@php-wasm/node-8-1
Advanced tools
Sorry, the diff of this file is not supported yet
Sorry, the diff of this file is not supported yet
Sorry, the diff of this file is not supported yet
Sorry, the diff of this file is not supported yet
+20
-0
@@ -33,3 +33,5 @@ var __create = Object.create; | ||
| getIntlExtensionPath: () => getIntlExtensionPath, | ||
| getMemcachedExtensionPath: () => getMemcachedExtensionPath, | ||
| getPHPLoaderModule: () => getPHPLoaderModule, | ||
| getRedisExtensionPath: () => getRedisExtensionPath, | ||
| getXdebugExtensionPath: () => getXdebugExtensionPath, | ||
@@ -67,8 +69,26 @@ jspi: () => import_wasm_feature_detect.jspi | ||
| } | ||
| async function getRedisExtensionPath() { | ||
| if (await (0, import_wasm_feature_detect.jspi)()) { | ||
| return (0, import_node_path.join)(packageDir, "jspi/extensions/redis/8_1/redis.so"); | ||
| } | ||
| throw new Error( | ||
| "The Redis extension requires JSPI (JavaScript Promise Integration) support. Your current environment is using asyncify, which cannot properly handle exceptions during Redis network operations. Please use Node.js 23+ or a browser with JSPI support to use the Redis extension." | ||
| ); | ||
| } | ||
| async function getMemcachedExtensionPath() { | ||
| if (await (0, import_wasm_feature_detect.jspi)()) { | ||
| return (0, import_node_path.join)(packageDir, "jspi/extensions/memcached/8_1/memcached.so"); | ||
| } | ||
| throw new Error( | ||
| "The Memcached extension requires JSPI (JavaScript Promise Integration) support. Your current environment is using asyncify, which cannot properly handle exceptions during Memcached network operations. Please use Node.js 23+ or a browser with JSPI support to use the Memcached extension." | ||
| ); | ||
| } | ||
| // Annotate the CommonJS export names for ESM import in node: | ||
| 0 && (module.exports = { | ||
| getIntlExtensionPath, | ||
| getMemcachedExtensionPath, | ||
| getPHPLoaderModule, | ||
| getRedisExtensionPath, | ||
| getXdebugExtensionPath, | ||
| jspi | ||
| }); |
+18
-0
@@ -29,7 +29,25 @@ // packages/php-wasm/node-builds/8-1/src/index.ts | ||
| } | ||
| async function getRedisExtensionPath() { | ||
| if (await jspi()) { | ||
| return join(packageDir, "jspi/extensions/redis/8_1/redis.so"); | ||
| } | ||
| throw new Error( | ||
| "The Redis extension requires JSPI (JavaScript Promise Integration) support. Your current environment is using asyncify, which cannot properly handle exceptions during Redis network operations. Please use Node.js 23+ or a browser with JSPI support to use the Redis extension." | ||
| ); | ||
| } | ||
| async function getMemcachedExtensionPath() { | ||
| if (await jspi()) { | ||
| return join(packageDir, "jspi/extensions/memcached/8_1/memcached.so"); | ||
| } | ||
| throw new Error( | ||
| "The Memcached extension requires JSPI (JavaScript Promise Integration) support. Your current environment is using asyncify, which cannot properly handle exceptions during Memcached network operations. Please use Node.js 23+ or a browser with JSPI support to use the Memcached extension." | ||
| ); | ||
| } | ||
| export { | ||
| getIntlExtensionPath, | ||
| getMemcachedExtensionPath, | ||
| getPHPLoaderModule, | ||
| getRedisExtensionPath, | ||
| getXdebugExtensionPath, | ||
| jspi | ||
| }; |
+3
-3
| { | ||
| "name": "@php-wasm/node-8-1", | ||
| "version": "3.0.44", | ||
| "version": "3.0.45", | ||
| "description": "PHP 8.1 WebAssembly binaries for node", | ||
@@ -38,3 +38,3 @@ "repository": { | ||
| }, | ||
| "gitHead": "16881b9b024e961a5254be5b366fad096585c310", | ||
| "gitHead": "90da64a5068b13069ea9faf8ff9f5b1e36fd6099", | ||
| "dependencies": { | ||
@@ -44,3 +44,3 @@ "ini": "4.1.2", | ||
| "ws": "8.18.3", | ||
| "@php-wasm/universal": "3.0.44" | ||
| "@php-wasm/universal": "3.0.45" | ||
| }, | ||
@@ -47,0 +47,0 @@ "packageManager": "npm@10.9.2", |
Sorry, the diff of this file is too big to display
Sorry, the diff of this file is too big to display
Sorry, the diff of this file is too big to display
Sorry, the diff of this file is too big to display
Native code
Supply chain riskContains native code (e.g., compiled binaries or shared libraries). Including native code can obscure malicious behavior.
Found 1 instance in 1 package
Network access
Supply chain riskThis module accesses the network.
Found 1 instance in 1 package
Shell access
Supply chain riskThis module accesses the system shell. Accessing the system shell increases the risk of executing arbitrary code.
Found 1 instance in 1 package
Uses eval
Supply chain riskPackage uses dynamic code execution (e.g., eval()), which is a dangerous practice. This can prevent the code from running in certain environments and increases the risk that the code may contain exploits or malicious behavior.
Found 1 instance in 1 package
Debug access
Supply chain riskUses debug, reflection and dynamic code execution features.
Found 1 instance in 1 package
Filesystem access
Supply chain riskAccesses the file system, and could potentially read sensitive data.
Found 1 instance in 1 package
AI-detected potential code anomaly
Supply chain riskAI has identified unusual behaviors that may pose a security risk.
Found 1 instance in 1 package
Long strings
Supply chain riskContains long string literals, which may be a sign of obfuscated or packed code.
Found 1 instance in 1 package
URL strings
Supply chain riskPackage contains fragments of external URLs or IP addresses, which the package may be accessing at runtime.
Found 1 instance in 1 package
Network access
Supply chain riskThis module accesses the network.
Found 1 instance in 1 package
Shell access
Supply chain riskThis module accesses the system shell. Accessing the system shell increases the risk of executing arbitrary code.
Found 1 instance in 1 package
Uses eval
Supply chain riskPackage uses dynamic code execution (e.g., eval()), which is a dangerous practice. This can prevent the code from running in certain environments and increases the risk that the code may contain exploits or malicious behavior.
Found 1 instance in 1 package
Debug access
Supply chain riskUses debug, reflection and dynamic code execution features.
Found 1 instance in 1 package
Filesystem access
Supply chain riskAccesses the file system, and could potentially read sensitive data.
Found 1 instance in 1 package
Long strings
Supply chain riskContains long string literals, which may be a sign of obfuscated or packed code.
Found 1 instance in 1 package
URL strings
Supply chain riskPackage contains fragments of external URLs or IP addresses, which the package may be accessing at runtime.
Found 1 instance in 1 package
70315118
1.3%21
23.53%146
-42.97%19
-36.67%59565
-7.36%+ Added
+ Added
+ Added
+ Added
+ Added
+ Added
- Removed
- Removed
- Removed
- Removed
- Removed
- Removed
Updated