chore: upgrade deps (#10824)

This commit is contained in:
Noel
2025-04-05 13:18:56 +02:00
committed by GitHub
parent 432aba3df7
commit f580de8025
200 changed files with 6756 additions and 12893 deletions

View File

@@ -14,12 +14,10 @@ import { AudioPlayerError } from '../src/audio/AudioPlayerError';
import { AudioResource } from '../src/audio/AudioResource';
import { NoSubscriberBehavior } from '../src/index';
vitest.mock('../src/DataStore', () => {
return {
addAudioPlayer: vitest.fn(),
deleteAudioPlayer: vitest.fn(),
};
});
vitest.mock('../src/DataStore', () => ({
addAudioPlayer: vitest.fn(),
deleteAudioPlayer: vitest.fn(),
}));
vitest.mock('../src/VoiceConnection', async (importOriginal) => {
// eslint-disable-next-line @typescript-eslint/consistent-type-imports
@@ -34,11 +32,9 @@ vitest.mock('../src/VoiceConnection', async (importOriginal) => {
};
});
vitest.mock('../src/audio/AudioPlayerError', () => {
return {
AudioPlayerError: vitest.fn(),
};
});
vitest.mock('../src/audio/AudioPlayerError', () => ({
AudioPlayerError: vitest.fn(),
}));
function* silence() {
while (true) {

View File

@@ -37,9 +37,7 @@ const AudioPlayer = _AudioPlayer as unknown as vitest.Mocked<typeof _AudioPlayer
const PlayerSubscription = _PlayerSubscription as unknown as vitest.Mock<_PlayerSubscription>;
const _NetworkingClass = Networking.Networking;
vitest.spyOn(Networking, 'Networking').mockImplementation((...args) => {
return new _NetworkingClass(...args);
});
vitest.spyOn(Networking, 'Networking').mockImplementation((...args) => new _NetworkingClass(...args));
function createFakeAdapter() {
const sendPayload = vitest.fn();

View File

@@ -63,31 +63,32 @@
"homepage": "https://discord.js.org",
"funding": "https://github.com/discordjs/discord.js?sponsor",
"dependencies": {
"@types/ws": "^8.5.13",
"discord-api-types": "^0.37.118",
"@types/ws": "^8.18.1",
"discord-api-types": "^0.37.119",
"prism-media": "^1.3.5",
"tslib": "^2.8.1",
"ws": "^8.18.0"
"ws": "^8.18.1"
},
"devDependencies": {
"@discordjs/api-extractor": "workspace:^",
"@discordjs/opus": "^0.9.0",
"@discordjs/scripts": "workspace:^",
"@favware/cliff-jumper": "^4.1.0",
"@noble/ciphers": "^1.1.3",
"@types/node": "^22.10.10",
"@vitest/coverage-v8": "^2.1.8",
"@noble/ciphers": "^1.2.1",
"@types/node": "^22.14.0",
"@vitest/coverage-v8": "^3.1.1",
"cross-env": "^7.0.3",
"esbuild-plugin-version-injector": "^1.2.1",
"eslint": "^8.57.1",
"eslint-config-neon": "^0.1.62",
"eslint": "^9.24.0",
"eslint-config-neon": "^0.2.7",
"eslint-formatter-compact": "^8.40.0",
"eslint-formatter-pretty": "^6.0.1",
"prettier": "^3.4.2",
"tsup": "^8.3.5",
"turbo": "^2.3.3",
"prettier": "^3.5.3",
"tsup": "^8.4.0",
"turbo": "^2.5.0",
"typescript": "~5.5.4",
"vitest": "^2.1.8",
"vitest-websocket-mock": "^0.3.0"
"vitest": "^3.1.1",
"vitest-websocket-mock": "^0.5.0"
},
"engines": {
"node": ">=22.12.0"

View File

@@ -44,17 +44,13 @@ const libs = {
additionalData: Buffer,
nonce: Buffer,
key: ArrayBufferLike,
) => {
return sodium.api.crypto_aead_xchacha20poly1305_ietf_decrypt(cipherText, additionalData, null, nonce, key);
},
) => sodium.api.crypto_aead_xchacha20poly1305_ietf_decrypt(cipherText, additionalData, null, nonce, key),
crypto_aead_xchacha20poly1305_ietf_encrypt: (
plaintext: Buffer,
additionalData: Buffer,
nonce: Buffer,
key: ArrayBufferLike,
) => {
return sodium.api.crypto_aead_xchacha20poly1305_ietf_encrypt(plaintext, additionalData, null, nonce, key);
},
) => sodium.api.crypto_aead_xchacha20poly1305_ietf_encrypt(plaintext, additionalData, null, nonce, key),
}),
'libsodium-wrappers': (sodium: any): Methods => ({
crypto_aead_xchacha20poly1305_ietf_decrypt: (
@@ -62,17 +58,13 @@ const libs = {
additionalData: Buffer,
nonce: Buffer,
key: ArrayBufferLike,
) => {
return sodium.crypto_aead_xchacha20poly1305_ietf_decrypt(null, cipherText, additionalData, nonce, key);
},
) => sodium.crypto_aead_xchacha20poly1305_ietf_decrypt(null, cipherText, additionalData, nonce, key),
crypto_aead_xchacha20poly1305_ietf_encrypt: (
plaintext: Buffer,
additionalData: Buffer,
nonce: Buffer,
key: ArrayBufferLike,
) => {
return sodium.crypto_aead_xchacha20poly1305_ietf_encrypt(plaintext, additionalData, null, nonce, key);
},
) => sodium.crypto_aead_xchacha20poly1305_ietf_encrypt(plaintext, additionalData, null, nonce, key),
}),
'@stablelib/xchacha20poly1305': (stablelib: any): Methods => ({
crypto_aead_xchacha20poly1305_ietf_decrypt(plaintext, additionalData, nonce, key) {

View File

@@ -1,4 +1,4 @@
export * from './generateDependencyReport';
export * from './entersState';
export * from './adapter';
export type * from './adapter';
export * from './demuxProbe';