@types/node
Advanced tools
+19
-26
@@ -43,3 +43,3 @@ /** | ||
| WatchEventType, | ||
| WatchOptions, | ||
| WatchOptions as _WatchOptions, | ||
| WriteStream, | ||
@@ -1186,2 +1186,12 @@ WriteVResult, | ||
| function opendir(path: PathLike, options?: OpenDirOptions): Promise<Dir>; | ||
| interface WatchOptions extends _WatchOptions { | ||
| maxQueue?: number | undefined; | ||
| overflow?: "ignore" | "throw" | undefined; | ||
| } | ||
| interface WatchOptionsWithBufferEncoding extends WatchOptions { | ||
| encoding: "buffer"; | ||
| } | ||
| interface WatchOptionsWithStringEncoding extends WatchOptions { | ||
| encoding?: BufferEncoding | undefined; | ||
| } | ||
| /** | ||
@@ -1219,29 +1229,12 @@ * Returns an async iterator that watches for changes on `filename`, where `filename`is either a file or a directory. | ||
| filename: PathLike, | ||
| options: | ||
| | (WatchOptions & { | ||
| encoding: "buffer"; | ||
| }) | ||
| | "buffer", | ||
| ): AsyncIterable<FileChangeInfo<Buffer>>; | ||
| /** | ||
| * Watch for changes on `filename`, where `filename` is either a file or a directory, returning an `FSWatcher`. | ||
| * @param filename A path to a file or directory. If a URL is provided, it must use the `file:` protocol. | ||
| * @param options Either the encoding for the filename provided to the listener, or an object optionally specifying encoding, persistent, and recursive options. | ||
| * If `encoding` is not supplied, the default of `'utf8'` is used. | ||
| * If `persistent` is not supplied, the default of `true` is used. | ||
| * If `recursive` is not supplied, the default of `false` is used. | ||
| */ | ||
| function watch(filename: PathLike, options?: WatchOptions | BufferEncoding): AsyncIterable<FileChangeInfo<string>>; | ||
| /** | ||
| * Watch for changes on `filename`, where `filename` is either a file or a directory, returning an `FSWatcher`. | ||
| * @param filename A path to a file or directory. If a URL is provided, it must use the `file:` protocol. | ||
| * @param options Either the encoding for the filename provided to the listener, or an object optionally specifying encoding, persistent, and recursive options. | ||
| * If `encoding` is not supplied, the default of `'utf8'` is used. | ||
| * If `persistent` is not supplied, the default of `true` is used. | ||
| * If `recursive` is not supplied, the default of `false` is used. | ||
| */ | ||
| options?: WatchOptionsWithStringEncoding | BufferEncoding, | ||
| ): NodeJS.AsyncIterator<FileChangeInfo<string>>; | ||
| function watch( | ||
| filename: PathLike, | ||
| options: WatchOptions | string, | ||
| ): AsyncIterable<FileChangeInfo<string>> | AsyncIterable<FileChangeInfo<Buffer>>; | ||
| options: WatchOptionsWithBufferEncoding | "buffer", | ||
| ): NodeJS.AsyncIterator<FileChangeInfo<Buffer>>; | ||
| function watch( | ||
| filename: PathLike, | ||
| options: WatchOptions | BufferEncoding | "buffer", | ||
| ): NodeJS.AsyncIterator<FileChangeInfo<string | Buffer>>; | ||
| /** | ||
@@ -1248,0 +1241,0 @@ * Asynchronously copies the entire directory structure from `src` to `dest`, |
| { | ||
| "name": "@types/node", | ||
| "version": "24.2.1", | ||
| "version": "24.3.0", | ||
| "description": "TypeScript definitions for node", | ||
@@ -153,4 +153,4 @@ "homepage": "https://github.com/DefinitelyTyped/DefinitelyTyped/tree/master/types/node", | ||
| "peerDependencies": {}, | ||
| "typesPublisherContentHash": "c642826dc621e8df9fa43f5471ad2dd77883f4fff1a3c22d8d18322f596ed09d", | ||
| "typesPublisherContentHash": "1db0510763ba3afd8e54c0591e60a100a7b90926f5d7da28ae32d8f845d725da", | ||
| "typeScriptVersion": "5.2" | ||
| } |
+1
-1
@@ -11,3 +11,3 @@ # Installation | ||
| ### Additional Details | ||
| * Last updated: Fri, 08 Aug 2025 16:38:49 GMT | ||
| * Last updated: Fri, 15 Aug 2025 08:39:32 GMT | ||
| * Dependencies: [undici-types](https://npmjs.com/package/undici-types) | ||
@@ -14,0 +14,0 @@ |
+11
-0
@@ -319,2 +319,13 @@ /** | ||
