@stripe/extensibility-eslint-plugin 0.15.4 → 0.15.5
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/configs/async-with-egress.cjs +11 -0
- package/dist/configs/async-with-egress.js +11 -0
- package/dist/configs/billing.bill.discount_calculation.cjs +11 -0
- package/dist/configs/billing.bill.discount_calculation.js +11 -0
- package/dist/configs/billing.customer_balance_application.cjs +11 -0
- package/dist/configs/billing.customer_balance_application.js +11 -0
- package/dist/configs/billing.invoice_collection_setting.cjs +11 -0
- package/dist/configs/billing.invoice_collection_setting.js +11 -0
- package/dist/configs/billing.prorations.cjs +11 -0
- package/dist/configs/billing.prorations.js +11 -0
- package/dist/configs/billing.recurring_billing_item_handling.cjs +11 -0
- package/dist/configs/billing.recurring_billing_item_handling.js +11 -0
- package/dist/configs/core.workflows.custom_action.cjs +11 -0
- package/dist/configs/core.workflows.custom_action.js +11 -0
- package/dist/configs/custom-objects.cjs +11 -0
- package/dist/configs/custom-objects.js +11 -0
- package/dist/configs/extend.objects.custom_objects.cjs +11 -0
- package/dist/configs/extend.objects.custom_objects.js +11 -0
- package/dist/configs/extend.workflows.custom_action.cjs +11 -0
- package/dist/configs/extend.workflows.custom_action.js +11 -0
- package/dist/configs/runtime-core.cjs +11 -0
- package/dist/configs/runtime-core.js +11 -0
- package/dist/configs/sync-no-egress.cjs +11 -0
- package/dist/configs/sync-no-egress.js +11 -0
- package/dist/index.cjs +11 -0
- package/dist/index.d.ts.map +1 -1
- package/dist/index.js +11 -0
- package/dist/rule-config.d.ts.map +1 -1
- package/dist/security-rules/no-secrets.d.ts +13 -0
- package/dist/security-rules/no-secrets.d.ts.map +1 -1
- package/dist/tsconfig.build.tsbuildinfo +1 -1
- package/package.json +1 -1
|
@@ -7559,6 +7559,16 @@ var originalRule = noSecrets.rules["no-secrets"];
|
|
|
7559
7559
|
if (!originalRule) {
|
|
7560
7560
|
throw new Error("Expected rule 'no-secrets' not found in eslint-plugin-no-secrets");
|
|
7561
7561
|
}
|
|
7562
|
+
var noSecretsOptions = {
|
|
7563
|
+
tolerance: 5,
|
|
7564
|
+
// High enough to avoid false-positives on normal identifiers.
|
|
7565
|
+
ignoreModules: true,
|
|
7566
|
+
additionalRegexes: {
|
|
7567
|
+
"Stripe Secret Key": "sk_(live|test)_[a-zA-Z0-9]{20,}",
|
|
7568
|
+
"Stripe Restricted Key": "rk_(live|test)_[a-zA-Z0-9]{20,}",
|
|
7569
|
+
"Stripe Webhook Secret": "whsec_[a-zA-Z0-9+/=]{20,}"
|
|
7570
|
+
}
|
|
7571
|
+
};
|
|
7562
7572
|
var rule = {
|
|
7563
7573
|
...originalRule,
|
|
7564
7574
|
meta: {
|
|
@@ -8180,6 +8190,7 @@ var _requiredRules = {
|
|
|
8180
8190
|
"no-unmodified-loop-condition": "warn",
|
|
8181
8191
|
"no-constant-condition": "warn",
|
|
8182
8192
|
"for-direction": "warn",
|
|
8193
|
+
[`${_PLUGIN_NAME}/no-secrets`]: ["error", noSecretsOptions],
|
|
8183
8194
|
[`${_PLUGIN_NAME}/valid-extension-interface`]: "warn"
|
|
8184
8195
|
};
|
|
8185
8196
|
var _recommendedRules = {
|
|
@@ -7525,6 +7525,16 @@ var originalRule = noSecrets.rules["no-secrets"];
|
|
|
7525
7525
|
if (!originalRule) {
|
|
7526
7526
|
throw new Error("Expected rule 'no-secrets' not found in eslint-plugin-no-secrets");
|
|
7527
7527
|
}
|
|
7528
|
+
var noSecretsOptions = {
|
|
7529
|
+
tolerance: 5,
|
|
7530
|
+
// High enough to avoid false-positives on normal identifiers.
|
|
7531
|
+
ignoreModules: true,
|
|
7532
|
+
additionalRegexes: {
|
|
7533
|
+
"Stripe Secret Key": "sk_(live|test)_[a-zA-Z0-9]{20,}",
|
|
7534
|
+
"Stripe Restricted Key": "rk_(live|test)_[a-zA-Z0-9]{20,}",
|
|
7535
|
+
"Stripe Webhook Secret": "whsec_[a-zA-Z0-9+/=]{20,}"
|
|
7536
|
+
}
|
|
7537
|
+
};
|
|
7528
7538
|
var rule = {
|
|
7529
7539
|
...originalRule,
|
|
7530
7540
|
meta: {
|
|
@@ -8146,6 +8156,7 @@ var _requiredRules = {
|
|
|
8146
8156
|
"no-unmodified-loop-condition": "warn",
|
|
8147
8157
|
"no-constant-condition": "warn",
|
|
8148
8158
|
"for-direction": "warn",
|
|
8159
|
+
[`${_PLUGIN_NAME}/no-secrets`]: ["error", noSecretsOptions],
|
|
8149
8160
|
[`${_PLUGIN_NAME}/valid-extension-interface`]: "warn"
|
|
8150
8161
|
};
|
|
8151
8162
|
var _recommendedRules = {
|
|
@@ -7569,6 +7569,16 @@ var originalRule = noSecrets.rules["no-secrets"];
|
|
|
7569
7569
|
if (!originalRule) {
|
|
7570
7570
|
throw new Error("Expected rule 'no-secrets' not found in eslint-plugin-no-secrets");
|
|
7571
7571
|
}
|
|
7572
|
+
var noSecretsOptions = {
|
|
7573
|
+
tolerance: 5,
|
|
7574
|
+
// High enough to avoid false-positives on normal identifiers.
