@stripe/extensibility-eslint-plugin 0.15.4 → 0.15.5

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (32) hide show
  1. package/dist/configs/async-with-egress.cjs +11 -0
  2. package/dist/configs/async-with-egress.js +11 -0
  3. package/dist/configs/billing.bill.discount_calculation.cjs +11 -0
  4. package/dist/configs/billing.bill.discount_calculation.js +11 -0
  5. package/dist/configs/billing.customer_balance_application.cjs +11 -0
  6. package/dist/configs/billing.customer_balance_application.js +11 -0
  7. package/dist/configs/billing.invoice_collection_setting.cjs +11 -0
  8. package/dist/configs/billing.invoice_collection_setting.js +11 -0
  9. package/dist/configs/billing.prorations.cjs +11 -0
  10. package/dist/configs/billing.prorations.js +11 -0
  11. package/dist/configs/billing.recurring_billing_item_handling.cjs +11 -0
  12. package/dist/configs/billing.recurring_billing_item_handling.js +11 -0
  13. package/dist/configs/core.workflows.custom_action.cjs +11 -0
  14. package/dist/configs/core.workflows.custom_action.js +11 -0
  15. package/dist/configs/custom-objects.cjs +11 -0
  16. package/dist/configs/custom-objects.js +11 -0
  17. package/dist/configs/extend.objects.custom_objects.cjs +11 -0
  18. package/dist/configs/extend.objects.custom_objects.js +11 -0
  19. package/dist/configs/extend.workflows.custom_action.cjs +11 -0
  20. package/dist/configs/extend.workflows.custom_action.js +11 -0
  21. package/dist/configs/runtime-core.cjs +11 -0
  22. package/dist/configs/runtime-core.js +11 -0
  23. package/dist/configs/sync-no-egress.cjs +11 -0
  24. package/dist/configs/sync-no-egress.js +11 -0
  25. package/dist/index.cjs +11 -0
  26. package/dist/index.d.ts.map +1 -1
  27. package/dist/index.js +11 -0
  28. package/dist/rule-config.d.ts.map +1 -1
  29. package/dist/security-rules/no-secrets.d.ts +13 -0
  30. package/dist/security-rules/no-secrets.d.ts.map +1 -1
  31. package/dist/tsconfig.build.tsbuildinfo +1 -1
  32. package/package.json +1 -1
@@ -7559,6 +7559,16 @@ var originalRule = noSecrets.rules["no-secrets"];
7559
7559
  if (!originalRule) {
7560
7560
  throw new Error("Expected rule 'no-secrets' not found in eslint-plugin-no-secrets");
7561
7561
  }
7562
+ var noSecretsOptions = {
7563
+ tolerance: 5,
7564
+ // High enough to avoid false-positives on normal identifiers.
7565
+ ignoreModules: true,
7566
+ additionalRegexes: {
7567
+ "Stripe Secret Key": "sk_(live|test)_[a-zA-Z0-9]{20,}",
7568
+ "Stripe Restricted Key": "rk_(live|test)_[a-zA-Z0-9]{20,}",
7569
+ "Stripe Webhook Secret": "whsec_[a-zA-Z0-9+/=]{20,}"
7570
+ }
7571
+ };
7562
7572
  var rule = {
7563
7573
  ...originalRule,
7564
7574
  meta: {
@@ -8180,6 +8190,7 @@ var _requiredRules = {
8180
8190
  "no-unmodified-loop-condition": "warn",
8181
8191
  "no-constant-condition": "warn",
8182
8192
  "for-direction": "warn",
8193
+ [`${_PLUGIN_NAME}/no-secrets`]: ["error", noSecretsOptions],
8183
8194
  [`${_PLUGIN_NAME}/valid-extension-interface`]: "warn"
8184
8195
  };
8185
8196
  var _recommendedRules = {
@@ -7525,6 +7525,16 @@ var originalRule = noSecrets.rules["no-secrets"];
7525
7525
  if (!originalRule) {
7526
7526
  throw new Error("Expected rule 'no-secrets' not found in eslint-plugin-no-secrets");
7527
7527
  }
7528
+ var noSecretsOptions = {
7529
+ tolerance: 5,
7530
+ // High enough to avoid false-positives on normal identifiers.
