+11
-0
| 1.6.1 / 2013-06-05 | ||
| ================== | ||
| * Merge pull request #168 from katsgeorgeek/topics/master | ||
| * Add test for different RegExp flags. | ||
| * Add test for regexp comparison. | ||
| * Downgrade mocha version for fix running Phantom tests. | ||
| * Fix comparison equality of two regexps. | ||
| * Merge pull request #161 from brandonpayton/master | ||
| * Fix documented name for assert interface's isDefined method | ||
| 1.6.0 / 2013-04-29 | ||
@@ -3,0 +14,0 @@ ================== |
+1
-1
@@ -14,3 +14,3 @@ /*! | ||
| exports.version = '1.6.0'; | ||
| exports.version = '1.6.1'; | ||
@@ -17,0 +17,0 @@ /*! |
@@ -306,3 +306,3 @@ /*! | ||
| * | ||
| * @name isUndefined | ||
| * @name isDefined | ||
| * @param {Mixed} value | ||
@@ -309,0 +309,0 @@ * @param {String} message |
@@ -43,2 +43,5 @@ // This is (almost) directly from Node.js assert | ||
| } else if (actual instanceof RegExp && expected instanceof RegExp){ | ||
| return actual.toString() === expected.toString(); | ||
| // 7.4. For all other Object pairs, including Array objects, equivalence is | ||
@@ -45,0 +48,0 @@ // determined by having the same number of owned properties (as verified |
+2
-2
@@ -14,3 +14,3 @@ { | ||
| ], | ||
| "version": "1.6.0", | ||
| "version": "1.6.1", | ||
| "repository": { | ||
@@ -33,3 +33,3 @@ "type": "git", | ||
| "component": "*" | ||
| , "mocha": "*" | ||
| , "mocha": "1.8.x" | ||
| , "mocha-cloud": "*" | ||
@@ -36,0 +36,0 @@ , "mocha-phantomjs": "*" |
+28
-1
| # Release Notes | ||
| ## 1.6.1 / 2013-06-05 | ||
| The following changes are required if you are upgrading from the previous version: | ||
| - **Users:** | ||
| - No changes required. | ||
| - **Plugin Developers:** | ||
| - No changes required. | ||
| - **Core Contributors:** | ||
| - Refresh `node_modules` folder for updated developement dependencies. | ||
| ### Deep Equality | ||
| Regular Expressions are now tested as part of all deep equality assertions. In previous versions | ||
| they silently passed for all scenarios. Thanks to [@katsgeorgeek](https://github.com/katsgeorgeek) for the contribution. | ||
| ### Community Contributions | ||
| - [#161](https://github.com/chaijs/chai/pull/161) Fix documented name for assert interface's isDefined method. [@brandonpayton](https://github.com/brandonpayton) | ||
| - [#168](https://github.com/chaijs/chai/pull/168) Fix comparison equality of two regexps for when using deep equality. [@katsgeorgeek](https://github.com/katsgeorgeek) | ||
| Thank you to all who took the time to contribute! | ||
| ### Additional Notes | ||
| - Mocha has been locked at version `1.8.x` to ensure `mocha-phantomjs` compatibility. | ||
| ## 1.6.0 / 2013-04-29 | ||
@@ -19,3 +46,3 @@ | ||
| Asserts that the target is a superset of `set`, or that the target and `set` have the same members. | ||
| Order is not taken into account. Thanks to [#NickHeiner](https://github.com/NickHeiner) for the contribution. | ||
| Order is not taken into account. Thanks to [@NickHeiner](https://github.com/NickHeiner) for the contribution. | ||
@@ -22,0 +49,0 @@ ```js |
Sorry, the diff of this file is too big to display
Uses eval
Supply chain riskPackage uses dynamic code execution (e.g., eval()), which is a dangerous practice. This can prevent the code from running in certain environments and increases the risk that the code may contain exploits or malicious behavior.
Found 1 instance in 1 package
Dynamic require
Supply chain riskDynamic require can indicate the package is performing dangerous or unsafe dynamic code execution.
Found 1 instance in 1 package
Long strings
Supply chain riskContains long string literals, which may be a sign of obfuscated or packed code.
Found 1 instance in 1 package
Uses eval
Supply chain riskPackage uses dynamic code execution (e.g., eval()), which is a dangerous practice. This can prevent the code from running in certain environments and increases the risk that the code may contain exploits or malicious behavior.
Found 1 instance in 1 package
Dynamic require
Supply chain riskDynamic require can indicate the package is performing dangerous or unsafe dynamic code execution.
Found 1 instance in 1 package
Long strings
Supply chain riskContains long string literals, which may be a sign of obfuscated or packed code.
Found 1 instance in 1 package
245948
0.7%7210
0.06%