cdk-ecr-deployment 3.0.10 → 3.0.12

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (27) hide show
  1. package/.jsii +2 -2
  2. package/lib/index.js +3 -3
  3. package/node_modules/@types/cacheable-request/node_modules/@types/node/README.md +1 -1
  4. package/node_modules/@types/cacheable-request/node_modules/@types/node/crypto.d.ts +17 -1
  5. package/node_modules/@types/cacheable-request/node_modules/@types/node/module.d.ts +2 -2
  6. package/node_modules/@types/cacheable-request/node_modules/@types/node/package.json +2 -2
  7. package/node_modules/@types/cacheable-request/node_modules/@types/node/process.d.ts +17 -0
  8. package/node_modules/@types/cacheable-request/node_modules/@types/node/ts4.8/crypto.d.ts +17 -1
  9. package/node_modules/@types/cacheable-request/node_modules/@types/node/ts4.8/module.d.ts +2 -2
  10. package/node_modules/@types/cacheable-request/node_modules/@types/node/ts4.8/process.d.ts +17 -0
  11. package/node_modules/@types/keyv/node_modules/@types/node/README.md +1 -1
  12. package/node_modules/@types/keyv/node_modules/@types/node/crypto.d.ts +17 -1
  13. package/node_modules/@types/keyv/node_modules/@types/node/module.d.ts +2 -2
  14. package/node_modules/@types/keyv/node_modules/@types/node/package.json +2 -2
  15. package/node_modules/@types/keyv/node_modules/@types/node/process.d.ts +17 -0
  16. package/node_modules/@types/keyv/node_modules/@types/node/ts4.8/crypto.d.ts +17 -1
  17. package/node_modules/@types/keyv/node_modules/@types/node/ts4.8/module.d.ts +2 -2
  18. package/node_modules/@types/keyv/node_modules/@types/node/ts4.8/process.d.ts +17 -0
  19. package/node_modules/@types/responselike/node_modules/@types/node/README.md +1 -1
  20. package/node_modules/@types/responselike/node_modules/@types/node/crypto.d.ts +17 -1
  21. package/node_modules/@types/responselike/node_modules/@types/node/module.d.ts +2 -2
  22. package/node_modules/@types/responselike/node_modules/@types/node/package.json +2 -2
  23. package/node_modules/@types/responselike/node_modules/@types/node/process.d.ts +17 -0
  24. package/node_modules/@types/responselike/node_modules/@types/node/ts4.8/crypto.d.ts +17 -1
  25. package/node_modules/@types/responselike/node_modules/@types/node/ts4.8/module.d.ts +2 -2
  26. package/node_modules/@types/responselike/node_modules/@types/node/ts4.8/process.d.ts +17 -0
  27. package/package.json +1 -1
package/.jsii CHANGED
@@ -4190,6 +4190,6 @@
4190
4190
  "symbolId": "src/index:S3ArchiveName"
4191
4191
  }
4192
4192
  },
4193
- "version": "3.0.10",
4194
- "fingerprint": "faG3xY85k5p0vp11Gvizh1g8GqhIn6cstir0b4a3pbw="
4193
+ "version": "3.0.12",
4194
+ "fingerprint": "Q1QiSV2urczT91P/IAo0PIRGnyQie8NiVqqkDEDdn3Y="
4195
4195
  }
package/lib/index.js CHANGED
@@ -37,7 +37,7 @@ class DockerImageName {
37
37
  }
38
38
  exports.DockerImageName = DockerImageName;
39
39
  _a = JSII_RTTI_SYMBOL_1;
40
- DockerImageName[_a] = { fqn: "cdk-ecr-deployment.DockerImageName", version: "3.0.10" };
40
+ DockerImageName[_a] = { fqn: "cdk-ecr-deployment.DockerImageName", version: "3.0.12" };
41
41
  class S3ArchiveName {
42
42
  constructor(p, ref, creds) {
43
43
  this.creds = creds;
@@ -50,7 +50,7 @@ class S3ArchiveName {
50
50
  }
51
51
  exports.S3ArchiveName = S3ArchiveName;
52
52
  _b = JSII_RTTI_SYMBOL_1;
53
- S3ArchiveName[_b] = { fqn: "cdk-ecr-deployment.S3ArchiveName", version: "3.0.10" };
53
+ S3ArchiveName[_b] = { fqn: "cdk-ecr-deployment.S3ArchiveName", version: "3.0.12" };
54
54
  class ECRDeployment extends constructs_1.Construct {
55
55
  constructor(scope, id, props) {
56
56
  super(scope, id);
@@ -134,5 +134,5 @@ class ECRDeployment extends constructs_1.Construct {
134
134
  }
135
135
  exports.ECRDeployment = ECRDeployment;
136
136
  _c = JSII_RTTI_SYMBOL_1;
137
- ECRDeployment[_c] = { fqn: "cdk-ecr-deployment.ECRDeployment", version: "3.0.10" };
137
+ ECRDeployment[_c] = { fqn: "cdk-ecr-deployment.ECRDeployment", version: "3.0.12" };
138
138
  //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"index.js","sourceRoot":"","sources":["../src/index.ts"],"names":[],"mappings":";;;;;AAAA,qEAAqE;AACrE,sCAAsC;AAGtC,+CAA+C;AAC/C,6BAA6B;AAC7B,6CAAoH;AAEpH,2CAAuC;AACvC,qCAAmD;AAwFnD,SAAS,OAAO,CAAC,UAAkB;IACjC,IAAI,IAAA,gCAAuB,GAAE,EAAE;QAC7B,IAAI;YACF,MAAM,aAAa,GAAG,IAAI,CAAC,IAAI,CAAC,SAAS,EAAE,sBAAsB,CAAC,CAAC;YACnE,MAAM,YAAY,GAAG,IAAI,CAAC,IAAI,CAAC,SAAS,EAAE,eAAe,CAAC,CAAC;YAC3D,aAAa,CAAC,YAAY,CAAC,OAAO,CAAC,KAAK,EAAE,CAAC,aAAa,EAAE,YAAY,CAAC,CAAC,CAAC;YAEzE,OAAO,wBAAM,CAAC,IAAI,CAAC,SAAS,CAAC,YAAY,CAAC,CAAC;SAC5C;QAAC,OAAO,GAAG,EAAE;YACZ,OAAO,CAAC,IAAI,CAAC,gCAAgC,GAAG,EAAE,CAAC,CAAC;SACrD;KACF;IAED,OAAO,wBAAM,CAAC,IAAI,CAAC,eAAe,CAAC,IAAI,CAAC,IAAI,CAAC,SAAS,EAAE,WAAW,CAAC,EAAE;QACpE,SAAS,EAAE;YACT,UAAU;SACX;KACF,CAAC,CAAC;AACL,CAAC;AAED,MAAa,eAAe;IAC1B,YAA2B,IAAY,EAAS,KAAc;QAAnC,SAAI,GAAJ,IAAI,CAAQ;QAAS,UAAK,GAAL,KAAK,CAAS;IAAI,CAAC