Bump ws and socket.io-client
Bumps ws, ws and socket.io-client. These dependencies needed to be updated together.
Updates ws from 7.3.1 to 7.5.9
Release notes
Sourced from ws's releases.
7.5.9
Bug fixes
- Backported bc8bd34e to the 7.x release line (0435e6e1).
7.5.8
Bug fixes
- Backported 0fdcc0af to the 7.x release line (2758ed35).
- Backported d68ba9e1 to the 7.x release line (dc1781bc).
7.5.7
Bug fixes
- Backported 6946f5fe to the 7.x release line (1f72e2e1).
7.5.6
Bug fixes
- Backported b8186dd1 to the 7.x release line (73dec34b).
- Backported ed2b8039 to the 7.x release line (22a26afb).
7.5.5
Bug fixes
- Backported ec9377ca to the 7.x release line (0e274acd).
7.5.4
Bug fixes
- Backported 6a72da3e to the 7.x release line (76087fbf).
- Backported 869c9892 to the 7.x release line (27997933).
7.5.3
Bug fixes
- The
WebSocketServerconstructor now throws an error if more than one of thenoServer,server, andportoptions are specefied (66e58d27).- Fixed a bug where a
'close'event was emitted by aWebSocketServerbefore the internal HTTP/S server was actually closed (5a587304).- Fixed a bug that allowed WebSocket connections to be established after
WebSocketServer.prototype.close()was called (772236a1).7.5.2
Bug fixes
- The opening handshake is now aborted if the client receives a
Sec-WebSocket-Extensionsheader but no extension was requested or if the server indicates an extension not requested by the client (aca94c86).
... (truncated)
Commits
8a78f87[dist] 7.5.90435e6e[security] Fix same host check for ws+unix: redirects4271f07[dist] 7.5.8dc1781b[security] Drop sensitive headers when following insecure redirects2758ed3[fix] Abort the handshake if the Upgrade header is invalida370613[dist] 7.5.71f72e2e[security] Drop sensitive headers when following redirects (#2013)8ecd890[dist] 7.5.622a26af[fix] Resume the socket in theCLOSINGstate73dec34[fix] Do not throw if the redirect URL is invalid- Additional commits viewable in compare view
Updates ws from 6.2.1 to 7.5.9
Release notes
Sourced from ws's releases.
7.5.9
Bug fixes
- Backported bc8bd34e to the 7.x release line (0435e6e1).
7.5.8
Bug fixes
- Backported 0fdcc0af to the 7.x release line (2758ed35).
- Backported d68ba9e1 to the 7.x release line (dc1781bc).
7.5.7
Bug fixes
- Backported 6946f5fe to the 7.x release line (1f72e2e1).
7.5.6
Bug fixes
- Backported b8186dd1 to the 7.x release line (73dec34b).
- Backported ed2b8039 to the 7.x release line (22a26afb).
7.5.5
Bug fixes
- Backported ec9377ca to the 7.x release line (0e274acd).
7.5.4
Bug fixes
- Backported 6a72da3e to the 7.x release line (76087fbf).
- Backported 869c9892 to the 7.x release line (27997933).
7.5.3
Bug fixes
- The
WebSocketServerconstructor now throws an error if more than one of thenoServer,server, andportoptions are specefied (66e58d27).- Fixed a bug where a
'close'event was emitted by aWebSocketServerbefore the internal HTTP/S server was actually closed (5a587304).- Fixed a bug that allowed WebSocket connections to be established after
WebSocketServer.prototype.close()was called (772236a1).7.5.2
Bug fixes
- The opening handshake is now aborted if the client receives a
Sec-WebSocket-Extensionsheader but no extension was requested or if the server indicates an extension not requested by the client (aca94c86).