7531
+ ignoreModules: true,
7532
+ additionalRegexes: {
7533
+ "Stripe Secret Key": "sk_(live|test)_[a-zA-Z0-9]{20,}",
7534
+ "Stripe Restricted Key": "rk_(live|test)_[a-zA-Z0-9]{20,}",
7535
+ "Stripe Webhook Secret": "whsec_[a-zA-Z0-9+/=]{20,}"
7536
+ }
7537
+ };
7528
7538
  var rule = {
7529
7539
  ...originalRule,
7530
7540
  meta: {
@@ -8146,6 +8156,7 @@ var _requiredRules = {
8146
8156
  "no-unmodified-loop-condition": "warn",
8147
8157
  "no-constant-condition": "warn",
8148
8158
  "for-direction": "warn",
8159
+ [`${_PLUGIN_NAME}/no-secrets`]: ["error", noSecretsOptions],
8149
8160
  [`${_PLUGIN_NAME}/valid-extension-interface`]: "warn"
8150
8161
  };
8151
8162
  var _recommendedRules = {
@@ -7569,6 +7569,16 @@ var originalRule = noSecrets.rules["no-secrets"];
7569
7569
  if (!originalRule) {
7570
7570
  throw new Error("Expected rule 'no-secrets' not found in eslint-plugin-no-secrets");
7571
7571
  }
7572
+ var noSecretsOptions = {
7573
+ tolerance: 5,
7574
+ // High enough to avoid false-positives on normal identifiers.
7575
+ ignoreModules: true,
7576
+ additionalRegexes: {
7577
+ "Stripe Secret Key": "sk_(live|test)_[a-zA-Z0-9]{20,}",
7578
+ "Stripe Restricted Key": "rk_(live|test)_[a-zA-Z0-9]{20,}",
7579
+ "Stripe Webhook Secret": "whsec_[a-zA-Z0-9+/=]{20,}"
7580
+ }
7581
+ };
7572
7582
  var rule = {
7573
7583
  ...originalRule,
7574
7584
  meta: {
@@ -8190,6 +8200,7 @@ var _requiredRules = {
8190
8200
  "no-unmodified-loop-condition": "warn",
8191
8201
  "no-constant-condition": "warn",
8192
8202
  "for-direction": "warn",
8203
+ [`${_PLUGIN_NAME}/no-secrets`]: ["error", noSecretsOptions],
8193
8204
  [`${_PLUGIN_NAME}/valid-extension-interface`]: "warn"
8194
8205
  };
8195
8206
  var _recommendedRules = {
@@ -7535,6 +7535,16 @@ var originalRule = noSecrets.rules["no-secrets"];
7535
7535
  if (!originalRule) {
7536
7536
  throw new Error("Expected rule 'no-secrets' not found in eslint-plugin-no-secrets");
7537
7537
  }
7538
+ var noSecretsOptions = {
7539
+ tolerance: 5,
7540
+ // High enough to avoid false-positives on normal identifiers.
7541
+ ignoreModules: true,
7542
+ additionalRegexes: {
7543
+ "Stripe Secret Key": "sk_(live|test)_[a-zA-Z0-9]{20,}",
7544
+ "Stripe Restricted Key": "rk_(live|test)_[a-zA-Z0-9]{20,}",
7545
+ "Stripe Webhook Secret": "whsec_[a-zA-Z0-9+/=]{20,}"
7546
+ }
7547
+ };
7538
7548
  var rule = {
7539
7549
  ...originalRule,
7540
7550
  meta: {
@@ -8156,6 +8166,7 @@ var _requiredRules = {
8156
8166
  "no-unmodified-loop-condition": "warn",
8157
8167
  "no-constant-condition": "warn",
8158
8168
  "for-direction": "warn",
8169
+ [`${_PLUGIN_NAME}/no-secrets`]: ["error", noSecretsOptions],
8159
8170
  [`${_PLUGIN_NAME}/valid-extension-interface`]: "warn"
8160
8171
  };
8161
8172
  var _recommendedRules = {
@@ -7569,6 +7569,16 @@ var originalRule = noSecrets.rules["no-secrets"];
7569
7569
  if (!originalRule) {
7570
7570
  throw new Error("Expected rule 'no-secrets' not found in eslint-plugin-no-secrets");
7571
7571
  }
7572
+ var noSecretsOptions = {
7573
+ tolerance: 5,
7574
+ // High enough to avoid false-positives on normal identifiers.