|
|
7575
|
+
ignoreModules: true,
|
|
7576
|
+
additionalRegexes: {
|
|
7577
|
+
"Stripe Secret Key": "sk_(live|test)_[a-zA-Z0-9]{20,}",
|
|
7578
|
+
"Stripe Restricted Key": "rk_(live|test)_[a-zA-Z0-9]{20,}",
|
|
7579
|
+
"Stripe Webhook Secret": "whsec_[a-zA-Z0-9+/=]{20,}"
|
|
7580
|
+
}
|
|
7581
|
+
};
|
|
7572
7582
|
var rule = {
|
|
7573
7583
|
...originalRule,
|
|
7574
7584
|
meta: {
|
|
@@ -8190,6 +8200,7 @@ var _requiredRules = {
|
|
|
8190
8200
|
"no-unmodified-loop-condition": "warn",
|
|
8191
8201
|
"no-constant-condition": "warn",
|
|
8192
8202
|
"for-direction": "warn",
|
|
8203
|
+
[`${_PLUGIN_NAME}/no-secrets`]: ["error", noSecretsOptions],
|
|
8193
8204
|
[`${_PLUGIN_NAME}/valid-extension-interface`]: "warn"
|
|
8194
8205
|
};
|
|
8195
8206
|
var _recommendedRules = {
|
|
@@ -7535,6 +7535,16 @@ var originalRule = noSecrets.rules["no-secrets"];
|
|
|
7535
7535
|
if (!originalRule) {
|
|
7536
7536
|
throw new Error("Expected rule 'no-secrets' not found in eslint-plugin-no-secrets");
|
|
7537
7537
|
}
|
|
7538
|
+
var noSecretsOptions = {
|
|
7539
|
+
tolerance: 5,
|
|
7540
|
+
// High enough to avoid false-positives on normal identifiers.
|
|
7541
|
+
ignoreModules: true,
|
|
7542
|
+
additionalRegexes: {
|
|
7543
|
+
"Stripe Secret Key": "sk_(live|test)_[a-zA-Z0-9]{20,}",
|
|
7544
|
+
"Stripe Restricted Key": "rk_(live|test)_[a-zA-Z0-9]{20,}",
|
|
7545
|
+
"Stripe Webhook Secret": "whsec_[a-zA-Z0-9+/=]{20,}"
|
|
7546
|
+
}
|
|
7547
|
+
};
|
|
7538
7548
|
var rule = {
|
|
7539
7549
|
...originalRule,
|
|
7540
7550
|
meta: {
|
|
@@ -8156,6 +8166,7 @@ var _requiredRules = {
|
|
|
8156
8166
|
"no-unmodified-loop-condition": "warn",
|
|
8157
8167
|
"no-constant-condition": "warn",
|
|
8158
8168
|
"for-direction": "warn",
|
|
8169
|
+
[`${_PLUGIN_NAME}/no-secrets`]: ["error", noSecretsOptions],
|
|
8159
8170
|
[`${_PLUGIN_NAME}/valid-extension-interface`]: "warn"
|
|
8160
8171
|
};
|
|
8161
8172
|
var _recommendedRules = {
|
|
@@ -7569,6 +7569,16 @@ var originalRule = noSecrets.rules["no-secrets"];
|
|
|
7569
7569
|
if (!originalRule) {
|
|
7570
7570
|
throw new Error("Expected rule 'no-secrets' not found in eslint-plugin-no-secrets");
|
|
7571
7571
|
}
|
|
7572
|
+
var noSecretsOptions = {
|
|
7573
|
+
tolerance: 5,
|
|
7574
|
+
// High enough to avoid false-positives on normal identifiers.
|
|
7575
|
+
ignoreModules: true,
|
|
7576
|
+
additionalRegexes: {
|
|
7577
|
+
"Stripe Secret Key": "sk_(live|test)_[a-zA-Z0-9]{20,}",
|
|
7578
|
+
"Stripe Restricted Key": "rk_(live|test)_[a-zA-Z0-9]{20,}",
|
|
7579
|
+
"Stripe Webhook Secret": "whsec_[a-zA-Z0-9+/=]{20,}"
|
|
7580
|
+
}
|
|
7581
|
+
};
|
|
7572
7582
|
var rule = {
|
|
7573
7583
|
...originalRule,
|
|
7574
7584
|
meta: {
|
|
@@ -8190,6 +8200,7 @@ var _requiredRules = {
|
|
|
8190
8200
|
"no-unmodified-loop-condition": "warn",
|
|
8191
8201
|
"no-constant-condition": "warn",
|
|
8192
8202
|
"for-direction": "warn",
|
|
8203
|
+
[`${_PLUGIN_NAME}/no-secrets`]: ["error", noSecretsOptions],
|
|
8193
8204
|
[`${_PLUGIN_NAME}/valid-extension-interface`]: "warn"
|
|
8194
8205
|
};
|
|
8195
8206
|
var _recommendedRules = {
|
|
@@ -7535,6 +7535,16 @@ var originalRule = noSecrets.rules["no-secrets"];
|
|
|
7535
7535
|
if (!originalRule) {
|
|
7536
7536
|
throw new Error("Expected rule 'no-secrets' not found in eslint-plugin-no-secrets");
|
|
7537
7537
|
}
|
|
7538
|
+
var noSecretsOptions = {
|
|
7539
|
+
tolerance: 5,
|
|
7540
|
+
// High enough to avoid false-positives on normal identifiers.
