Conversation
|
CLA Signature Action: All authors have signed the CLA. You may need to manually re-run the blocking PR check if it doesn't pass in a few minutes. |
Builds ready [9202e49]
Page Load Metrics (604 ± 43 ms)
|
kumavis
left a comment
There was a problem hiding this comment.
since we're bundling lockdown we can remove the ses dep
|
this will help keep |
Builds ready [d62d37f]
Page Load Metrics (677 ± 27 ms)
|
Gudahtt
left a comment
There was a problem hiding this comment.
Why was the lockdown script vendored, rather than imported? Where specifically did this script come from, and which version is it?
This script came from building lockdown from SES-Shim's master branch. |
|
@Gudahtt good question. asking agoric about next version release timeline |
|
ses release "maybe tomorrow" 👍 |
|
Cool - makes sense 👍 Not against including vendored dependencies, but it would be nice if some context for what the file is was included in the codebase alongside it. A pattern I've seen used before is to create a directory under As an example of where this went wrong, I've briefly considered updating It sounds like we'll be updating SES pretty soon so it's likely not to be an issue here, but you never know! We could get stuck on this version if the next update introduces problems. Better safe than sorry, and a couple of lines of text should be easy enough to add anyway. |
|
hold |
This reverts commit 966e4c6.
Builds ready [c1f144a]
Page Load Metrics (599 ± 45 ms)
|
|
need to verify the ses-bug for errors in console is not affected in browser |
|
heres the ses bug in question endojs/endo#636 |
| var _proto = MiddlewareArray.prototype; | ||
|
|
||
| - _proto.concat = function concat() { | ||
| + Object.defineProperty(_proto, 'concat', { value: function concat() { |
There was a problem hiding this comment.
Huh. I don't quite follow what's going on here. Is this an array class that is extending Array and redefining concat?
Could we propose this upstream? They seem to be fairly responsive maintainers.
There was a problem hiding this comment.
your understanding is correct. its fine for them to do that (none of my business), but the override mistake doesnt allow them to do it via assignment. thus this.
yes, we usually PR these patches upstream. but we dont let that block us so we write patches as well.
There was a problem hiding this comment.
Got it. Using a patch seems fine for now, but having that work started by creating a PR would be great. Then we could hopefully delete the patch on the next update, rather than re-write it each time. Especially for packages like this that are updated relatively frequently.
Gudahtt
left a comment
There was a problem hiding this comment.
LGTM!
I didn't test this yet, but it'll be a while before our next feature release so we'll have plenty of time to find any new SES-related breakages.
Update to SES lockdown
0.12.4, which includes new optionoverrideTaming: 'severe'