@arkweid/lefthook
Advanced tools
Comparing version 0.7.4 to 0.7.5
#!/usr/bin/env node | ||
var spawn = require('child_process').spawn; | ||
var path = require('path'); | ||
const { getExePath } = require('../get-exe'); | ||
@@ -9,5 +9,5 @@ var command_args = process.argv.slice(2); | ||
var child = spawn( | ||
path.join(__dirname, 'lefthook'), | ||
getExePath(), | ||
command_args, | ||
{ stdio: [process.stdin, process.stdout, process.stderr] }); | ||
{ stdio: "inherit" }); | ||
@@ -14,0 +14,0 @@ child.on('close', function (code) { |
{ | ||
"name": "@arkweid/lefthook", | ||
"version": "0.7.4", | ||
"version": "0.7.5", | ||
"description": "Simple git hooks manager", | ||
@@ -5,0 +5,0 @@ "main": "index.js", |
@@ -1,13 +0,10 @@ | ||
const { spawn } = require("child_process"); | ||
const { join } = require("path"); | ||
if (!process.env.CI) { | ||
const { spawnSync } = require('child_process'); | ||
const { getExePath } = require('./get-exe'); | ||
const isCI = process.env.CI; | ||
if (!isCI) { | ||
binpath = join(__dirname, 'bin', 'lefthook'); | ||
result = spawn(binpath, ["install", "-f"], { | ||
cwd: process.env.INIT_CWD, | ||
stdio: [process.stdin, process.stdout, process.stderr] | ||
// run install | ||
spawnSync(getExePath(), ['install', '-f'], { | ||
cwd: process.env.INIT_CWD || process.cwd, | ||
stdio: 'inherit', | ||
}); | ||
} |
Sorry, the diff of this file is not supported yet
Sorry, the diff of this file is not supported yet
Sorry, the diff of this file is not supported yet
Sorry, the diff of this file is not supported yet
Sorry, the diff of this file is not supported yet
Sorry, the diff of this file is not supported yet
Sorry, the diff of this file is not supported yet
Shell access
Supply chain riskThis module accesses the system shell. Accessing the system shell increases the risk of executing arbitrary code.
Found 1 instance in 1 package
40211414
55