chore(deps): update node.js to v12.22.12 #14
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
12
->12.22.12
Release Notes
nodejs/node (node)
v12.22.12
: 2022-04-05, Version 12.22.12 'Erbium' (LTS), @richardlauCompare Source
Notable Changes
This is planned to be the final Node.js 12 release. Node.js 12 will
reach End-of-Life status on 30 April 2022, after which it will no
receive updates. You are strongly advised to migrate your applications
to Node.js 16 or 14 (both of which are Long Term Support (LTS) releases)
to continue to receive future security updates beyond 30 April 2022.
This release fixes a shutdown crash in Node-API (formerly N-API) and a
potential stack overflow when using
vm.runInNewContext()
.The list of GPG keys used to sign releases and instructions on how to
fetch the keys for verifying binaries has been synchronized with the
main branch.
Commits
1193290f3f
] - deps: V8: cherry-pickcc9a8a3
(devsnek) #42065333eda8d03
] - doc: add a note about possible missing lines to readline.asyncIterator (Igor Mikhalev) #34675518a49c0c6
] - doc: use openpgp.org for keyserver examples (Nick Schonning) #3922711aef2ad03
] - doc: update release key for Danielle Adams (Danielle Adams) #36793a9c38f1003
] - doc: add release key for Danielle Adams (Danielle Adams) #35545a35f553889
] - doc: add release key for Bryan English (Bryan English) #421025f104e3218
] - node-api: cctest on v8impl::Reference (legendecas) #38970e23c04f0dc
] - node-api: avoid SecondPassCallback crash (Michael Dawson) #38899a7224c9559
] - node-api: fix shutdown crashes (Michael Dawson) #3849281b4dc88f1
] - node-api: make reference weak parameter an indirect link to references (Chengzhong Wu) #380002aa9ca1ea9
] - node-api: fix crash in finalization (Michael Dawson) #37876a2f4206415
] - node-api: stop ref gc during environment teardown (Gabriel Schulhof) #37616171bb66ccc
] - node-api: force env shutdown deferring behavior (Gabriel Schulhof) #37303e707514c80
] - src: fix finalization crash (James M Snell) #38250v12.22.11
: 2022-03-17, Version 12.22.11 'Erbium' (LTS), @richardlauCompare Source
This is a security release.
Notable changes
Update to OpenSSL 1.1.1n, which addresses the following vulnerability:
BN_mod_sqrt()
reachable when parsing certificates (High)(CVE-2022-0778)More details are available at https://www.openssl.org/news/secadv/20220315.txt
Fix for building Node.js 12.x with Visual Studio 2019 to allow us to continue to
run CI tests.
Commits
e3e5bf11ba
] - build: pin Windows GitHub runner to windows-2019 (Richard Lau) #42349f41e7771bf
] - build: fix detection of Visual Studio 2019 (Richard Lau) #42349c372ec207d
] - deps: update archs files for OpenSSL-1.1.n (Richard Lau) #42348d574a1dccb
] - deps: upgrade openssl sources to 1.1.1n (Richard Lau) #42348v12.22.10
: 2022-02-01, Version 12.22.10 'Erbium' (LTS), @ruyadornoCompare Source
Notable changes
Commits
33899b435d
] - deps: upgrade npm to 6.14.16 (Ruy Adorno) #41601d9237c46ca
] - tools: update tzdata to 2021a4 (Albert Wang) #41443v12.22.9
: 2022-01-10, Version 12.22.9 'Erbium' (LTS), @richardlauCompare Source
This is a security release.
Notable changes
Improper handling of URI Subject Alternative Names (Medium)(CVE-2021-44531)
Accepting arbitrary Subject Alternative Name (SAN) types, unless a PKI is specifically defined to use a particular SAN type, can result in bypassing name-constrained intermediates. Node.js was accepting URI SAN types, which PKIs are often not defined to use. Additionally, when a protocol allows URI SANs, Node.js did not match the URI correctly.
Versions of Node.js with the fix for this disable the URI SAN type when checking a certificate against a hostname. This behavior can be reverted through the
--security-revert
command-line option.More details will be available at CVE-2021-44531 after publication.
Certificate Verification Bypass via String Injection (Medium)(CVE-2021-44532)
Node.js converts SANs (Subject Alternative Names) to a string format. It uses this string to check peer certificates against hostnames when validating connections. The string format was subject to an injection vulnerability when name constraints were used within a certificate chain, allowing the bypass of these name constraints.
