Skip to content

Commit f68f675

Browse files
angular-robotjosephperrott
authored andcommitted
build: update all non-major dependencies (#2365)
PR Close #2365
1 parent c30ec68 commit f68f675

File tree

20 files changed

+413
-399
lines changed

20 files changed

+413
-399
lines changed

.github/local-actions/branch-manager/main.js

Lines changed: 29 additions & 28 deletions
Original file line numberDiff line numberDiff line change
@@ -229,6 +229,7 @@ var require_file_command = __commonJS({
229229
};
230230
Object.defineProperty(exports, "__esModule", { value: true });
231231
exports.prepareKeyValueMessage = exports.issueFileCommand = void 0;
232+
var crypto = __importStar(__require("crypto"));
232233
var fs2 = __importStar(__require("fs"));
233234
var os3 = __importStar(__require("os"));
234235
var utils_1 = require_utils();
@@ -3677,11 +3678,11 @@ var require_util2 = __commonJS({
36773678
var assert = __require("assert");
36783679
var { isUint8Array } = __require("util/types");
36793680
var supportedHashes = [];
3680-
var crypto2;
3681+
var crypto;
36813682
try {
3682-
crypto2 = __require("crypto");
3683+
crypto = __require("crypto");
36833684
const possibleRelevantHashes = ["sha256", "sha384", "sha512"];
3684-
supportedHashes = crypto2.getHashes().filter((hash) => possibleRelevantHashes.includes(hash));
3685+
supportedHashes = crypto.getHashes().filter((hash) => possibleRelevantHashes.includes(hash));
36853686
} catch {
36863687
}
36873688
function responseURL(response) {
@@ -3946,7 +3947,7 @@ var require_util2 = __commonJS({
39463947
}
39473948
}
39483949
function bytesMatch(bytes, metadataList) {
3949-
if (crypto2 === void 0) {
3950+
if (crypto === void 0) {
39503951
return true;
39513952
}
39523953
const parsedMetadata = parseMetadata(metadataList);
@@ -3961,7 +3962,7 @@ var require_util2 = __commonJS({
39613962
for (const item of metadata) {
39623963
const algorithm = item.algo;
39633964
const expectedValue = item.hash;
3964-
let actualValue = crypto2.createHash(algorithm).update(bytes).digest("base64");
3965+
let actualValue = crypto.createHash(algorithm).update(bytes).digest("base64");
39653966
if (actualValue[actualValue.length - 1] === "=") {
39663967
if (actualValue[actualValue.length - 2] === "=") {
39673968
actualValue = actualValue.slice(0, -2);
@@ -16098,9 +16099,9 @@ var require_connection = __commonJS({
1609816099
channels.open = diagnosticsChannel.channel("undici:websocket:open");
1609916100
channels.close = diagnosticsChannel.channel("undici:websocket:close");
1610016101
channels.socketError = diagnosticsChannel.channel("undici:websocket:socket_error");
16101-
var crypto2;
16102+
var crypto;
1610216103
try {
16103-
crypto2 = __require("crypto");
16104+
crypto = __require("crypto");
1610416105
} catch {
1610516106
}
1610616107
function establishWebSocketConnection(url, protocols, ws, onEstablish, options) {
@@ -16119,7 +16120,7 @@ var require_connection = __commonJS({
1611916120
const headersList = new Headers(options.headers)[kHeadersList];
1612016121
request2.headersList = headersList;
1612116122
}
16122-
const keyValue = crypto2.randomBytes(16).toString("base64");
16123+
const keyValue = crypto.randomBytes(16).toString("base64");
