jasmine-node
Advanced tools
Sorry, the diff of this file is too big to display
| var jasmine = require('./index'); | ||
| var util, | ||
| Path= require('path'); | ||
| Path= require('path'), | ||
| fs = require('fs'); | ||
| try { | ||
@@ -129,2 +130,8 @@ util = require('util') | ||
| process.on('uncaughtException', function(e) { | ||
| console.error(e.stack || e); | ||
| exitCode = 1; | ||
| process.exit(exitCode); | ||
| }); | ||
| process.on("exit", onExit); | ||
@@ -131,0 +138,0 @@ |
@@ -11,3 +11,3 @@ var fs = require('fs'); | ||
| var filename = __dirname + '/jasmine-2.0.0.rc1.js'; | ||
| var filename = __dirname + '/jasmine-1.3.1.js'; | ||
| var isWindowUndefined = typeof global.window === 'undefined'; | ||
@@ -83,3 +83,3 @@ if (isWindowUndefined) { | ||
| specs = require('./spec-collection'), | ||
| jasmineEnv = jasmine.currentEnv_ = new jasmine.Env(); | ||
| jasmineEnv = jasmine.getEnv(); | ||
@@ -86,0 +86,0 @@ specs.load(folder, fileMatcher); |
@@ -17,3 +17,3 @@ var walkdir = require('walkdir'); | ||
| exports.load = function(loadpath, matcher) { | ||
| var wannaBeSpecs = walkdir.sync(loadpath) | ||
| var wannaBeSpecs = walkdir.sync(loadpath, { follow_symlinks: true }) | ||
| specs = []; | ||
@@ -20,0 +20,0 @@ |
+2
-1
| { | ||
| "name" : "jasmine-node" | ||
| , "version" : "1.0.28" | ||
| , "version" : "1.1.0" | ||
| , "description" : "DOM-less simple JavaScript BDD testing framework for Node" | ||
| , "contributors" : [ "Chris Moultrie <chris@moultrie.org>" ] | ||
| , "homepage" : [ "http://pivotal.github.com/jasmine" | ||
@@ -6,0 +7,0 @@ , "https://github.com/mhevery/jasmine-node"] |
+6
-0
@@ -73,2 +73,3 @@ jasmine-node | ||
| ----------- | ||
| Install the dependent packages by running: | ||
@@ -85,1 +86,6 @@ | ||
| scripts/specs --verbose | ||
| changelog | ||
| --------- | ||
| * _1.1.0 - Updated Jasmine to 1.3.1, fixed fs missing, catching uncaught exceptions, other fixes_ |
@@ -6,15 +6,11 @@ (function(){ | ||
| beforeEach(function(){ | ||
| this.addMatchers({ | ||
| toHaveProperty: function(prop) { | ||
| try { | ||
| return prop in this.actual; | ||
| } | ||
| catch (e) { | ||
| return false; | ||
| } | ||
| jasmine.Matchers.prototype.toHaveProperty = function(prop) { | ||
| try { | ||
| return prop in this.actual; | ||
| } | ||
| }); | ||
| }); | ||
| catch (e) { | ||
| return false; | ||
| } | ||
| } | ||
| })(); |
+1
-1
@@ -21,3 +21,3 @@ #!/usr/bin/env bash | ||
| #command=$entry"--nohelpers --runWithRequireJs spec-requirejs" | ||
| command=$entry"--runWithRequireJs ./" | ||
| command=$entry"--runWithRequireJs spec" | ||
| echo $command | ||
@@ -24,0 +24,0 @@ time $command |
Sorry, the diff of this file is too big to display
Major refactor
Supply chain riskPackage has recently undergone a major refactor. It may be unstable or indicate significant internal changes. Use caution when updating to versions that include significant changes.
Found 1 instance in 1 package
Shell access
Supply chain riskThis module accesses the system shell. Accessing the system shell increases the risk of executing arbitrary code.
Found 1 instance in 1 package
Uses eval
Supply chain riskPackage uses dynamic code execution (e.g., eval()), which is a dangerous practice. This can prevent the code from running in certain environments and increases the risk that the code may contain exploits or malicious behavior.
Found 1 instance in 1 package
Debug access
Supply chain riskUses debug, reflection and dynamic code execution features.
Found 1 instance in 1 package
Dynamic require
Supply chain riskDynamic require can indicate the package is performing dangerous or unsafe dynamic code execution.
Found 1 instance in 1 package
Environment variable access
Supply chain riskPackage accesses environment variables, which may be a sign of credential stuffing or data theft.
Found 1 instance in 1 package
Filesystem access
Supply chain riskAccesses the file system, and could potentially read sensitive data.
Found 1 instance in 1 package
Long strings
Supply chain riskContains long string literals, which may be a sign of obfuscated or packed code.
Found 1 instance in 1 package
Shell access
Supply chain riskThis module accesses the system shell. Accessing the system shell increases the risk of executing arbitrary code.
Found 1 instance in 1 package
Uses eval
Supply chain riskPackage uses dynamic code execution (e.g., eval()), which is a dangerous practice. This can prevent the code from running in certain environments and increases the risk that the code may contain exploits or malicious behavior.
Found 1 instance in 1 package
Debug access
Supply chain riskUses debug, reflection and dynamic code execution features.
Found 1 instance in 1 package
Dynamic require
Supply chain riskDynamic require can indicate the package is performing dangerous or unsafe dynamic code execution.
Found 1 instance in 1 package
Environment variable access
Supply chain riskPackage accesses environment variables, which may be a sign of credential stuffing or data theft.
Found 1 instance in 1 package
Filesystem access
Supply chain riskAccesses the file system, and could potentially read sensitive data.
Found 1 instance in 1 package
Long strings
Supply chain riskContains long string literals, which may be a sign of obfuscated or packed code.
Found 1 instance in 1 package
135651
3.31%3840
2.65%90
7.14%3
50%