Versions of Node.js with the fix for this escape SANs containing the problematic characters in order to prevent the injection. This behavior can be reverted through the
--security-revert
command-line option.More details will be available at CVE-2021-44532 after publication.
Incorrect handling of certificate subject and issuer fields (Medium)(CVE-2021-44533)
Node.js did not handle multi-value Relative Distinguished Names correctly. Attackers could craft certificate subjects containing a single-value Relative Distinguished Name that would be interpreted as a multi-value Relative Distinguished Name, for example, in order to inject a Common Name that would allow bypassing the certificate subject verification.
Affected versions of Node.js do not accept multi-value Relative Distinguished Names and are thus not vulnerable to such attacks themselves. However, third-party code that uses node's ambiguous presentation of certificate subjects may be vulnerable.
More details will be available at CVE-2021-44533 after publication.
Prototype pollution via
console.table
properties (Low)(CVE-2022-21824)Due to the formatting logic of the
console.table()
function it was not safe to allow user controlled input to be passed to theproperties
parameter while simultaneously passing a plain object with at least one property as the first parameter, which could be__proto__
. The prototype pollution has very limited control, in that it only allows an empty string to be assigned numerical keys of the object prototype.Versions of Node.js with the fix for this use a null protoype for the object these properties are being assigned to.
More details will be available at CVE-2022-21824 after publication.
Thanks to Patrik Oldsberg (rugvip) for reporting this vulnerability.
Commits
be69403528
] - console: fix prototype pollution via console.table (Tobias Nießen) nodejs-private/node-private#30719873abfb2
] - crypto,tls: implement safe x509 GeneralName format (Tobias Nießen and Akshay Kumar) nodejs-private/node-private#300ff9ac7d757
] - doc: fix date for v12.22.8 (Richard Lau) #41213a5c7843cab
] - src: add cve reverts and associated tests (Michael Dawson and Akshay Kumar) nodejs-private/node-private#300d4e5d1b9ca
] - src: remove unused x509 functions (Tobias Nießen and Akshay Kumar) nodejs-private/node-private#3008c2db2c86b
] - tls: fix handling of x509 subject and issuer (Tobias Nießen and Akshay Kumar) nodejs-private/node-private#300e0fe6a635e
] - tls: drop support for URI alternative names (Tobias Nießen and Akshay Kumar) nodejs-private/node-private#300v12.22.8
: 2021-12-16, Version 12.22.8 'Erbium' (LTS), @richardlauCompare Source
Notable Changes
This release contains a c-ares update to fix a regression introduced in
Node.js 12.22.5 resolving CNAME records containing underscores
#39780.
Root certificates have been updated to those from Mozilla's Network
Security Services 3.71 #40281.
Commits
2d42295d2a
] - build: pin macOS GitHub runner to macos-10.15 (Richard Lau) #4112441e09ec71b
] - child_process: retain reference to data with advanced serialization (Anna Henningsen) #38728f0be07796e
] - crypto: update root certificates (Richard Lau) #402804c9f920d34
] - deps: update archs files for OpenSSL-1.1.1m (Richard Lau) #4117260d7d4171e
] - deps: upgrade openssl sources to 1.1.1m (Richard Lau) #411727feff67419
] - deps: add -fno-strict-aliasing flag to libuv (Daniel Bevenius) #40631534ac7c7c6
] - deps: update c-ares to 1.18.1 (Richard Lau) #40660c019fa9b70
] - deps: update to [email protected] (Guy Bedford) #39402b13340eff4
] - doc: add alternative version links to the packages page (Filip Skokan) #36915243b2fbfdb
] - lib: fix regular expression to detect `/` and `\` (Francesco Trotta) #4032570e094a26b
] - repl: fix error message printing (Anna Henningsen) #3820902b432a704
] - src: fix crash in AfterGetAddrInfo (Anna Henningsen) #397357479447d6a
] - test: deflake child-process-pipe-dataflow (Luigi Pinca) #40838833e199393
] - tools: update certdata.txt (Richard Lau) #40280e4339fe286
] - tools: add script to update c-ares (Richard Lau) #40660f50b9c1e8a
] - worker: avoid potential deadlock on NearHeapLimit (Santiago Gimeno) #38403v12.22.7
: 2021-10-12, Version 12.22.7 'Erbium' (LTS), @danielleadamsCompare Source
This is a security release.