;IACnE,IAAW,GAAG,KAAa,OAAO,YAAY,IAAI,CAAC,IAAI,EAAE,CAAC,CAAC,CAAC;;AAF9D,0CAGC;;;AAED,MAAa,aAAa;IAExB,YAAmB,CAAS,EAAE,GAAY,EAAS,KAAc;QAAd,UAAK,GAAL,KAAK,CAAS;QAC/D,IAAI,CAAC,IAAI,GAAG,CAAC,CAAC;QACd,IAAI,GAAG,EAAE;YACP,IAAI,CAAC,IAAI,IAAI,GAAG,GAAG,GAAG,CAAC;SACxB;IACH,CAAC;IACD,IAAW,GAAG,KAAa,OAAO,QAAQ,IAAI,CAAC,IAAI,EAAE,CAAC,CAAC,CAAC;;AAR1D,sCASC;;;AAED,MAAa,aAAc,SAAQ,sBAAS;IAG1C,YAAY,KAAgB,EAAE,EAAU,EAAE,KAAyB;QACjE,KAAK,CAAC,KAAK,EAAE,EAAE,CAAC,CAAC;QACjB,MAAM,WAAW,GAAG,KAAK,CAAC,WAAW,IAAI,GAAG,CAAC;QAC7C,IAAI,CAAC,OAAO,GAAG,IAAI,wBAAM,CAAC,iBAAiB,CAAC,IAAI,EAAE,uBAAuB,EAAE;YACzE,IAAI,EAAE,IAAI,CAAC,mBAAmB,CAAC,WAAW,CAAC;YAC3C,IAAI,EAAE,OAAO,CAAC,KAAK,CAAC,UAAU,IAAI,UAAU,CAAC;YAC7C,OAAO,EAAE,wBAAM,CAAC,OAAO,CAAC,eAAe;YACvC,OAAO,EAAE,WAAW;YACpB,WAAW,EAAE,KAAK,CAAC,WAAW;YAC9B,aAAa,EAAE,0BAA0B;YACzC,OAAO,EAAE,sBAAQ,CAAC,OAAO,CAAC,EAAE,CAAC;YAC7B,IAAI,EAAE,KAAK,CAAC,IAAI;YAChB,UAAU,EAAE,WAAW;YACvB,GAAG,EAAE,KAAK,CAAC,GAAG;YACd,UAAU,EAAE,KAAK,CAAC,UAAU;YAC5B,cAAc,EAAE,KAAK,CAAC,cAAc;SACrC,CAAC,CAAC;QAEH,MAAM,WAAW,GAAG,IAAI,CAAC,OAAO,CAAC,IAAI,CAAC;QACtC,IAAI,CAAC,WAAW,EAAE;YAAE,MAAM,IAAI,KAAK,CAAC,qDAAqD,CAAC,CAAC;SAAE;QAE7F,WAAW,CAAC,oBAAoB,CAC9B,IAAI,qBAAG,CAAC,eAAe,CAAC;YACtB,MAAM,EAAE,qBAAG,CAAC,MAAM,CAAC,KAAK;YACxB,OAAO,EAAE;gBACP,2BAA2B;gBAC3B,iCAAiC;gBACjC,4BAA4B;gBAC5B,yBAAyB;gBACzB,0BAA0B;gBAC1B,gBAAgB;gBAChB,oBAAoB;gBACpB,mBAAmB;gBACnB,yBAAyB;gBACzB,+BAA+B;gBAC/B,yBAAyB;gBACzB,qBAAqB;gBACrB,yBAAyB;gBACzB,cAAc;aACf;YACD,SAAS,EAAE,CAAC,GAAG,CAAC;SACjB,CAAC,CAAC,CAAC;QACN,WAAW,CAAC,oBAAoB,CAAC,IAAI,qBAAG,CAAC,eAAe,CAAC;YACvD,MAAM,EAAE,qBAAG,CAAC,MAAM,CAAC,KAAK;YACxB,OAAO,EAAE;gBACP,cAAc;aACf;YACD,SAAS,EAAE,CAAC,GAAG,CAAC;SACjB,CAAC,CAAC,CAAC;QAEJ,IAAI,4BAAc,CAAC,IAAI,EAAE,gBAAgB,EAAE;YACzC,YAAY,EAAE,IAAI,CAAC,OAAO,CAAC,WAAW;YACtC,YAAY,EAAE,6BAA6B;YAC3C,UAAU,EAAE;gBACV,QAAQ,EAAE,KAAK,CAAC,GAAG,CAAC,GAAG;gBACvB,QAAQ,EAAE,KAAK,CAAC,GAAG,CAAC,KAAK;gBACzB,SAAS,EAAE,KAAK,CAAC,IAAI,CAAC,GAAG;gBACzB,SAAS,EAAE,KAAK,CAAC,IAAI,CAAC,KAAK;aAC5B;SACF,CAAC,CAAC;IACL,CAAC;IAEM,oBAAoB,CAAC,SAA0B;QACpD,MAAM,WAAW,GAAG,IAAI,CAAC,OAAO,CAAC,IAAI,CAAC;QACtC,IAAI,CAAC,WAAW,EAAE;YAAE,MAAM,IAAI,KAAK,CAAC,qDAAqD,CAAC,CAAC;SAAE;QAE7F,OAAO,WAAW,CAAC,oBAAoB,CAAC,SAAS,CAAC,CAAC;IACrD,CAAC;IAEO,mBAAmB,CAAC,WAAoB;QAC9C,IAAI,IAAI,GAAG,sCAAsC,CAAC;QAElD,0EAA0E;QAC1E,2EAA2E;QAC3E,4CAA4C;QAC5C,IAAI,WAAW,EAAE;YACf,IAAI,mBAAK,CAAC,YAAY,CAAC,WAAW,CAAC,EAAE;gBACnC,MAAM,IAAI,KAAK,CAAC,mHAAmH,CAAC,CAAC;aACtI;YAED,IAAI,IAAI,IAAI,WAAW,CAAC,QAAQ,EAAE,KAAK,CAAC;SACzC;QAED,OAAO,IAAI,CAAC;IACd,CAAC;;AAvFH,sCAwFC","sourcesContent":["// Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.\n// SPDX-License-Identifier: Apache-2.0\n\n\nimport * as child_process from 'child_process';\nimport * as path from 'path';\nimport { aws_ec2 as ec2, aws_iam as iam, aws_lambda as lambda, Duration, CustomResource, Token } from 'aws-cdk-lib';\nimport { PolicyStatement, AddToPrincipalPolicyResult } from 'aws-cdk-lib/aws-iam';\nimport { Construct } from 'constructs';\nimport { shouldUsePrebuiltLambda } from './config';\n\nexport interface ECRDeploymentProps {\n\n  /**\n   * Image to use to build Golang lambda for custom resource, if download fails or is not wanted.\n   *\n   * Might be needed for local build if all images need to come from own registry.\n   *\n   * Note that image should use yum as a package manager and have golang available.\n   *\n   * @default public.ecr.aws/sam/build-go1.x:latest\n   */\n  readonly buildImage?: string;\n  /**\n   * The source of the docker image.\n   */\n  readonly src: IImageName;\n\n  /**\n   * The destination of the docker image.\n   */\n  readonly dest: IImageName;\n\n  /**\n   * The amount of memory (in MiB) to allocate to the AWS Lambda function which\n   * replicates the files from the CDK bucket to the destination bucket.\n   *\n   * If you are deploying large files, you will need to increase this number\n   * accordingly.\n   *\n   * @default 512\n   */\n  readonly memoryLimit?: number;\n\n  /**\n   * Execution role associated with this function\n   *\n   * @default - A role is automatically created\n   */\n  readonly role?: iam.IRole;\n\n  /**\n   * The VPC network to place the deployment lambda handler in.\n   *\n   * @default None\n   */\n  readonly vpc?: ec2.IVpc;\n\n  /**\n   * Where in the VPC to place the deployment lambda handler.\n   * Only used if 'vpc' is supplied.\n   *\n   * @default - the Vpc default strategy if not specified\n   */\n  readonly vpcSubnets?: ec2.SubnetSelection;\n\n  /**\n   * The list of security groups to associate with the Lambda's network interfaces.\n   *\n   * Only used if 'vpc' is supplied.\n   *\n   * @default - If the function is placed within a VPC and a security group is\n   * not specified, either by this or securityGroup prop, a dedicated security\n   * group will be created for this function.