Replies: 1 comment 2 replies
-
|
Agreed. To reformulate OP and try to understand the pnpm status quo: is there a rationale for In the case where I want to fix security issues, what I expect as a package manager user is to update the source of truth defining the tree of packages to use... a.k.a. the lockfile. And so,
Am I/we missing something? Is there a benefit to the current behavior of |
Beta Was this translation helpful? Give feedback.
2 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
We're currently using npm pretty much everywhere at my company. I'm exploring pnpm as an alternative.
I'm not sure what the equivalent of
npm audit fixis in pnpm. Coming from npm I'm used to being able to update what's needed to remove known security issues. AFAIK there's no single command that accomplishes the same in pnpm.The closest I got was to
pnpm audit --fixto populate overrides,pnpm installto persist changes in lockfile,pnpm installThat way the dependencies that were overridden stay there as long as they comply with all specified version ranges. Remaining audits need to be looked at again
How do others handle that? Just live with the overrides?
Beta Was this translation helpful? Give feedback.
All reactions