Bump @simplewebauthn/server from 9.0.3 to 13.2.1 #889

Closed
opened 2026-04-05 17:55:42 +02:00 by MrUnknownDE · 0 comments
Owner

Originally created by @dependabot[bot] on 9/19/2025

Bumps @simplewebauthn/server from 9.0.3 to 13.2.1.

Release notes

Sourced from @​simplewebauthn/server's releases.

v13.2.1

Changes:

  • [server] generateRegistrationOptions() will now correctly encoded the userID argument to base64url when it is an instance of Node's Buffer (#724)

v13.2.0

  • [server] The return value from verifyRegistrationResponse() has been defined more strictly to communicate that registrationInfo will only ever be present if verified is true (#715)
  • [server] verifyRegistrationResponse() can now verify attestations containing SHA256 hashes by using EC public keys with the P-384 curve (#721)
  • [server] The Android SafetyNet "CTS profile match" system integrity check can now be disabled by setting attestationSafetyNetEnforceCTSCheck: false when calling verifyRegistrationResponse(). This check remains enforced by default (#722)
  • [browser] [server] These libraries now have better support in Deno 2.2+ projects which use generic typing for Uint8Array via TypeScript 5.7. SimpleWebAuthn values of type Uint8Array_ are equivalent to Uint8Array in Deno 2.1 and earlier, and Uint8Array<ArrayBuffer> in Deno 2.2 and later. (#717)

v13.1.2

Changes

  • [browser] [server] Exported the ResidentKeyRequirement type to help with type inference (#704)

v13.1.1

Changes:

  • [server] "android-key" attestation statement verification has been modernized (#675)
  • [server] More TPM manufacturers are recognized while verifying "tpm" attestation statements (#673)

v13.1.0

Changes:

  • [server] The cross-fetch dependency has been removed from the project to silence in the console DeprecationWarning's about a "punycode" module (#661)
  • [browser] startRegistration() and startAuthentication() will now warn about calls made using the pre-v11 call structure to encourage refactoring to use the current call structure, but still try to handle such calls the best they can (#664)

v13.0.0 - The one where they share a type

Hot on the heels of the last major release, v13 introduces support for registration hints! Refined types and improved attestation trust anchor verification are also included. Last but not least, we say goodbye to one of the project's packages for better docs and fewer dependencies to install. Read on for more information, including refactor advice for dealing with the retirement of @​simplewebauthn/types.

Changes:

  • [server] A new preferredAuthenticatorType argument can be set when calling generateRegistrationOptions() to generate options that encourage the browser to direct the user to register one of three types of authenticators: 'securityKey', 'localDevice', or 'remoteDevice' (a.k.a. opinionated WebAuthn hints support) (#653)
  • [browser] startRegistration() will recognize hints if specified in optionsJSON (#652)
  • [server] Attestation verification now recognizes intermediate certificates as trust anchors (#650)
  • [browser] [server] The types previously maintained in the types package are now included within the browser and server packages. See Breaking Changes below for more info (#655)

Breaking Changes

@​typescript/types is being retired.

Its types will now be included directly in @​simplewebauthn/browser and @​simplewebauthn/server.

To refactor existing imports from /types, simply import them from /browser or /server instead:

Before:

import type {
</tr></table> 

... (truncated)

Changelog

Sourced from @​simplewebauthn/server's changelog.

v13.2.1

Changes:

  • [server] generateRegistrationOptions() will now correctly encoded the userID argument to base64url when it is an instance of Node's Buffer (#724)

v13.2.0

Changes

  • [server] The return value from verifyRegistrationResponse() has been defined more strictly to communicate that registrationInfo will only ever be present if verified is true (#715)
  • [server] verifyRegistrationResponse() can now verify attestations containing SHA256 hashes by using EC public keys with the P-384 curve (#721)
  • [server] The Android SafetyNet "CTS profile match" system integrity check can now be disabled by setting attestationSafetyNetEnforceCTSCheck: false when calling verifyRegistrationResponse(). This check remains enforced by default (#722)
  • [browser] [server] These libraries now have better support in Deno 2.2+ projects which use generic typing for Uint8Array via TypeScript 5.7. SimpleWebAuthn values of type Uint8Array_ are equivalent to Uint8Array in Deno 2.1 and earlier, and Uint8Array<ArrayBuffer> in Deno 2.2 and later. (#717)

v13.1.2

Changes

  • [browser] [server] Exported the ResidentKeyRequirement type to help with type inference (#704)

v13.1.1

Changes:

  • [server] "android-key" attestation statement verification has been modernized (#675)
  • [server] More TPM manufacturers are recognized while verifying "tpm" attestation statements (#673)

v13.1.0

Changes:

  • [server] The cross-fetch dependency has been removed from the project to silence in the console DeprecationWarning's about a "punycode" module

... (truncated)