\n   */\n  readonly securityGroups?: ec2.SecurityGroup[];\n\n  /**\n   * The environment variable to set\n   */\n  readonly environment?: { [key: string]: string };\n}\n\nexport interface IImageName {\n  /**\n   *  The uri of the docker image.\n   *\n   *  The uri spec follows https://github.com/containers/skopeo\n   */\n  readonly uri: string;\n\n  /**\n   * The credentials of the docker image. Format `user:password` or `AWS Secrets Manager secret arn` or `AWS Secrets Manager secret name`\n   */\n  creds?: string;\n}\n\nfunction getCode(buildImage: string): lambda.AssetCode {\n  if (shouldUsePrebuiltLambda()) {\n    try {\n      const installScript = path.join(__dirname, '../lambda/install.js');\n      const prebuiltPath = path.join(__dirname, '../lambda/out');\n      child_process.execFileSync(process.argv0, [installScript, prebuiltPath]);\n\n      return lambda.Code.fromAsset(prebuiltPath);\n    } catch (err) {\n      console.warn(`Can not get prebuilt lambda: ${err}`);\n    }\n  }\n\n  return lambda.Code.fromDockerBuild(path.join(__dirname, '../lambda'), {\n    buildArgs: {\n      buildImage,\n    },\n  });\n}\n\nexport class DockerImageName implements IImageName {\n  public constructor(private name: string, public creds?: string) { }\n  public get uri(): string { return `docker://${this.name}`; }\n}\n\nexport class S3ArchiveName implements IImageName {\n  private name: string;\n  public constructor(p: string, ref?: string, public creds?: string) {\n    this.name = p;\n    if (ref) {\n      this.name += ':' + ref;\n    }\n  }\n  public get uri(): string { return `s3://${this.name}`; }\n}\n\nexport class ECRDeployment extends Construct {\n  private handler: lambda.SingletonFunction;\n\n  constructor(scope: Construct, id: string, props: ECRDeploymentProps) {\n    super(scope, id);\n    const memoryLimit = props.memoryLimit ?? 512;\n    this.handler = new lambda.SingletonFunction(this, 'CustomResourceHandler', {\n      uuid: this.renderSingletonUuid(memoryLimit),\n      code: getCode(props.buildImage ?? 'golang:1'),\n      runtime: lambda.Runtime.PROVIDED_AL2023,\n      handler: 'bootstrap',\n      environment: props.environment,\n      lambdaPurpose: 'Custom::CDKECRDeployment',\n      timeout: Duration.minutes(15),\n      role: props.role,\n      memorySize: memoryLimit,\n      vpc: props.vpc,\n      vpcSubnets: props.vpcSubnets,\n      securityGroups: props.securityGroups,\n    });\n\n    const handlerRole = this.handler.role;\n    if (!handlerRole) { throw new Error('lambda.SingletonFunction should have created a Role'); }\n\n    handlerRole.addToPrincipalPolicy(\n      new iam.PolicyStatement({\n        effect: iam.Effect.ALLOW,\n        actions: [\n          'ecr:GetAuthorizationToken',\n          'ecr:BatchCheckLayerAvailability',\n          'ecr:GetDownloadUrlForLayer',\n          'ecr:GetRepositoryPolicy',\n          'ecr:DescribeRepositories',\n          'ecr:ListImages',\n          'ecr:DescribeImages',\n          'ecr:BatchGetImage',\n          'ecr:ListTagsForResource',\n          'ecr:DescribeImageScanFindings',\n          'ecr:InitiateLayerUpload',\n          'ecr:UploadLayerPart',\n          'ecr:CompleteLayerUpload',\n          'ecr:PutImage',\n        ],\n        resources: ['*'],\n      }));\n    handlerRole.addToPrincipalPolicy(new iam.PolicyStatement({\n      effect: iam.Effect.ALLOW,\n      actions: [\n        's3:GetObject',\n      ],\n      resources: ['*'],\n    }));\n\n    new CustomResource(this, 'CustomResource', {\n      serviceToken: this.handler.functionArn,\n      resourceType: 'Custom::CDKBucketDeployment',\n      properties: {\n        SrcImage: props.src.uri,\n        SrcCreds: props.src.creds,\n        DestImage: props.dest.uri,\n        DestCreds: props.dest.creds,\n      },\n    });\n  }\n\n  public addToPrincipalPolicy(statement: PolicyStatement): AddToPrincipalPolicyResult {\n    const handlerRole = this.handler.role;\n    if (!handlerRole) { throw new Error('lambda.SingletonFunction should have created a Role'); }\n\n    return handlerRole.addToPrincipalPolicy(statement);\n  }\n\n  private renderSingletonUuid(memoryLimit?: number) {\n    let uuid = 'bd07c930-edb9-4112-a20f-03f096f53666';\n\n    // if user specify a custom memory limit, define another singleton handler\n    // with this configuration. otherwise, it won't be possible to use multiple\n    // configurations since we have a singleton.\n    if (memoryLimit) {\n      if (Token.isUnresolved(memoryLimit)) {\n        throw new Error('Can\\'t use tokens when specifying \"memoryLimit\" since we use it to identify the singleton custom resource handler');\n      }\n\n      uuid += `-${memoryLimit.toString()}MiB`;\n    }\n\n    return uuid;\n  }\n}\n"]}
@@ -8,7 +8,7 @@ This package contains type definitions for node (https://nodejs.org/).
8
8
  Files were exported from https://github.com/DefinitelyTyped/DefinitelyTyped/tree/master/types/node.
