@@ -497,2 +497,10 @@ 'use strict'; | ||
| this.removeListener('data', inflateOnData); | ||
| // | ||
| // The choice to employ `zlib.reset()` over `zlib.close()` is dictated by the | ||
| // fact that in Node.js versions prior to 13.10.0, the callback for | ||
| // `zlib.flush()` is not called if `zlib.close()` is used. Utilizing | ||
| // `zlib.reset()` ensures that either the callback is invoked or an error is | ||
| // emitted. | ||
| // | ||
| this.reset(); | ||
@@ -513,4 +521,10 @@ } | ||
| this[kPerMessageDeflate]._inflate = null; | ||
| if (this[kError]) { | ||
| this[kCallback](this[kError]); | ||
| return; | ||
| } | ||
| err[kStatusCode] = 1007; | ||
| this[kCallback](err); | ||
| } |
+1
-1
@@ -711,3 +711,3 @@ /* eslint no-unused-vars: ["error", { "varsIgnorePattern": "^Duplex|Readable$", "caughtErrors": "none" }] */ | ||
| 'The URL\'s protocol must be one of "ws:", "wss:", ' + | ||
| '"http:", "https", or "ws+unix:"'; | ||
| '"http:", "https:", or "ws+unix:"'; | ||
| } else if (isIpcUrl && !parsedUrl.pathname) { | ||
@@ -714,0 +714,0 @@ invalidUrlMessage = "The URL's pathname is empty"; |
+2
-2
| { | ||
| "name": "ws", | ||
| "version": "8.18.1", | ||
| "version": "8.18.2", | ||
| "description": "Simple to use, blazing fast and thoroughly tested websocket client and server for Node.js", | ||
@@ -63,3 +63,3 @@ "keywords": [ | ||
| "eslint-plugin-prettier": "^5.0.0", | ||
| "globals": "^15.0.0", | ||
| "globals": "^16.0.0", | ||
| "mocha": "^8.4.0", | ||
@@ -66,0 +66,0 @@ "nyc": "^15.0.0", |
Network access
Supply chain riskThis module accesses the network.
Found 4 instances in 1 package
Environment variable access
Supply chain riskPackage accesses environment variables, which may be a sign of credential stuffing or data theft.
Found 2 instances in 1 package
Long strings
Supply chain riskContains long string literals, which may be a sign of obfuscated or packed code.
Found 1 instance in 1 package
Network access
Supply chain riskThis module accesses the network.
Found 4 instances in 1 package
Environment variable access
Supply chain riskPackage accesses environment variables, which may be a sign of credential stuffing or data theft.
Found 2 instances in 1 package
Long strings
Supply chain riskContains long string literals, which may be a sign of obfuscated or packed code.
Found 1 instance in 1 package
147181
0.27%4229
0.26%