I encountered this same issue at a different okta sample and described the problem as well as presented the solution. As nobody responded, I could think that keeping the samples current exceeds the okta team's ability to do - let me please know if that is the case; I would then stop writing such observations 😄
Running npm install for the Express & Okta-Hosted Login Page Example results with:
λ npm install
> @okta/samples-nodejs-express-4@3.0.0 postinstall c:\work\learning\okta\samples-nodejs-express-4
> node post-install.js
Creating default configuration file
Sample project is ready to go! Please add your configuration to c:\work\learning\okta\samples-nodejs-express-4\.samples.config.j
son, see the README for instructions.
npm WARN optional SKIPPING OPTIONAL DEPENDENCY: fsevents@1.1.3 (node_modules\fsevents):
npm WARN notsup SKIPPING OPTIONAL DEPENDENCY: Unsupported platform for fsevents@1.1.3: wanted {"os":"darwin","arch":"any"} (curre
nt: {"os":"win32","arch":"x64"})
added 380 packages from 351 contributors and audited 1332 packages in 14.251s
found 25 vulnerabilities (4 low, 16 moderate, 5 high)
run `npm audit fix` to fix them, or `npm audit` for details
Subsequent execution of the npm audit results with the following suggestions:
- Run
npm install --save-dev protractor@5.4.1 to resolve 4 vulnerabilities
- Run
npm install @okta/oidc-middleware@1.0.2 to resolve 3 vulnerabilities
- Run
npm install @okta/jwt-verifier@0.0.14 to resolve 3 vulnerabilities
- Run
npm update fsevents --depth 3 to resolve 13 vulnerabilities
- Run
npm update fill-range --depth 7 to resolve 1 vulnerability
I did try to run these suggested commands, only to find that the total number of vulnerabilities dropped from 25 to 16, meaning that there is more work to be done, because of various inter-dependencies.
I encountered this same issue at a different okta sample and described the problem as well as presented the solution. As nobody responded, I could think that keeping the samples current exceeds the okta team's ability to do - let me please know if that is the case; I would then stop writing such observations 😄
Running
npm installfor the Express & Okta-Hosted Login Page Example results with:Subsequent execution of the
npm auditresults with the following suggestions:npm install --save-dev protractor@5.4.1to resolve 4 vulnerabilitiesnpm install @okta/oidc-middleware@1.0.2to resolve 3 vulnerabilitiesnpm install @okta/jwt-verifier@0.0.14to resolve 3 vulnerabilitiesnpm update fsevents --depth 3to resolve 13 vulnerabilitiesnpm update fill-range --depth 7to resolve 1 vulnerabilityI did try to run these suggested commands, only to find that the total number of vulnerabilities dropped from 25 to 16, meaning that there is more work to be done, because of various inter-dependencies.