pusher-js 8.4.2 → 8.4.3

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -9,7 +9,7 @@
9
9
  "author": "",
10
10
  "license": "ISC",
11
11
  "dependencies": {
12
- "express": "^4.18.2",
12
+ "express": "^4.22.1",
13
13
  "pusher": "^5.1.1-beta"
14
14
  }
15
15
  }
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "pusher-js",
3
- "version": "8.4.2",
3
+ "version": "8.4.3",
4
4
  "description": "Pusher Channels JavaScript library for browsers, React Native, NodeJS and web workers",
5
5
  "main": "dist/node/pusher.js",
6
6
  "browser": "dist/web/pusher.js",
@@ -68,12 +68,18 @@
68
68
  "tweetnacl": "^1.0.3"
69
69
  },
70
70
  "overrides": {
71
+ "body-parser": "^1.20.3",
72
+ "browserstack-local": "^1.5.12",
71
73
  "cipher-base": "^1.0.6",
72
74
  "compression": "^1.8.1",
75
+ "express": "^4.22.1",
73
76
  "js-yaml": "^3.14.2",
77
+ "lodash": "^4.17.23",
78
+ "minimatch": "^3.1.5",
74
79
  "node-forge": "^1.3.2",
75
80
  "on-headers": "^1.1.0",
76
81
  "pbkdf2": "^3.1.5",
82
+ "qs": "^6.14.0",
77
83
  "sha.js": "^2.4.12",
78
84
  "tmp": "^0.2.4"
79
85
  }
@@ -1,25 +1,25 @@
1
1
  var config = {
2
- browserStack: {
3
- startTunnel: true,
4
- timeout: 1800,
5
- },
6
- browsers: ['ChromeHeadless', 'FirefoxHeadless'],
2
+ browsers: ['ChromeHeadlessNoHttpsUpgrade', 'FirefoxHeadlessNoHttpsUpgrade'],
7
3
  customLaunchers: {
8
- bs_safari_12: {
9
- base: 'BrowserStack',
10
- os_version: "Mojave",
11
- browser: "Safari",
12
- browser_version: "12",
13
- os: "OS X"
4
+ // When forceTLS=true XHR tests run first, browsers store an HSTS entry for
5
+ // sockjs-*.pusher.com (Pusher servers send Strict-Transport-Security headers).
6
+ // Subsequent forceTLS=false XHR tests request HTTP URLs which are then
7
+ // silently upgraded to HTTPS via HSTS. The resulting CORS preflight for the
8
+ // upgraded URL fails, blocking the connection. Disabling web security (Chrome)
9
+ // or HTTPS-only mode (Firefox) bypasses this so the HSTS-upgraded HTTPS
10
+ // response is returned to the Pusher client and the connection can establish.
11
+ ChromeHeadlessNoHttpsUpgrade: {
12
+ base: 'ChromeHeadless',
13
+ flags: ['--disable-web-security']
14
+ },
15
+ FirefoxHeadlessNoHttpsUpgrade: {
16
+ base: 'FirefoxHeadless',
17
+ prefs: {
18
+ 'dom.security.https_only_mode': false,
19
+ 'network.stricttransportsecurity.preloadlist': false
20
+ }
14
21
  }
15
22
  }
16
23
  };
17
- if (process.env.CI === 'full' && browserStackCredsAvailable()) {
18
- config.browsers.push('bs_safari_12');
19
- }
20
-
21
- function browserStackCredsAvailable() {
22
- return process.env.BROWSER_STACK_USERNAME && process.env.BROWSER_STACK_ACCESS_KEY
23
- }
24
24
 
25
25
  module.exports = config;