Notable changes
Commits
21a2e554e3
] - deps: update llhttp to 2.1.4 (Fedor Indutny) nodejs-private/node-private#286d5d3a03246
] - http: add regression test for smuggling content length (Matteo Collina) nodejs-private/node-private#2860858587f21
] - http: add regression test for chunked smuggling (Matteo Collina) nodejs-private/node-private#286v12.22.6
: 2021-08-31, Version 12.22.6 'Erbium' (LTS), @MylesBorinsCompare Source
This is a security release.
Notable Changes
These are vulnerabilities in the node-tar, arborist, and npm cli modules which
are related to the initial reports and subsequent remediation of node-tar
vulnerabilities CVE-2021-32803
and CVE-2021-32804.
Subsequent internal security review of node-tar and additional external bounty
reports have resulted in another 5 CVE being remediated in core npm CLI
dependencies including node-tar, and npm arborist.
You can read more about it in:
Commits
a0154b586b
] - deps: update archs files for OpenSSL-1.1.1l (Richard Lau) #398697a95637eb7
] - deps: upgrade openssl sources to 1.1.1l (Richard Lau) #39869840b0ffff6
] - deps: upgrade npm to 6.14.15 (Darcy Clarke) #39856v12.22.5
: 2021-08-11, Version 12.22.5 'Erbium' (LTS), @BethGriggsCompare Source
This is a security release.
Notable Changes
Commits
5f947db68c
] - deps: update c-ares to 1.17.2 (Beth Griggs) #3972442695ea34b
] - deps: reflect c-ares source tree (Beth Griggs) #39653e4c9156b32
] - deps: apply missed updates from c-ares 1.17.1 (Beth Griggs) #396539cd1f53103
] - http2: add tests for cancel event while client is paused reading (Akshay K) #396222008c9722f
] - http2: update handling of rst_stream with error code NGHTTP2_CANCEL (Akshay K) #396221780bbc329
] - tls: validate "rejectUnauthorized: undefined" (Matteo Collina) nodejs-private/node-private#276v12.22.4
: 2021-07-29, Version 12.22.4 'Erbium' (LTS), @richardlauCompare Source
This is a security release.
Notable Changes
Commits
499e56babe
] - build: fix label-pr workflow (Michaël Zasso) #3839998ac3c4108
] - build: label PRs with GitHub Action instead of nodejs-github-bot (Phillip Johnsen) #38301ddc8dde150
] - deps: upgrade npm to 6.14.14 (Darcy Clarke) #39553e11a862eed
] - deps: update to c-ares 1.17.1 (Danny Sonnenschein) #3620739e9cd540f
] - deps: restore minimum ICU version to 65 (Richard Lau) #39068e459c79b02
] - deps: V8: cherry-pick035c305
(Michaël Zasso) #38497b3c698a5d8
] - deps: update to [email protected] (Guy Bedford) #384507d5a2f9588
] - deps: update to [email protected] (Guy Bedford) #37992906b43e586
] - deps: V8: update build dependencies (Michaël Zasso) #3924515b91fa3fa
] - deps: V8: backport8959494
(Michaël Zasso) #392458046daf09f
] - deps: V8: cherry-pick0b3a4ec
(Michaël Zasso) #39245f4377b13a6
] - deps: V8: cherry-pick7c182bd
(Michaël Zasso) #39245add7b5b4c2
] - deps: V8: cherry-pickcc641f6
(Michaël Zasso) #39245a73275f056
] - deps: V8: cherry-pick7b33328
(Michaël Zasso) #39245492b0d6b37
] - deps: V8: cherry-picke6f62a4
(Michaël Zasso) #392452b54156260
] - deps: V8: cherry-pick92e6d33
(Michaël Zasso) #39245bbceab4d91
] - deps: V8: backport1b1eda0
(Michaël Zasso) #3924593a1a3c5ae
] - deps: V8: cherry-pick530080c
(Milad Fa) #38509b263f2585a
] - http2: on receiving rst_stream with cancel code add it to pending list (Akshay K) #394233e4bc1b0d3
] - module: fix legacynode
specifier resolution to resolve"main"
field (Antoine du Hamel) #38979f552c45676
] - src: move CHECK in AddIsolateFinishedCallback (Fedor Indutny) #3801030ce0e66ae
] - src: update cares_wrap OpenBSD defines (Anna Henningsen) #38670v12.22.3
: 2021-07-05, Version 12.22.3 'Erbium' (LTS), @richardlauCompare Source
Notable Changes
Node.js 12.22.2 introduced a regression in the Windows installer on
non-English locales that is being fixed in this release. There is no
need to download this release if you are not using the Windows
installer.