7575
+ ignoreModules: true,
7576
+ additionalRegexes: {
7577
+ "Stripe Secret Key": "sk_(live|test)_[a-zA-Z0-9]{20,}",
7578
+ "Stripe Restricted Key": "rk_(live|test)_[a-zA-Z0-9]{20,}",
7579
+ "Stripe Webhook Secret": "whsec_[a-zA-Z0-9+/=]{20,}"
7580
+ }
7581
+ };
7572
7582
  var rule = {
7573
7583
  ...originalRule,
7574
7584
  meta: {
@@ -8190,6 +8200,7 @@ var _requiredRules = {
8190
8200
  "no-unmodified-loop-condition": "warn",
8191
8201
  "no-constant-condition": "warn",
8192
8202
  "for-direction": "warn",
8203
+ [`${_PLUGIN_NAME}/no-secrets`]: ["error", noSecretsOptions],
8193
8204
  [`${_PLUGIN_NAME}/valid-extension-interface`]: "warn"
8194
8205
  };
8195
8206
  var _recommendedRules = {
@@ -7535,6 +7535,16 @@ var originalRule = noSecrets.rules["no-secrets"];
7535
7535
  if (!originalRule) {
7536
7536
  throw new Error("Expected rule 'no-secrets' not found in eslint-plugin-no-secrets");
7537
7537
  }
7538
+ var noSecretsOptions = {
7539
+ tolerance: 5,
7540
+ // High enough to avoid false-positives on normal identifiers.
7541
+ ignoreModules: true,
7542
+ additionalRegexes: {
7543
+ "Stripe Secret Key": "sk_(live|test)_[a-zA-Z0-9]{20,}",
7544
+ "Stripe Restricted Key": "rk_(live|test)_[a-zA-Z0-9]{20,}",
7545
+ "Stripe Webhook Secret": "whsec_[a-zA-Z0-9+/=]{20,}"
7546
+ }
7547
+ };
7538
7548
  var rule = {
7539
7549
  ...originalRule,
7540
7550
  meta: {
@@ -8156,6 +8166,7 @@ var _requiredRules = {
8156
8166
  "no-unmodified-loop-condition": "warn",
8157
8167
  "no-constant-condition": "warn",
8158
8168
  "for-direction": "warn",
8169
+ [`${_PLUGIN_NAME}/no-secrets`]: ["error", noSecretsOptions],
8159
8170
  [`${_PLUGIN_NAME}/valid-extension-interface`]: "warn"
8160
8171
  };
8161
8172
  var _recommendedRules = {
@@ -7569,6 +7569,16 @@ var originalRule = noSecrets.rules["no-secrets"];
7569
7569
  if (!originalRule) {
7570
7570
  throw new Error("Expected rule 'no-secrets' not found in eslint-plugin-no-secrets");
7571
7571
  }
7572
+ var noSecretsOptions = {
7573
+ tolerance: 5,
7574
+ // High enough to avoid false-positives on normal identifiers.