|
|
7541
|
+
ignoreModules: true,
|
|
7542
|
+
additionalRegexes: {
|
|
7543
|
+
"Stripe Secret Key": "sk_(live|test)_[a-zA-Z0-9]{20,}",
|
|
7544
|
+
"Stripe Restricted Key": "rk_(live|test)_[a-zA-Z0-9]{20,}",
|
|
7545
|
+
"Stripe Webhook Secret": "whsec_[a-zA-Z0-9+/=]{20,}"
|
|
7546
|
+
}
|
|
7547
|
+
};
|
|
7538
7548
|
var rule = {
|
|
7539
7549
|
...originalRule,
|
|
7540
7550
|
meta: {
|
|
@@ -8156,6 +8166,7 @@ var _requiredRules = {
|
|
|
8156
8166
|
"no-unmodified-loop-condition": "warn",
|
|
8157
8167
|
"no-constant-condition": "warn",
|
|
8158
8168
|
"for-direction": "warn",
|
|
8169
|
+
[`${_PLUGIN_NAME}/no-secrets`]: ["error", noSecretsOptions],
|
|
8159
8170
|
[`${_PLUGIN_NAME}/valid-extension-interface`]: "warn"
|
|
8160
8171
|
};
|
|
8161
8172
|
var _recommendedRules = {
|
|
@@ -7569,6 +7569,16 @@ var originalRule = noSecrets.rules["no-secrets"];
|
|
|
7569
7569
|
if (!originalRule) {
|
|
7570
7570
|
throw new Error("Expected rule 'no-secrets' not found in eslint-plugin-no-secrets");
|
|
7571
7571
|
}
|
|
7572
|
+
var noSecretsOptions = {
|
|
7573
|
+
tolerance: 5,
|
|
7574
|
+
// High enough to avoid false-positives on normal identifiers.
|
|
7575
|
+
ignoreModules: true,
|
|
7576
|
+
additionalRegexes: {
|
|
7577
|
+
"Stripe Secret Key": "sk_(live|test)_[a-zA-Z0-9]{20,}",
|
|
7578
|
+
"Stripe Restricted Key": "rk_(live|test)_[a-zA-Z0-9]{20,}",
|
|
7579
|
+
"Stripe Webhook Secret": "whsec_[a-zA-Z0-9+/=]{20,}"
|
|
7580
|
+
}
|
|
7581
|
+
};
|
|
7572
7582
|
var rule = {
|
|
7573
7583
|
...originalRule,
|
|
7574
7584
|
meta: {
|
|
@@ -8190,6 +8200,7 @@ var _requiredRules = {
|
|
|
8190
8200
|
"no-unmodified-loop-condition": "warn",
|
|
8191
8201
|
"no-constant-condition": "warn",
|
|
8192
8202
|
"for-direction": "warn",
|
|
8203
|
+
[`${_PLUGIN_NAME}/no-secrets`]: ["error", noSecretsOptions],
|
|
8193
8204
|
[`${_PLUGIN_NAME}/valid-extension-interface`]: "warn"
|
|
8194
8205
|
};
|
|
8195
8206
|
var _recommendedRules = {
|
|
@@ -7535,6 +7535,16 @@ var originalRule = noSecrets.rules["no-secrets"];
|
|
|
7535
7535
|
if (!originalRule) {
|
|
7536
7536
|
throw new Error("Expected rule 'no-secrets' not found in eslint-plugin-no-secrets");
|
|
7537
7537
|
}
|
|
7538
|
+
var noSecretsOptions = {
|
|
7539
|
+
tolerance: 5,
|
|
7540
|
+
// High enough to avoid false-positives on normal identifiers.
|
|
7541
|
+
ignoreModules: true,
|
|
7542
|
+
additionalRegexes: {
|
|
7543
|
+
"Stripe Secret Key": "sk_(live|test)_[a-zA-Z0-9]{20,}",
|
|
7544
|
+
"Stripe Restricted Key": "rk_(live|test)_[a-zA-Z0-9]{20,}",
|
|
7545
|
+
"Stripe Webhook Secret": "whsec_[a-zA-Z0-9+/=]{20,}"
|
|
7546
|
+
}
|
|
7547
|
+
};
|
|
7538
7548
|
var rule = {
|
|
7539
7549
|
...originalRule,
|
|
7540
7550
|
meta: {
|
|
@@ -8156,6 +8166,7 @@ var _requiredRules = {
|
|
|
8156
8166
|
"no-unmodified-loop-condition": "warn",
|
|
8157
8167
|
"no-constant-condition": "warn",
|
|
8158
8168
|
"for-direction": "warn",
|
|
8169
|
+
[`${_PLUGIN_NAME}/no-secrets`]: ["error", noSecretsOptions],
|
|
8159
8170
|
[`${_PLUGIN_NAME}/valid-extension-interface`]: "warn"
|
|
8160
8171
|
};
|
|
8161
8172
|
var _recommendedRules = {
|
|
@@ -7569,6 +7569,16 @@ var originalRule = noSecrets.rules["no-secrets"];
|
|
|
7569
7569
|
if (!originalRule) {
|
|
7570
7570
|
throw new Error("Expected rule 'no-secrets' not found in eslint-plugin-no-secrets");
|
|
7571
7571
|
}
|
|
7572
|
+
var noSecretsOptions = {
|
|
7573
|
+
tolerance: 5,
|
|
7574
|
+
// High enough to avoid false-positives on normal identifiers.
|
|
7575
|
+
ignoreModules: true,
|
|
7576
|
+
additionalRegexes: {
|
|
7577
|
+
"Stripe Secret Key": "sk_(live|test)_[a-zA-Z0-9]{20,}",
|
|
7578
|
+
"Stripe Restricted Key": "rk_(live|test)_[a-zA-Z0-9]{20,}",
|
|
7579
|
+
"Stripe Webhook Secret": "whsec_[a-zA-Z0-9+/=]{20,}"
|
|
7580
|
+
}
|
|
7581
|
+
};
|
|
7572
7582
|
var rule = {
|
|
7573
7583
|
...originalRule,
|
|
7574
7584
|
meta: {
|
|
@@ -8190,6 +8200,7 @@ var _requiredRules = {
|
|
|
8190
8200
|
"no-unmodified-loop-condition": "warn",
|
|
8191
8201
|
"no-constant-condition": "warn",
|
|
8192
8202
|
"for-direction": "warn",
|
|
8203
|
+
[`${_PLUGIN_NAME}/no-secrets`]: ["error", noSecretsOptions],
|
|
8193
8204
|
[`${_PLUGIN_NAME}/valid-extension-interface`]: "warn"
|
|
8194
8205
|
};
|
|
8195
8206
|
var _recommendedRules = {
|
|
@@ -7535,6 +7535,16 @@ var originalRule = noSecrets.rules["no-secrets"];
|
|
|
7535
7535
|
if (!originalRule) {
|
|
7536
7536
|
throw new Error("Expected rule 'no-secrets' not found in eslint-plugin-no-secrets");
|
|
7537
7537
|
}
|
|
7538
|
+
var noSecretsOptions = {
|
|
7539
|
+
tolerance: 5,
|
|
7540
|
+
// High enough to avoid false-positives on normal identifiers.