Commits
182f86a4d4
] - win,msi: use localized "Authenticated Users" name (Richard Lau) #39241v12.22.2
: 2021-07-01, Version 12.22.2 'Erbium' (LTS), @richardlauCompare Source
This is a security release.
Notable Changes
Vulnerabilities fixed:
Commits
623fd1fcb5
] - deps: uv: cherry-pick99c29c9
(Ben Noordhuis) nodejs-private/node-private#267923b3760f8
] - deps: upgrade npm to 6.14.13 (Ruy Adorno) #38214a52790cba0
] - win,msi: set install directory permission (AkshayK) nodejs-private/node-private#269v12.22.1
: 2021-04-06, Version 12.22.1 'Erbium' (LTS), @mylesborinsCompare Source
This is a security release.
Notable Changes
Vulnerabilities fixed:
Commits
c947f1a0e1
] - deps: upgrade npm to 6.14.12 (Ruy Adorno) #3791851a753c06f
] - deps: update archs files for OpenSSL-1.1.1k (Tobias Nießen) #37939c85a519b48
] - deps: upgrade openssl sources to 1.1.1k (Tobias Nießen) #37939v12.22.0
: 2021-03-30, Version 12.22.0 'Erbium' (LTS), @richardlauCompare Source
Notable changes
The legacy HTTP parser is runtime deprecated
The legacy HTTP parser, selected by the
--http-parser=legacy
command lineoption, is deprecated with the pending End-of-Life of Node.js 10.x (where it
is the only HTTP parser implementation provided) at the end of April 2021. It
will now warn on use but otherwise continue to function and may be removed in
a future Node.js 12.x release.
The default HTTP parser based on llhttp is not affected. By default it is
stricter than the now deprecated legacy HTTP parser. If interoperability with
HTTP implementations that send invalid HTTP headers is required, the HTTP
parser can be started in a less secure mode with the
--insecure-http-parser
command line option.
Contributed by Beth Griggs #37603.
ES Modules
ES Modules are now considered stable.
Contributed by Guy Bedford #35781
node-api
Updated to node-api version 8 and added an experimental API to allow retrieval of the add-on file name.
Contributed by Gabriel Schulhof #37652 and #37195.
New API's to control code coverage data collection
v8.stopCoverage()
andv8.takeCoverage()
have been added.Contributed by Joyee Cheung #33807.
New API to monitor event loop utilization by Worker threads
worker.performance.eventLoopUtilization()
has been added.Contributed by Trevor Norris #35664.
Commits
1872625990
] - (SEMVER-MINOR) deps: update to [email protected] (Guy Bedford) #37712dfa04d9035
] - deps: V8: cherry-pickbeebee4
(Peter Marshall) #37293bf8733fe22
] - doc: mark modules implementation as stable (Guy Bedford) #357810a35d49f56
] - Revert "embedding: make Stop() stop Workers" (Anna Henningsen) #32623a0b610450a
] - (SEMVER-MINOR) http: runtime deprecate legacy HTTP parser (Beth Griggs) #376032da24ac302
] - lib: add URI handling functions to primordials (Antoine du Hamel) #373947b0ed4ba92
] - module: improve support of data: URLs (Antoine du Hamel) #3739293dd799a86
] - (SEMVER-MINOR) node-api: define version 8 (Gabriel Schulhof) #37652f5692093d3
] - (SEMVER-MINOR) node-api: allow retrieval of add-on file name (Gabriel Schulhof) #371956cef0e3678
] - src,test: add regression test for nested Worker termination (Anna Henningsen) #32623364bf03a68
] - test: fix races in test-performance-eventlooputil (Gerhard Stoebich) #36028d7a4ccdf09
] - test: correct test-worker-eventlooputil (Gerhard Stoebich) #358910f6d44500c
] - test: add cpu-profiler-crash test (Santiago Gimeno) #3729386f34ee18c
] - (SEMVER-MINOR) v8: implement v8.stopCoverage() (Joyee Cheung) #338078ddea3f16d
] - (SEMVER-MINOR) v8: implement v8.takeCoverage() (Joyee Cheung) #33807eec7542781
] - (SEMVER-MINOR) worker: add eventLoopUtilization() (Trevor Norris) #35664v12.21.0
: 2021-02-23, Version 12.21.0 'Erbium' (LTS), @richardlauCompare Source
This is a security release.