9
9
 
10
10
  ### Additional Details
11
- * Last updated: Thu, 11 Jan 2024 05:35:20 GMT
11
+ * Last updated: Tue, 16 Jan 2024 09:07:05 GMT
12
12
  * Dependencies: [undici-types](https://npmjs.com/package/undici-types)
13
13
 
14
14
  # Credits
@@ -100,6 +100,8 @@ declare module "crypto" {
100
100
  const OPENSSL_VERSION_NUMBER: number;
101
101
  /** Applies multiple bug workarounds within OpenSSL. See https://www.openssl.org/docs/man1.0.2/ssl/SSL_CTX_set_options.html for detail. */
102
102
  const SSL_OP_ALL: number;
103
+ /** Instructs OpenSSL to allow a non-[EC]DHE-based key exchange mode for TLS v1.3 */
104
+ const SSL_OP_ALLOW_NO_DHE_KEX: number;
103
105
  /** Allows legacy insecure renegotiation between OpenSSL and unpatched clients or servers. See https://www.openssl.org/docs/man1.0.2/ssl/SSL_CTX_set_options.html. */
104
106
  const SSL_OP_ALLOW_UNSAFE_LEGACY_RENEGOTIATION: number;
105
107
  /** Attempts to use the server's preferences instead of the client's when selecting a cipher. See https://www.openssl.org/docs/man1.0.2/ssl/SSL_CTX_set_options.html. */
@@ -116,15 +118,29 @@ declare module "crypto" {
116
118
  const SSL_OP_LEGACY_SERVER_CONNECT: number;
117
119
  /** Instructs OpenSSL to disable support for SSL/TLS compression. */
118
120
  const SSL_OP_NO_COMPRESSION: number;
121
+ /** Instructs OpenSSL to disable encrypt-then-MAC. */
122
+ const SSL_OP_NO_ENCRYPT_THEN_MAC: number;
119
123
  const SSL_OP_NO_QUERY_MTU: number;
124
+ /** Instructs OpenSSL to disable renegotiation. */
125
+ const SSL_OP_NO_RENEGOTIATION: number;
120
126
  /** Instructs OpenSSL to always start a new session when performing renegotiation. */
121
127
  const SSL_OP_NO_SESSION_RESUMPTION_ON_RENEGOTIATION: number;
128
+ /** Instructs OpenSSL to turn off SSL v2 */
122
129
  const SSL_OP_NO_SSLv2: number;
130
+ /** Instructs OpenSSL to turn off SSL v3 */
123
131
  const SSL_OP_NO_SSLv3: number;
132
+ /** Instructs OpenSSL to disable use of RFC4507bis tickets. */
124
133
  const SSL_OP_NO_TICKET: number;
134
+ /** Instructs OpenSSL to turn off TLS v1 */
125
135
  const SSL_OP_NO_TLSv1: number;
136
+ /** Instructs OpenSSL to turn off TLS v1.1 */
126
137
  const SSL_OP_NO_TLSv1_1: number;
138
+ /** Instructs OpenSSL to turn off TLS v1.2 */
127
139
  const SSL_OP_NO_TLSv1_2: number;
140
+ /** Instructs OpenSSL to turn off TLS v1.3 */
141
+ const SSL_OP_NO_TLSv1_3: number;
142
+ /** Instructs OpenSSL server to prioritize ChaCha20-Poly1305 when the client does. This option has no effect if `SSL_OP_CIPHER_SERVER_PREFERENCE` is not enabled. */
143
+ const SSL_OP_PRIORITIZE_CHACHA: number;
128
144
  /** Instructs OpenSSL to disable version rollback attack detection. */
129
145
  const SSL_OP_TLS_ROLLBACK_BUG: number;
130
146
  const ENGINE_METHOD_RSA: number;
@@ -363,7 +379,7 @@ declare module "crypto" {
363
379
  * @since v13.1.0
364
380
  * @param options `stream.transform` options
365
381
  */
366
- copy(options?: stream.TransformOptions): Hash;
382
+ copy(options?: HashOptions): Hash;
367
383
  /**
368
384
  * Updates the hash content with the given `data`, the encoding of which
369
385
  * is given in `inputEncoding`.
@@ -280,13 +280,13 @@ declare module "module" {
280
280
  * The directory name of the current module. This is the same as the `path.dirname()` of the `import.meta.filename`.
281
281
  * **Caveat:** only present on `file:` modules.
282
282
  */
283
- dirname?: string;
283
+ dirname: string;
284
284
  /**
285
285
  * The full absolute path and filename of the current module, with symlinks resolved.
286
286
  * This is the same as the `url.fileURLToPath()` of the `import.meta.url`.
287
287
  * **Caveat:** only local modules support this property. Modules not using the `file:` protocol will not provide it.
288
288
  */
289
- filename?: string;
289
+ filename: string;
290
290
  /**
291
291
  * The absolute `file:` URL of the module.
292
292
  */
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@types/node",
3
- "version": "20.11.0",
3
+ "version": "20.11.4",
4
4
  "description": "TypeScript definitions for node",
5
5
  "homepage": "https://github.com/DefinitelyTyped/DefinitelyTyped/tree/master/types/node",
6
6
  "license": "MIT",
@@ -224,7 +224,7 @@
224
224
  "dependencies": {
225
225
  "undici-types": "~5.26.4"
226
226
  },
227
- "typesPublisherContentHash": "ca77e7986f304692dfe04a1ec38a5dbebe32e569398b09ae4d01fd359a652186",
227
+ "typesPublisherContentHash": "0bdb6c09ff6e5c7ea9efdc866ce3750191f1ee5b29fe8e02af32eb863e910dd9",
228
228
  "typeScriptVersion": "4.6",
229
229
  "nonNpm": true
230
230
  }
@@ -1316,6 +1316,23 @@ declare module "process" {
1316
1316
  */
1317
1317
  uptime(): number;
1318
1318
  hrtime: HRTime;
1319
+ /**
1320
+ * If the Node.js process was spawned with an IPC channel, the process.channel property is a reference to the IPC channel.
1321
+ * If no IPC channel exists, this property is undefined.
1322
+ * @since v7.1.0
1323
+ */
1324
+ channel?: {
1325
+ /**
1326
+ * This method makes the IPC channel keep the event loop of the process running if .unref() has been called before.
1327
+ * @since v7.1.0
1328
+ */
1329
+ ref(): void;
1330
+ /**
1331
+ * This method makes the IPC channel not keep the event loop of the process running, and lets it finish even while the channel is open.
1332
+ * @since v7.1.0
1333
+ */
1334
+ unref(): void;
1335
+ };
1319
1336
  /**
1320
1337
  * If Node.js is spawned with an IPC channel, the `process.send()` method can be
1321
1338
  * used to send messages to the parent process. Messages will be received as a `'message'` event on the parent's `ChildProcess` object.