Commits

Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot show <dependency name> ignore conditions will show all of the ignore conditions of the specified dependency
  • @dependabot ignore this major version will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this minor version will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)
*Originally created by @dependabot[bot] on 9/19/2025* Bumps [@simplewebauthn/server](https://github.com/MasterKale/SimpleWebAuthn/tree/HEAD/packages/server) from 9.0.3 to 13.2.1. <details> <summary>Release notes</summary> <p><em>Sourced from <a href="https://github.com/MasterKale/SimpleWebAuthn/releases"><code>@​simplewebauthn/server</code>'s releases</a>.</em></p> <blockquote> <h2>v13.2.1</h2> <p><strong>Changes:</strong></p> <ul> <li><strong>[server]</strong> <code>generateRegistrationOptions()</code> will now correctly encoded the <code>userID</code> argument to base64url when it is an instance of Node's <code>Buffer</code> (<a href="https://redirect.github.com/MasterKale/SimpleWebAuthn/pull/724">#724</a>)</li> </ul> <h2>v13.2.0</h2> <ul> <li><strong>[server]</strong> The return value from <code>verifyRegistrationResponse()</code> has been defined more strictly to communicate that <code>registrationInfo</code> will only ever be present if <code>verified</code> is <code>true</code> (<a href="https://redirect.github.com/MasterKale/SimpleWebAuthn/pull/715">#715</a>)</li> <li><strong>[server]</strong> <code>verifyRegistrationResponse()</code> can now verify attestations containing SHA256 hashes by using EC public keys with the P-384 curve (<a href="https://redirect.github.com/MasterKale/SimpleWebAuthn/pull/721">#721</a>)</li> <li><strong>[server]</strong> The Android SafetyNet &quot;CTS profile match&quot; system integrity check can now be disabled by setting <code>attestationSafetyNetEnforceCTSCheck: false</code> when calling <code>verifyRegistrationResponse()</code>. This check remains enforced by default (<a href="https://redirect.github.com/MasterKale/SimpleWebAuthn/pull/722">#722</a>)</li> <li><strong>[browser] [server]</strong> These libraries now have better support in Deno 2.2+ projects which use <a href="https://typescriptdocs.com/release-notes/TypeScript%205.7.html#typedarrays-are-now-generic-over-arraybufferlike">generic typing for <code>Uint8Array</code> via TypeScript 5.7</a>. SimpleWebAuthn values of type <code>Uint8Array_</code> are equivalent to <code>Uint8Array</code> in Deno 2.1 and earlier, and <code>Uint8Array&lt;ArrayBuffer&gt;</code> in Deno 2.2 and later. (<a href="https://redirect.github.com/MasterKale/SimpleWebAuthn/pull/717">#717</a>)</li> </ul> <h2>v13.1.2</h2> <p><strong>Changes</strong></p> <ul> <li><strong>[browser] [server]</strong> Exported the <code>ResidentKeyRequirement</code> type to help with type inference (<a href="https://redirect.github.com/MasterKale/SimpleWebAuthn/pull/704">#704</a>)</li> </ul> <h2>v13.1.1</h2> <p><strong>Changes:</strong></p> <ul> <li><strong>[server]</strong> <code>&quot;android-key&quot;</code> attestation statement verification has been modernized (<a href="https://redirect.github.com/MasterKale/SimpleWebAuthn/pull/675">#675</a>)</li> <li><strong>[server]</strong> More TPM manufacturers are recognized while verifying <code>&quot;tpm&quot;</code> attestation statements (<a href="https://redirect.github.com/MasterKale/SimpleWebAuthn/pull/673">#673</a>)</li> </ul> <h2>v13.1.0</h2> <p><strong>Changes:</strong></p> <ul> <li><strong>[server]</strong> The <code>cross-fetch</code> dependency has been removed from the project to silence in the console <code>DeprecationWarning</code>'s about a &quot;<code>punycode</code>&quot; module (<a href="https://redirect.github.com/MasterKale/SimpleWebAuthn/pull/661">#661</a>)</li> <li><strong>[browser]</strong> <code>startRegistration()</code> and <code>startAuthentication()</code> will now warn about calls made using the pre-v11 call structure to encourage refactoring to use the current call structure, but still try to handle such calls the best they can (<a href="https://redirect.github.com/MasterKale/SimpleWebAuthn/pull/664">#664</a>)</li> </ul> <h2>v13.0.0 - The one where they share a type</h2> <p>Hot on the heels of the last major release, v13 introduces <strong>support for registration hints</strong>! Refined types and improved attestation trust anchor verification are also included. Last but not least, we say goodbye to one of the project's packages for better docs and fewer dependencies to install. Read on for more information, including refactor advice for dealing with the retirement of <strong><code>@​simplewebauthn/types</code></strong>.