@vercel/build-utils
Advanced tools
+10
-0
| # @vercel/build-utils | ||
| ## 13.4.3 | ||
| ### Patch Changes | ||
| - [services] ([#15093](https://github.com/vercel/vercel/pull/15093)) | ||
| - consolidate `workspace` and `entrypoint` from `experimentalServices` `vercel.json` schema | ||
| - make `framework` config in service optional -- infer framework from service workspace when not explicitly provided | ||
| - Updated dependencies [[`fc56fb91b4dafabe0f68f86efeabbaf98b2642bc`](https://github.com/vercel/vercel/commit/fc56fb91b4dafabe0f68f86efeabbaf98b2642bc)]: | ||
| - @vercel/python-analysis@0.6.0 | ||
| ## 13.4.2 | ||
@@ -4,0 +14,0 @@ |
@@ -6,3 +6,3 @@ import { Builder } from '.'; | ||
| export declare const BACKEND_FRAMEWORKS: readonly ["express", "hono", "h3", "koa", "nestjs", "fastify", "elysia"]; | ||
| export declare const PYTHON_FRAMEWORKS: readonly ["fastapi", "flask", "python"]; | ||
| export declare const PYTHON_FRAMEWORKS: readonly ["fastapi", "flask", "django", "python"]; | ||
| export declare const RUNTIME_FRAMEWORKS: readonly ["python"]; | ||
@@ -9,0 +9,0 @@ /** |
@@ -46,2 +46,3 @@ "use strict"; | ||
| "flask", | ||
| "django", | ||
| "python" | ||
@@ -48,0 +49,0 @@ // Generic Python framework preset |
+1
-0
@@ -5,2 +5,3 @@ import FileFsRef from './file-fs-ref'; | ||
| * - A top-level 'app' callable (Flask, FastAPI, Sanic, WSGI/ASGI, etc.) | ||
| * - A top-level 'application' callable (Django) | ||
| * - A top-level 'handler' class (BaseHTTPRequestHandler subclass) | ||
@@ -7,0 +8,0 @@ */ |
+5
-8
@@ -485,2 +485,3 @@ /// <reference types="node" /> | ||
| routePrefix?: string; | ||
| routePrefixSource?: 'configured' | 'generated'; | ||
| schedule?: string; | ||
@@ -635,12 +636,8 @@ topic?: string; | ||
| /** | ||
| * Entry file for the service, relative to the workspace directory. | ||
| * @example "src/index.ts", "main.py", "api/server.go" | ||
| * Service entrypoint, relative to the project root. | ||
| * Can be either a file path (runtime entrypoint) or a directory path | ||
| * (service workspace for framework-based services). | ||
| * @example "apps/web", "services/api/src/index.ts", "services/fastapi/main.py" | ||
| */ | ||
| entrypoint?: string; | ||
| /** | ||
| * Path to the directory containing the service's manifest file | ||
| * (package.json, pyproject.toml, etc.). | ||
| * Defaults to "." (project root) if not specified. | ||
| */ | ||
| workspace?: string; | ||
| /** Framework to use */ | ||
@@ -647,0 +644,0 @@ framework?: string; |
+2
-2
| { | ||
| "name": "@vercel/build-utils", | ||
| "version": "13.4.2", | ||
| "version": "13.4.3", | ||
| "license": "Apache-2.0", | ||
@@ -14,3 +14,3 @@ "main": "./dist/index.js", | ||
| "dependencies": { | ||
| "@vercel/python-analysis": "0.5.0" | ||
| "@vercel/python-analysis": "0.6.0" | ||
| }, | ||
@@ -17,0 +17,0 @@ "devDependencies": { |
Sorry, the diff of this file is too big to display
Network access
Supply chain riskThis module accesses the network.
Found 1 instance in 1 package
Shell access
Supply chain riskThis module accesses the system shell. Accessing the system shell increases the risk of executing arbitrary code.
Found 1 instance in 1 package
Dynamic require
Supply chain riskDynamic require can indicate the package is performing dangerous or unsafe dynamic code execution.
Found 1 instance in 1 package
Environment variable access
Supply chain riskPackage accesses environment variables, which may be a sign of credential stuffing or data theft.
Found 11 instances in 1 package
Filesystem access
Supply chain riskAccesses the file system, and could potentially read sensitive data.
Found 3 instances in 1 package
Long strings
Supply chain riskContains long string literals, which may be a sign of obfuscated or packed code.
Found 1 instance in 1 package
URL strings
Supply chain riskPackage contains fragments of external URLs or IP addresses, which the package may be accessing at runtime.
Found 1 instance in 1 package
Network access
Supply chain riskThis module accesses the network.
Found 1 instance in 1 package
Shell access
Supply chain riskThis module accesses the system shell. Accessing the system shell increases the risk of executing arbitrary code.
Found 1 instance in 1 package
Dynamic require
Supply chain riskDynamic require can indicate the package is performing dangerous or unsafe dynamic code execution.
Found 1 instance in 1 package
Environment variable access
Supply chain riskPackage accesses environment variables, which may be a sign of credential stuffing or data theft.
Found 11 instances in 1 package
Filesystem access
Supply chain riskAccesses the file system, and could potentially read sensitive data.
Found 3 instances in 1 package
Long strings
Supply chain riskContains long string literals, which may be a sign of obfuscated or packed code.
Found 1 instance in 1 package
URL strings
Supply chain riskPackage contains fragments of external URLs or IP addresses, which the package may be accessing at runtime.
Found 1 instance in 1 package
1407432
0.04%45
2.27%+ Added
- Removed