Comparing version 2.3.4 to 2.3.5
# Changelog | ||
## 2.3.5 | ||
* Fix bug [#375](https://github.com/olivernn/lunr.js/issues/375) with fuzzy matching that meant insertions at the end of a word would not match. Thanks [Luca Ongaro](https://github.com/lucaong) for reporting and to [Rob Hoelz](https://github.com/hoelzro) for providing a fix. | ||
* Switch to using `Array.isArray` when checking for results from pipeline functions to support `vm.runInContext`, [#381](https://github.com/olivernn/lunr.js/pull/381) thanks [Rob Hoelz](https://github.com/hoelzro). | ||
## 2.3.4 | ||
@@ -4,0 +9,0 @@ |
@@ -213,3 +213,3 @@ /*! | ||
if (result instanceof Array) { | ||
if (Array.isArray(result)) { | ||
for (var k = 0; k < result.length; k++) { | ||
@@ -216,0 +216,0 @@ memo.push(result[k]) |
@@ -120,9 +120,9 @@ /*! | ||
noEditNode.final = true | ||
} else { | ||
stack.push({ | ||
node: noEditNode, | ||
editsRemaining: frame.editsRemaining, | ||
str: frame.str.slice(1) | ||
}) | ||
} | ||
stack.push({ | ||
node: noEditNode, | ||
editsRemaining: frame.editsRemaining, | ||
str: frame.str.slice(1) | ||
}) | ||
} | ||
@@ -129,0 +129,0 @@ |
{ | ||
"name": "lunr", | ||
"description": "Simple full-text search in your browser.", | ||
"version": "2.3.4", | ||
"version": "2.3.5", | ||
"author": "Oliver Nightingale", | ||
@@ -6,0 +6,0 @@ "keywords": ["search"], |
@@ -275,2 +275,3 @@ suite('lunr.TokenSet', function () { | ||
x6 = lunr.TokenSet.fromString('foo'), | ||
x7 = lunr.TokenSet.fromString('bara'), | ||
y = lunr.TokenSet.fromFuzzyString('bar', 1) | ||
@@ -284,2 +285,3 @@ | ||
assert.equal(x6.intersect(y).toArray().length, 0) | ||
assert.sameMembers(x7.intersect(y).toArray(), ["bara"]) | ||
}) | ||
@@ -286,0 +288,0 @@ |
Sorry, the diff of this file is too big to display
Sorry, the diff of this file is not supported yet
Environment variable access
Supply chain riskPackage accesses environment variables, which may be a sign of credential stuffing or data theft.
Found 1 instance in 1 package
Environment variable access
Supply chain riskPackage accesses environment variables, which may be a sign of credential stuffing or data theft.
Found 4 instances in 1 package
944134
28