Hi, I understand the repo’s development’s indeed still happening , but perhaps at least security releases could be done? eg: electron release 28.x.*
was at EOLife in May (current stable is v33.0.2
).
I’m guessing this yarn.lock
is where it’s pinned in the logseq repo (github /logseq/logseq/blob/53d8c5a3c6b43fbff0f8de2a32d09e284ef72fcb/yarn.lock#L2649
(sorry discourse won’t allow more than than two links) )?
update: logseq’s been removed from nixos (biggest package maintenance ecosystem I know of) for this very security concern of this thread.
2 Likes
Ramses
March 10, 2025, 5:53pm
3
Thanks for raising this issue @jakotay (and sorry for taking so long to reply).
All work is currently focused on the “DB branch”, which will be merged back into main soon. There, electron has been been updated to v31.7.5
:
logseq:feat/db
← logseq:enhance/db-electron-upgrade
opened 01:52AM - 27 Nov 24 UTC
- [x] upgrade electron to **v31.7.5** ( Chrome **124**, Node **v20.14**)
- [x] … test electron release builder
Edit: I see there’s an issue with this version as well, so I’ve flagged the issue with @tienson based on the comment below. He told me that the electron version will be updated again.
opened 04:08PM - 13 Dec 24 UTC
### Search first
- [X] I searched and no similar issues were found
### Wha… t Happened?
The current release 0.10.9 uses electron version 27 which reached EOL 2024-Apr-16. In the master branch electron version 31 is used which will reach EOL 2025-Jan-14, which is at the time of writing in 1 month.
That means that the current version of logseq already is insecure and the master branch will become insecure very shortly.
Therefore I recommend upgrading electron to at least version 33 which will reach EOL 2025-Apr-29 and creating a new release.
See https://www.electronjs.org/docs/latest/tutorial/electron-timelines
### Reproduce the Bug
1. Download current version
2. investigate dependencies
3. Download master
4. investigate dependencies
### Expected Behavior
Release version should have an electron version which still receives security updates.
### Screenshots
_No response_
### Desktop or Mobile Platform Information
_No response_
### Additional Context
_No response_
### Are you willing to submit a PR? If you know how to fix the bug.
- [ ] I'm willing to submit a PR (Thank you!)
Edit 2: Electron will be updated soon, in time for the new local builds:
logseq:master
← logseq:chore/bump-electron
opened 06:17PM - 10 Mar 25 UTC
Is there a timeline? As distros are removing logseq for lack of maintenance, it would be helpful to know if this is days, weeks, or months.
I see in other comments that there’s no date. But for those of us on distros where logseq is being removed, it would be good to have some idea.
2 Likes
Ramses
March 12, 2025, 4:33pm
5
thomasc:
Is there a timeline? As distros are removing logseq for lack of maintenance, it would be helpful to know if this is days, weeks, or months.
Sorry, I really can’t give a timeline because I don’t know. I’m hoping for weeks, but it wouldn’t be the first time I’m wrong
I’m a dev too, so I understand .
As a user workarounds in that general time frame are OK.
3 Likes
I agree. It would be great to have a sort of intermediate release for the sake of having logseq in nixpkgs again.
3 Likes
I don’t think you’ll have solved this issue until finally mark a new release Electron version in use is outdated and marked insecure · Issue #11644 · logseq/logseq · GitHub
(I think logseq has always used release tags, so this is to be expected: downstreams will have been dutifully watching waiting for those numbers to continue bumping)
3 Likes