@textile/threads-client
Advanced tools
+11
-0
@@ -6,2 +6,13 @@ # Change Log | ||
| # [2.1.0](https://github.com/textileio/js-threads/compare/@textile/threads-client@2.0.0...@textile/threads-client@2.1.0) (2020-12-18) | ||
| ### Features | ||
| * change to using list for return type ([6952a90](https://github.com/textileio/js-threads/commit/6952a9062e59dfe9c15166a2c426e4f7e30f2e34)) | ||
| # [2.0.0](https://github.com/textileio/js-threads/compare/@textile/threads-client@1.4.0-alpha.6...@textile/threads-client@2.0.0) (2020-12-18) | ||
@@ -8,0 +19,0 @@ |
@@ -243,6 +243,6 @@ /** | ||
| */ | ||
| listDBs(): Promise<Record<string, { | ||
| listDBs(): Promise<Array<{ | ||
| id: string; | ||
| name?: string; | ||
| } | undefined>>; | ||
| }>>; | ||
| /** | ||
@@ -249,0 +249,0 @@ * Lists the collections in a thread |
@@ -341,9 +341,9 @@ "use strict"; | ||
| var _a; | ||
| const dbs = {}; | ||
| const dbs = []; | ||
| for (const db of res.getDbsList()) { | ||
| const id = threads_id_1.ThreadID.fromBytes(db.getDbid_asU8()).toString(); | ||
| dbs[id] = { | ||
| dbs.push({ | ||
| id, | ||
| name: (_a = db.getInfo()) === null || _a === void 0 ? void 0 : _a.getName(), | ||
| }; | ||
| }); | ||
| } | ||
@@ -350,0 +350,0 @@ return dbs; |
+2
-2
| { | ||
| "name": "@textile/threads-client", | ||
| "version": "2.0.0", | ||
| "version": "2.1.0", | ||
| "main": "dist/cjs/index.js", | ||
@@ -35,3 +35,3 @@ "types": "dist/cjs/index.d.ts", | ||
| }, | ||
| "gitHead": "1e60c4e4d3dc5fc32c83d9a4734b1a80703b7e69" | ||
| "gitHead": "7dede0c34b48f0a77773c221d8c0a841b176efd3" | ||
| } |
Sorry, the diff of this file is too big to display
Sorry, the diff of this file is too big to display
Sorry, the diff of this file is too big to display
Network access
Supply chain riskThis module accesses the network.
Found 1 instance in 1 package
Uses eval
Supply chain riskPackage uses dynamic code execution (e.g., eval()), which is a dangerous practice. This can prevent the code from running in certain environments and increases the risk that the code may contain exploits or malicious behavior.
Found 3 instances in 1 package
Dynamic require
Supply chain riskDynamic require can indicate the package is performing dangerous or unsafe dynamic code execution.
Found 1 instance in 1 package
Long strings
Supply chain riskContains long string literals, which may be a sign of obfuscated or packed code.
Found 1 instance in 1 package
Network access
Supply chain riskThis module accesses the network.
Found 1 instance in 1 package
Uses eval
Supply chain riskPackage uses dynamic code execution (e.g., eval()), which is a dangerous practice. This can prevent the code from running in certain environments and increases the risk that the code may contain exploits or malicious behavior.
Found 3 instances in 1 package
Dynamic require
Supply chain riskDynamic require can indicate the package is performing dangerous or unsafe dynamic code execution.
Found 1 instance in 1 package
Long strings
Supply chain riskContains long string literals, which may be a sign of obfuscated or packed code.
Found 1 instance in 1 package
1180173
0.02%