@mikro-orm/core
Advanced tools
@@ -125,3 +125,3 @@ import { Hydrator } from './Hydrator.js'; | ||
| if (prop.ref) { | ||
| ret.push(` const value = entity${entityKey};`); | ||
| ret.push(` const value = entity${entityKey}?.__scalarReference ? entity${entityKey}.unwrap() : entity${entityKey};`); | ||
| ret.push(` entity${entityKey} = oldValue_${idx} ?? new ScalarReference(value);`); | ||
@@ -128,0 +128,0 @@ ret.push(` entity${entityKey}.bind(entity, '${prop.name}');`); |
+1
-1
| { | ||
| "name": "@mikro-orm/core", | ||
| "version": "7.0.4-dev.13", | ||
| "version": "7.0.4-dev.14", | ||
| "description": "TypeScript ORM for Node.js based on Data Mapper, Unit of Work and Identity Map patterns. Supports MongoDB, MySQL, PostgreSQL and SQLite databases as well as usage with vanilla JavaScript.", | ||
@@ -5,0 +5,0 @@ "keywords": [ |
@@ -528,3 +528,7 @@ import { clone } from './clone.js'; | ||
| const unwrap = prop.ref ? '?.unwrap()' : ''; | ||
| let ret = ` if (${this.getPropertyCondition(path)}) {\n`; | ||
| let ret = ` if (${this.getPropertyCondition(path)}`; | ||
| if (prop.lazy && prop.ref) { | ||
| ret += ` && entity${path.map(k => this.wrap(k)).join('')}?.isInitialized()`; | ||
| } | ||
| ret += `) {\n`; | ||
| if (['number', 'string', 'boolean'].includes(prop.type.toLowerCase())) { | ||
@@ -531,0 +535,0 @@ return ret + ` ret${dataKey} = entity${entityKey}${unwrap};\n }\n`; |
+1
-1
@@ -132,3 +132,3 @@ import { clone } from './clone.js'; | ||
| static PK_SEPARATOR = '~~~'; | ||
| static #ORM_VERSION = '7.0.4-dev.13'; | ||
| static #ORM_VERSION = '7.0.4-dev.14'; | ||
| /** | ||
@@ -135,0 +135,0 @@ * Checks if the argument is instance of `Object`. Returns false for arrays. |
Network access
Supply chain riskThis module accesses the network.
Found 1 instance in 1 package
Uses eval
Supply chain riskPackage uses dynamic code execution (e.g., eval()), which is a dangerous practice. This can prevent the code from running in certain environments and increases the risk that the code may contain exploits or malicious behavior.
Found 2 instances in 1 package
Environment variable access
Supply chain riskPackage accesses environment variables, which may be a sign of credential stuffing or data theft.
Found 2 instances in 1 package
Long strings
Supply chain riskContains long string literals, which may be a sign of obfuscated or packed code.
Found 1 instance in 1 package
Network access
Supply chain riskThis module accesses the network.
Found 1 instance in 1 package
Uses eval
Supply chain riskPackage uses dynamic code execution (e.g., eval()), which is a dangerous practice. This can prevent the code from running in certain environments and increases the risk that the code may contain exploits or malicious behavior.
Found 2 instances in 1 package
Environment variable access
Supply chain riskPackage accesses environment variables, which may be a sign of credential stuffing or data theft.
Found 2 instances in 1 package
Long strings
Supply chain riskContains long string literals, which may be a sign of obfuscated or packed code.
Found 1 instance in 1 package
1379432
0.02%29968
0.01%