@@ -100,6 +100,8 @@ declare module "crypto" {
100
100
  const OPENSSL_VERSION_NUMBER: number;
101
101
  /** Applies multiple bug workarounds within OpenSSL. See https://www.openssl.org/docs/man1.0.2/ssl/SSL_CTX_set_options.html for detail. */
102
102
  const SSL_OP_ALL: number;
103
+ /** Instructs OpenSSL to allow a non-[EC]DHE-based key exchange mode for TLS v1.3 */
104
+ const SSL_OP_ALLOW_NO_DHE_KEX: number;
103
105
  /** Allows legacy insecure renegotiation between OpenSSL and unpatched clients or servers. See https://www.openssl.org/docs/man1.0.2/ssl/SSL_CTX_set_options.html. */
104
106
  const SSL_OP_ALLOW_UNSAFE_LEGACY_RENEGOTIATION: number;
105
107
  /** Attempts to use the server's preferences instead of the client's when selecting a cipher. See https://www.openssl.org/docs/man1.0.2/ssl/SSL_CTX_set_options.html. */
@@ -116,15 +118,29 @@ declare module "crypto" {
116
118
  const SSL_OP_LEGACY_SERVER_CONNECT: number;
117
119
  /** Instructs OpenSSL to disable support for SSL/TLS compression. */
118
120
  const SSL_OP_NO_COMPRESSION: number;
121
+ /** Instructs OpenSSL to disable encrypt-then-MAC. */
122
+ const SSL_OP_NO_ENCRYPT_THEN_MAC: number;
119
123
  const SSL_OP_NO_QUERY_MTU: number;
124
+ /** Instructs OpenSSL to disable renegotiation. */
125
+ const SSL_OP_NO_RENEGOTIATION: number;
120
126
  /** Instructs OpenSSL to always start a new session when performing renegotiation. */
121
127
  const SSL_OP_NO_SESSION_RESUMPTION_ON_RENEGOTIATION: number;
128
+ /** Instructs OpenSSL to turn off SSL v2 */
122
129
  const SSL_OP_NO_SSLv2: number;
130
+ /** Instructs OpenSSL to turn off SSL v3 */
123
131
  const SSL_OP_NO_SSLv3: number;
132
+ /** Instructs OpenSSL to disable use of RFC4507bis tickets. */
124
133
  const SSL_OP_NO_TICKET: number;
134
+ /** Instructs OpenSSL to turn off TLS v1 */
125
135
  const SSL_OP_NO_TLSv1: number;
136
+ /** Instructs OpenSSL to turn off TLS v1.1 */
126
137
  const SSL_OP_NO_TLSv1_1: number;
138
+ /** Instructs OpenSSL to turn off TLS v1.2 */
127
139
  const SSL_OP_NO_TLSv1_2: number;
140
+ /** Instructs OpenSSL to turn off TLS v1.3 */
141
+ const SSL_OP_NO_TLSv1_3: number;
142
+ /** Instructs OpenSSL server to prioritize ChaCha20-Poly1305 when the client does. This option has no effect if `SSL_OP_CIPHER_SERVER_PREFERENCE` is not enabled. */
143
+ const SSL_OP_PRIORITIZE_CHACHA: number;
128
144
  /** Instructs OpenSSL to disable version rollback attack detection. */
129
145
  const SSL_OP_TLS_ROLLBACK_BUG: number;
130
146
  const ENGINE_METHOD_RSA: number;
@@ -363,7 +379,7 @@ declare module "crypto" {
363
379
  * @since v13.1.0
364
380
  * @param options `stream.transform` options
365
381
  */
366
- copy(options?: stream.TransformOptions): Hash;
382
+ copy(options?: HashOptions): Hash;
367
383
  /**
368
384
  * Updates the hash content with the given `data`, the encoding of which
369
385
  * is given in `inputEncoding`.
@@ -280,13 +280,13 @@ declare module "module" {
280
280
  * The directory name of the current module. This is the same as the `path.dirname()` of the `import.meta.filename`.
281
281
  * **Caveat:** only present on `file:` modules.
282
282
  */
283
- dirname?: string;
283
+ dirname: string;
284
284
  /**
285
285
  * The full absolute path and filename of the current module, with symlinks resolved.
286
286
  * This is the same as the `url.fileURLToPath()` of the `import.meta.url`.
287
287
  * **Caveat:** only local modules support this property. Modules not using the `file:` protocol will not provide it.
288
288
  */
289
- filename?: string;
289
+ filename: string;
290
290
  /**
291
291
  * The absolute `file:` URL of the module.
292
292
  */
@@ -1316,6 +1316,23 @@ declare module "process" {
1316
1316
  */
1317
1317
  uptime(): number;
1318
1318
  hrtime: HRTime;
1319
+ /**
1320
+ * If the Node.js process was spawned with an IPC channel, the process.channel property is a reference to the IPC channel.
1321
+ * If no IPC channel exists, this property is undefined.
1322
+ * @since v7.1.0
1323
+ */
1324
+ channel?: {
1325
+ /**
1326
+ * This method makes the IPC channel keep the event loop of the process running if .unref() has been called before.
1327
+ * @since v7.1.0
1328
+ */
1329
+ ref(): void;
1330
+ /**
1331
+ * This method makes the IPC channel not keep the event loop of the process running, and lets it finish even while the channel is open.
1332
+ * @since v7.1.0
1333
+ */
1334
+ unref(): void;
1335
+ };
1319
1336
  /**
1320
1337
  * If Node.js is spawned with an IPC channel, the `process.send()` method can be
1321
1338
  * used to send messages to the parent process. Messages will be received as a `'message'` event on the parent's `ChildProcess` object.
@@ -8,7 +8,7 @@ This package contains type definitions for node (https://nodejs.org/).
8
8
  Files were exported from https://github.com/DefinitelyTyped/DefinitelyTyped/tree/master/types/node.
9
9
 
10
10
  ### Additional Details
11
- * Last updated: Thu, 11 Jan 2024 05:35:20 GMT
11
+ * Last updated: Tue, 16 Jan 2024 09:07:05 GMT
12
12
  * Dependencies: [undici-types](https://npmjs.com/package/undici-types)
13
13
 
14
14
  # Credits
@@ -100,6 +100,8 @@ declare module "crypto" {
100
100
  const OPENSSL_VERSION_NUMBER: number;
101
101
  /** Applies multiple bug workarounds within OpenSSL. See https://www.openssl.org/docs/man1.0.2/ssl/SSL_CTX_set_options.html for detail. */
102
102
  const SSL_OP_ALL: number;
103
+ /** Instructs OpenSSL to allow a non-[EC]DHE-based key exchange mode for TLS v1.3 */
104
+ const SSL_OP_ALLOW_NO_DHE_KEX: number;
103
105
  /** Allows legacy insecure renegotiation between OpenSSL and unpatched clients or servers. See https://www.openssl.org/docs/man1.0.2/ssl/SSL_CTX_set_options.html. */
104
106
  const SSL_OP_ALLOW_UNSAFE_LEGACY_RENEGOTIATION: number;
105
107
  /** Attempts to use the server's preferences instead of the client's when selecting a cipher. See https://www.openssl.org/docs/man1.0.2/ssl/SSL_CTX_set_options.html. */
@@ -116,15 +118,29 @@ declare module "crypto" {
116
118
  const SSL_OP_LEGACY_SERVER_CONNECT: number;
117
119
  /** Instructs OpenSSL to disable support for SSL/TLS compression. */
118
120
  const SSL_OP_NO_COMPRESSION: number;
121
+ /** Instructs OpenSSL to disable encrypt-then-MAC. */
122
+ const SSL_OP_NO_ENCRYPT_THEN_MAC: number;
119
123
  const SSL_OP_NO_QUERY_MTU: number;
124
+ /** Instructs OpenSSL to disable renegotiation. */
125
+ const SSL_OP_NO_RENEGOTIATION: number;
120
126
  /** Instructs OpenSSL to always start a new session when performing renegotiation. */
121
127
  const SSL_OP_NO_SESSION_RESUMPTION_ON_RENEGOTIATION: number;
128
+ /** Instructs OpenSSL to turn off SSL v2 */
122
129
  const SSL_OP_NO_SSLv2: number;
130
+ /** Instructs OpenSSL to turn off SSL v3 */
123
131
  const SSL_OP_NO_SSLv3: number;
132
+ /** Instructs OpenSSL to disable use of RFC4507bis tickets. */
124
133
  const SSL_OP_NO_TICKET: number;
134
+ /** Instructs OpenSSL to turn off TLS v1 */
125
135
  const SSL_OP_NO_TLSv1: number;
136
+ /** Instructs OpenSSL to turn off TLS v1.1 */
126
137
  const SSL_OP_NO_TLSv1_1: number;
138
+ /** Instructs OpenSSL to turn off TLS v1.2 */
127
139
  const SSL_OP_NO_TLSv1_2: number;
140
+ /** Instructs OpenSSL to turn off TLS v1.3 */
141
+ const SSL_OP_NO_TLSv1_3: number;
142
+ /** Instructs OpenSSL server to prioritize ChaCha20-Poly1305 when the client does. This option has no effect if `SSL_OP_CIPHER_SERVER_PREFERENCE` is not enabled. */
143
+ const SSL_OP_PRIORITIZE_CHACHA: number;
128
144
  /** Instructs OpenSSL to disable version rollback attack detection. */
129
145
  const SSL_OP_TLS_ROLLBACK_BUG: number;
130
146
  const ENGINE_METHOD_RSA: number;
@@ -363,7 +379,7 @@ declare module "crypto" {
363
379
  * @since v13.1.0
364
380
  * @param options `stream.transform` options
365
381
  */
366
- copy(options?: stream.TransformOptions): Hash;
382
+ copy(options?: HashOptions): Hash;
367
383
  /**
368
384
  * Updates the hash content with the given `data`, the encoding of which
369
385
  * is given in `inputEncoding`.