Notable changes
Vulnerabilities fixed:
Commits
e69177a088
] - deps: update archs files for OpenSSL-1.1.1j (Daniel Bevenius) #374130633ae77e6
] - deps: upgrade openssl sources to 1.1.1j (Daniel Bevenius) #37413922ada7713
] - (SEMVER-MINOR) http2: add unknownProtocol timeout (Daniel Bevenius) nodejs-private/node-private#2461564752d55
] - src: drop localhost6 as allowed host for inspector (Matteo Collina) nodejs-private/node-private#244v12.20.2
: 2021-02-10, Version 12.20.2 'Erbium' (LTS), @ruyadornoCompare Source
Notable changes
Commits
e8a4e560ea
] - async_hooks: fix leak in AsyncLocalStorage exit (Stephen Belanger) #35779427968d266
] - deps: upgrade npm to 6.14.11 (Ruy Adorno) #37173cd9a8106be
] - http: do not loop over prototype in Agent (Michaël Zasso) #364104ac8f37800
] - http2: check write not scheduled in scope destructor (David Halls) #36241v12.20.1
: 2021-01-04, Version 12.20.1 'Erbium' (LTS), @richardlauCompare Source
Notable changes
This is a security release.
Vulnerabilities fixed:
Affected Node.js versions are vulnerable to a use-after-free bug in its
TLS implementation. When writing to a TLS enabled socket,
node::StreamBase::Write calls node::TLSWrap::DoWrite with a freshly
allocated WriteWrap object as first argument. If the DoWrite method does
not return an error, this object is passed back to the caller as part of
a StreamWriteResult structure. This may be exploited to corrupt memory
leading to a Denial of Service or potentially other exploits
Affected versions of Node.js allow two copies of a header field in a
http request. For example, two Transfer-Encoding header fields. In this
case Node.js identifies the first header field and ignores the second.
This can lead to HTTP Request Smuggling
(https://cwe.mitre.org/data/definitions/444.html).
This is a vulnerability in OpenSSL which may be exploited through Node.js.
You can read more about it in
https://www.openssl.org/news/secadv/20201208.txt
Commits
5de5354918
] - deps: update http-parser to http-parser@ec8b5ee
(Richard Lau) nodejs-private/node-private#2362eacfbec68
] - deps: upgrade npm to 6.14.10 (Ruy Adorno) #3657196ec482d90
] - deps: update archs files for OpenSSL-1.1.1i (Myles Borins) #365217ec0eb408b
] - deps: upgrade openssl sources to 1.1.1i (Myles Borins) #3652176ea9c5a7a
] - deps: upgrade npm to 6.14.9 (Myles Borins) #36450420244e4d9
] - http: unsetF_CHUNKED
on newTransfer-Encoding
(Matteo Collina) nodejs-private/node-private#2364a30ac8c75
] - http: add test for http transfer encoding smuggling (Richard Lau) nodejs-private/node-private#23692d430917a
] - http: unsetF_CHUNKED
on newTransfer-Encoding
(Fedor Indutny) nodejs-private/node-private#2365b00de7d67
] - src: retain pointers to WriteWrap/ShutdownWrap (James M Snell) nodejs-private/node-private#230v12.20.0
: 2020-11-24, Version 12.20.0 'Erbium' (LTS), @mylesborinsCompare Source
Notable Changes
https://github.com/nodejs/node/pull/35546ll/35546
https://github.com/nodejs/node/pull/35435ll/35435
https://github.com/nodejs/node/pull/35333ll/35333
https://github.com/nodejs/node/pull/35542ll/35542
https://github.com/nodejs/node/pull/33134ll/33134
https://github.com/nodejs/node/pull/33278ll/33278
https://github.com/nodejs/node/pull/34718ll/34718
https://github.com/nodejs/node/pull/35249ll/35249
https://github.com/nodejs/node/pull/35214ll/35214
https://github.com/nodejs/node/pull/35512ll/35512
Commits
c6eb0b62d9
] - benchmark: ignore build artifacts for napi addons (Richard Lau) #35970f3a045720c