</p> <p><strong>Changes:</strong></p> <ul> <li><strong>[server]</strong> A new <code>preferredAuthenticatorType</code> argument can be set when calling <code>generateRegistrationOptions()</code> to generate options that encourage the browser to direct the user to register one of three types of authenticators: <code>'securityKey'</code>, <code>'localDevice'</code>, or <code>'remoteDevice'</code> (a.k.a. opinionated <a href="https://w3c.github.io/webauthn/#dom-publickeycredentialcreationoptions-hints">WebAuthn hints</a> support) (<a href="https://redirect.github.com/MasterKale/SimpleWebAuthn/pull/653">#653</a>)</li> <li><strong>[browser]</strong> <code>startRegistration()</code> will recognize <code>hints</code> if specified in <code>optionsJSON</code> (<a href="https://redirect.github.com/MasterKale/SimpleWebAuthn/pull/652">#652</a>)</li> <li><strong>[server]</strong> Attestation verification now recognizes intermediate certificates as trust anchors (<a href="https://redirect.github.com/MasterKale/SimpleWebAuthn/pull/650">#650</a>)</li> <li><strong>[browser] [server]</strong> The types previously maintained in the <strong>types</strong> package are now included within the <strong>browser</strong> and <strong>server</strong> packages. See Breaking Changes below for more info (<a href="https://redirect.github.com/MasterKale/SimpleWebAuthn/pull/655">#655</a>)</li> </ul> <h3>Breaking Changes</h3> <h4><code>@​typescript/types</code> is being retired.</h4> <p>Its types will now be included directly in <strong><code>@​simplewebauthn/browser</code></strong> and <strong><code>@​simplewebauthn/server</code></strong>.</p> <p>To refactor existing imports from <strong>/types</strong>, simply import them from <strong>/browser</strong> or <strong>/server</strong> instead:</p> <p><strong>Before:</strong></p> <pre lang="ts"><code>import type { &lt;/tr&gt;&lt;/table&gt; </code></pre> </blockquote> <p>... (truncated)</p> </details> <details> <summary>Changelog</summary> <p><em>Sourced from <a href="https://github.com/MasterKale/SimpleWebAuthn/blob/master/CHANGELOG.md"><code>@​simplewebauthn/server</code>'s changelog</a>.</em></p> <blockquote> <h2>v13.2.1</h2> <p><strong>Changes:</strong></p> <ul> <li><strong>[server]</strong> <code>generateRegistrationOptions()</code> will now correctly encoded the <code>userID</code> argument to base64url when it is an instance of Node's <code>Buffer</code> (<a href="https://redirect.github.com/MasterKale/SimpleWebAuthn/pull/724">#724</a>)</li> </ul> <h2>v13.2.0</h2> <p><strong>Changes</strong></p> <ul> <li><strong>[server]</strong> The return value from <code>verifyRegistrationResponse()</code> has been defined more strictly to communicate that <code>registrationInfo</code> will only ever be present if <code>verified</code> is <code>true</code> (<a href="https://redirect.github.com/MasterKale/SimpleWebAuthn/pull/715">#715</a>)</li> <li><strong>[server]</strong> <code>verifyRegistrationResponse()</code> can now verify attestations containing SHA256 hashes by using EC public keys with the P-384 curve (<a href="https://redirect.github.com/MasterKale/SimpleWebAuthn/pull/721">#721</a>)</li> <li><strong>[server]</strong> The Android SafetyNet &quot;CTS profile match&quot; system integrity check can now be disabled by setting <code>attestationSafetyNetEnforceCTSCheck: false</code> when calling <code>verifyRegistrationResponse()</code>. This check remains enforced by default (<a href="https://redirect.github.com/MasterKale/SimpleWebAuthn/pull/722">#722</a>)</li> <li><strong>[browser] [server]</strong> These libraries now have better support in Deno 2.2+ projects which use <a href="https://typescriptdocs.com/release-notes/TypeScript%205.7.html#typedarrays-are-now-generic-over-arraybufferlike">generic typing for <code>Uint8Array</code> via TypeScript 5.7</a>. SimpleWebAuthn values of type <code>Uint8Array_</code> are equivalent to <code>Uint8Array</code> in Deno 2.1 and earlier, and <code>Uint8Array&lt;ArrayBuffer&gt;</code> in Deno 2.2 and later. (<a href="https://redirect.github.com/MasterKale/SimpleWebAuthn/pull/717">#717</a>)</li> </ul> <h2>v13.1.2</h2> <p><strong>Changes</strong></p> <ul> <li><strong>[browser] [server]</strong> Exported the <code>ResidentKeyRequirement</code> type to help with type inference (<a href="https://redirect.github.com/MasterKale/SimpleWebAuthn/pull/704">#704</a>)</li> </ul> <h2>v13.1.1</h2> <p><strong>Changes:</strong></p> <ul> <li><strong>[server]</strong> <code>&quot;android-key&quot;</code> attestation statement verification has been modernized (<a href="https://redirect.github.com/MasterKale/SimpleWebAuthn/pull/675">#675</a>)</li> <li><strong>[server]</strong> More TPM manufacturers are recognized while verifying <code>&quot;tpm&quot;</code> attestation statements (<a href="https://redirect.github.com/MasterKale/SimpleWebAuthn/pull/673">#673</a>)</li> </ul> <h2>v13.1.0</h2> <p><strong>Changes:</strong></p> <ul> <li><strong>[server]</strong> The <code>cross-fetch</code> dependency has been removed from the project to silence in the console <code>DeprecationWarning</code>'s about a &quot;<code>punycode</code>&quot; module</li> </ul> <!