@@ -280,13 +280,13 @@ declare module "module" {
280
280
  * The directory name of the current module. This is the same as the `path.dirname()` of the `import.meta.filename`.
281
281
  * **Caveat:** only present on `file:` modules.
282
282
  */
283
- dirname?: string;
283
+ dirname: string;
284
284
  /**
285
285
  * The full absolute path and filename of the current module, with symlinks resolved.
286
286
  * This is the same as the `url.fileURLToPath()` of the `import.meta.url`.
287
287
  * **Caveat:** only local modules support this property. Modules not using the `file:` protocol will not provide it.
288
288
  */
289
- filename?: string;
289
+ filename: string;
290
290
  /**
291
291
  * The absolute `file:` URL of the module.
292
292
  */
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@types/node",
3
- "version": "20.11.0",
3
+ "version": "20.11.4",
4
4
  "description": "TypeScript definitions for node",
5
5
  "homepage": "https://github.com/DefinitelyTyped/DefinitelyTyped/tree/master/types/node",
6
6
  "license": "MIT",
@@ -224,7 +224,7 @@
224
224
  "dependencies": {
225
225
  "undici-types": "~5.26.4"
226
226
  },
227
- "typesPublisherContentHash": "ca77e7986f304692dfe04a1ec38a5dbebe32e569398b09ae4d01fd359a652186",
227
+ "typesPublisherContentHash": "0bdb6c09ff6e5c7ea9efdc866ce3750191f1ee5b29fe8e02af32eb863e910dd9",
228
228
  "typeScriptVersion": "4.6",
229
229
  "nonNpm": true
230
230
  }
@@ -1316,6 +1316,23 @@ declare module "process" {
1316
1316
  */
1317
1317
  uptime(): number;
1318
1318
  hrtime: HRTime;
1319
+ /**
1320
+ * If the Node.js process was spawned with an IPC channel, the process.channel property is a reference to the IPC channel.
1321
+ * If no IPC channel exists, this property is undefined.
1322
+ * @since v7.1.0
1323
+ */
1324
+ channel?: {
1325
+ /**
1326
+ * This method makes the IPC channel keep the event loop of the process running if .unref() has been called before.
1327
+ * @since v7.1.0
1328
+ */
1329
+ ref(): void;
1330
+ /**
1331
+ * This method makes the IPC channel not keep the event loop of the process running, and lets it finish even while the channel is open.
1332
+ * @since v7.1.0
1333
+ */
1334
+ unref(): void;
1335
+ };
1319
1336
  /**
1320
1337
  * If Node.js is spawned with an IPC channel, the `process.send()` method can be
1321
1338
  * used to send messages to the parent process. Messages will be received as a `'message'` event on the parent's `ChildProcess` object.
@@ -100,6 +100,8 @@ declare module "crypto" {
100
100
  const OPENSSL_VERSION_NUMBER: number;
101
101
  /** Applies multiple bug workarounds within OpenSSL. See https://www.openssl.org/docs/man1.0.2/ssl/SSL_CTX_set_options.html for detail. */
102
102
  const SSL_OP_ALL: number;
103
+ /** Instructs OpenSSL to allow a non-[EC]DHE-based key exchange mode for TLS v1.3 */
104
+ const SSL_OP_ALLOW_NO_DHE_KEX: number;
103
105
  /** Allows legacy insecure renegotiation between OpenSSL and unpatched clients or servers. See https://www.openssl.org/docs/man1.0.2/ssl/SSL_CTX_set_options.html. */
104
106
  const SSL_OP_ALLOW_UNSAFE_LEGACY_RENEGOTIATION: number;
105
107
  /** Attempts to use the server's preferences instead of the client's when selecting a cipher. See https://www.openssl.org/docs/man1.0.2/ssl/SSL_CTX_set_options.html. */
@@ -116,15 +118,29 @@ declare module "crypto" {
116
118
  const SSL_OP_LEGACY_SERVER_CONNECT: number;
117
119
  /** Instructs OpenSSL to disable support for SSL/TLS compression. */
118
120
  const SSL_OP_NO_COMPRESSION: number;
121
+ /** Instructs OpenSSL to disable encrypt-then-MAC. */
122
+ const SSL_OP_NO_ENCRYPT_THEN_MAC: number;
119
123
  const SSL_OP_NO_QUERY_MTU: number;
124
+ /** Instructs OpenSSL to disable renegotiation. */
125
+ const SSL_OP_NO_RENEGOTIATION: number;
120
126
  /** Instructs OpenSSL to always start a new session when performing renegotiation. */
121
127
  const SSL_OP_NO_SESSION_RESUMPTION_ON_RENEGOTIATION: number;
128
+ /** Instructs OpenSSL to turn off SSL v2 */
122
129
  const SSL_OP_NO_SSLv2: number;
130
+ /** Instructs OpenSSL to turn off SSL v3 */
123
131
  const SSL_OP_NO_SSLv3: number;
132
+ /** Instructs OpenSSL to disable use of RFC4507bis tickets. */
124
133
  const SSL_OP_NO_TICKET: number;
134
+ /** Instructs OpenSSL to turn off TLS v1 */
125
135
  const SSL_OP_NO_TLSv1: number;
136
+ /** Instructs OpenSSL to turn off TLS v1.1 */
126
137
  const SSL_OP_NO_TLSv1_1: number;
138
+ /** Instructs OpenSSL to turn off TLS v1.2 */
127
139
  const SSL_OP_NO_TLSv1_2: number;
140
+ /** Instructs OpenSSL to turn off TLS v1.3 */
141
+ const SSL_OP_NO_TLSv1_3: number;
142
+ /** Instructs OpenSSL server to prioritize ChaCha20-Poly1305 when the client does. This option has no effect if `SSL_OP_CIPHER_SERVER_PREFERENCE` is not enabled. */
143
+ const SSL_OP_PRIORITIZE_CHACHA: number;
128
144
  /** Instructs OpenSSL to disable version rollback attack detection. */
129
145
  const SSL_OP_TLS_ROLLBACK_BUG: number;
130
146
  const ENGINE_METHOD_RSA: number;
@@ -363,7 +379,7 @@ declare module "crypto" {
363
379
  * @since v13.1.0
364
380
  * @param options `stream.transform` options
365
381
  */
366
- copy(options?: stream.TransformOptions): Hash;
382
+ copy(options?: HashOptions): Hash;
367
383
  /**
368
384
  * Updates the hash content with the given `data`, the encoding of which
369
385
  * is given in `inputEncoding`.
@@ -280,13 +280,13 @@ declare module "module" {
280
280
  * The directory name of the current module. This is the same as the `path.dirname()` of the `import.meta.filename`.