|
|
7541
|
+
ignoreModules: true,
|
|
7542
|
+
additionalRegexes: {
|
|
7543
|
+
"Stripe Secret Key": "sk_(live|test)_[a-zA-Z0-9]{20,}",
|
|
7544
|
+
"Stripe Restricted Key": "rk_(live|test)_[a-zA-Z0-9]{20,}",
|
|
7545
|
+
"Stripe Webhook Secret": "whsec_[a-zA-Z0-9+/=]{20,}"
|
|
7546
|
+
}
|
|
7547
|
+
};
|
|
7538
7548
|
var rule = {
|
|
7539
7549
|
...originalRule,
|
|
7540
7550
|
meta: {
|
|
@@ -8156,6 +8166,7 @@ var _requiredRules = {
|
|
|
8156
8166
|
"no-unmodified-loop-condition": "warn",
|
|
8157
8167
|
"no-constant-condition": "warn",
|
|
8158
8168
|
"for-direction": "warn",
|
|
8169
|
+
[`${_PLUGIN_NAME}/no-secrets`]: ["error", noSecretsOptions],
|
|
8159
8170
|
[`${_PLUGIN_NAME}/valid-extension-interface`]: "warn"
|
|
8160
8171
|
};
|
|
8161
8172
|
var _recommendedRules = {
|
|
@@ -7569,6 +7569,16 @@ var originalRule = noSecrets.rules["no-secrets"];
|
|
|
7569
7569
|
if (!originalRule) {
|
|
7570
7570
|
throw new Error("Expected rule 'no-secrets' not found in eslint-plugin-no-secrets");
|
|
7571
7571
|
}
|
|
7572
|
+
var noSecretsOptions = {
|
|
7573
|
+
tolerance: 5,
|
|
7574
|
+
// High enough to avoid false-positives on normal identifiers.
|
|
7575
|
+
ignoreModules: true,
|
|
7576
|
+
additionalRegexes: {
|
|
7577
|
+
"Stripe Secret Key": "sk_(live|test)_[a-zA-Z0-9]{20,}",
|
|
7578
|
+
"Stripe Restricted Key": "rk_(live|test)_[a-zA-Z0-9]{20,}",
|
|
7579
|
+
"Stripe Webhook Secret": "whsec_[a-zA-Z0-9+/=]{20,}"
|
|
7580
|
+
}
|
|
7581
|
+
};
|
|
7572
7582
|
var rule = {
|
|
7573
7583
|
...originalRule,
|
|
7574
7584
|
meta: {
|
|
@@ -8190,6 +8200,7 @@ var _requiredRules = {
|
|
|
8190
8200
|
"no-unmodified-loop-condition": "warn",
|
|
8191
8201
|
"no-constant-condition": "warn",
|
|
8192
8202
|
"for-direction": "warn",
|
|
8203
|
+
[`${_PLUGIN_NAME}/no-secrets`]: ["error", noSecretsOptions],
|
|
8193
8204
|
[`${_PLUGIN_NAME}/valid-extension-interface`]: "warn"
|
|
8194
8205
|
};
|
|
8195
8206
|
var _recommendedRules = {
|
|
@@ -7535,6 +7535,16 @@ var originalRule = noSecrets.rules["no-secrets"];
|
|
|
7535
7535
|
if (!originalRule) {
|
|
7536
7536
|
throw new Error("Expected rule 'no-secrets' not found in eslint-plugin-no-secrets");
|
|
7537
7537
|
}
|
|
7538
|
+
var noSecretsOptions = {
|
|
7539
|
+
tolerance: 5,
|
|
7540
|
+
// High enough to avoid false-positives on normal identifiers.
|
|
7541
|
+
ignoreModules: true,
|
|
7542
|
+
additionalRegexes: {
|
|
7543
|
+
"Stripe Secret Key": "sk_(live|test)_[a-zA-Z0-9]{20,}",
|
|
7544
|
+
"Stripe Restricted Key": "rk_(live|test)_[a-zA-Z0-9]{20,}",
|
|
7545
|
+
"Stripe Webhook Secret": "whsec_[a-zA-Z0-9+/=]{20,}"
|
|
7546
|
+
}
|
|
7547
|
+
};
|
|
7538
7548
|
var rule = {
|
|
7539
7549
|
...originalRule,
|
|
7540
7550
|
meta: {
|
|
@@ -8156,6 +8166,7 @@ var _requiredRules = {
|
|
|
8156
8166
|
"no-unmodified-loop-condition": "warn",
|
|
8157
8167
|
"no-constant-condition": "warn",
|
|
8158
8168
|
"for-direction": "warn",
|
|
8169
|
+
[`${_PLUGIN_NAME}/no-secrets`]: ["error", noSecretsOptions],
|
|
8159
8170
|
[`${_PLUGIN_NAME}/valid-extension-interface`]: "warn"
|
|
8160
8171
|
};
|
|
8161
8172
|
var _recommendedRules = {
|
|
@@ -7569,6 +7569,16 @@ var originalRule = noSecrets.rules["no-secrets"];
|
|
|
7569
7569
|
if (!originalRule) {
|
|
7570
7570
|
throw new Error("Expected rule 'no-secrets' not found in eslint-plugin-no-secrets");
|
|
7571
7571
|
}
|
|
7572
|
+
var noSecretsOptions = {
|
|
7573
|
+
tolerance: 5,
|
|
7574
|
+
// High enough to avoid false-positives on normal identifiers.
