Comparing version 0.1.9 to 0.2.0
@@ -6,8 +6,19 @@ #!/usr/bin/env node | ||
path = require('path'), | ||
wru = require(path.join(CWD, 'node', 'wru.console.js')), | ||
test = [], | ||
args = resolveArguments(process.argv), | ||
wru = require(path.join(__dirname, 'wru.console.js')), | ||
inline = [], | ||
test = [consoleAssert], | ||
wru_test = wru.test, | ||
interval = 0 | ||
; | ||
function consoleAssert() { | ||
inline.forEach(function (args) { | ||
args.length < 2 ? | ||
wru.assert(args[0]) : | ||
wru.assert(args[1], args[0]) | ||
; | ||
}); | ||
} | ||
function execute() { | ||
inline.length || test.shift(); | ||
wru_test.call(wru, test); | ||
@@ -30,4 +41,17 @@ } | ||
global.log = wru.log; | ||
resolveArguments(process.argv).forEach(function (fileName) { | ||
require(path.join(CWD, fileName)); | ||
}); | ||
/* maybe too obtrusive ... | ||
global.console.assert = function assert() { | ||
inline.push(arguments); | ||
}; | ||
*/ | ||
if (args.length) { | ||
args.forEach(function (fileName) { | ||
require(path.join(CWD, fileName)); | ||
}); | ||
} else { | ||
console.log(''); | ||
console.log('Usage:'); | ||
console.log('wru ~/path/with/test.js ~/more?if/necessary.js'); | ||
console.log(''); | ||
process.exit(); | ||
} |
{ | ||
"name": "wru" | ||
, "version": "0.1.9" | ||
, "version": "0.2.0" | ||
, "description": "sync and async JavaScript tests have never been that easy" | ||
@@ -5,0 +5,0 @@ , "homepage": "https://github.com/WebReflection/wru" |
License Policy Violation
LicenseThis package is not allowed per your license policy. Review the package's license to ensure compliance.
Found 1 instance in 1 package
Dynamic require
Supply chain riskDynamic require can indicate the package is performing dangerous or unsafe dynamic code execution.
Found 1 instance in 1 package
License Policy Violation
LicenseThis package is not allowed per your license policy. Review the package's license to ensure compliance.
Found 1 instance in 1 package
Native code
Supply chain riskContains native code (e.g., compiled binaries or shared libraries). Including native code can obscure malicious behavior.
Found 1 instance in 1 package
Shell access
Supply chain riskThis module accesses the system shell. Accessing the system shell increases the risk of executing arbitrary code.
Found 1 instance in 1 package
Uses eval
Supply chain riskPackage uses dynamic code execution (e.g., eval()), which is a dangerous practice. This can prevent the code from running in certain environments and increases the risk that the code may contain exploits or malicious behavior.
Found 1 instance in 1 package
Dynamic require
Supply chain riskDynamic require can indicate the package is performing dangerous or unsafe dynamic code execution.
Found 1 instance in 1 package
Filesystem access
Supply chain riskAccesses the file system, and could potentially read sensitive data.
Found 1 instance in 1 package
2
1
80813
14
865