pusher-js 8.4.2 → 8.4.3
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/package.json
CHANGED
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "pusher-js",
|
|
3
|
-
"version": "8.4.
|
|
3
|
+
"version": "8.4.3",
|
|
4
4
|
"description": "Pusher Channels JavaScript library for browsers, React Native, NodeJS and web workers",
|
|
5
5
|
"main": "dist/node/pusher.js",
|
|
6
6
|
"browser": "dist/web/pusher.js",
|
|
@@ -68,12 +68,18 @@
|
|
|
68
68
|
"tweetnacl": "^1.0.3"
|
|
69
69
|
},
|
|
70
70
|
"overrides": {
|
|
71
|
+
"body-parser": "^1.20.3",
|
|
72
|
+
"browserstack-local": "^1.5.12",
|
|
71
73
|
"cipher-base": "^1.0.6",
|
|
72
74
|
"compression": "^1.8.1",
|
|
75
|
+
"express": "^4.22.1",
|
|
73
76
|
"js-yaml": "^3.14.2",
|
|
77
|
+
"lodash": "^4.17.23",
|
|
78
|
+
"minimatch": "^3.1.5",
|
|
74
79
|
"node-forge": "^1.3.2",
|
|
75
80
|
"on-headers": "^1.1.0",
|
|
76
81
|
"pbkdf2": "^3.1.5",
|
|
82
|
+
"qs": "^6.14.0",
|
|
77
83
|
"sha.js": "^2.4.12",
|
|
78
84
|
"tmp": "^0.2.4"
|
|
79
85
|
}
|
|
@@ -1,25 +1,25 @@
|
|
|
1
1
|
var config = {
|
|
2
|
-
|
|
3
|
-
startTunnel: true,
|
|
4
|
-
timeout: 1800,
|
|
5
|
-
},
|
|
6
|
-
browsers: ['ChromeHeadless', 'FirefoxHeadless'],
|
|
2
|
+
browsers: ['ChromeHeadlessNoHttpsUpgrade', 'FirefoxHeadlessNoHttpsUpgrade'],
|
|
7
3
|
customLaunchers: {
|
|
8
|
-
|
|
9
|
-
|
|
10
|
-
|
|
11
|
-
|
|
12
|
-
|
|
13
|
-
|
|
4
|
+
// When forceTLS=true XHR tests run first, browsers store an HSTS entry for
|
|
5
|
+
// sockjs-*.pusher.com (Pusher servers send Strict-Transport-Security headers).
|
|
6
|
+
// Subsequent forceTLS=false XHR tests request HTTP URLs which are then
|
|
7
|
+
// silently upgraded to HTTPS via HSTS. The resulting CORS preflight for the
|
|
8
|
+
// upgraded URL fails, blocking the connection. Disabling web security (Chrome)
|
|
9
|
+
// or HTTPS-only mode (Firefox) bypasses this so the HSTS-upgraded HTTPS
|
|
10
|
+
// response is returned to the Pusher client and the connection can establish.
|
|
11
|
+
ChromeHeadlessNoHttpsUpgrade: {
|
|
12
|
+
base: 'ChromeHeadless',
|
|
13
|
+
flags: ['--disable-web-security']
|
|
14
|
+
},
|
|
15
|
+
FirefoxHeadlessNoHttpsUpgrade: {
|
|
16
|
+
base: 'FirefoxHeadless',
|
|
17
|
+
prefs: {
|
|
18
|
+
'dom.security.https_only_mode': false,
|
|
19
|
+
'network.stricttransportsecurity.preloadlist': false
|
|
20
|
+
}
|
|
14
21
|
}
|
|
15
22
|
}
|
|
16
23
|
};
|
|
17
|
-
if (process.env.CI === 'full' && browserStackCredsAvailable()) {
|
|
18
|
-
config.browsers.push('bs_safari_12');
|
|
19
|
-
}
|
|
20
|
-
|
|
21
|
-
function browserStackCredsAvailable() {
|
|
22
|
-
return process.env.BROWSER_STACK_USERNAME && process.env.BROWSER_STACK_ACCESS_KEY
|
|
23
|
-
}
|
|
24
24
|
|
|
25
25
|
module.exports = config;
|