281
281
  * **Caveat:** only present on `file:` modules.
282
282
  */
283
- dirname?: string;
283
+ dirname: string;
284
284
  /**
285
285
  * The full absolute path and filename of the current module, with symlinks resolved.
286
286
  * This is the same as the `url.fileURLToPath()` of the `import.meta.url`.
287
287
  * **Caveat:** only local modules support this property. Modules not using the `file:` protocol will not provide it.
288
288
  */
289
- filename?: string;
289
+ filename: string;
290
290
  /**
291
291
  * The absolute `file:` URL of the module.
292
292
  */
@@ -1316,6 +1316,23 @@ declare module "process" {
1316
1316
  */
1317
1317
  uptime(): number;
1318
1318
  hrtime: HRTime;
1319
+ /**
1320
+ * If the Node.js process was spawned with an IPC channel, the process.channel property is a reference to the IPC channel.
1321
+ * If no IPC channel exists, this property is undefined.
1322
+ * @since v7.1.0
1323
+ */
1324
+ channel?: {
1325
+ /**
1326
+ * This method makes the IPC channel keep the event loop of the process running if .unref() has been called before.
1327
+ * @since v7.1.0
1328
+ */
1329
+ ref(): void;
1330
+ /**
1331
+ * This method makes the IPC channel not keep the event loop of the process running, and lets it finish even while the channel is open.
1332
+ * @since v7.1.0
1333
+ */
1334
+ unref(): void;
1335
+ };
1319
1336
  /**
1320
1337
  * If Node.js is spawned with an IPC channel, the `process.send()` method can be
1321
1338
  * used to send messages to the parent process. Messages will be received as a `'message'` event on the parent's `ChildProcess` object.
@@ -8,7 +8,7 @@ This package contains type definitions for node (https://nodejs.org/).
8
8
  Files were exported from https://github.com/DefinitelyTyped/DefinitelyTyped/tree/master/types/node.
9
9
 
10
10
  ### Additional Details
11
- * Last updated: Thu, 11 Jan 2024 05:35:20 GMT
11
+ * Last updated: Tue, 16 Jan 2024 09:07:05 GMT
12
12
  * Dependencies: [undici-types](https://npmjs.com/package/undici-types)
13
13
 
14
14
  # Credits
@@ -100,6 +100,8 @@ declare module "crypto" {
100
100
  const OPENSSL_VERSION_NUMBER: number;
101
101
  /** Applies multiple bug workarounds within OpenSSL. See https://www.openssl.org/docs/man1.0.2/ssl/SSL_CTX_set_options.html for detail. */
102
102
  const SSL_OP_ALL: number;
103
+ /** Instructs OpenSSL to allow a non-[EC]DHE-based key exchange mode for TLS v1.3 */
104
+ const SSL_OP_ALLOW_NO_DHE_KEX: number;
103
105
  /** Allows legacy insecure renegotiation between OpenSSL and unpatched clients or servers. See https://www.openssl.org/docs/man1.0.2/ssl/SSL_CTX_set_options.html. */
104
106
  const SSL_OP_ALLOW_UNSAFE_LEGACY_RENEGOTIATION: number;
105
107
  /** Attempts to use the server's preferences instead of the client's when selecting a cipher. See https://www.openssl.org/docs/man1.0.2/ssl/SSL_CTX_set_options.html. */
@@ -116,15 +118,29 @@ declare module "crypto" {
116
118
  const SSL_OP_LEGACY_SERVER_CONNECT: number;
117
119
  /** Instructs OpenSSL to disable support for SSL/TLS compression. */
118
120
  const SSL_OP_NO_COMPRESSION: number;
121
+ /** Instructs OpenSSL to disable encrypt-then-MAC. */
122
+ const SSL_OP_NO_ENCRYPT_THEN_MAC: number;
119
123
  const SSL_OP_NO_QUERY_MTU: number;
124
+ /** Instructs OpenSSL to disable renegotiation. */
125
+ const SSL_OP_NO_RENEGOTIATION: number;
120
126
  /** Instructs OpenSSL to always start a new session when performing renegotiation. */
121
127
  const SSL_OP_NO_SESSION_RESUMPTION_ON_RENEGOTIATION: number;
128
+ /** Instructs OpenSSL to turn off SSL v2 */
122
129
  const SSL_OP_NO_SSLv2: number;
130
+ /** Instructs OpenSSL to turn off SSL v3 */
123
131
  const SSL_OP_NO_SSLv3: number;
132
+ /** Instructs OpenSSL to disable use of RFC4507bis tickets. */
124
133
  const SSL_OP_NO_TICKET: number;
134
+ /** Instructs OpenSSL to turn off TLS v1 */
125
135
  const SSL_OP_NO_TLSv1: number;
136
+ /** Instructs OpenSSL to turn off TLS v1.1 */
126
137
  const SSL_OP_NO_TLSv1_1: number;
138
+ /** Instructs OpenSSL to turn off TLS v1.2 */
127
139
  const SSL_OP_NO_TLSv1_2: number;
140
+ /** Instructs OpenSSL to turn off TLS v1.3 */
141
+ const SSL_OP_NO_TLSv1_3: number;
142
+ /** Instructs OpenSSL server to prioritize ChaCha20-Poly1305 when the client does. This option has no effect if `SSL_OP_CIPHER_SERVER_PREFERENCE` is not enabled. */
143
+ const SSL_OP_PRIORITIZE_CHACHA: number;
128
144
  /** Instructs OpenSSL to disable version rollback attack detection. */
129
145
  const SSL_OP_TLS_ROLLBACK_BUG: number;
130
146
  const ENGINE_METHOD_RSA: number;
@@ -363,7 +379,7 @@ declare module "crypto" {
363
379
  * @since v13.1.0
364
380
  * @param options `stream.transform` options
365
381
  */
366
- copy(options?: stream.TransformOptions): Hash;
382
+ copy(options?: HashOptions): Hash;
367
383
  /**
368
384
  * Updates the hash content with the given `data`, the encoding of which
369
385
  * is given in `inputEncoding`.
@@ -280,13 +280,13 @@ declare module "module" {
280
280
  * The directory name of the current module. This is the same as the `path.dirname()` of the `import.meta.filename`.
281
281
  * **Caveat:** only present on `file:` modules.
282
282
  */
283
- dirname?: string;
283
+ dirname: string;
284
284
  /**
285
285
  * The full absolute path and filename of the current module, with symlinks resolved.
286
286
  * This is the same as the `url.fileURLToPath()` of the `import.meta.url`.
287
287
  * **Caveat:** only local modules support this property. Modules not using the `file:` protocol will not provide it.
288
288
  */
289
- filename?: string;
289
+ filename: string;
290
290
  /**
291
291
  * The absolute `file:` URL of the module.
292
292
  */
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@types/node",
3
- "version": "20.11.0",
3
+ "version": "20.11.4",
4
4
  "description": "TypeScript definitions for node",
5
5
  "homepage": "https://github.com/DefinitelyTyped/DefinitelyTyped/tree/master/types/node",
6
6
  "license": "MIT",
@@ -224,7 +224,7 @@
224
224
  "dependencies": {
225
225
  "undici-types": "~5.26.4"
226
226
  },
227
- "typesPublisherContentHash": "ca77e7986f304692dfe04a1ec38a5dbebe32e569398b09ae4d01fd359a652186",
227
+ "typesPublisherContentHash": "0bdb6c09ff6e5c7ea9efdc866ce3750191f1ee5b29fe8e02af32eb863e910dd9",
228
228
  "typeScriptVersion": "4.6",
229
229
  "nonNpm": true
230
230
  }
@@ -1316,6 +1316,23 @@ declare module "process" {
1316
1316
  */
1317
1317
  uptime(): number;
1318
1318
  hrtime: HRTime;
1319
+ /**
1320
+ * If the Node.js process was spawned with an IPC channel, the process.channel property is a reference to the IPC channel.
