@aikidosec/safe-chain 1.1.1 → 1.1.3

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@aikidosec/safe-chain",
3
- "version": "1.1.1",
3
+ "version": "1.1.3",
4
4
  "scripts": {
5
5
  "test": "node --test --experimental-test-module-mocks 'src/**/*.spec.js'",
6
6
  "test:watch": "node --test --watch --experimental-test-module-mocks 'src/**/*.spec.js'",
@@ -23,7 +23,9 @@ export async function runYarnCommand(args) {
23
23
  }
24
24
 
25
25
  async function fixYarnProxyEnvironmentVariables(env) {
26
- // Yarn ignores standard proxy environment variables HTTPS_PROXY and NODE_EXTRA_CA_CERTS
26
+ // Yarn ignores standard proxy environment variable HTTPS_PROXY
27
+ // It does respect NODE_EXTRA_CA_CERTS for custom CA certificates though.
28
+ // Don't use YARN_HTTPS_CA_FILE_PATH though, as it causes to ignore all system CAs
27
29
 
28
30
  // Yarn v2/v3 and v4+ use different environment variables for proxy and CA certs
29
31
  // When setting all variables, yarn returns an error about conflicting variables
@@ -35,10 +37,8 @@ async function fixYarnProxyEnvironmentVariables(env) {
35
37
 
36
38
  if (majorVersion >= 4) {
37
39
  env.YARN_HTTPS_PROXY = env.HTTPS_PROXY;
38
- env.YARN_HTTPS_CA_FILE_PATH = env.NODE_EXTRA_CA_CERTS;
39
40
  } else if (majorVersion === 2 || majorVersion === 3) {
40
41
  env.YARN_HTTPS_PROXY = env.HTTPS_PROXY;
41
- env.YARN_CA_FILE_PATH = env.NODE_EXTRA_CA_CERTS;
42
42
  }
43
43
  }
44
44
 
@@ -35,7 +35,9 @@ function tunnelRequestToDestination(req, clientSocket, head) {
35
35
  ui.writeError(
36
36
  `Safe-chain: error connecting to ${hostname}:${port} - ${err.message}`
37
37
  );
38
- clientSocket.end("HTTP/1.1 502 Bad Gateway\r\n\r\n");
38
+ if (clientSocket.writable) {
39
+ clientSocket.end("HTTP/1.1 502 Bad Gateway\r\n\r\n");
40
+ }
39
41
  });
40
42
  }
41
43
 
@@ -76,8 +78,12 @@ function tunnelRequestViaProxy(req, clientSocket, head, proxyUrl) {
76
78
  ui.writeError(
77
79
  `Safe-chain: proxy CONNECT failed: ${response.split("\r\n")[0]}`
78
80
  );
79
- clientSocket.end("HTTP/1.1 502 Bad Gateway\r\n\r\n");
80
- proxySocket.end();
81
+ if (clientSocket.writable) {
82
+ clientSocket.end("HTTP/1.1 502 Bad Gateway\r\n\r\n");
83
+ }
84
+ if (proxySocket.writable) {
85
+ proxySocket.end();
86
+ }
81
87
  }
82
88
  });
83
89
 
@@ -88,11 +94,15 @@ function tunnelRequestViaProxy(req, clientSocket, head, proxyUrl) {
88
94
  proxy.port || 8080
89
95
  } - ${err.message}`
90
96
  );
91
- clientSocket.end("HTTP/1.1 502 Bad Gateway\r\n\r\n");
97
+ if (clientSocket.writable) {
98
+ clientSocket.end("HTTP/1.1 502 Bad Gateway\r\n\r\n");
99
+ }
92
100
  }
93
101
  });
94
102
 
95
103
  clientSocket.on("error", () => {
96
- proxySocket.end();
104
+ if (proxySocket.writable) {
105
+ proxySocket.end();
106
+ }
97
107
  });
98
108
  }