] - build: fuzzer that targets node::LoadEnvironment() (davkor) #3484448bc3fcd4c
] - build: improved release lint error message (Shelley Vohr) #355232e766a6adf
] - console: add Symbol.toStringTag property (Leko) #3539990244362cc
] - crypto: fix KeyObject garbage collection (Anna Henningsen) #3548142f64eba89
] - crypto: update certdata to NSS 3.56 (Shelley Vohr) #35546a6f58c0888
] - crypto: set env values in KeyObject Deserialize method (ThakurKarthik) #354166539cf2725
] - deps: upgrade to [email protected] (Guy Bedford) #35928bdcc77bdf4
] - deps: update to [email protected] (Guy Bedford) #359015b8d3c74e8
] - deps: upgrade to [email protected] (Guy Bedford) #35871d7f0e3e5f0
] - deps: update to [email protected] (Guy Bedford) #357450a1474d9df
] - deps: update llhttp to 2.1.3 (Fedor Indutny) #35435cf07a8695a
] - deps: upgrade to libuv 1.40.0 (Colin Ihrig) #35333cc11464b4e
] - deps: upgrade to c-ares v1.16.1 (Shelley Vohr) #353245405e62eaf
] - deps: update to uvwasi 0.0.11 (Colin Ihrig) #3510444c739cc49
] - deps: V8: cherry-pick6be2f6e
(Benjamin Coe) #35055b78a1a186f
] - doc: update releaser in v12.18.4 changelog (Beth Griggs) #352171cd1d0159d
] - doc: move package.import content higher (Myles Borins) #3553579f3c323f6
] - doc: fix broken links in modules.md (Rich Trott) #35182b4941cfaec
] - doc: make minor improvements to module.md (Rich Trott) #350837dc3b74c34
] - doc: add ESM examples inmodule
API doc page (Antoine du HAMEL) #34875f0b06b64ff
] - doc: move module core module doc to separate page (Antoine du HAMEL) #3474777555d8500
] - doc: put landing specifics in details tag (Rich Trott) #35296b50b34b30e
] - doc: put release script specifics in details (Myles Borins) #352601a8f3a844e
] - doc: copyedit esm.md (Rich Trott) #35414d99120040c
] - doc: error code fix in resolver spec (Guy Bedford) #34998df52814113
] - doc: document Buffer.concat may use internal pool (Andrey Pechkurov) #3554142a587f9ba
] - doc: use test username instead of real (Pooja D.P) #35611bfff4fc3c9
] - doc: revise description of process.ppid (Pooja D.P) #35589a9ac75480f
] - doc: add symlink information for process.execpath (Pooja D.P) #355905fea51b66c
] - doc: add PoojaDurgad as a triager (Pooja D.P) #35153a0b541c3e0
] - doc: use kbd element in process doc (Rich Trott) #35584992355cdf9
] - doc: simplify wording in tracing APIs doc (Pooja D.P) #3555605db4b8343
] - doc: improve SIGINT error text (Rich Trott) #3555842c479572c
] - doc: use sentence case for class property (Rich Trott) #35540fb9bb05ee2
] - doc: fix util.inspect change history (Antoine du Hamel) #355286952c45202
] - doc: add aduh95 to collaborators (Antoine du Hamel) #35542b5f752528b
] - doc: update AUTHORS list (Anna Henningsen) #35280370f8e3afd
] - doc: update sxa's email address to Red Hat from IBM (Stewart X Addison) #35442edf3fbbd14
] - doc: update contact information for @BethGriggs (Beth Griggs) #354518be289e58c
] - doc: update contact information for richardlau (Richard Lau) #3545042c0dfcc23
] - doc: importable node protocol URLs (Bradley Meck) #35434c192af66e7
] - doc: unhide resolver spec (Guy Bedford) #35358b0e43c718c
] - doc: add gpg key export directions to releases doc (Danielle Adams) #35298884755f1e5
] - doc: simplify circular dependencies text in modules.md (Rich Trott) #3512685c47d753c
] - doc: avoid double-while sentence in perf_hooks.md (Rich Trott) [#35078](https://redirectConfiguration
📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.