+13
| git push | ||
| git push --tags | ||
| npm publish | ||
| rm -f pkg/* | ||
| ruby -rubygems build | ||
| cp pkg/* ../sinon-web/releases/. | ||
| cp Changelog.txt ../sinon-web/. | ||
| cd ../sinon-web | ||
| sed -i "s/2012\-[0-9][0-9]\-[0-9][0-9] \-/`date +%Y`-`date +%m`-`date +%d` -/" index.html | ||
| sed -i "s/2012\-[0-9][0-9]\-[0-9][0-9] \-/`date +%Y`-`date +%m`-`date +%d` -/" qunit/index.html | ||
| sed -i "s/$1/$2/" index.html | ||
| sed -i "s/$1/$2/" qunit/index.html | ||
| sed -i "s/$1/$2/" docs/index.html |
+3
-0
@@ -0,1 +1,4 @@ | ||
| == 1.4.2 / 2012-07-11 | ||
| * sinon.match for arrays (Maximilian Antoni) | ||
| == 1.4.1 / 2012-07-11 | ||
@@ -2,0 +5,0 @@ * Strengthen a Node.JS inference to avoid quirky behavior with Mocha |
@@ -59,3 +59,3 @@ /* @depend ../sinon.js */ | ||
| } | ||
| } else if (exp !== act) { | ||
| } else if (!sinon.deepEqual(exp, act)) { | ||
| return false; | ||
@@ -62,0 +62,0 @@ } |
+1
-1
| { | ||
| "name": "sinon", | ||
| "description": "JavaScript test spies, stubs and mocks.", | ||
| "version": "1.4.1", | ||
| "version": "1.4.2", | ||
| "homepage": "http://cjohansen.no/sinon/", | ||
@@ -6,0 +6,0 @@ "author": "Christian Johansen", |
@@ -125,2 +125,20 @@ /*jslint onevar: false, eqeqeq: false*/ | ||
| "returns true if array is equal": function () { | ||
| var match = sinon.match({ arr: ["a", "b"] }); | ||
| assert(match.test({ arr: ["a", "b"] })); | ||
| }, | ||
| "returns false if array is not equal": function () { | ||
| var match = sinon.match({ arr: ["b", "a"] }); | ||
| assert.isFalse(match.test({ arr: ["a", "b"] })); | ||
| }, | ||
| "returns true if number objects are equal": function () { | ||
| var match = sinon.match({ one : new Number(1) }); | ||
| assert(match.test({ one : new Number(1) })); | ||
| }, | ||
| "returns true if test matches": function () { | ||
@@ -127,0 +145,0 @@ var match = sinon.match({ prop: sinon.match.typeOf("boolean") }); |
Uses eval
Supply chain riskPackage uses dynamic code execution (e.g., eval()), which is a dangerous practice. This can prevent the code from running in certain environments and increases the risk that the code may contain exploits or malicious behavior.
Found 3 instances in 1 package
Environment variable access
Supply chain riskPackage accesses environment variables, which may be a sign of credential stuffing or data theft.
Found 1 instance in 1 package
Long strings
Supply chain riskContains long string literals, which may be a sign of obfuscated or packed code.
Found 1 instance in 1 package
URL strings
Supply chain riskPackage contains fragments of external URLs or IP addresses, which the package may be accessing at runtime.
Found 1 instance in 1 package
Uses eval
Supply chain riskPackage uses dynamic code execution (e.g., eval()), which is a dangerous practice. This can prevent the code from running in certain environments and increases the risk that the code may contain exploits or malicious behavior.
Found 3 instances in 1 package
Environment variable access
Supply chain riskPackage accesses environment variables, which may be a sign of credential stuffing or data theft.
Found 1 instance in 1 package
Long strings
Supply chain riskContains long string literals, which may be a sign of obfuscated or packed code.
Found 1 instance in 1 package
URL strings
Supply chain riskPackage contains fragments of external URLs or IP addresses, which the package may be accessing at runtime.
Found 1 instance in 1 package
1631540
0.06%60
1.69%34015
0.04%