wrangler
Advanced tools
+10
-10
| { | ||
| "name": "wrangler", | ||
| "version": "4.66.0", | ||
| "version": "4.67.0", | ||
| "description": "Command-line interface for all things Cloudflare Workers", | ||
@@ -57,6 +57,6 @@ "keywords": [ | ||
| "unenv": "2.0.0-rc.24", | ||
| "workerd": "1.20260217.0", | ||
| "workerd": "1.20260219.0", | ||
| "@cloudflare/kv-asset-handler": "0.4.2", | ||
| "@cloudflare/unenv-preset": "2.13.0", | ||
| "miniflare": "4.20260217.0" | ||
| "@cloudflare/unenv-preset": "2.14.0", | ||
| "miniflare": "4.20260219.0" | ||
| }, | ||
@@ -67,3 +67,3 @@ "devDependencies": { | ||
| "@cloudflare/types": "6.18.4", | ||
| "@cloudflare/workers-types": "^4.20260217.0", | ||
| "@cloudflare/workers-types": "^4.20260219.0", | ||
| "@cspotcode/source-map-support": "0.8.1", | ||
@@ -155,10 +155,10 @@ "@netlify/build-info": "^10.2.0", | ||
| "@cloudflare/eslint-config-shared": "1.2.1", | ||
| "@cloudflare/pages-shared": "^0.13.108", | ||
| "@cloudflare/workers-shared": "0.19.0", | ||
| "@cloudflare/pages-shared": "^0.13.109", | ||
| "@cloudflare/workers-tsconfig": "0.0.0", | ||
| "@cloudflare/workers-shared": "0.19.0", | ||
| "@cloudflare/workflows-shared": "0.4.0", | ||
| "@cloudflare/workers-utils": "0.11.0" | ||
| "@cloudflare/workers-utils": "0.11.0", | ||
| "@cloudflare/workflows-shared": "0.4.0" | ||
| }, | ||
| "peerDependencies": { | ||
| "@cloudflare/workers-types": "^4.20260217.0" | ||
| "@cloudflare/workers-types": "^4.20260219.0" | ||
| }, | ||
@@ -165,0 +165,0 @@ "peerDependenciesMeta": { |
@@ -9,3 +9,2 @@ { | ||
| "__tests__", | ||
| "./init-tests/**", | ||
| // Note: `startDevWorker` and `middleware` should also be included but some work is needed | ||
@@ -12,0 +11,0 @@ // for that first (see: https://github.com/cloudflare/workers-sdk/issues/8303) |
| const { unstable_dev } = require("wrangler"); | ||
| describe("Worker", () => { | ||
| let worker; | ||
| beforeAll(async () => { | ||
| worker = await unstable_dev("src/index.js", { | ||
| experimental: { disableExperimentalWarning: true }, | ||
| }); | ||
| }); | ||
| afterAll(async () => { | ||
| await worker.stop(); | ||
| }); | ||
| it("should return Hello World", async () => { | ||
| const resp = await worker.fetch(); | ||
| if (resp) { | ||
| const text = await resp.text(); | ||
| expect(text).toMatchInlineSnapshot(`"Hello World!"`); | ||
| } | ||
| }); | ||
| }); |
| import { afterAll, beforeAll, describe, expect, it } from "vitest"; | ||
| import { unstable_dev } from "wrangler"; | ||
| describe("Worker", () => { | ||
| let worker; | ||
| beforeAll(async () => { | ||
| worker = await unstable_dev("src/index.js", { | ||
| experimental: { disableExperimentalWarning: true }, | ||
| }); | ||
| }); | ||
| afterAll(async () => { | ||
| await worker.stop(); | ||
| }); | ||
| it("should return Hello World", async () => { | ||
| const resp = await worker.fetch(); | ||
| if (resp) { | ||
| const text = await resp.text(); | ||
| expect(text).toMatchInlineSnapshot(`"Hello World!"`); | ||
| } | ||
| }); | ||
| }); |
| import { afterAll, beforeAll, describe, expect, it } from "vitest"; | ||
| import { unstable_dev } from "wrangler"; | ||
| import type { Unstable_DevWorker } from "wrangler"; | ||
| describe("Worker", () => { | ||
| let worker: Unstable_DevWorker; | ||
| beforeAll(async () => { | ||
| worker = await unstable_dev("src/index.ts", { | ||
| experimental: { disableExperimentalWarning: true }, | ||
| }); | ||
| }); | ||
| afterAll(async () => { | ||
| await worker.stop(); | ||
| }); | ||
| it("should return Hello World", async () => { | ||
| const resp = await worker.fetch(); | ||
| if (resp) { | ||
| const text = await resp.text(); | ||
| expect(text).toMatchInlineSnapshot(`"Hello World!"`); | ||
| } | ||
| }); | ||
| }); |
Sorry, the diff of this file is too big to display
Sorry, the diff of this file is too big to display
Sorry, the diff of this file is too big to display
Shell access
Supply chain riskThis module accesses the system shell. Accessing the system shell increases the risk of executing arbitrary code.
Found 1 instance in 1 package
Long strings
Supply chain riskContains long string literals, which may be a sign of obfuscated or packed code.
Found 1 instance in 1 package
URL strings
Supply chain riskPackage contains fragments of external URLs or IP addresses, which the package may be accessing at runtime.
Found 1 instance in 1 package
Shell access
Supply chain riskThis module accesses the system shell. Accessing the system shell increases the risk of executing arbitrary code.
Found 1 instance in 1 package
Long strings
Supply chain riskContains long string literals, which may be a sign of obfuscated or packed code.
Found 1 instance in 1 package
URL strings
Supply chain riskPackage contains fragments of external URLs or IP addresses, which the package may be accessing at runtime.
Found 1 instance in 1 package
15694540
0.13%43
-6.52%12919
-0.48%+ Added
+ Added
+ Added
+ Added
+ Added
+ Added
+ Added
+ Added
- Removed
- Removed
- Removed
- Removed
- Removed
- Removed
- Removed
- Removed
Updated
Updated