is-wsl
Advanced tools
Comparing version 1.0.0 to 1.1.0
'use strict'; | ||
const os = require('os'); | ||
const fs = require('fs'); | ||
@@ -9,2 +10,6 @@ | ||
if (os.release().includes('Microsoft')) { | ||
return true; | ||
} | ||
try { | ||
@@ -17,3 +22,3 @@ return fs.readFileSync('/proc/version', 'utf8').includes('Microsoft'); | ||
if (process.env.__AWFUL_WAY_TO_TEST_THIS_BUT_WHATEVER__) { | ||
if (process.env.__IS_WSL_TEST__) { | ||
module.exports = isWsl; | ||
@@ -20,0 +25,0 @@ } else { |
{ | ||
"name": "is-wsl", | ||
"version": "1.0.0", | ||
"version": "1.1.0", | ||
"description": "Check if the process is running inside Windows Subsystem for Linux (Bash on Windows)", | ||
@@ -36,8 +36,6 @@ "license": "MIT", | ||
"ava": "*", | ||
"clear-require": "^2.0.0", | ||
"proxyquire": "^1.7.11", | ||
"xo": "*" | ||
}, | ||
"ava": { | ||
"require": "./pre-test" | ||
} | ||
} |
Environment variable access
Supply chain riskPackage accesses environment variables, which may be a sign of credential stuffing or data theft.
Found 1 instance in 1 package
Environment variable access
Supply chain riskPackage accesses environment variables, which may be a sign of credential stuffing or data theft.
Found 1 instance in 1 package
2878
21
4