|
1 | 1 | { |
2 | | - "name": "typisttech/wordfence-api", |
3 | | - "description": "Fetch WordPress vulnerability information from Wordfence vulnerability data feed.", |
4 | | - "license": "MIT", |
5 | | - "keywords": [ |
6 | | - "security", |
7 | | - "wordfence", |
8 | | - "wordpress" |
9 | | - ], |
10 | | - "authors": [ |
11 | | - { |
12 | | - "name": "Typist Tech", |
13 | | - "email": "wordfence-api@typist.tech", |
14 | | - "homepage": "https://typist.tech/" |
| 2 | + "name": "typisttech/wordfence-api", |
| 3 | + "description": "Fetch WordPress vulnerability information from Wordfence vulnerability data feed.", |
| 4 | + "license": "MIT", |
| 5 | + "keywords": [ |
| 6 | + "security", |
| 7 | + "wordfence", |
| 8 | + "wordpress" |
| 9 | + ], |
| 10 | + "authors": [ |
| 11 | + { |
| 12 | + "name": "Typist Tech", |
| 13 | + "email": "wordfence-api@typist.tech", |
| 14 | + "homepage": "https://typist.tech/" |
| 15 | + }, |
| 16 | + { |
| 17 | + "name": "Tang Rufus", |
| 18 | + "email": "tangrufus@gmail.com", |
| 19 | + "homepage": "https://typist.tech/", |
| 20 | + "role": "Developer" |
| 21 | + } |
| 22 | + ], |
| 23 | + "homepage": "https://github.com/typisttech/wordfence-api", |
| 24 | + "support": { |
| 25 | + "email": "wordfence-api@typist.tech", |
| 26 | + "issues": "https://github.com/typisttech/wordfence-api/issues", |
| 27 | + "source": "https://github.com/typisttech/wordfence-api" |
15 | 28 | }, |
16 | | - { |
17 | | - "name": "Tang Rufus", |
18 | | - "email": "tangrufus@gmail.com", |
19 | | - "homepage": "https://typist.tech/", |
20 | | - "role": "Developer" |
21 | | - } |
22 | | - ], |
23 | | - "homepage": "https://github.com/typisttech/wordfence-api", |
24 | | - "support": { |
25 | | - "email": "wordfence-api@typist.tech", |
26 | | - "issues": "https://github.com/typisttech/wordfence-api/issues", |
27 | | - "source": "https://github.com/typisttech/wordfence-api" |
28 | | - }, |
29 | | - "require": { |
30 | | - "php": "^8.3", |
31 | | - "composer/semver": "^3.4", |
32 | | - "guzzlehttp/guzzle": "^7.9" |
33 | | - }, |
34 | | - "require-dev": { |
35 | | - "mockery/mockery": "^1.6", |
36 | | - "pestphp/pest": "^3.5", |
37 | | - "roave/security-advisories": "dev-latest" |
38 | | - }, |
39 | | - "autoload": { |
40 | | - "psr-4": { |
41 | | - "TypistTech\\WordfenceApi\\": "src/" |
42 | | - } |
43 | | - }, |
44 | | - "autoload-dev": { |
45 | | - "psr-4": { |
46 | | - "Tests\\": "tests/" |
47 | | - } |
48 | | - }, |
49 | | - "config": { |
50 | | - "allow-plugins": { |
51 | | - "pestphp/pest-plugin": true |
| 29 | + "require": { |
| 30 | + "php": "^8.3", |
| 31 | + "composer/semver": "^3.4", |
| 32 | + "guzzlehttp/guzzle": "^7.9" |
52 | 33 | }, |
53 | | - "sort-packages": true |
54 | | - }, |
55 | | - "scripts": { |
56 | | - "fixture:download": [ |
57 | | - "curl -o ./tests/fixtures/vulnerabilities.production.json https://www.wordfence.com/api/intelligence/v2/vulnerabilities/production", |
58 | | - "curl -o ./tests/fixtures/vulnerabilities.scanner.json https://www.wordfence.com/api/intelligence/v2/vulnerabilities/scanner" |
59 | | - ], |
60 | | - "pest:e2e": "pest -d memory_limit=512M --group=e2e", |
61 | | - "pest:feature": "pest -d memory_limit=640M --group=feature", |
62 | | - "pest:unit": "pest --group=unit", |
63 | | - "test": [ |
64 | | - "@composer normalize --dry-run", |
65 | | - "pint --test", |
66 | | - "XDEBUG_MODE=off pest -d memory_limit=640M" |
67 | | - ] |
68 | | - } |
| 34 | + "require-dev": { |
| 35 | + "mockery/mockery": "^1.6", |
| 36 | + "pestphp/pest": "^4.1", |
| 37 | + "roave/security-advisories": "dev-latest" |
| 38 | + }, |
| 39 | + "autoload": { |
| 40 | + "psr-4": { |
| 41 | + "TypistTech\\WordfenceApi\\": "src/" |
| 42 | + } |
| 43 | + }, |
| 44 | + "autoload-dev": { |
| 45 | + "psr-4": { |
| 46 | + "Tests\\": "tests/" |
| 47 | + } |
| 48 | + }, |
| 49 | + "config": { |
| 50 | + "allow-plugins": { |
| 51 | + "pestphp/pest-plugin": true |
| 52 | + }, |
| 53 | + "sort-packages": true |
| 54 | + }, |
| 55 | + "scripts": { |
| 56 | + "fixture:download": [ |
| 57 | + "curl -o ./tests/Fixtures/vulnerabilities.production.json https://www.wordfence.com/api/intelligence/v2/vulnerabilities/production", |
| 58 | + "curl -o ./tests/Fixtures/vulnerabilities.scanner.json https://www.wordfence.com/api/intelligence/v2/vulnerabilities/scanner" |
| 59 | + ], |
| 60 | + "pest": "pest -d memory_limit=512M", |
| 61 | + "pest:e2e": "pest -d memory_limit=512M --group=e2e", |
| 62 | + "pest:feature": "pest -d memory_limit=512M --group=feature", |
| 63 | + "pest:unit": "pest --group=unit" |
| 64 | + } |
69 | 65 | } |
0 commit comments