1612316124
request2.headersList.append("sec-websocket-key", keyValue);
1612416125
request2.headersList.append("sec-websocket-version", "13");
1612516126
for (const protocol of protocols) {
@@ -16149,7 +16150,7 @@ var require_connection = __commonJS({
1614916150
return;
1615016151
}
1615116152
const secWSAccept = response.headersList.get("Sec-WebSocket-Accept");
16152-
const digest = crypto2.createHash("sha1").update(keyValue + uid).digest("base64");
16153+
const digest = crypto.createHash("sha1").update(keyValue + uid).digest("base64");
1615316154
if (secWSAccept !== digest) {
1615416155
failWebsocketConnection(ws, "Incorrect hash received in Sec-WebSocket-Accept header.");
1615516156
return;
@@ -16229,15 +16230,15 @@ var require_frame = __commonJS({
1622916230
""(exports, module) {
1623016231
"use strict";
1623116232
var { maxUnsigned16Bit } = require_constants5();
16232-
var crypto2;
16233+
var crypto;
1623316234
try {
16234-
crypto2 = __require("crypto");
16235+
crypto = __require("crypto");
1623516236
} catch {
1623616237
}
1623716238
var WebsocketFrameSend = class {
1623816239
constructor(data) {
1623916240
this.frameData = data;
16240-
this.maskKey = crypto2.randomBytes(4);
16241+
this.maskKey = crypto.randomBytes(4);
1624116242
}
1624216243
createFrame(opcode) {
1624316244
var _a2;
@@ -31774,7 +31775,7 @@ var require_tmp = __commonJS({
3177431775
""(exports, module) {
3177531776
var fs2 = __require("fs");
3177631777
var path4 = __require("path");
31777-
var crypto2 = __require("crypto");
31778+
var crypto = __require("crypto");
3177831779
var osTmpDir = require_os_tmpdir();
3177931780
var _c = process.binding("constants");
3178031781
var tmpDir = osTmpDir();
@@ -31792,9 +31793,9 @@ var require_tmp = __commonJS({
3179231793
function _randomChars(howMany) {
3179331794
var value = [], rnd = null;
3179431795
try {
31795-
rnd = crypto2.randomBytes(howMany);
31796+
rnd = crypto.randomBytes(howMany);
3179631797
} catch (e) {
31797-
rnd = crypto2.pseudoRandomBytes(howMany);
31798+
rnd = crypto.pseudoRandomBytes(howMany);
3179831799
}
3179931800
for (var i = 0; i < howMany; i++) {
3180031801
value.push(RANDOM_CHARS[rnd[i] % RANDOM_CHARS.length]);
@@ -38279,11 +38280,11 @@ var require_util9 = __commonJS({
3827938280
var { isUint8Array } = __require("node:util/types");
3828038281
var { webidl } = require_webidl2();
3828138282
var supportedHashes = [];
38282-
var crypto2;
38283+
var crypto;
3828338284
try {
38284-
crypto2 = __require("node:crypto");
38285+
crypto = __require("node:crypto");
3828538286
const possibleRelevantHashes = ["sha256", "sha384", "sha512"];
38286-
supportedHashes = crypto2.getHashes().filter((hash) => possibleRelevantHashes.includes(hash));
38287+
supportedHashes = crypto.getHashes().filter((hash) => possibleRelevantHashes.includes(hash));
3828738288
} catch {
3828838289
}
3828938290
function responseURL(response) {
@@ -38543,7 +38544,7 @@ var require_util9 = __commonJS({
3854338544
}
3854438545
}
3854538546
function bytesMatch(bytes, metadataList) {
38546-
if (crypto2 === void 0) {
38547+
if (crypto === void 0) {
3854738548
return true;
3854838549
}
3854938550
const parsedMetadata = parseMetadata(metadataList);
