, partitioning the side-effects cache and the global virtual store across two Node majors even though both installs would run scripts on the same shell node.
    2. engines.runtime / devEngines.runtime pin. When a project pins a Node version via devEngines.runtime (pnpm v11+), pnpm downloads that Node into node_modules/node/ and uses it to run lifecycle scripts. But the hash still anchored to whichever Node ran pnpm itself, not to the pinned Node — so two installs of the same project with two different runner Nodes would still disagree on the GVS slot path even though scripts run on the same pinned Node.

    Three changes:

    • @pnpm/engine.runtime.system-node-version now exports engineName(nodeVersion?). Resolves the version in this order: explicit override → getSystemNodeVersion() (which already prefers node --version over process.version in SEA contexts) → process.version.
    • @pnpm/deps.graph-hasher now exports findRuntimeNodeVersion(snapshotKeys) — scans an iterable of lockfile snapshot keys for a node@runtime:<version> entry and returns its bare version string. calcDepState and calcGraphNodeHash/iterateHashedGraphNodes accept a nodeVersion? (in the options bag for the first, as a trailing parameter / ctx field for the others), forwarded to engineName(). The default (no override) preserves the pre-change behaviour. The legacy ENGINE_NAME constant in @pnpm/constants is unchanged so external consumers and existing tests keep working; in non-SEA, non-pinned contexts every value lines up.
    • Every install-side caller of the graph-hasher (@pnpm/installing.deps-resolver, @pnpm/installing.deps-restorer, @pnpm/installing.deps-installer, @pnpm/building.during-install, @pnpm/building.after-install, @pnpm/deps.graph-builder) now derives the project's pinned runtime via findRuntimeNodeVersion(Object.keys(graph)) once per invocation and threads it through.

    On upgrade, two one-time GVS slot churns are possible:

    • SEA-pnpm users without a runtime pin: slots that previously hashed under the embedded-Node major (e.g. node26) now hash under the shell-Node major (e.g. node24), matching what pacquet, the npm-published pnpm package, and any other pnpm-compatible tool already produce.
    • Projects with a devEngines.runtime pin: slots that previously hashed under the runner's Node major now hash under the pinned Node major, matching what the lifecycle scripts will actually run on.

    In both cases the old slots become prune-eligible.

  • Resolve the GVS hash's engine portion per-snapshot when a dependency declares its own engines.runtime, instead of using an install-wide value.

    Pnpm's resolver desugars a dep's engines.runtime into dependencies.node: 'runtime:<version>', and the bin linker spawns that dep's lifecycle scripts through the pinned Node downloaded into <pkgDir>/node_modules/node/. The GVS hash and the side-effects-cache key prefix were still anchored to the install-wide runtime — so a pinning snapshot's slot encoded the wrong Node major, and a reinstall on the same host could read the cached side-effects under a key whose <platform>;<arch>;node<major> triple disagreed with the Node the build actually ran on.

    Per-snapshot resolution now matches what bins/linker already does on a per-package basis:

    • @pnpm/deps.graph-hasher adds readSnapshotRuntimePin(children) — reads the node entry from one snapshot's graph children and extracts the version from a node@runtime: value. Pairs with the existing findRuntimeNodeVersion(snapshotKeys) install-wide fallback (also now exported from @pnpm/deps.graph-hasher rather than @pnpm/engine.runtime.system-node-version, where it was a poor fit — system-node-version is about probing the host Node, not parsing lockfile-derived strings).
    • calcDepState and calcGraphNodeHash consult readSnapshotRuntimePin(graph[depPath].children) first and only fall back to the install-wide nodeVersion parameter when the snapshot doesn't pin its own Node.

    Pacquet mirrors the same precedence at the calc_graph_node_hash call site in package-manager/src/virtual_store_layout.rs — a new find_own_runtime_node_major(snapshot) helper reads each snapshot's dependencies for a node entry with Prefix::Runtime and overrides the install-wide engine when present.

    On upgrade, snapshots of dependencies that declare their own engines.runtime re-hash under that dep's pinned Node instead of the install-wide value. The old slots become prune-eligible. Closes #​11690.

  • Fixed pnpm publish failing with a 404 when authentication relied on OIDC trusted publishing alongside an .npmrc written by actions/setup-node (_authToken=${NODE_AUTH_TOKEN}) without NODE_AUTH_TOKEN being set. Unresolved ${VAR} placeholders in auth values are now treated as empty rather than passed through verbatim, so the literal placeholder no longer surfaces as a bearer token when OIDC fallback is the intended auth source #​11513.

  • Fix devEngines.packageManager (singular form, without onFail) defaulting to onFail: "error" instead of the documented pmOnFail: "download". As a result, a project that pinned a different pnpm version via devEngines.packageManager and ran pnpm install from a mismatched pnpm version failed with a hard error, even though the migration table from managePackageManagerVersions: true to pmOnFail: download (default) promises the install would auto-download the wanted version #​11676.

    The array form of devEngines.packageManager keeps its existing per-element defaults (error for the last entry, ignore for the rest), since those reflect explicit prioritization by the user. Explicit onFail values continue to win.

