Unverified Commit 6658a9ca authored by Hong Minhee's avatar Hong Minhee
Browse files

Release 1.6.13

parent bf2f0783
Loading
Loading
Loading
Loading
+7 −3
Original line number Diff line number Diff line
@@ -173,7 +173,7 @@ jobs:
      working-directory: ${{ github.workspace }}/fedify/
    - run: deno task npm
      working-directory: ${{ github.workspace }}/fedify/
    - run: npm publish --dry-run fedify-fedify-*.tgz
    - run: npm publish --dry-run --tag latest fedify-fedify-*.tgz
      working-directory: ${{ github.workspace }}/fedify/
      env:
        DNT_SKIP_TEST: "true"
@@ -286,7 +286,11 @@ jobs:
        set -ex
        npm config set //registry.npmjs.org/:_authToken "$NPM_AUTH_TOKEN"
        if [[ "$GITHUB_REF_TYPE" = "tag" ]]; then
          npm publish --provenance --access public fedify-fedify-*.tgz
          npm publish \
            --provenance \
            --access public \
            --tag latest \
            fedify-fedify-*.tgz
        elif [[ "$GITHUB_EVENT_NAME" = "pull_request_target" ]]; then
          npm publish \
            --provenance \
@@ -304,7 +308,7 @@ jobs:
      run: |
        set -ex
        npm config set //registry.npmjs.org/:_authToken "$NPM_AUTH_TOKEN"
        npm publish --provenance --access public fedify-cli-*.tgz
        npm publish --provenance --access public --tag latest fedify-cli-*.tgz
      env:
        NPM_AUTH_TOKEN: ${{ secrets.NPM_AUTH_TOKEN }}
      working-directory: ${{ github.workspace }}/cli/
+8 −8
Original line number Diff line number Diff line
@@ -6,7 +6,14 @@ Fedify changelog
Version 1.6.13
--------------

To be released.
Released on December 20, 2025.

 -  Fixed a ReDoS (Regular Expression Denial of Service) vulnerability in
    the document loader's HTML parsing.  An attacker-controlled server could
    respond with a malicious HTML payload that blocked the event loop.
    [[CVE-2025-68475]]

[CVE-2025-68475]: https://github.com/fedify-dev/fedify/security/advisories/GHSA-rchf-xwx2-hm93


Version 1.6.12
@@ -124,13 +131,6 @@ Released on June 30, 2025.
    typed literal object (e.g., `"votersCount":{"type":"xsd:nonNegativeInteger",
    "@value":123}`).

 -  Fixed a ReDoS (Regular Expression Denial of Service) vulnerability in
    the document loader's HTML parsing.  An attacker-controlled server could
    respond with a malicious HTML payload that blocked the event loop.
    [[CVE-2025-68475]]

[CVE-2025-68475]: https://github.com/fedify-dev/fedify/security/advisories/GHSA-rchf-xwx2-hm93


Version 1.6.2
-------------
+1 −1
Original line number Diff line number Diff line
{
  "name": "@fedify/fedify",
  "version": "1.6.12",
  "version": "1.6.13",
  "description": "An ActivityPub server framework",
  "keywords": [
    "ActivityPub",