@@ -38558,7 +38559,7 @@ var require_util9 = __commonJS({
3855838559
for (const item of metadata) {
3855938560
const algorithm = item.algo;
3856038561
const expectedValue = item.hash;
38561-
let actualValue = crypto2.createHash(algorithm).update(bytes).digest("base64");
38562+
let actualValue = crypto.createHash(algorithm).update(bytes).digest("base64");
3856238563
if (actualValue[actualValue.length - 1] === "=") {
3856338564
if (actualValue[actualValue.length - 2] === "=") {
3856438565
actualValue = actualValue.slice(0, -2);
@@ -50244,13 +50245,13 @@ var require_frame2 = __commonJS({
5024450245
"use strict";
5024550246
var { maxUnsigned16Bit } = require_constants11();
5024650247
var BUFFER_SIZE = 16386;
50247-
var crypto2;
50248+
var crypto;
5024850249
var buffer = null;
5024950250
var bufIdx = BUFFER_SIZE;
5025050251
try {
50251-
crypto2 = __require("node:crypto");
50252+
crypto = __require("node:crypto");
5025250253
} catch {
50253-
crypto2 = {
50254+
crypto = {
5025450255
randomFillSync: function randomFillSync(buffer2, _offset, _size) {
5025550256
for (let i = 0; i < buffer2.length; ++i) {
5025650257
buffer2[i] = Math.random() * 255 | 0;
@@ -50262,7 +50263,7 @@ var require_frame2 = __commonJS({
5026250263
function generateMask() {
5026350264
if (bufIdx === BUFFER_SIZE) {
5026450265
bufIdx = 0;
50265-
crypto2.randomFillSync(buffer ??= Buffer.allocUnsafe(BUFFER_SIZE), 0, BUFFER_SIZE);
50266+
crypto.randomFillSync(buffer ??= Buffer.allocUnsafe(BUFFER_SIZE), 0, BUFFER_SIZE);
5026650267
}
5026750268
return [buffer[bufIdx++], buffer[bufIdx++], buffer[bufIdx++], buffer[bufIdx++]];
5026850269
}
@@ -50331,9 +50332,9 @@ var require_connection2 = __commonJS({
5033150332
var { Headers, getHeadersList } = require_headers2();
5033250333
var { getDecodeSplit } = require_util9();
5033350334
var { WebsocketFrameSend } = require_frame2();
50334-
var crypto2;
50335+
var crypto;
5033550336
try {
50336-
crypto2 = __require("node:crypto");
50337+
crypto = __require("node:crypto");
5033750338
} catch {
5033850339
}
5033950340
function establishWebSocketConnection(url, protocols, client, ws, onEstablish, options) {
@@ -50353,7 +50354,7 @@ var require_connection2 = __commonJS({
5035350354
const headersList = getHeadersList(new Headers(options.headers));
5035450355
request2.headersList = headersList;
5035550356
}
50356-
const keyValue = crypto2.randomBytes(16).toString("base64");
50357+
const keyValue = crypto.randomBytes(16).toString("base64");
5035750358
request2.headersList.append("sec-websocket-key", keyValue);
5035850359
request2.headersList.append("sec-websocket-version", "13");
5035950360
for (const protocol of protocols) {
@@ -50384,7 +50385,7 @@ var require_connection2 = __commonJS({
5038450385
return;
5038550386
}
5038650387
const secWSAccept = response.headersList.get("Sec-WebSocket-Accept");
50387-
const digest = crypto2.createHash("sha1").update(keyValue + uid).digest("base64");
50388+
const digest = crypto.createHash("sha1").update(keyValue + uid).digest("base64");
5038850389
if (secWSAccept !== digest) {
5038950390
failWebsocketConnection(ws, "Incorrect hash received in Sec-WebSocket-Accept header.");
5039050391
return;