1321
+ * If no IPC channel exists, this property is undefined.
1322
+ * @since v7.1.0
1323
+ */
1324
+ channel?: {
1325
+ /**
1326
+ * This method makes the IPC channel keep the event loop of the process running if .unref() has been called before.
1327
+ * @since v7.1.0
1328
+ */
1329
+ ref(): void;
1330
+ /**
1331
+ * This method makes the IPC channel not keep the event loop of the process running, and lets it finish even while the channel is open.
1332
+ * @since v7.1.0
1333
+ */
1334
+ unref(): void;
1335
+ };
1319
1336
  /**
1320
1337
  * If Node.js is spawned with an IPC channel, the `process.send()` method can be
1321
1338
  * used to send messages to the parent process. Messages will be received as a `'message'` event on the parent's `ChildProcess` object.
@@ -100,6 +100,8 @@ declare module "crypto" {
100
100
  const OPENSSL_VERSION_NUMBER: number;
101
101
  /** Applies multiple bug workarounds within OpenSSL. See https://www.openssl.org/docs/man1.0.2/ssl/SSL_CTX_set_options.html for detail. */
102
102
  const SSL_OP_ALL: number;
103
+ /** Instructs OpenSSL to allow a non-[EC]DHE-based key exchange mode for TLS v1.3 */
104
+ const SSL_OP_ALLOW_NO_DHE_KEX: number;
103
105
  /** Allows legacy insecure renegotiation between OpenSSL and unpatched clients or servers. See https://www.openssl.org/docs/man1.0.2/ssl/SSL_CTX_set_options.html. */
104
106
  const SSL_OP_ALLOW_UNSAFE_LEGACY_RENEGOTIATION: number;
105
107
  /** Attempts to use the server's preferences instead of the client's when selecting a cipher. See https://www.openssl.org/docs/man1.0.2/ssl/SSL_CTX_set_options.html. */
@@ -116,15 +118,29 @@ declare module "crypto" {
116
118
  const SSL_OP_LEGACY_SERVER_CONNECT: number;
117
119
  /** Instructs OpenSSL to disable support for SSL/TLS compression. */
118
120
  const SSL_OP_NO_COMPRESSION: number;
121
+ /** Instructs OpenSSL to disable encrypt-then-MAC. */
122
+ const SSL_OP_NO_ENCRYPT_THEN_MAC: number;
119
123
  const SSL_OP_NO_QUERY_MTU: number;
124
+ /** Instructs OpenSSL to disable renegotiation. */
125
+ const SSL_OP_NO_RENEGOTIATION: number;
120
126
  /** Instructs OpenSSL to always start a new session when performing renegotiation. */
121
127
  const SSL_OP_NO_SESSION_RESUMPTION_ON_RENEGOTIATION: number;
128
+ /** Instructs OpenSSL to turn off SSL v2 */
122
129
  const SSL_OP_NO_SSLv2: number;
130
+ /** Instructs OpenSSL to turn off SSL v3 */
123
131
  const SSL_OP_NO_SSLv3: number;
132
+ /** Instructs OpenSSL to disable use of RFC4507bis tickets. */
124
133
  const SSL_OP_NO_TICKET: number;
134
+ /** Instructs OpenSSL to turn off TLS v1 */
125
135
  const SSL_OP_NO_TLSv1: number;
136
+ /** Instructs OpenSSL to turn off TLS v1.1 */
126
137
  const SSL_OP_NO_TLSv1_1: number;
138
+ /** Instructs OpenSSL to turn off TLS v1.2 */
127
139
  const SSL_OP_NO_TLSv1_2: number;
140
+ /** Instructs OpenSSL to turn off TLS v1.3 */
141
+ const SSL_OP_NO_TLSv1_3: number;
142
+ /** Instructs OpenSSL server to prioritize ChaCha20-Poly1305 when the client does. This option has no effect if `SSL_OP_CIPHER_SERVER_PREFERENCE` is not enabled. */
143
+ const SSL_OP_PRIORITIZE_CHACHA: number;
128
144
  /** Instructs OpenSSL to disable version rollback attack detection. */
129
145
  const SSL_OP_TLS_ROLLBACK_BUG: number;
130
146
  const ENGINE_METHOD_RSA: number;
@@ -363,7 +379,7 @@ declare module "crypto" {
363
379
  * @since v13.1.0
364
380
  * @param options `stream.transform` options
365
381
  */
366
- copy(options?: stream.TransformOptions): Hash;
382
+ copy(options?: HashOptions): Hash;
367
383
  /**
368
384
  * Updates the hash content with the given `data`, the encoding of which
369
385
  * is given in `inputEncoding`.
@@ -280,13 +280,13 @@ declare module "module" {
280
280
  * The directory name of the current module. This is the same as the `path.dirname()` of the `import.meta.filename`.
281
281
  * **Caveat:** only present on `file:` modules.
282
282
  */
283
- dirname?: string;
283
+ dirname: string;
284
284
  /**
285
285
  * The full absolute path and filename of the current module, with symlinks resolved.
286
286
  * This is the same as the `url.fileURLToPath()` of the `import.meta.url`.
287
287
  * **Caveat:** only local modules support this property. Modules not using the `file:` protocol will not provide it.
288
288
  */
289
- filename?: string;
289
+ filename: string;
290
290
  /**
291
291
  * The absolute `file:` URL of the module.
292
292
  */
@@ -1316,6 +1316,23 @@ declare module "process" {
1316
1316
  */
1317
1317
  uptime(): number;
1318
1318
  hrtime: HRTime;
1319
+ /**
1320
+ * If the Node.js process was spawned with an IPC channel, the process.channel property is a reference to the IPC channel.
1321
+ * If no IPC channel exists, this property is undefined.
1322
+ * @since v7.1.0
1323
+ */
1324
+ channel?: {
1325
+ /**
1326
+ * This method makes the IPC channel keep the event loop of the process running if .unref() has been called before.
1327
+ * @since v7.1.0
1328
+ */
1329
+ ref(): void;
1330
+ /**
1331
+ * This method makes the IPC channel not keep the event loop of the process running, and lets it finish even while the channel is open.
1332
+ * @since v7.1.0
1333
+ */
1334
+ unref(): void;
1335
+ };
1319
1336
  /**
1320
1337
  * If Node.js is spawned with an IPC channel, the `process.send()` method can be
1321
1338
  * used to send messages to the parent process. Messages will be received as a `'message'` event on the parent's `ChildProcess` object.
package/package.json CHANGED
@@ -90,7 +90,7 @@
90
90
  ],
91
91
  "main": "lib/index.js",
92
92
  "license": "Apache-2.0",
93
- "version": "3.0.10",
93
+ "version": "3.0.12",
94
94
  "jest": {
95
95
  "testMatch": [
96
96
  "<rootDir>/src/**/__tests__/**/*.ts?(x)",