@evo/fetch-io
Advanced tools
@@ -5,5 +5,5 @@ 'use strict'; | ||
| var _cookiesJs = require('cookies-js'); | ||
| var _jsCookie = require('js-cookie'); | ||
| var _cookiesJs2 = _interopRequireDefault(_cookiesJs); | ||
| var _jsCookie2 = _interopRequireDefault(_jsCookie); | ||
@@ -33,3 +33,3 @@ var _fetchMock = require('fetch-mock'); | ||
| (0, _userInfo.init)(myOrigin); | ||
| _cookiesJs2.default.set('csrf_token', csrfToken); | ||
| _jsCookie2.default.set('csrf_token', csrfToken); | ||
| _fetchMock2.default.delete('http://my.example.com:5000/test1_delete', respFromMy); | ||
@@ -36,0 +36,0 @@ _fetchMock2.default.delete('/test1_delete', respWithParams); |
@@ -9,5 +9,5 @@ 'use strict'; | ||
| var _cookiesJs = require('cookies-js'); | ||
| var _jsCookie = require('js-cookie'); | ||
| var _cookiesJs2 = _interopRequireDefault(_cookiesJs); | ||
| var _jsCookie2 = _interopRequireDefault(_jsCookie); | ||
@@ -34,3 +34,3 @@ var _index = require('../index'); | ||
| (0, _userInfo.init)(myOrigin); | ||
| _cookiesJs2.default.set('csrf_token', csrfToken); | ||
| _jsCookie2.default.set('csrf_token', csrfToken); | ||
| _fetchMock2.default.post('http://my.example.com:5000/test1_post', respFromMy); | ||
@@ -37,0 +37,0 @@ _fetchMock2.default.post('/test1_post', respWithParams); |
@@ -9,5 +9,5 @@ 'use strict'; | ||
| var _cookiesJs = require('cookies-js'); | ||
| var _jsCookie = require('js-cookie'); | ||
| var _cookiesJs2 = _interopRequireDefault(_cookiesJs); | ||
| var _jsCookie2 = _interopRequireDefault(_jsCookie); | ||
@@ -33,3 +33,3 @@ var _index = require('../index'); | ||
| (0, _userInfo.init)(myOrigin); | ||
| _cookiesJs2.default.set('csrf_token', csrfToken); | ||
| _jsCookie2.default.set('csrf_token', csrfToken); | ||
| _fetchMock2.default.put('http://my.example.com:5000/test1_put', respFromMy); | ||
@@ -36,0 +36,0 @@ _fetchMock2.default.put('/test1_put', respWithParams); |
+4
-4
| { | ||
| "name": "@evo/fetch-io", | ||
| "version": "2.3.0", | ||
| "version": "2.3.1", | ||
| "description": "", | ||
@@ -20,7 +20,7 @@ "repository": { | ||
| "fetch-mock": "^6.0.0", | ||
| "js-cookie": "^3.0.1", | ||
| "node-fetch": "^1.7.3", | ||
| "whatwg-fetch": "^2.0.3", | ||
| "@evo/prom-utils": "^0.2.6", | ||
| "cookies-js": "^1.2.3", | ||
| "@evo/user-info": "2.0.2" | ||
| "@evo/user-info": "2.0.5" | ||
| }, | ||
@@ -30,3 +30,3 @@ "peerDependencies": { | ||
| "@evo/prom-utils": "^0.2.6", | ||
| "@evo/user-info": "^2.0.2" | ||
| "@evo/user-info": "^2.0.5" | ||
| }, | ||
@@ -33,0 +33,0 @@ "jest": { |
| import { init as initUserInfo } from '@evo/user-info'; | ||
| import cookie from 'cookies-js'; | ||
| import cookie from 'js-cookie'; | ||
| import fetchMock from 'fetch-mock'; | ||
@@ -4,0 +4,0 @@ import { DELETE, my, init } from '../index'; |
| /* eslint-disable max-nested-callbacks */ | ||
| import { init as initUserInfo } from '@evo/user-info'; | ||
| import fetchMock from 'fetch-mock'; | ||
| import cookie from 'cookies-js'; | ||
| import cookie from 'js-cookie'; | ||
| import { POST, my, init } from '../index'; | ||
@@ -6,0 +6,0 @@ import { FetchNetworkError, FetchDataError } from '../errors'; |
| import { init as initUserInfo } from '@evo/user-info'; | ||
| import fetchMock from 'fetch-mock'; | ||
| import cookie from 'cookies-js'; | ||
| import cookie from 'js-cookie'; | ||
| import { PUT, my, init } from '../index'; | ||
@@ -5,0 +5,0 @@ import { FetchNetworkError, FetchDataError } from '../errors'; |
Network access
Supply chain riskThis module accesses the network.
Found 1 instance in 1 package
Environment variable access
Supply chain riskPackage accesses environment variables, which may be a sign of credential stuffing or data theft.
Found 1 instance in 1 package
URL strings
Supply chain riskPackage contains fragments of external URLs or IP addresses, which the package may be accessing at runtime.
Found 1 instance in 1 package
Network access
Supply chain riskThis module accesses the network.
Found 1 instance in 1 package
Environment variable access
Supply chain riskPackage accesses environment variables, which may be a sign of credential stuffing or data theft.
Found 1 instance in 1 package
URL strings
Supply chain riskPackage contains fragments of external URLs or IP addresses, which the package may be accessing at runtime.
Found 1 instance in 1 package
75499
-0.03%