|
|
7575
|
+
ignoreModules: true,
|
|
7576
|
+
additionalRegexes: {
|
|
7577
|
+
"Stripe Secret Key": "sk_(live|test)_[a-zA-Z0-9]{20,}",
|
|
7578
|
+
"Stripe Restricted Key": "rk_(live|test)_[a-zA-Z0-9]{20,}",
|
|
7579
|
+
"Stripe Webhook Secret": "whsec_[a-zA-Z0-9+/=]{20,}"
|
|
7580
|
+
}
|
|
7581
|
+
};
|
|
7572
7582
|
var rule = {
|
|
7573
7583
|
...originalRule,
|
|
7574
7584
|
meta: {
|
|
@@ -8190,6 +8200,7 @@ var _requiredRules = {
|
|
|
8190
8200
|
"no-unmodified-loop-condition": "warn",
|
|
8191
8201
|
"no-constant-condition": "warn",
|
|
8192
8202
|
"for-direction": "warn",
|
|
8203
|
+
[`${_PLUGIN_NAME}/no-secrets`]: ["error", noSecretsOptions],
|
|
8193
8204
|
[`${_PLUGIN_NAME}/valid-extension-interface`]: "warn"
|
|
8194
8205
|
};
|
|
8195
8206
|
var _recommendedRules = {
|
|
@@ -7535,6 +7535,16 @@ var originalRule = noSecrets.rules["no-secrets"];
|
|
|
7535
7535
|
if (!originalRule) {
|
|
7536
7536
|
throw new Error("Expected rule 'no-secrets' not found in eslint-plugin-no-secrets");
|
|
7537
7537
|
}
|
|
7538
|
+
var noSecretsOptions = {
|
|
7539
|
+
tolerance: 5,
|
|
7540
|
+
// High enough to avoid false-positives on normal identifiers.
|
|
7541
|
+
ignoreModules: true,
|
|
7542
|
+
additionalRegexes: {
|
|
7543
|
+
"Stripe Secret Key": "sk_(live|test)_[a-zA-Z0-9]{20,}",
|
|
7544
|
+
"Stripe Restricted Key": "rk_(live|test)_[a-zA-Z0-9]{20,}",
|
|
7545
|
+
"Stripe Webhook Secret": "whsec_[a-zA-Z0-9+/=]{20,}"
|
|
7546
|
+
}
|
|
7547
|
+
};
|
|
7538
7548
|
var rule = {
|
|
7539
7549
|
...originalRule,
|
|
7540
7550
|
meta: {
|
|
@@ -8156,6 +8166,7 @@ var _requiredRules = {
|
|
|
8156
8166
|
"no-unmodified-loop-condition": "warn",
|
|
8157
8167
|
"no-constant-condition": "warn",
|
|
8158
8168
|
"for-direction": "warn",
|
|
8169
|
+
[`${_PLUGIN_NAME}/no-secrets`]: ["error", noSecretsOptions],
|
|
8159
8170
|
[`${_PLUGIN_NAME}/valid-extension-interface`]: "warn"
|
|
8160
8171
|
};
|
|
8161
8172
|
var _recommendedRules = {
|
|
@@ -7559,6 +7559,16 @@ var originalRule = noSecrets.rules["no-secrets"];
|
|
|
7559
7559
|
if (!originalRule) {
|
|
7560
7560
|
throw new Error("Expected rule 'no-secrets' not found in eslint-plugin-no-secrets");
|
|
7561
7561
|
}
|
|
7562
|
+
var noSecretsOptions = {
|
|
7563
|
+
tolerance: 5,
|
|
7564
|
+
// High enough to avoid false-positives on normal identifiers.
|
|
7565
|
+
ignoreModules: true,
|
|
7566
|
+
additionalRegexes: {
|
|
7567
|
+
"Stripe Secret Key": "sk_(live|test)_[a-zA-Z0-9]{20,}",
|
|
7568
|
+
"Stripe Restricted Key": "rk_(live|test)_[a-zA-Z0-9]{20,}",
|
|
7569
|
+
"Stripe Webhook Secret": "whsec_[a-zA-Z0-9+/=]{20,}"
|
|
7570
|
+
}
|
|
7571
|
+
};
|
|
7562
7572
|
var rule = {
|
|
7563
7573
|
...originalRule,
|
|
7564
7574
|
meta: {
|
|
@@ -8180,6 +8190,7 @@ var _requiredRules = {
|
|
|
8180
8190
|
"no-unmodified-loop-condition": "warn",
|
|
8181
8191
|
"no-constant-condition": "warn",
|
|
8182
8192
|
"for-direction": "warn",
|
|
8193
|
+
[`${_PLUGIN_NAME}/no-secrets`]: ["error", noSecretsOptions],
|
|
8183
8194
|
[`${_PLUGIN_NAME}/valid-extension-interface`]: "warn"
|
|
8184
8195
|
};
|
|
8185
8196
|
var _recommendedRules = {
|
|
@@ -7525,6 +7525,16 @@ var originalRule = noSecrets.rules["no-secrets"];
|
|
|
7525
7525
|
if (!originalRule) {
|
|
7526
7526
|
throw new Error("Expected rule 'no-secrets' not found in eslint-plugin-no-secrets");
|
|
7527
7527
|
}
|
|
7528
|
+
var noSecretsOptions = {
|
|
7529
|
+
tolerance: 5,
|
|
7530
|
+
// High enough to avoid false-positives on normal identifiers.
|
|
7531
|
+
ignoreModules: true,
|
|
7532
|
+
additionalRegexes: {
|
|
7533
|
+
"Stripe Secret Key": "sk_(live|test)_[a-zA-Z0-9]{20,}",
|
|
7534
|
+
"Stripe Restricted Key": "rk_(live|test)_[a-zA-Z0-9]{20,}",
|
|
7535
|
+
"Stripe Webhook Secret": "whsec_[a-zA-Z0-9+/=]{20,}"
|
|
7536
|
+
}
|
|
7537
|
+
};
|
|
7528
7538
|
var rule = {
|
|
7529
7539
|
...originalRule,
|
|
7530
7540
|
meta: {
|
|
@@ -8146,6 +8156,7 @@ var _requiredRules = {
|
|
|
8146
8156
|
"no-unmodified-loop-condition": "warn",
|
|
8147
8157
|
"no-constant-condition": "warn",
|
|
8148
8158
|
"for-direction": "warn",
|
|
8159
|
+
[`${_PLUGIN_NAME}/no-secrets`]: ["error", noSecretsOptions],
|
|
8149
8160
|
[`${_PLUGIN_NAME}/valid-extension-interface`]: "warn"
|
|
8150
8161
|
};
|
|
8151
8162
|
var _recommendedRules = {
|
|
@@ -7569,6 +7569,16 @@ var originalRule = noSecrets.rules["no-secrets"];
|
|
|
7569
7569
|
if (!originalRule) {
|
|
7570
7570
|
throw new Error("Expected rule 'no-secrets' not found in eslint-plugin-no-secrets");
|
|
7571
7571
|
}
|
|
7572
|
+
var noSecretsOptions = {
|
|
7573
|
+
tolerance: 5,
|
|
7574
|
+
// High enough to avoid false-positives on normal identifiers.
