+10
-6
@@ -21,5 +21,5 @@ const ExitHandler = require('./exit_handler'); | ||
| * spec-writing interface. If it is set to false, the spec-writing interface | ||
| * can be accessed via jasmine-core's `noGlobals` method, e.g.: | ||
| * can be imported from jasmine-core in spec files, e.g.: | ||
| * | ||
| * `const {describe, it, expect, jasmine} = require('jasmine-core').noGlobals();` | ||
| * `const {describe, it, expect, jasmine} = require('jasmine-core');` | ||
| * | ||
@@ -47,8 +47,12 @@ * @name JasmineOptions#globals | ||
| if (options.globals === false) { | ||
| this.jasmine = jasmineCore.noGlobals().jasmine; | ||
| } else { | ||
| this.jasmine = jasmineCore.boot(); | ||
| if (options.jasmineCore && !options.jasmineCore.installGlobals) { | ||
| throw new Error('bad core passed'); | ||
| } | ||
| this.jasmine = jasmineCore.jasmine; | ||
| if (options.globals !== false) { | ||
| jasmineCore.installGlobals(); | ||
| } | ||
| /** | ||
@@ -55,0 +59,0 @@ * The Jasmine environment. |
@@ -27,6 +27,4 @@ const path = require('path'); | ||
| * spec-writing interface. If it is set to false, the spec-writing interface | ||
| * can be accessed in workers via jasmine-core's `noGlobals` method, e.g.: | ||
| * | ||
| * `const {describe, it, expect, jasmine} = require('jasmine-core').noGlobals();` | ||
| * | ||
| * can be imported from jasmine-core in spec files, e.g.: * | ||
| * `const {describe, it, expect, jasmine} = require('jasmine-core');` * | ||
| * @name ParallelRunnerOptions#globals | ||
@@ -65,5 +63,4 @@ * @type (boolean | undefined) | ||
| const bootedCore = jasmineCore.boot(); | ||
| const ParallelReportDispatcher = options.ParallelReportDispatcher || | ||
| bootedCore.ParallelReportDispatcher; | ||
| jasmineCore.jasmine.ParallelReportDispatcher; | ||
| this.reportDispatcher_ = new ParallelReportDispatcher(error => { | ||
@@ -74,3 +71,3 @@ console.error(error); | ||
| this.reportDispatcher_.addReporter(this.reporter_); | ||
| this.timer_ = new bootedCore.Timer(); | ||
| this.timer_ = new jasmineCore.jasmine.Timer(); | ||
@@ -77,0 +74,0 @@ // Public. See RunnerBase jsdocs. |
@@ -51,10 +51,7 @@ const regexSpecFilter = require("./filters/regex_spec_filter"); | ||
| .then(core => { | ||
| let env; | ||
| if (options.globals === false) { | ||
| env = core.noGlobals().jasmine.getEnv(); | ||
| } else { | ||
| env = core.boot().getEnv(); | ||
| if (options.globals !== false) { | ||
| core.installGlobals(); | ||
| } | ||
| const env = core.jasmine.getEnv(); | ||
| env.addReporter(forwardingReporter(this.clusterWorker_)); | ||
@@ -61,0 +58,0 @@ env.addReporter({ |
+2
-2
@@ -13,3 +13,3 @@ { | ||
| "license": "MIT", | ||
| "version": "6.1.0", | ||
| "version": "7.0.0-pre.0", | ||
| "repository": { | ||
@@ -37,3 +37,3 @@ "type": "git", | ||
| "glob": "^10.2.2 || ^11.0.3 || ^12.0.0 || ^13.0.0", | ||
| "jasmine-core": "~6.1.0" | ||
| "jasmine-core": "7.0.0-pre.0" | ||
| }, | ||
@@ -40,0 +40,0 @@ "bin": "./bin/jasmine.js", |
Dynamic require
Supply chain riskDynamic require can indicate the package is performing dangerous or unsafe dynamic code execution.
Found 1 instance in 1 package
Environment variable access
Supply chain riskPackage accesses environment variables, which may be a sign of credential stuffing or data theft.
Found 2 instances in 1 package
Filesystem access
Supply chain riskAccesses the file system, and could potentially read sensitive data.
Found 1 instance in 1 package
Long strings
Supply chain riskContains long string literals, which may be a sign of obfuscated or packed code.
Found 1 instance in 1 package
No v1
QualityPackage is not semver >=1. This means it is not stable and does not support ^ ranges.
Found 1 instance in 1 package
URL strings
Supply chain riskPackage contains fragments of external URLs or IP addresses, which the package may be accessing at runtime.
Found 1 instance in 1 package
Dynamic require
Supply chain riskDynamic require can indicate the package is performing dangerous or unsafe dynamic code execution.
Found 1 instance in 1 package
Environment variable access
Supply chain riskPackage accesses environment variables, which may be a sign of credential stuffing or data theft.
Found 2 instances in 1 package
Filesystem access
Supply chain riskAccesses the file system, and could potentially read sensitive data.
Found 1 instance in 1 package
Long strings
Supply chain riskContains long string literals, which may be a sign of obfuscated or packed code.
Found 1 instance in 1 package
URL strings
Supply chain riskPackage contains fragments of external URLs or IP addresses, which the package may be accessing at runtime.
Found 1 instance in 1 package
75387
-0.03%2083
-0.14%1
Infinity%+ Added
- Removed
Updated