7575
+ ignoreModules: true,
7576
+ additionalRegexes: {
7577
+ "Stripe Secret Key": "sk_(live|test)_[a-zA-Z0-9]{20,}",
7578
+ "Stripe Restricted Key": "rk_(live|test)_[a-zA-Z0-9]{20,}",
7579
+ "Stripe Webhook Secret": "whsec_[a-zA-Z0-9+/=]{20,}"
7580
+ }
7581
+ };
7572
7582
  var rule = {
7573
7583
  ...originalRule,
7574
7584
  meta: {
@@ -8190,6 +8200,7 @@ var _requiredRules = {
8190
8200
  "no-unmodified-loop-condition": "warn",
8191
8201
  "no-constant-condition": "warn",
8192
8202
  "for-direction": "warn",
8203
+ [`${_PLUGIN_NAME}/no-secrets`]: ["error", noSecretsOptions],
8193
8204
  [`${_PLUGIN_NAME}/valid-extension-interface`]: "warn"
8194
8205
  };
8195
8206
  var _recommendedRules = {
@@ -7535,6 +7535,16 @@ var originalRule = noSecrets.rules["no-secrets"];
7535
7535
  if (!originalRule) {
7536
7536
  throw new Error("Expected rule 'no-secrets' not found in eslint-plugin-no-secrets");
7537
7537
  }
7538
+ var noSecretsOptions = {
7539
+ tolerance: 5,
7540
+ // High enough to avoid false-positives on normal identifiers.
7541
+ ignoreModules: true,
7542
+ additionalRegexes: {
7543
+ "Stripe Secret Key": "sk_(live|test)_[a-zA-Z0-9]{20,}",
7544
+ "Stripe Restricted Key": "rk_(live|test)_[a-zA-Z0-9]{20,}",
7545
+ "Stripe Webhook Secret": "whsec_[a-zA-Z0-9+/=]{20,}"
7546
+ }
7547
+ };
7538
7548
  var rule = {
7539
7549
  ...originalRule,
7540
7550
  meta: {
@@ -8156,6 +8166,7 @@ var _requiredRules = {
8156
8166
  "no-unmodified-loop-condition": "warn",
8157
8167
  "no-constant-condition": "warn",
8158
8168
  "for-direction": "warn",
8169
+ [`${_PLUGIN_NAME}/no-secrets`]: ["error", noSecretsOptions],
8159
8170
  [`${_PLUGIN_NAME}/valid-extension-interface`]: "warn"
8160
8171
  };
8161
8172
  var _recommendedRules = {
@@ -7569,6 +7569,16 @@ var originalRule = noSecrets.rules["no-secrets"];
7569
7569
  if (!originalRule) {
7570
7570
  throw new Error("Expected rule 'no-secrets' not found in eslint-plugin-no-secrets");
7571
7571
  }
7572
+ var noSecretsOptions = {
7573
+ tolerance: 5,
7574
+ // High enough to avoid false-positives on normal identifiers.
7575
+ ignoreModules: true,
7576
+ additionalRegexes: {
7577
+ "Stripe Secret Key": "sk_(live|test)_[a-zA-Z0-9]{20,}",
7578
+ "Stripe Restricted Key": "rk_(live|test)_[a-zA-Z0-9]{20,}",
7579
+ "Stripe Webhook Secret": "whsec_[a-zA-Z0-9+/=]{20,}"
7580
+ }
7581
+ };
7572
7582
  var rule = {
7573
7583
  ...originalRule,
7574
7584
  meta: {
@@ -8190,6 +8200,7 @@ var _requiredRules = {
8190
8200
  "no-unmodified-loop-condition": "warn",
8191
8201
  "no-constant-condition": "warn",
8192
8202
  "for-direction": "warn",
8203
+ [`${_PLUGIN_NAME}/no-secrets`]: ["error", noSecretsOptions],
8193
8204
  [`${_PLUGIN_NAME}/valid-extension-interface`]: "warn"
8194
8205
  };
8195
8206
  var _recommendedRules = {
@@ -7535,6 +7535,16 @@ var originalRule = noSecrets.rules["no-secrets"];
7535
7535
  if (!originalRule) {
7536
7536
  throw new Error("Expected rule 'no-secrets' not found in eslint-plugin-no-secrets");
7537
7537
  }
7538
+ var noSecretsOptions = {
7539
+ tolerance: 5,
7540
+ // High enough to avoid false-positives on normal identifiers.