|
|
7575
|
+
ignoreModules: true,
|
|
7576
|
+
additionalRegexes: {
|
|
7577
|
+
"Stripe Secret Key": "sk_(live|test)_[a-zA-Z0-9]{20,}",
|
|
7578
|
+
"Stripe Restricted Key": "rk_(live|test)_[a-zA-Z0-9]{20,}",
|
|
7579
|
+
"Stripe Webhook Secret": "whsec_[a-zA-Z0-9+/=]{20,}"
|
|
7580
|
+
}
|
|
7581
|
+
};
|
|
7572
7582
|
var rule = {
|
|
7573
7583
|
...originalRule,
|
|
7574
7584
|
meta: {
|
|
@@ -8190,6 +8200,7 @@ var _requiredRules = {
|
|
|
8190
8200
|
"no-unmodified-loop-condition": "warn",
|
|
8191
8201
|
"no-constant-condition": "warn",
|
|
8192
8202
|
"for-direction": "warn",
|
|
8203
|
+
[`${_PLUGIN_NAME}/no-secrets`]: ["error", noSecretsOptions],
|
|
8193
8204
|
[`${_PLUGIN_NAME}/valid-extension-interface`]: "warn"
|
|
8194
8205
|
};
|
|
8195
8206
|
var _recommendedRules = {
|
|
@@ -7535,6 +7535,16 @@ var originalRule = noSecrets.rules["no-secrets"];
|
|
|
7535
7535
|
if (!originalRule) {
|
|
7536
7536
|
throw new Error("Expected rule 'no-secrets' not found in eslint-plugin-no-secrets");
|
|
7537
7537
|
}
|
|
7538
|
+
var noSecretsOptions = {
|
|
7539
|
+
tolerance: 5,
|
|
7540
|
+
// High enough to avoid false-positives on normal identifiers.
|
|
7541
|
+
ignoreModules: true,
|
|
7542
|
+
additionalRegexes: {
|
|
7543
|
+
"Stripe Secret Key": "sk_(live|test)_[a-zA-Z0-9]{20,}",
|
|
7544
|
+
"Stripe Restricted Key": "rk_(live|test)_[a-zA-Z0-9]{20,}",
|
|
7545
|
+
"Stripe Webhook Secret": "whsec_[a-zA-Z0-9+/=]{20,}"
|
|
7546
|
+
}
|
|
7547
|
+
};
|
|
7538
7548
|
var rule = {
|
|
7539
7549
|
...originalRule,
|
|
7540
7550
|
meta: {
|
|
@@ -8156,6 +8166,7 @@ var _requiredRules = {
|
|
|
8156
8166
|
"no-unmodified-loop-condition": "warn",
|
|
8157
8167
|
"no-constant-condition": "warn",
|
|
8158
8168
|
"for-direction": "warn",
|
|
8169
|
+
[`${_PLUGIN_NAME}/no-secrets`]: ["error", noSecretsOptions],
|
|
8159
8170
|
[`${_PLUGIN_NAME}/valid-extension-interface`]: "warn"
|
|
8160
8171
|
};
|
|
8161
8172
|
var _recommendedRules = {
|
|
@@ -7569,6 +7569,16 @@ var originalRule = noSecrets.rules["no-secrets"];
|
|
|
7569
7569
|
if (!originalRule) {
|
|
7570
7570
|
throw new Error("Expected rule 'no-secrets' not found in eslint-plugin-no-secrets");
|
|
7571
7571
|
}
|
|
7572
|
+
var noSecretsOptions = {
|
|
7573
|
+
tolerance: 5,
|
|
7574
|
+
// High enough to avoid false-positives on normal identifiers.
|
|
7575
|
+
ignoreModules: true,
|
|
7576
|
+
additionalRegexes: {
|
|
7577
|
+
"Stripe Secret Key": "sk_(live|test)_[a-zA-Z0-9]{20,}",
|
|
7578
|
+
"Stripe Restricted Key": "rk_(live|test)_[a-zA-Z0-9]{20,}",
|
|
7579
|
+
"Stripe Webhook Secret": "whsec_[a-zA-Z0-9+/=]{20,}"
|
|
7580
|
+
}
|
|
7581
|
+
};
|
|
7572
7582
|
var rule = {
|
|
7573
7583
|
...originalRule,
|
|
7574
7584
|
meta: {
|
|
@@ -8190,6 +8200,7 @@ var _requiredRules = {
|
|
|
8190
8200
|
"no-unmodified-loop-condition": "warn",
|
|
8191
8201
|
"no-constant-condition": "warn",
|
|
8192
8202
|
"for-direction": "warn",
|
|
8203
|
+
[`${_PLUGIN_NAME}/no-secrets`]: ["error", noSecretsOptions],
|
|
8193
8204
|
[`${_PLUGIN_NAME}/valid-extension-interface`]: "warn"
|
|
8194
8205
|
};
|
|
8195
8206
|
var _recommendedRules = {
|
|
@@ -7535,6 +7535,16 @@ var originalRule = noSecrets.rules["no-secrets"];
|
|
|
7535
7535
|
if (!originalRule) {
|
|
7536
7536
|
throw new Error("Expected rule 'no-secrets' not found in eslint-plugin-no-secrets");
|
|
7537
7537
|
}
|
|
7538
|
+
var noSecretsOptions = {
|
|
7539
|
+
tolerance: 5,
|
|
7540
|
+
// High enough to avoid false-positives on normal identifiers.