.github/local-actions/changelog/main.js

Lines changed: 29 additions & 28 deletions
Original file line numberDiff line numberDiff line change
@@ -229,6 +229,7 @@ var require_file_command = __commonJS({
229229
};
230230
Object.defineProperty(exports, "__esModule", { value: true });
231231
exports.prepareKeyValueMessage = exports.issueFileCommand = void 0;
232+
var crypto = __importStar(__require("crypto"));
232233
var fs = __importStar(__require("fs"));
233234
var os3 = __importStar(__require("os"));
234235
var utils_1 = require_utils();
@@ -3677,11 +3678,11 @@ var require_util2 = __commonJS({
36773678
var assert = __require("assert");
36783679
var { isUint8Array } = __require("util/types");
36793680
var supportedHashes = [];
3680-
var crypto2;
3681+
var crypto;
36813682
try {
3682-
crypto2 = __require("crypto");
3683+
crypto = __require("crypto");
36833684
const possibleRelevantHashes = ["sha256", "sha384", "sha512"];
3684-
supportedHashes = crypto2.getHashes().filter((hash) => possibleRelevantHashes.includes(hash));
3685+
supportedHashes = crypto.getHashes().filter((hash) => possibleRelevantHashes.includes(hash));
36853686
} catch {
36863687
}
36873688
function responseURL(response) {
@@ -3946,7 +3947,7 @@ var require_util2 = __commonJS({
39463947
}
39473948
}
39483949
function bytesMatch(bytes, metadataList) {
3949-
if (crypto2 === void 0) {
3950+
if (crypto === void 0) {
39503951
return true;
39513952
}
39523953
const parsedMetadata = parseMetadata(metadataList);
@@ -3961,7 +3962,7 @@ var require_util2 = __commonJS({
39613962
for (const item of metadata) {
39623963
const algorithm = item.algo;
39633964
const expectedValue = item.hash;
3964-
let actualValue = crypto2.createHash(algorithm).update(bytes).digest("base64");
3965+
let actualValue = crypto.createHash(algorithm).update(bytes).digest("base64");
39653966
if (actualValue[actualValue.length - 1] === "=") {
39663967
if (actualValue[actualValue.length - 2] === "=") {
39673968
actualValue = actualValue.slice(0, -2);
@@ -16098,9 +16099,9 @@ var require_connection = __commonJS({
1609816099
channels.open = diagnosticsChannel.channel("undici:websocket:open");
1609916100
channels.close = diagnosticsChannel.channel("undici:websocket:close");
1610016101
channels.socketError = diagnosticsChannel.channel("undici:websocket:socket_error");
16101-
var crypto2;
16102+
var crypto;
1610216103
try {
16103-
crypto2 = __require("crypto");
16104+
crypto = __require("crypto");
1610416105
} catch {
1610516106
}
1610616107
function establishWebSocketConnection(url, protocols, ws, onEstablish, options) {
@@ -16119,7 +16120,7 @@ var require_connection = __commonJS({
1611916120
const headersList = new Headers(options.headers)[kHeadersList];
1612016121
request2.headersList = headersList;
1612116122
}
16122-
const keyValue = crypto2.randomBytes(16).toString("base64");
16123+
const keyValue = crypto.randomBytes(16).toString("base64");
1612316124
request2.headersList.append("sec-websocket-key", keyValue);
1612416125
request2.headersList.append("sec-websocket-version", "13");
1612516126
for (const protocol of protocols) {
@@ -16149,7 +16150,7 @@ var require_connection = __commonJS({
1614916150
return;
1615016151
}
1615116152
const secWSAccept = response.headersList.get("Sec-WebSocket-Accept");
16152-
const digest = crypto2.createHash("sha1").update(keyValue + uid).digest("base64");
16153+
const digest = crypto.createHash("sha1").update(keyValue + uid).digest("base64");
1615316154
if (secWSAccept !== digest) {
1615416155
failWebsocketConnection(ws, "Incorrect hash received in Sec-WebSocket-Accept header.");
1615516156
return;
@@ -16229,15 +16230,15 @@ var require_frame = __commonJS({
1622916230
""(exports, module) {
1623016231
"use strict";
1623116232
var { maxUnsigned16Bit } = require_constants5();
16232-
var crypto2;
16233+
var crypto;
1623316234
try {
16234-
crypto2 = __require("crypto");
16235+
crypto = __require("crypto");
1623516236
} catch {
1623616237
}
1623716238
var WebsocketFrameSend = class {
1623816239
constructor(data) {
1623916240
this.frameData = data;
16240-
this.maskKey = crypto2.randomBytes(4);
16241+
this.maskKey = crypto.randomBytes(4);
1624116242
}
1624216243
createFrame(opcode) {
1624316244
var _a2;
@@ -22806,11 +22807,11 @@ var require_util9 = __commonJS({
2280622807
var { isUint8Array } = __require("node:util/types");
2280722808
var { webidl } = require_webidl2();
2280822809
var supportedHashes = [];
22809-
var crypto2;
22810+
var crypto;
2281022811
try {
22811-
crypto2 = __require("node:crypto");
22812+
crypto = __require("node:crypto");
2281222813
const possibleRelevantHashes = ["sha256", "sha384", "sha512"];
22813-
