-
Notifications
You must be signed in to change notification settings - Fork 4
Adds npm-shrinkwrap.json file #697
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
Ran `npm shrinkwrap`, which renamed my local package-lock.json to npm-shrinkwrap.json. Should work, will have to test publish to npm though.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This is awesome! Does it also close #594? For some reason I can't seem to link 614 to close it, and 532 is a discussion. We'll have to do those manually. I'd also like to document the workflow for updating (and not updating) with shrinkwrap.
Shall we add an entry to the changelog for this? It'll be getting its own release. |
I can update the changelog and document usage!
#624 should have closed that, but since we're working on the v5 branch, and v4 is still marked as the default branch, Github doesn't close things when merged. I'll close that one now.
that discussion's purpose was to decide on a mechanism to freeze dependencies, and this PR implements the one we decided on.
We haven't actually released v5 yet, have we? This one is v5 only too, it won't work with v4. |
True, but I plan to make a new pre-release with this. |
Now that we've ran `npm shrinkwrap`, the only thing we need to do going forward is run `npm install`.
Added to the CHANGELOG and CONTRIBUTING! |
Love the new docs! Instead of the I feel like we've covered these before, but I just can't locate the info - if someone just does |
Happy to put it there, but my understanding was that Security was for things that are specific security fixes (i.e. we found this vulnerability and patched it, etc). This change is related to Security, and it's always good to update, but there's not the urgency of fixing a patch; we can't point to a specific library and say "this had a security flaw in it, this change avoids that", right?
That's my experience with it. Just to test it, I checked on a different machine, checked out this branch and ran
I wanted to have one simple instruction for adding dependencies that didn't have any ambiguity, so I only documented that one. Extra benefit that the version in the package.json will more explicit and under our control, and not the default semver range operator like There are still a ton of ways to change |
Makes sense to me! All the rest are great answers too, thanks and looks great! If I could approve again, I would 🚀 |
* Adds npm-shrinkwrap.json file Ran `npm shrinkwrap`, which renamed my local package-lock.json to npm-shrinkwrap.json. Should work, will have to test publish to npm though. * Add shrinkwrap to CHANGELOG.md and CONTRIBUTING.md Now that we've ran `npm shrinkwrap`, the only thing we need to do going forward is run `npm install`.
Ran
npm shrinkwrap
, which renamed my local package-lock.json to npm-shrinkwrap.json. Should work, will have to test publish to npm though.Resolves #614 and resolves #532