|
|
7541
|
+
ignoreModules: true,
|
|
7542
|
+
additionalRegexes: {
|
|
7543
|
+
"Stripe Secret Key": "sk_(live|test)_[a-zA-Z0-9]{20,}",
|
|
7544
|
+
"Stripe Restricted Key": "rk_(live|test)_[a-zA-Z0-9]{20,}",
|
|
7545
|
+
"Stripe Webhook Secret": "whsec_[a-zA-Z0-9+/=]{20,}"
|
|
7546
|
+
}
|
|
7547
|
+
};
|
|
7538
7548
|
var rule = {
|
|
7539
7549
|
...originalRule,
|
|
7540
7550
|
meta: {
|
|
@@ -8156,6 +8166,7 @@ var _requiredRules = {
|
|
|
8156
8166
|
"no-unmodified-loop-condition": "warn",
|
|
8157
8167
|
"no-constant-condition": "warn",
|
|
8158
8168
|
"for-direction": "warn",
|
|
8169
|
+
[`${_PLUGIN_NAME}/no-secrets`]: ["error", noSecretsOptions],
|
|
8159
8170
|
[`${_PLUGIN_NAME}/valid-extension-interface`]: "warn"
|
|
8160
8171
|
};
|
|
8161
8172
|
var _recommendedRules = {
|
|
@@ -7559,6 +7559,16 @@ var originalRule = noSecrets.rules["no-secrets"];
|
|
|
7559
7559
|
if (!originalRule) {
|
|
7560
7560
|
throw new Error("Expected rule 'no-secrets' not found in eslint-plugin-no-secrets");
|
|
7561
7561
|
}
|
|
7562
|
+
var noSecretsOptions = {
|
|
7563
|
+
tolerance: 5,
|
|
7564
|
+
// High enough to avoid false-positives on normal identifiers.
|
|
7565
|
+
ignoreModules: true,
|
|
7566
|
+
additionalRegexes: {
|
|
7567
|
+
"Stripe Secret Key": "sk_(live|test)_[a-zA-Z0-9]{20,}",
|
|
7568
|
+
"Stripe Restricted Key": "rk_(live|test)_[a-zA-Z0-9]{20,}",
|
|
7569
|
+
"Stripe Webhook Secret": "whsec_[a-zA-Z0-9+/=]{20,}"
|
|
7570
|
+
}
|
|
7571
|
+
};
|
|
7562
7572
|
var rule = {
|
|
7563
7573
|
...originalRule,
|
|
7564
7574
|
meta: {
|
|
@@ -8180,6 +8190,7 @@ var _requiredRules = {
|
|
|
8180
8190
|
"no-unmodified-loop-condition": "warn",
|
|
8181
8191
|
"no-constant-condition": "warn",
|
|
8182
8192
|
"for-direction": "warn",
|
|
8193
|
+
[`${_PLUGIN_NAME}/no-secrets`]: ["error", noSecretsOptions],
|
|
8183
8194
|
[`${_PLUGIN_NAME}/valid-extension-interface`]: "warn"
|
|
8184
8195
|
};
|
|
8185
8196
|
var _recommendedRules = {
|
|
@@ -7525,6 +7525,16 @@ var originalRule = noSecrets.rules["no-secrets"];
|
|
|
7525
7525
|
if (!originalRule) {
|
|
7526
7526
|
throw new Error("Expected rule 'no-secrets' not found in eslint-plugin-no-secrets");
|
|
7527
7527
|
}
|
|
7528
|
+
var noSecretsOptions = {
|
|
7529
|
+
tolerance: 5,
|
|
7530
|
+
// High enough to avoid false-positives on normal identifiers.
|
|
7531
|
+
ignoreModules: true,
|
|
7532
|
+
additionalRegexes: {
|
|
7533
|
+
"Stripe Secret Key": "sk_(live|test)_[a-zA-Z0-9]{20,}",
|
|
7534
|
+
"Stripe Restricted Key": "rk_(live|test)_[a-zA-Z0-9]{20,}",
|
|
7535
|
+
"Stripe Webhook Secret": "whsec_[a-zA-Z0-9+/=]{20,}"
|
|
7536
|
+
}
|
|
7537
|
+
};
|
|
7528
7538
|
var rule = {
|
|
7529
7539
|
...originalRule,
|
|
7530
7540
|
meta: {
|
|
@@ -8146,6 +8156,7 @@ var _requiredRules = {
|
|
|
8146
8156
|
"no-unmodified-loop-condition": "warn",
|
|
8147
8157
|
"no-constant-condition": "warn",
|
|
8148
8158
|
"for-direction": "warn",
|
|
8159
|
+
[`${_PLUGIN_NAME}/no-secrets`]: ["error", noSecretsOptions],
|
|
8149
8160
|
[`${_PLUGIN_NAME}/valid-extension-interface`]: "warn"
|
|
8150
8161
|
};
|
|
8151
8162
|
var _recommendedRules = {
|
|
@@ -7559,6 +7559,16 @@ var originalRule = noSecrets.rules["no-secrets"];
|
|
|
7559
7559
|
if (!originalRule) {
|
|
7560
7560
|
throw new Error("Expected rule 'no-secrets' not found in eslint-plugin-no-secrets");
|
|
7561
7561
|
}
|
|
7562
|
+
var noSecretsOptions = {
|
|
7563
|
+
tolerance: 5,
|
|
7564
|
+
// High enough to avoid false-positives on normal identifiers.
