From 47fd1b0ac116c2dfb9d06d6f2bb9066b0cac2976 Mon Sep 17 00:00:00 2001
From: Zachary Carter <zack.carter@gmail.com>
Date: Mon, 4 Jun 2012 16:10:05 -0700
Subject: [PATCH] Fix globals in wsapi.js that seemed to be created
 unintentionally and fix the modules that depended on implicit globals

---
 lib/bcrypt.js                        | 1 +
 lib/browserid/views.js               | 3 ++-
 lib/wsapi.js                         | 6 +++---
 lib/wsapi/address_info.js            | 4 +++-
 lib/wsapi/auth_with_assertion.js     | 3 ++-
 lib/wsapi/authenticate_user.js       | 1 +
 lib/wsapi/complete_email_addition.js | 3 ++-
 lib/wsapi/have_email.js              | 3 ++-
 lib/wsapi/session_context.js         | 3 ++-
 9 files changed, 18 insertions(+), 9 deletions(-)

diff --git a/lib/bcrypt.js b/lib/bcrypt.js
index 6c56d5373..d3ee871cf 100644
--- a/lib/bcrypt.js
+++ b/lib/bcrypt.js
@@ -3,6 +3,7 @@
  * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
 
 const
+path = require('path'),
 computecluster = require('compute-cluster'),
 logger = require('../lib/logging.js').logger,
 bcrypt = require('bcrypt'),
diff --git a/lib/browserid/views.js b/lib/browserid/views.js
index 48fbc69c5..1fc696fb6 100644
--- a/lib/browserid/views.js
+++ b/lib/browserid/views.js
@@ -12,7 +12,8 @@ config = require('../configuration.js'),
 und = require('underscore'),
 util = require('util'),
 httputils = require('../httputils.js'),
-etagify = require('etagify');
+etagify = require('etagify'),
+secrets = require('../secrets');
 
 // all templated content, redirects, and renames are handled here.
 // anything that is not an api, and not static
diff --git a/lib/wsapi.js b/lib/wsapi.js
index 004dd36d7..420868c6e 100644
--- a/lib/wsapi.js
+++ b/lib/wsapi.js
@@ -17,7 +17,7 @@
 
 const
 sessions = require('client-sessions'),
-express = require('express');
+express = require('express'),
 secrets = require('./secrets'),
 config = require('./configuration'),
 logger = require('./logging.js').logger,
@@ -27,8 +27,8 @@ url = require('url'),
 fs = require('fs'),
 path = require('path'),
 validate = require('./validate'),
-statsd = require('./statsd');
-bcrypt = require('./bcrypt');
+statsd = require('./statsd'),
+bcrypt = require('./bcrypt'),
 i18n = require('./i18n');
 
 var abide = i18n.abide({
diff --git a/lib/wsapi/address_info.js b/lib/wsapi/address_info.js
index 9a4c9009f..e65f93993 100644
--- a/lib/wsapi/address_info.js
+++ b/lib/wsapi/address_info.js
@@ -5,7 +5,9 @@
 const
 db = require('../db.js'),
 primary = require('../primary.js'),
-wsapi = require('../wsapi.js');
+wsapi = require('../wsapi.js'),
+httputils = require('../httputils.js'),
+url = require('url');
 
 // return information about an email address.
 //   type:  is this an address with 'primary' or 'secondary' support?
diff --git a/lib/wsapi/auth_with_assertion.js b/lib/wsapi/auth_with_assertion.js
index 4e0fa6eba..37127d6ed 100644
--- a/lib/wsapi/auth_with_assertion.js
+++ b/lib/wsapi/auth_with_assertion.js
@@ -10,7 +10,8 @@ logger = require('../logging.js').logger,
 querystring = require('querystring'),
 primary = require('../primary.js'),
 http = require('http'),
-https = require('https');
+https = require('https'),
+config = require('../configuration');
 
 exports.method = 'post';
 exports.writes_db = false;
diff --git a/lib/wsapi/authenticate_user.js b/lib/wsapi/authenticate_user.js
index f4d060288..a14cfa950 100644
--- a/lib/wsapi/authenticate_user.js
+++ b/lib/wsapi/authenticate_user.js
@@ -12,6 +12,7 @@ http = require('http'),
 https = require('https'),
 querystring = require('querystring'),
 statsd = require('../statsd');
+config = require('../configuration');
 
 exports.method = 'post';
 exports.writes_db = false;
diff --git a/lib/wsapi/complete_email_addition.js b/lib/wsapi/complete_email_addition.js
index 7756fcf5b..abd012418 100644
--- a/lib/wsapi/complete_email_addition.js
+++ b/lib/wsapi/complete_email_addition.js
@@ -6,7 +6,8 @@ const
 db = require('../db.js'),
 logger = require('../logging.js').logger,
 wsapi = require('../wsapi.js'),
-brycpt = require('../bcrypt.js');
+bcrypt = require('../bcrypt.js'),
+httputils = require('../httputils.js');
 
 exports.method = 'post';
 exports.writes_db = true;
diff --git a/lib/wsapi/have_email.js b/lib/wsapi/have_email.js
index 5caf1feff..2ff22f030 100644
--- a/lib/wsapi/have_email.js
+++ b/lib/wsapi/have_email.js
@@ -4,7 +4,8 @@
 
 const
 db = require('../db.js'),
-wsapi = require('../wsapi.js');
+wsapi = require('../wsapi.js'),
+url = require('url');
 
 // return if an email is known to browserid
 
diff --git a/lib/wsapi/session_context.js b/lib/wsapi/session_context.js
index 7cc5e8862..01ca65d3b 100644
--- a/lib/wsapi/session_context.js
+++ b/lib/wsapi/session_context.js
@@ -8,7 +8,8 @@ logger = require('../logging.js').logger,
 crypto = require('crypto'),
 wsapi = require('../wsapi.js'),
 secrets = require('../secrets.js'),
-version = require('../version.js');
+version = require('../version.js'),
+config = require('../configuration.js');
 
 // return the CSRF token, authentication status, and current server time (for assertion signing)
 // 2011-12-22: adding a random seed for keygen
-- 
GitLab