7541
+ ignoreModules: true,
7542
+ additionalRegexes: {
7543
+ "Stripe Secret Key": "sk_(live|test)_[a-zA-Z0-9]{20,}",
7544
+ "Stripe Restricted Key": "rk_(live|test)_[a-zA-Z0-9]{20,}",
7545
+ "Stripe Webhook Secret": "whsec_[a-zA-Z0-9+/=]{20,}"
7546
+ }
7547
+ };
7538
7548
  var rule = {
7539
7549
  ...originalRule,
7540
7550
  meta: {
@@ -8156,6 +8166,7 @@ var _requiredRules = {
8156
8166
  "no-unmodified-loop-condition": "warn",
8157
8167
  "no-constant-condition": "warn",
8158
8168
  "for-direction": "warn",
8169
+ [`${_PLUGIN_NAME}/no-secrets`]: ["error", noSecretsOptions],
8159
8170
  [`${_PLUGIN_NAME}/valid-extension-interface`]: "warn"
8160
8171
  };
8161
8172
  var _recommendedRules = {
@@ -7569,6 +7569,16 @@ var originalRule = noSecrets.rules["no-secrets"];
7569
7569
  if (!originalRule) {
7570
7570
  throw new Error("Expected rule 'no-secrets' not found in eslint-plugin-no-secrets");
7571
7571
  }
7572
+ var noSecretsOptions = {
7573
+ tolerance: 5,
7574
+ // High enough to avoid false-positives on normal identifiers.
7575
+ ignoreModules: true,
7576
+ additionalRegexes: {
7577
+ "Stripe Secret Key": "sk_(live|test)_[a-zA-Z0-9]{20,}",
7578
+ "Stripe Restricted Key": "rk_(live|test)_[a-zA-Z0-9]{20,}",
7579
+ "Stripe Webhook Secret": "whsec_[a-zA-Z0-9+/=]{20,}"
7580
+ }
7581
+ };
7572
7582
  var rule = {
7573
7583
  ...originalRule,
7574
7584
  meta: {
@@ -8190,6 +8200,7 @@ var _requiredRules = {
8190
8200
  "no-unmodified-loop-condition": "warn",
8191
8201
  "no-constant-condition": "warn",
8192
8202
  "for-direction": "warn",
8203
+ [`${_PLUGIN_NAME}/no-secrets`]: ["error", noSecretsOptions],
8193
8204
  [`${_PLUGIN_NAME}/valid-extension-interface`]: "warn"
8194
8205
  };
8195
8206
  var _recommendedRules = {
@@ -7535,6 +7535,16 @@ var originalRule = noSecrets.rules["no-secrets"];
7535
7535
  if (!originalRule) {
7536
7536
  throw new Error("Expected rule 'no-secrets' not found in eslint-plugin-no-secrets");
7537
7537
  }
7538
+ var noSecretsOptions = {
7539
+ tolerance: 5,
7540
+ // High enough to avoid false-positives on normal identifiers.
7541
+ ignoreModules: true,
7542
+ additionalRegexes: {
7543
+ "Stripe Secret Key": "sk_(live|test)_[a-zA-Z0-9]{20,}",
7544
+ "Stripe Restricted Key": "rk_(live|test)_[a-zA-Z0-9]{20,}",
7545
+ "Stripe Webhook Secret": "whsec_[a-zA-Z0-9+/=]{20,}"
7546
+ }
7547
+ };
7538
7548
  var rule = {
7539
7549
  ...originalRule,
7540
7550
  meta: {
@@ -8156,6 +8166,7 @@ var _requiredRules = {
8156
8166
  "no-unmodified-loop-condition": "warn",
8157
8167
  "no-constant-condition": "warn",
8158
8168
  "for-direction": "warn",
8169
+ [`${_PLUGIN_NAME}/no-secrets`]: ["error", noSecretsOptions],
8159
8170
  [`${_PLUGIN_NAME}/valid-extension-interface`]: "warn"
8160
8171
  };
8161
8172
  var _recommendedRules = {
@@ -7569,6 +7569,16 @@ var originalRule = noSecrets.rules["no-secrets"];
7569
7569
  if (!originalRule) {
7570
7570
  throw new Error("Expected rule 'no-secrets' not found in eslint-plugin-no-secrets");
7571
7571
  }
7572
+ var noSecretsOptions = {
7573
+ tolerance: 5,
7574
+ // High enough to avoid false-positives on normal identifiers.