| /** | ||
| * Like `url.fileURLToPath(...)` except that instead of returning a string | ||
| * representation of the path, a `Buffer` is returned. This conversion is | ||
| * helpful when the input URL contains percent-encoded segments that are | ||
| * not valid UTF-8 / Unicode sequences. | ||
| * @since v24.3.0 | ||
| * @param url The file URL string or URL object to convert to a path. | ||
| * @returns The fully-resolved platform-specific Node.js file path | ||
| * as a `Buffer`. | ||
| */ | ||
| function fileURLToPathBuffer(url: string | URL, options?: FileUrlToPathOptions): Buffer; | ||
| /** | ||
| * This function ensures that `path` is resolved absolutely, and that the URL | ||
@@ -321,0 +332,0 @@ * control characters are correctly encoded when converting into a File URL. |
Sorry, the diff of this file is too big to display
Sorry, the diff of this file is too big to display
Sorry, the diff of this file is too big to display
Sorry, the diff of this file is too big to display
Network access
Supply chain riskThis module accesses the network.
Found 9 instances in 1 package
Shell access
Supply chain riskThis module accesses the system shell. Accessing the system shell increases the risk of executing arbitrary code.
Found 1 instance in 1 package
Uses eval
Supply chain riskPackage uses dynamic code execution (e.g., eval()), which is a dangerous practice. This can prevent the code from running in certain environments and increases the risk that the code may contain exploits or malicious behavior.
Found 1 instance in 1 package
Debug access
Supply chain riskUses debug, reflection and dynamic code execution features.
Found 11 instances in 1 package
Dynamic require
Supply chain riskDynamic require can indicate the package is performing dangerous or unsafe dynamic code execution.
Found 1 instance in 1 package
Environment variable access
Supply chain riskPackage accesses environment variables, which may be a sign of credential stuffing or data theft.
Found 7 instances in 1 package
Filesystem access
Supply chain riskAccesses the file system, and could potentially read sensitive data.
Found 2 instances in 1 package
Long strings
Supply chain riskContains long string literals, which may be a sign of obfuscated or packed code.
Found 1 instance in 1 package
URL strings
Supply chain riskPackage contains fragments of external URLs or IP addresses, which the package may be accessing at runtime.
Found 1 instance in 1 package
Network access
Supply chain riskThis module accesses the network.
Found 9 instances in 1 package
Shell access
Supply chain riskThis module accesses the system shell. Accessing the system shell increases the risk of executing arbitrary code.
Found 1 instance in 1 package
Uses eval
Supply chain riskPackage uses dynamic code execution (e.g., eval()), which is a dangerous practice. This can prevent the code from running in certain environments and increases the risk that the code may contain exploits or malicious behavior.
Found 1 instance in 1 package
Debug access
Supply chain riskUses debug, reflection and dynamic code execution features.
Found 11 instances in 1 package
Dynamic require
Supply chain riskDynamic require can indicate the package is performing dangerous or unsafe dynamic code execution.
Found 1 instance in 1 package
Environment variable access
Supply chain riskPackage accesses environment variables, which may be a sign of credential stuffing or data theft.
Found 7 instances in 1 package
Filesystem access
Supply chain riskAccesses the file system, and could potentially read sensitive data.
Found 2 instances in 1 package
Long strings
Supply chain riskContains long string literals, which may be a sign of obfuscated or packed code.
Found 1 instance in 1 package
URL strings
Supply chain riskPackage contains fragments of external URLs or IP addresses, which the package may be accessing at runtime.
Found 1 instance in 1 package
2406623
0.11%52960
0.1%333
1.22%