... (truncated)
Commits
8a78f87[dist] 7.5.90435e6e[security] Fix same host check for ws+unix: redirects4271f07[dist] 7.5.8dc1781b[security] Drop sensitive headers when following insecure redirects2758ed3[fix] Abort the handshake if the Upgrade header is invalida370613[dist] 7.5.71f72e2e[security] Drop sensitive headers when following redirects (#2013)8ecd890[dist] 7.5.622a26af[fix] Resume the socket in theCLOSINGstate73dec34[fix] Do not throw if the redirect URL is invalid- Additional commits viewable in compare view
Updates socket.io-client from 2.3.0 to 2.5.0
Release notes
Sourced from socket.io-client's releases.
2.5.0
Bug Fixes
- ensure buffered events are sent in order (991eb0b)
Links:
- Diff: https://github.com/socketio/socket.io-client/compare/2.4.0...2.5.0
- Server release: 2.5.0
- engine.io-client version:
~3.5.0- ws version:
~7.4.22.4.0
The minor bump is matching the bump of the server, but there is no new feature in this release.
Links:
- Milestone: -
- Diff: https://github.com/socketio/socket.io-client/compare/2.3.1...2.4.0
- Server release: 2.4.0
- engine.io-client version:
~3.5.0- ws version:
~7.4.22.3.1
The
debugdependency has been reverted to~3.1.0, as the newer versions contains ES6 syntax which breaks in IE browsers.Please note that this only applied to users that bundle the Socket.IO client in their application, with webpack for example, as the "official" bundles (in the dist/ folder) were already transpiled with babel.
For webpack users, you can also take a look at the webpack-remove-debug plugin.
Bug Fixes
Links:
- Milestone: 2.3.1
- Diff: https://github.com/socketio/socket.io-client/compare/2.3.0...2.3.1
- Server release: -
- engine.io-client version:
~3.4.0- ws version:
~6.1.0- Build size
socket.io.js:
- min:
61.3 KB (- 5.7 KB)- min+gzip:
19.7 KB (- 0.8 KB)socket.io.slim.js:
- min:
52.6 KB (+ 0.4 KB)
... (truncated)
Changelog
Sourced from socket.io-client's changelog.
2.5.0 (2022-06-26)
Bug Fixes
- ensure buffered events are sent in order (991eb0b)
Dependencies
engine.io-client@~3.5.0(no change)ws@~7.4.2(no change)4.5.1 (2022-05-17)
There were some minor bug fixes on the server side, which mandate a client bump.
Dependencies
engine.io-client@~6.2.1(no change)ws@~8.2.3(no change)4.5.0 (2022-04-23)
Features
Additional details for the disconnect event
The "disconnect" event will now include additional details to help debugging if anything has gone wrong.
Example when a payload is over the maxHttpBufferSize value in HTTP long-polling mode:
socket.on("disconnect", (reason, details) => { console.log(reason); // "transport error"// in that case, details is an error object console.log(details.message); "xhr post error" console.log(details.description); // 413 (the HTTP status of the response)
// details.context refers to the XMLHttpRequest object console.log(details.context.status); // 413 console.log(details.context.responseText); // "" });
... (truncated)
Commits
2b8e318chore(release): 2.5.0991eb0bfix: ensure buffered events are sent in orderb1d7eefci: remove Node.js 8 from the test matrixde2ccffchore(release): 2.4.0e9dd12achore: bump engine.io-client version7248c1eci: migrate to GitHub Actions4631ed6chore(release): 2.3.17f73a28test: fix tests in IE67c54b8chore: bump engine.io-parser and socket.io-parser15a52abtest: remove arrow function (for now)- Additional commits viewable in compare view
Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.
Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR:
-
@dependabot rebasewill rebase this PR -
@dependabot recreatewill recreate this PR, overwriting any edits that have been made to it -
@dependabot mergewill merge this PR after your CI passes on it -
@dependabot squash and mergewill squash and merge this PR after your CI passes on it -
@dependabot cancel mergewill cancel a previously requested merge and block automerging -
@dependabot reopenwill reopen this PR if it is closed -
@dependabot closewill close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually -
@dependabot ignore this major versionwill close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself) -
@dependabot ignore this minor versionwill close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself) -
@dependabot ignore this dependencywill close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself) You can disable automated security fix PRs for this repo from the Security Alerts page.