@types/node
Advanced tools
@@ -74,3 +74,3 @@ /** | ||
| } | ||
| interface CreateReadStreamOptions { | ||
| interface CreateReadStreamOptions extends Abortable { | ||
| encoding?: BufferEncoding | null | undefined; | ||
@@ -77,0 +77,0 @@ autoClose?: boolean | undefined; |
+10
-0
@@ -352,2 +352,12 @@ /** | ||
| static getCompileCacheDir(): string | undefined; | ||
| /** | ||
| * Flush the [module compile cache](https://nodejs.org/docs/latest-v22.x/api/module.html#module-compile-cache) | ||
| * accumulated from modules already loaded | ||
| * in the current Node.js instance to disk. This returns after all the flushing | ||
| * file system operations come to an end, no matter they succeed or not. If there | ||
| * are any errors, this will fail silently, since compile cache misses should not | ||
| * interfere with the actual operation of the application. | ||
| * @since v22.10.0 | ||
| */ | ||
| static flushCompileCache(): void; | ||
| constructor(id: string, parent?: Module); | ||
@@ -354,0 +364,0 @@ } |
| { | ||
| "name": "@types/node", | ||
| "version": "22.9.4", | ||
| "version": "22.10.0", | ||
| "description": "TypeScript definitions for node", | ||
@@ -220,7 +220,7 @@ "homepage": "https://github.com/DefinitelyTyped/DefinitelyTyped/tree/master/types/node", | ||
| "dependencies": { | ||
| "undici-types": "~6.19.8" | ||
| "undici-types": "~6.20.0" | ||
| }, | ||
| "peerDependencies": {}, | ||
| "typesPublisherContentHash": "484edb8ac3b7a0881d60bf47bb409b48336bcac72069ac2262bbaf1eaa62d507", | ||
| "typesPublisherContentHash": "ce362bea3fcf1e354f4dc2b40d8779a88c8b89b200fed59ec53f508677acde75", | ||
| "typeScriptVersion": "5.0" | ||
| } |
+1
-1
@@ -11,3 +11,3 @@ # Installation | ||
| ### Additional Details | ||
| * Last updated: Mon, 25 Nov 2024 21:02:24 GMT | ||
| * Last updated: Tue, 26 Nov 2024 03:13:05 GMT | ||
| * Dependencies: [undici-types](https://npmjs.com/package/undici-types) | ||
@@ -14,0 +14,0 @@ |
@@ -598,2 +598,35 @@ /** | ||
| /** | ||
| * Check if an object is marked as not transferable with | ||
| * {@link markAsUntransferable}. | ||
| * @since v21.0.0 | ||
| */ | ||
| function isMarkedAsUntransferable(object: object): boolean; | ||
| /** | ||
| * Mark an object as not cloneable. If `object` is used as `message` in | ||
| * a `port.postMessage()` call, an error is thrown. This is a no-op if `object` is a | ||
| * primitive value. | ||
| * | ||
| * This has no effect on `ArrayBuffer`, or any `Buffer` like objects. | ||
| * | ||
| * This operation cannot be undone. | ||
| * | ||
| * ```js | ||
| * const { markAsUncloneable } = require('node:worker_threads'); | ||
| * | ||
| * const anyObject = { foo: 'bar' }; | ||
| * markAsUncloneable(anyObject); | ||
| * const { port1 } = new MessageChannel(); | ||
| * try { | ||
| * // This will throw an error, because anyObject is not cloneable. | ||
| * port1.postMessage(anyObject) | ||
| * } catch (error) { | ||
| * // error.name === 'DataCloneError' | ||
| * } | ||
| * ``` | ||
| * | ||
| * There is no equivalent to this API in browsers. | ||
| * @since v22.10.0 | ||
| */ | ||
| function markAsUncloneable(object: object): void; | ||
| /** | ||
| * Transfer a `MessagePort` to a different `vm` Context. The original `port` object is rendered unusable, and the returned `MessagePort` instance | ||
@@ -600,0 +633,0 @@ * takes its place. |
Sorry, the diff of this file is too big to display
Sorry, the diff of this file is too big to display
Sorry, the diff of this file is too big to display
Sorry, the diff of this file is too big to display
Network access
Supply chain riskThis module accesses the network.
Found 9 instances in 1 package
Shell access
Supply chain riskThis module accesses the system shell. Accessing the system shell increases the risk of executing arbitrary code.
Found 1 instance in 1 package
Uses eval
Supply chain riskPackage uses dynamic code execution (e.g., eval()), which is a dangerous practice. This can prevent the code from running in certain environments and increases the risk that the code may contain exploits or malicious behavior.
Found 1 instance in 1 package
Debug access
Supply chain riskUses debug, reflection and dynamic code execution features.
Found 11 instances in 1 package
Dynamic require
Supply chain riskDynamic require can indicate the package is performing dangerous or unsafe dynamic code execution.
Found 1 instance in 1 package
Environment variable access
Supply chain riskPackage accesses environment variables, which may be a sign of credential stuffing or data theft.
Found 7 instances in 1 package
Filesystem access
Supply chain riskAccesses the file system, and could potentially read sensitive data.
Found 2 instances in 1 package
Long strings
Supply chain riskContains long string literals, which may be a sign of obfuscated or packed code.
Found 1 instance in 1 package
URL strings
Supply chain riskPackage contains fragments of external URLs or IP addresses, which the package may be accessing at runtime.
Found 1 instance in 1 package
Network access
Supply chain riskThis module accesses the network.
Found 9 instances in 1 package
Shell access
Supply chain riskThis module accesses the system shell. Accessing the system shell increases the risk of executing arbitrary code.
Found 1 instance in 1 package
Uses eval
Supply chain riskPackage uses dynamic code execution (e.g., eval()), which is a dangerous practice. This can prevent the code from running in certain environments and increases the risk that the code may contain exploits or malicious behavior.
Found 1 instance in 1 package
Debug access
Supply chain riskUses debug, reflection and dynamic code execution features.
Found 11 instances in 1 package
Dynamic require
Supply chain riskDynamic require can indicate the package is performing dangerous or unsafe dynamic code execution.
Found 1 instance in 1 package
Environment variable access
Supply chain riskPackage accesses environment variables, which may be a sign of credential stuffing or data theft.
Found 7 instances in 1 package
Filesystem access
Supply chain riskAccesses the file system, and could potentially read sensitive data.
Found 2 instances in 1 package
Long strings
Supply chain riskContains long string literals, which may be a sign of obfuscated or packed code.
Found 1 instance in 1 package
URL strings
Supply chain riskPackage contains fragments of external URLs or IP addresses, which the package may be accessing at runtime.
Found 1 instance in 1 package
2284887
0.44%50598
0.47%294
1.38%+ Added
- Removed
Updated