supportedHashes = crypto2.getHashes().filter((hash) => possibleRelevantHashes.includes(hash));
22814+
supportedHashes = crypto.getHashes().filter((hash) => possibleRelevantHashes.includes(hash));
2281422815
} catch {
2281522816
}
2281622817
function responseURL(response) {
@@ -23070,7 +23071,7 @@ var require_util9 = __commonJS({
2307023071
}
2307123072
}
2307223073
function bytesMatch(bytes, metadataList) {
23073-
if (crypto2 === void 0) {
23074+
if (crypto === void 0) {
2307423075
return true;
2307523076
}
2307623077
const parsedMetadata = parseMetadata(metadataList);
@@ -23085,7 +23086,7 @@ var require_util9 = __commonJS({
2308523086
for (const item of metadata) {
2308623087
const algorithm = item.algo;
2308723088
const expectedValue = item.hash;
23088-
let actualValue = crypto2.createHash(algorithm).update(bytes).digest("base64");
23089+
let actualValue = crypto.createHash(algorithm).update(bytes).digest("base64");
2308923090
if (actualValue[actualValue.length - 1] === "=") {
2309023091
if (actualValue[actualValue.length - 2] === "=") {
2309123092
actualValue = actualValue.slice(0, -2);
@@ -34771,13 +34772,13 @@ var require_frame2 = __commonJS({
3477134772
"use strict";
3477234773
var { maxUnsigned16Bit } = require_constants10();
3477334774
var BUFFER_SIZE = 16386;
34774-
var crypto2;
34775+
var crypto;
3477534776
var buffer = null;
3477634777
var bufIdx = BUFFER_SIZE;
3477734778
try {
34778-
crypto2 = __require("node:crypto");
34779+
crypto = __require("node:crypto");
3477934780
} catch {
34780-
crypto2 = {
34781+
crypto = {
3478134782
randomFillSync: function randomFillSync(buffer2, _offset, _size) {
3478234783
for (let i = 0; i < buffer2.length; ++i) {
3478334784
buffer2[i] = Math.random() * 255 | 0;
@@ -34789,7 +34790,7 @@ var require_frame2 = __commonJS({
3478934790
function generateMask() {
3479034791
if (bufIdx === BUFFER_SIZE) {
3479134792
bufIdx = 0;
34792-
crypto2.randomFillSync(buffer ??= Buffer.allocUnsafe(BUFFER_SIZE), 0, BUFFER_SIZE);
34793+
crypto.randomFillSync(buffer ??= Buffer.allocUnsafe(BUFFER_SIZE), 0, BUFFER_SIZE);
3479334794
}
3479434795
return [buffer[bufIdx++], buffer[bufIdx++], buffer[bufIdx++], buffer[bufIdx++]];
3479534796
}
@@ -34858,9 +34859,9 @@ var require_connection2 = __commonJS({
3485834859
var { Headers, getHeadersList } = require_headers2();
3485934860
var { getDecodeSplit } = require_util9();
3486034861
var { WebsocketFrameSend } = require_frame2();
34861-
var crypto2;
34862+
var crypto;
3486234863
try {
34863-
crypto2 = __require("node:crypto");
34864+
crypto = __require("node:crypto");
3486434865
} catch {
3486534866
}
3486634867
function establishWebSocketConnection(url, protocols, client, ws, onEstablish, options) {
@@ -34880,7 +34881,7 @@ var require_connection2 = __commonJS({
3488034881
const headersList = getHeadersList(new Headers(options.headers));
3488134882
request2.headersList = headersList;
3488234883
}
34883-
const keyValue = crypto2.randomBytes(16).toString("base64");
34884+
const keyValue = crypto.randomBytes(16).toString("base64");
3488434885
request2.headersList.append("sec-websocket-key", keyValue);
3488534886
request2.headersList.append("sec-websocket-version", "13");
3488634887
for (const protocol of protocols) {
@@ -34911,7 +34912,7 @@ var require_connection2 = __commonJS({
3491134912
return;
3491234913
}
3491334914
const secWSAccept = response.headersList.get("Sec-WebSocket-Accept");
34914-
const digest = crypto2.createHash("sha1").update(keyValue + uid).digest("base64");
34915+
const digest = crypto.createHash("sha1").update(keyValue + uid).digest("base64");
3491534916
if (secWSAccept !== digest) {
3491634917
failWebsocketConnection(ws, "Incorrect hash received in Sec-WebSocket-Accept header.");
3491734918
return;
@@ -53540,7 +53541,7 @@ var require_tmp = __commonJS({
5354053541
""(exports, module) {
5354153542
var fs = __require("fs");
5354253543
var path2 = __require("path");
53543-
var crypto2 = __require("crypto");
53544+
var crypto = __require("crypto");
5354453545
var osTmpDir = require_os_tmpdir();
5354553546
var _c = process.binding("constants");
5354653547
var tmpDir = osTmpDir();
@@ -53558,9 +53559,9 @@ var require_tmp = __commonJS({
5355853559
function _randomChars(howMany) {
5355953560
var value = [], rnd = null;
5356053561
try {
53561-
rnd = crypto2.randomBytes(howMany);
53562+
rnd = crypto.randomBytes(howMany);
5356253563
} catch (e) {
53563-
rnd = crypto2.pseudoRandomBytes(howMany);
53564+
rnd = crypto.pseudoRandomBytes(howMany);
5356453565
}
5356553566
for (var i = 0; i < howMany; i++) {
5356653567
value.push(RANDOM_CHARS[rnd[i] % RANDOM_CHARS.length]);

0 commit comments

Comments
 (0)