@phero/server
Advanced tools
@@ -146,2 +146,5 @@ "use strict"; | ||
| init: core_1.tsx.expression.await(core_1.tsx.expression.call(`rpc_executor_${service.name}__${funcDef.name}__inner`, { args: ["input"] })), | ||
| }), core_1.tsx.statement.if({ | ||
| expression: core_1.tsx.expression.binary(core_1.tsx.expression.identifier("result"), "===", core_1.tsx.literal.undefined), | ||
| then: core_1.tsx.statement.return(core_1.tsx.literal.object(core_1.tsx.property.assignment("status", core_1.tsx.literal.number(204)))), | ||
| }), core_1.tsx.statement.return(core_1.tsx.literal.object(core_1.tsx.property.assignment("status", core_1.tsx.literal.number(200)), core_1.tsx.property.shorthandAssignment("result"))))), | ||
@@ -148,0 +151,0 @@ }); |
@@ -49,2 +49,5 @@ "use strict"; | ||
| break; | ||
| case 204: | ||
| res.end(); | ||
| break; | ||
| case 400: | ||
@@ -51,0 +54,0 @@ res.end(JSON.stringify({ errors: response.errors })); |
@@ -61,2 +61,5 @@ "use strict"; | ||
| break; | ||
| case 204: | ||
| res.end(); | ||
| break; | ||
| case 400: | ||
@@ -63,0 +66,0 @@ res.end(JSON.stringify({ errors: response.errors })); |
@@ -49,2 +49,5 @@ "use strict"; | ||
| break; | ||
| case 204: | ||
| res.end(); | ||
| break; | ||
| case 400: | ||
@@ -51,0 +54,0 @@ res.end(JSON.stringify({ errors: response.errors })); |
@@ -148,7 +148,4 @@ "use strict"; | ||
| res.statusCode = rpcResult.status; | ||
| if (rpcResult.status === 200) { | ||
| if (rpcResult.result === undefined) { | ||
| res.statusCode = 204; | ||
| } | ||
| else { | ||
| if (rpcResult.status === 200 || rpcResult.status === 204) { | ||
| if (rpcResult.status !== 204) { | ||
| res.write(JSON.stringify(rpcResult.result)); | ||
@@ -155,0 +152,0 @@ } |
| { | ||
| "name": "@phero/server", | ||
| "version": "0.10.5", | ||
| "version": "0.10.6", | ||
| "main": "dist/index.js", | ||
@@ -26,3 +26,3 @@ "description": "Server library for Phero", | ||
| "dependencies": { | ||
| "@phero/core": "^0.10.5", | ||
| "@phero/core": "^0.10.6", | ||
| "@phero/dev": "^0.10.5" | ||
@@ -44,3 +44,3 @@ }, | ||
| }, | ||
| "gitHead": "a05c7a855dc3a8eebbc11dff3a3b9161afdb93e7" | ||
| "gitHead": "9fd64f90405c25e05524be618b214afef4f3f688" | ||
| } |
+3
-3
| { | ||
| "name": "@phero/server", | ||
| "version": "0.10.5", | ||
| "version": "0.10.6", | ||
| "main": "dist/index.js", | ||
@@ -26,3 +26,3 @@ "description": "Server library for Phero", | ||
| "dependencies": { | ||
| "@phero/core": "^0.10.5", | ||
| "@phero/core": "^0.10.6", | ||
| "@phero/dev": "^0.10.5" | ||
@@ -44,3 +44,3 @@ }, | ||
| }, | ||
| "gitHead": "a05c7a855dc3a8eebbc11dff3a3b9161afdb93e7" | ||
| "gitHead": "9fd64f90405c25e05524be618b214afef4f3f688" | ||
| } |
Network access
Supply chain riskThis module accesses the network.
Found 1 instance in 1 package
New author
Supply chain riskA new npm collaborator published a version of the package for the first time. New collaborators are usually benign additions to a project, but do indicate a change to the security surface area of a package.
Found 1 instance in 1 package
Shell access
Supply chain riskThis module accesses the system shell. Accessing the system shell increases the risk of executing arbitrary code.
Found 1 instance in 1 package
Dynamic require
Supply chain riskDynamic require can indicate the package is performing dangerous or unsafe dynamic code execution.
Found 1 instance in 1 package
Environment variable access
Supply chain riskPackage accesses environment variables, which may be a sign of credential stuffing or data theft.
Found 1 instance in 1 package
Filesystem access
Supply chain riskAccesses the file system, and could potentially read sensitive data.
Found 1 instance in 1 package
Long strings
Supply chain riskContains long string literals, which may be a sign of obfuscated or packed code.
Found 1 instance in 1 package
Network access
Supply chain riskThis module accesses the network.
Found 1 instance in 1 package
Shell access
Supply chain riskThis module accesses the system shell. Accessing the system shell increases the risk of executing arbitrary code.
Found 1 instance in 1 package
Dynamic require
Supply chain riskDynamic require can indicate the package is performing dangerous or unsafe dynamic code execution.
Found 1 instance in 1 package
Environment variable access
Supply chain riskPackage accesses environment variables, which may be a sign of credential stuffing or data theft.
Found 1 instance in 1 package
Filesystem access
Supply chain riskAccesses the file system, and could potentially read sensitive data.
Found 1 instance in 1 package
Long strings
Supply chain riskContains long string literals, which may be a sign of obfuscated or packed code.
Found 1 instance in 1 package
109926
0.37%2271
0.4%3
50%Updated