-- raw HTML omitted --> </blockquote> <p>... (truncated)</p> </details> <details> <summary>Commits</summary> <ul> <li><a href="https://github.com/MasterKale/SimpleWebAuthn/commit/75ad6b747fb05f1e9027e870301cf062311ea684"><code>75ad6b7</code></a> Publish v13.2.1</li> <li><a href="https://github.com/MasterKale/SimpleWebAuthn/commit/b75dd4d0e8c57292f5a754e0d9043743d0e5d492"><code>b75dd4d</code></a> Add test</li> <li><a href="https://github.com/MasterKale/SimpleWebAuthn/commit/4e4276a790ae47e2ec05a1ac2aa1be4a6dd793fb"><code>4e4276a</code></a> Normalize bytes before base64url-encoding</li> <li><a href="https://github.com/MasterKale/SimpleWebAuthn/commit/84c61db7b22c14f0e4ebba860023dd76d589c5f5"><code>84c61db</code></a> Publish v13.2.0</li> <li><a href="https://github.com/MasterKale/SimpleWebAuthn/commit/ba148325f3738a47087eb288e383d51a4a6bae6e"><code>ba14832</code></a> Add tests</li> <li><a href="https://github.com/MasterKale/SimpleWebAuthn/commit/43200d974daf5e3733d14876926dc67f79fdf20e"><code>43200d9</code></a> Consume arg to skip CTS profile match enforcement</li> <li><a href="https://github.com/MasterKale/SimpleWebAuthn/commit/4c7e930041f4338e3cb8694e5f92b8e618be51a6"><code>4c7e930</code></a> Add new attestationSafetyNetEnforceCTSCheck arg</li> <li><a href="https://github.com/MasterKale/SimpleWebAuthn/commit/521aa6fe9b6b6d2f061560745b3301c792840457"><code>521aa6f</code></a> Minor bit of cleanup</li> <li><a href="https://github.com/MasterKale/SimpleWebAuthn/commit/13db34f90795cd62dc015242aeb88e8567516fac"><code>13db34f</code></a> Some minor cleanup</li> <li><a href="https://github.com/MasterKale/SimpleWebAuthn/commit/4dee70c42e50b857b2b857ebfcf82bb03ce36d83"><code>4dee70c</code></a> Maybe this fixes it?</li> <li>Additional commits viewable in <a href="https://github.com/MasterKale/SimpleWebAuthn/commits/v13.2.1/packages/server">compare view</a></li> </ul> </details> <br /> [![Dependabot compatibility score](https://dependabot-badges.githubapp.com/badges/compatibility_score?dependency-name=@simplewebauthn/server&package-manager=npm_and_yarn&previous-version=9.0.3&new-version=13.2.1)](https://docs.github.com/en/github/managing-security-vulnerabilities/about-dependabot-security-updates#about-compatibility-scores) Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting `@dependabot rebase`. [//]: # (dependabot-automerge-start) [//]: # (dependabot-automerge-end) --- <details> <summary>Dependabot commands and options</summary> <br /> You can trigger Dependabot actions by commenting on this PR: - `@dependabot rebase` will rebase this PR - `@dependabot recreate` will recreate this PR, overwriting any edits that have been made to it - `@dependabot merge` will merge this PR after your CI passes on it - `@dependabot squash and merge` will squash and merge this PR after your CI passes on it - `@dependabot cancel merge` will cancel a previously requested merge and block automerging - `@dependabot reopen` will reopen this PR if it is closed - `@dependabot close` will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually - `@dependabot show <dependency name> ignore conditions` will show all of the ignore conditions of the specified dependency - `@dependabot ignore this major version` will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself) - `@dependabot ignore this minor version` will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself) - `@dependabot ignore this dependency` will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself) </details>
MrUnknownDE added the dependenciesjavascriptdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesdependenciesjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascriptjavascript labels 2026-04-05 17:56:11 +02:00
Sign in to join this conversation.
No Label dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies dependencies javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript javascript
1 Participants
Notifications
Due Date
No due date set.
Dependencies

No dependencies set.

Reference: github/pangolin#889