Skip to content

Commit d66317e

Browse files
Merge pull request #487 from juliensadaoui/Update-Undertow-CVE-2020-10687
Update Undertow to fix CVE-2020-10687
2 parents 431d961 + 94ae28d commit d66317e

5 files changed

Lines changed: 11 additions & 11 deletions

File tree

.yo-rc.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
{
22
"generator-jhipster": {
3-
"jhipsterVersion": "6.10.4",
3+
"jhipsterVersion": "6.10.5",
44
"baseName": "JHipsterRegistry",
55
"packageName": "io.github.jhipster.registry",
66
"packageFolder": "io/github/jhipster/registry",

package-lock.json

Lines changed: 6 additions & 6 deletions
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

package.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -54,7 +54,7 @@
5454
"eslint-loader": "4.0.2",
5555
"file-loader": "6.0.0",
5656
"friendly-errors-webpack-plugin": "1.7.0",
57-
"generator-jhipster": "6.10.4",
57+
"generator-jhipster": "6.10.5",
5858
"html-loader": "1.1.0",
5959
"html-webpack-plugin": "4.3.0",
6060
"husky": "4.2.5",

pom.xml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@
3030
<profile.tls />
3131

3232
<!-- Dependency versions -->
33-
<jhipster-dependencies.version>3.9.0</jhipster-dependencies.version>
33+
<jhipster-dependencies.version>3.9.1</jhipster-dependencies.version>
3434
<!-- The spring-boot version should match the one managed by
3535
https://mvnrepository.com/artifact/io.github.jhipster/jhipster-dependencies/${jhipster-dependencies.version} -->
3636
<spring-boot.version>2.2.7.RELEASE</spring-boot.version>

sonar-project.properties

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -25,9 +25,9 @@ sonar.issue.ignore.multicriteria.UndocumentedApi.ruleKey=squid:UndocumentedApi
2525
# Rule https://sonarcloud.io/coding_rules?open=squid%3AS4502&rule_key=squid%3AS4502 is ignored, as for JWT tokens we are not subject to CSRF attack
2626
sonar.issue.ignore.multicriteria.S4502.resourceKey=src/main/java/**/*
2727
sonar.issue.ignore.multicriteria.S4502.ruleKey=squid:S4502
28-
# Rule https://sonarcloud.io/coding_rules?open=squid%3AS4684&rule_key=squid%3AS4684
28+
# Rule https://sonarcloud.io/coding_rules?open=java%3AS4684&rule_key=java%3AS4684
2929
sonar.issue.ignore.multicriteria.S4684.resourceKey=src/main/java/**/*
30-
sonar.issue.ignore.multicriteria.S4684.ruleKey=squid:S4684
30+
sonar.issue.ignore.multicriteria.S4684.ruleKey=java:S4684
3131
# Rule https://sonarcloud.io/coding_rules?open=Web%3ABoldAndItalicTagsCheck&rule_key=Web%3ABoldAndItalicTagsCheck is ignored. Even if we agree that using the "i" tag is an awful practice, this is what is recommended by http://fontawesome.io/examples/
3232
sonar.issue.ignore.multicriteria.BoldAndItalicTagsCheck.resourceKey=src/main/webapp/app/**/*.*
3333
sonar.issue.ignore.multicriteria.BoldAndItalicTagsCheck.ruleKey=Web:BoldAndItalicTagsCheck

0 commit comments

Comments
 (0)