  • Fix devEngines.packageManager not writing packageManagerDependencies to pnpm-lock.yaml when the lockfile lacks an env-doc entry. Previously the lockfile sync skipped resolution unless an existing packageManagerDependencies.pnpm entry needed refreshing, so a fresh install without onFail: "download" left the resolved pnpm version unrecorded — contradicting the documented behavior that the resolved version is stored in pnpm-lock.yaml #​11674.

  • Warn when package.json contains a legacy pnpm field with settings pnpm no longer reads from package.json (e.g. pnpm.overrides, pnpm.patchedDependencies). Previously these were silently ignored after the upgrade from v10, leaving users unaware that their overrides/patched dependencies had stopped taking effect #​11677.

v11.1.2

Compare Source

Patch Changes
  • convertEnginesRuntimeToDependencies: switch the runtime-dependency write to Object.defineProperty so the CodeQL js/prototype-polluting-assignment rule treats the assignment as safe regardless of the property name (follow-up to #​11609).

  • Address CodeQL static-analysis findings: guard manifest dependency writes against prototype-polluting keys (__proto__, constructor, prototype), and replace a potentially super-linear semver-detection regex in registry 404 hints with an O(n) parser.

  • Strip sec-fetch-* headers from outgoing HTTP requests. These headers are automatically added by undici's fetch() implementation per the Fetch spec but cause Azure DevOps Artifacts to return HTTP 400 for uncached upstream packages, as ADO interprets them as browser requests #​11572.

  • Fix minimumReleaseAge handling for cached abbreviated metadata.

    The version-spec cache fast path no longer rethrows ERR_PNPM_MISSING_TIME under strictPublishedByCheck; it now falls through to the registry-fetch path, consistent with the adjacent mtime-gated cache block.

    When the registry returns 304 Not Modified for a package whose cached metadata is abbreviated (no per-version time), pnpm now re-fetches with fullMetadata: true if minimumReleaseAge is active and the package was modified after the cutoff. The upgraded metadata is persisted to disk so subsequent installs don't repeat the fetch. Previously the abbreviated meta was used as-is and the maturity check fell back to its warn-and-skip path, silently bypassing the quarantine and emitting a misleading "metadata is missing the time field" warning.

    Closes #​11619.

  • Fix pnpm upgrade --interactive --latest -r not respecting named catalog groups. Previously, upgrading a dependency using a named catalog (e.g. "catalog:foo") would incorrectly rewrite package.json to "catalog:" and place the updated version in the default catalog instead of the named one [#​10115](https://

Note

PR body was truncated to here.


Configuration

📅 Schedule: (UTC)

  • Branch creation
    • Between 12:00 AM and 03:59 AM, only on Monday (* 0-3 * * 1)
  • Automerge
    • At any time (no schedule defined)

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

👻 Immortal: This PR will be recreated if closed unmerged. Get config help if that's undesired.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

@bolt-new-by-stackblitz
Copy link
Copy Markdown

Review PR in StackBlitz Codeflow Run & review this pull request in StackBlitz Codeflow.

@pkg-pr-new
Copy link
Copy Markdown

pkg-pr-new Bot commented Dec 29, 2025

Open in StackBlitz

npm i https://pkg.pr.new/unplugin-lightningcss@39

commit: f35fdab

@renovate renovate Bot force-pushed the renovate/all-minor-patch branch 10 times, most recently from 9aea6eb to dac8bec Compare January 5, 2026 08:56
@renovate renovate Bot force-pushed the renovate/all-minor-patch branch 4 times, most recently from c4e0483 to 558f461 Compare January 8, 2026 09:55
@socket-security
Copy link
Copy Markdown

socket-security Bot commented Jan 8, 2026

All alerts resolved. Learn more about Socket for GitHub.

This PR previously contained dependency changes with security issues that have been resolved, removed, or ignored.

View full report

@renovate renovate Bot force-pushed the renovate/all-minor-patch branch 12 times, most recently from 1f5110d to f7e4fcd Compare January 13, 2026 17:03
@renovate renovate Bot force-pushed the renovate/all-minor-patch branch 4 times, most recently from ecb4aca to 3c4b791 Compare January 22, 2026 16:44
@renovate renovate Bot changed the title fix(deps): update all non-major dependencies fix(deps): update all non-major dependencies - autoclosed Jan 22, 2026
@renovate renovate Bot closed this Jan 22, 2026
@renovate renovate Bot deleted the renovate/all-minor-patch branch January 22, 2026 17:44
@renovate renovate Bot changed the title fix(deps): update all non-major dependencies - autoclosed chore(deps): update all non-major dependencies Jan 26, 2026
@renovate renovate Bot reopened this Jan 26, 2026
@renovate renovate Bot force-pushed the renovate/all-minor-patch branch 13 times, most recently from 5855856 to fa38aa7 Compare February 1, 2026 21:32
@renovate renovate Bot force-pushed the renovate/all-minor-patch branch 6 times, most recently from 8224c6b to 8b74bc2 Compare February 5, 2026 08:57
@socket-security
Copy link
Copy Markdown

socket-security Bot commented Mar 6, 2026

Review the following changes in direct dependencies. Learn more about Socket for GitHub.

Diff Package Supply Chain
Security
Vulnerability Quality Maintenance License
Addedtsdown-preset-sxzz@​0.6.0681007692100
Added@​typescript/​native-preview@​7.0.0-dev.20260519.110010082100100
Addedtsdown@​0.22.0981008896100

View full report

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

0 participants