|
|
7565
|
+
ignoreModules: true,
|
|
7566
|
+
additionalRegexes: {
|
|
7567
|
+
"Stripe Secret Key": "sk_(live|test)_[a-zA-Z0-9]{20,}",
|
|
7568
|
+
"Stripe Restricted Key": "rk_(live|test)_[a-zA-Z0-9]{20,}",
|
|
7569
|
+
"Stripe Webhook Secret": "whsec_[a-zA-Z0-9+/=]{20,}"
|
|
7570
|
+
}
|
|
7571
|
+
};
|
|
7562
7572
|
var rule = {
|
|
7563
7573
|
...originalRule,
|
|
7564
7574
|
meta: {
|
|
@@ -8180,6 +8190,7 @@ var _requiredRules = {
|
|
|
8180
8190
|
"no-unmodified-loop-condition": "warn",
|
|
8181
8191
|
"no-constant-condition": "warn",
|
|
8182
8192
|
"for-direction": "warn",
|
|
8193
|
+
[`${_PLUGIN_NAME}/no-secrets`]: ["error", noSecretsOptions],
|
|
8183
8194
|
[`${_PLUGIN_NAME}/valid-extension-interface`]: "warn"
|
|
8184
8195
|
};
|
|
8185
8196
|
var _recommendedRules = {
|
|
@@ -7525,6 +7525,16 @@ var originalRule = noSecrets.rules["no-secrets"];
|
|
|
7525
7525
|
if (!originalRule) {
|
|
7526
7526
|
throw new Error("Expected rule 'no-secrets' not found in eslint-plugin-no-secrets");
|
|
7527
7527
|
}
|
|
7528
|
+
var noSecretsOptions = {
|
|
7529
|
+
tolerance: 5,
|
|
7530
|
+
// High enough to avoid false-positives on normal identifiers.
|
|
7531
|
+
ignoreModules: true,
|
|
7532
|
+
additionalRegexes: {
|
|
7533
|
+
"Stripe Secret Key": "sk_(live|test)_[a-zA-Z0-9]{20,}",
|
|
7534
|
+
"Stripe Restricted Key": "rk_(live|test)_[a-zA-Z0-9]{20,}",
|
|
7535
|
+
"Stripe Webhook Secret": "whsec_[a-zA-Z0-9+/=]{20,}"
|
|
7536
|
+
}
|
|
7537
|
+
};
|
|
7528
7538
|
var rule = {
|
|
7529
7539
|
...originalRule,
|
|
7530
7540
|
meta: {
|
|
@@ -8146,6 +8156,7 @@ var _requiredRules = {
|
|
|
8146
8156
|
"no-unmodified-loop-condition": "warn",
|
|
8147
8157
|
"no-constant-condition": "warn",
|
|
8148
8158
|
"for-direction": "warn",
|
|
8159
|
+
[`${_PLUGIN_NAME}/no-secrets`]: ["error", noSecretsOptions],
|
|
8149
8160
|
[`${_PLUGIN_NAME}/valid-extension-interface`]: "warn"
|
|
8150
8161
|
};
|
|
8151
8162
|
var _recommendedRules = {
|
package/dist/index.cjs
CHANGED
|
@@ -36872,6 +36872,16 @@ var originalRule = noSecrets.rules["no-secrets"];
|
|
|
36872
36872
|
if (!originalRule) {
|
|
36873
36873
|
throw new Error("Expected rule 'no-secrets' not found in eslint-plugin-no-secrets");
|
|
36874
36874
|
}
|
|
36875
|
+
var noSecretsOptions = {
|
|
36876
|
+
tolerance: 5,
|
|
36877
|
+
// High enough to avoid false-positives on normal identifiers.
|
|
36878
|
+
ignoreModules: true,
|
|
36879
|
+
additionalRegexes: {
|
|
36880
|
+
"Stripe Secret Key": "sk_(live|test)_[a-zA-Z0-9]{20,}",
|
|
36881
|
+
"Stripe Restricted Key": "rk_(live|test)_[a-zA-Z0-9]{20,}",
|
|
36882
|
+
"Stripe Webhook Secret": "whsec_[a-zA-Z0-9+/=]{20,}"
|
|
36883
|
+
}
|
|
36884
|
+
};
|
|
36875
36885
|
var rule16 = {
|
|
36876
36886
|
...originalRule,
|
|
36877
36887
|
meta: {
|
|
@@ -37274,6 +37284,7 @@ var _requiredRules = {
|
|
|
37274
37284
|
"no-unmodified-loop-condition": "warn",
|
|
37275
37285
|
"no-constant-condition": "warn",
|
|
37276
37286
|
"for-direction": "warn",
|
|
37287
|
+
[`${_PLUGIN_NAME}/no-secrets`]: ["error", noSecretsOptions],
|
|
37277
37288
|
[`${_PLUGIN_NAME}/valid-extension-interface`]: "warn"
|
|
37278
37289
|
};
|
|
37279
37290
|
var _recommendedRules = {
|
package/dist/index.d.ts.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../src/index.ts"],"names":[],"mappings":"AAAA;;;;;;;;;;;;;;;;;GAiBG;AAEH,OAAO,KAAK,EAAE,MAAM,EAAE,MAAM,EAAE,MAAM,QAAQ,CAAC;
|
|
1
|
+
{"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../src/index.ts"],"names":[],"mappings":"AAAA;;;;;;;;;;;;;;;;;GAiBG;AAEH,OAAO,KAAK,EAAE,MAAM,EAAE,MAAM,EAAE,MAAM,QAAQ,CAAC;AA2B7C;;;GAGG;AACH,eAAO,MAAM,YAAY,wCAAwC,CAAC;AAClE;;;GAGG;AACH,eAAO,MAAM,0BAA0B,OAAO,CAAC;AAE/C;;;GAGG;AACH,eAAO,MAAM,yBAAyB,EAAE,MAAM,CAAC,MAE9C,CAAC;AAEF;;;GAGG;AACH,eAAO,MAAM,wBAAwB,EAAE,MAAM,CAAC,MAE7C,CAAC;AAEF;;;GAGG;AACH,eAAO,MAAM,cAAc,EAAE,MAAM,CAAC,WAYnC,CAAC;AAEF;;;;;;GAMG;AACH,eAAO,MAAM,iBAAiB,EAAE,MAAM,CAAC,WAmBtC,CAAC;AAEF;;;GAGG;AACH,eAAO,MAAM,YAAY,EAAE,MAAM,CAAC,WAOjC,CAAC;AAIF;;;;;;;GAOG;AACH,QAAA,MAAM,MAAM,EAAE,MAAM,CAAC,MAAM,EAwG1B,CAAC;AAEF,eAAe,MAAM,CAAC;AACtB,OAAO,EAAE,MAAM,IAAI,gBAAgB,EAAE,CAAC"}
|