+4
-5
@@ -323,4 +323,3 @@ #!/usr/bin/env node | ||
| const knownShells = ['sh', 'ksh', 'zsh', 'bash', 'fish']; | ||
| if ((shell || /[ "']/.test(cmd)) && | ||
| knownShells.includes(shellBase)) { | ||
| if ((shell || /[ "']/.test(cmd)) && knownShells.includes(shellBase)) { | ||
| const cmdWithArgs = `${cmd} "\$${shellBase === 'fish' ? 'argv' : '@'}"`; | ||
@@ -335,6 +334,6 @@ if (shellBase !== 'fish') { | ||
| if (shell) { | ||
| process.emitWarning('The --shell option is unsafe, and will be removed. To pass ' + | ||
| 'positional arguments to the subprocess, use -g/--cmd-arg instead.', 'DeprecationWarning', 'GLOB_SHELL'); | ||
| process.emitWarning('The --shell option is not supported on this system. To pass ' + | ||
| 'positional arguments to the subprocess, use -g/--cmd-arg instead.', 'UnsupportedWarning', 'GLOB_SHELL'); | ||
| } | ||
| stream.on('end', () => foregroundChild(cmd, cmdArg, { shell })); | ||
| stream.on('end', () => foregroundChild(cmd, cmdArg)); | ||
| } | ||
@@ -341,0 +340,0 @@ } |
+1
-1
@@ -5,3 +5,3 @@ { | ||
| "description": "the most correct and second fastest glob implementation in JavaScript", | ||
| "version": "11.1.0", | ||
| "version": "12.0.0", | ||
| "type": "module", | ||
@@ -8,0 +8,0 @@ "tshy": { |
+5
-6
@@ -438,7 +438,7 @@ # Glob | ||
| To start absolute and non-absolute patterns in the same path, | ||
| you can use `{root:''}`. However, be aware that on Windows | ||
| systems, a pattern like `x:/*` or `//host/share/*` will | ||
| _always_ start in the `x:/` or `//host/share` directory, | ||
| regardless of the `root` setting. | ||
| To start absolute and non-absolute patterns in the same path, | ||
| you can use `{root:''}`. However, be aware that on Windows | ||
| systems, a pattern like `x:/*` or `//host/share/*` will | ||
| _always_ start in the `x:/` or `//host/share` directory, | ||
| regardless of the `root` setting. | ||
@@ -668,3 +668,2 @@ > [!NOTE] This _doesn't_ necessarily limit the walk to the | ||
| ## Glob Primer | ||
@@ -671,0 +670,0 @@ |
Sorry, the diff of this file is not supported yet
Environment variable access
Supply chain riskPackage accesses environment variables, which may be a sign of credential stuffing or data theft.
Found 1 instance in 1 package
Filesystem access
Supply chain riskAccesses the file system, and could potentially read sensitive data.
Found 1 instance in 1 package
Long strings
Supply chain riskContains long string literals, which may be a sign of obfuscated or packed code.
Found 1 instance in 1 package
Deprecated
MaintenanceThe maintainer of the package marked it as deprecated. This could indicate that a single version should not be used, or that the package is no longer maintained and any new vulnerabilities will not be fixed.
Found 1 instance in 1 package
Environment variable access
Supply chain riskPackage accesses environment variables, which may be a sign of credential stuffing or data theft.
Found 1 instance in 1 package
Filesystem access
Supply chain riskAccesses the file system, and could potentially read sensitive data.
Found 1 instance in 1 package
Long strings
Supply chain riskContains long string literals, which may be a sign of obfuscated or packed code.
Found 1 instance in 1 package
0
-100%484121
-0.02%4503
-0.02%1294
-0.08%12
20%