7575
+ ignoreModules: true,
7576
+ additionalRegexes: {
7577
+ "Stripe Secret Key": "sk_(live|test)_[a-zA-Z0-9]{20,}",
7578
+ "Stripe Restricted Key": "rk_(live|test)_[a-zA-Z0-9]{20,}",
7579
+ "Stripe Webhook Secret": "whsec_[a-zA-Z0-9+/=]{20,}"
7580
+ }
7581
+ };
7572
7582
  var rule = {
7573
7583
  ...originalRule,
7574
7584
  meta: {
@@ -8190,6 +8200,7 @@ var _requiredRules = {
8190
8200
  "no-unmodified-loop-condition": "warn",
8191
8201
  "no-constant-condition": "warn",
8192
8202
  "for-direction": "warn",
8203
+ [`${_PLUGIN_NAME}/no-secrets`]: ["error", noSecretsOptions],
8193
8204
  [`${_PLUGIN_NAME}/valid-extension-interface`]: "warn"
8194
8205
  };
8195
8206
  var _recommendedRules = {
@@ -7535,6 +7535,16 @@ var originalRule = noSecrets.rules["no-secrets"];
7535
7535
  if (!originalRule) {
7536
7536
  throw new Error("Expected rule 'no-secrets' not found in eslint-plugin-no-secrets");
7537
7537
  }
7538
+ var noSecretsOptions = {
7539
+ tolerance: 5,
7540
+ // High enough to avoid false-positives on normal identifiers.
7541
+ ignoreModules: true,
7542
+ additionalRegexes: {
7543
+ "Stripe Secret Key": "sk_(live|test)_[a-zA-Z0-9]{20,}",
7544
+ "Stripe Restricted Key": "rk_(live|test)_[a-zA-Z0-9]{20,}",
7545
+ "Stripe Webhook Secret": "whsec_[a-zA-Z0-9+/=]{20,}"
7546
+ }
7547
+ };
7538
7548
  var rule = {
7539
7549
  ...originalRule,
7540
7550
  meta: {
@@ -8156,6 +8166,7 @@ var _requiredRules = {
8156
8166
  "no-unmodified-loop-condition": "warn",
8157
8167
  "no-constant-condition": "warn",
8158
8168
  "for-direction": "warn",
8169
+ [`${_PLUGIN_NAME}/no-secrets`]: ["error", noSecretsOptions],
8159
8170
  [`${_PLUGIN_NAME}/valid-extension-interface`]: "warn"
8160
8171
  };
8161
8172
  var _recommendedRules = {
@@ -7559,6 +7559,16 @@ var originalRule = noSecrets.rules["no-secrets"];
7559
7559
  if (!originalRule) {
7560
7560
  throw new Error("Expected rule 'no-secrets' not found in eslint-plugin-no-secrets");
7561
7561
  }
7562
+ var noSecretsOptions = {
7563
+ tolerance: 5,
7564
+ // High enough to avoid false-positives on normal identifiers.
7565
+ ignoreModules: true,
7566
+ additionalRegexes: {
7567
+ "Stripe Secret Key": "sk_(live|test)_[a-zA-Z0-9]{20,}",
7568
+ "Stripe Restricted Key": "rk_(live|test)_[a-zA-Z0-9]{20,}",
7569
+ "Stripe Webhook Secret": "whsec_[a-zA-Z0-9+/=]{20,}"
7570
+ }
7571
+ };
7562
7572
  var rule = {
7563
7573
  ...originalRule,
7564
7574
  meta: {
@@ -8180,6 +8190,7 @@ var _requiredRules = {
8180
8190
  "no-unmodified-loop-condition": "warn",
8181
8191
  "no-constant-condition": "warn",
8182
8192
  "for-direction": "warn",
8193
+ [`${_PLUGIN_NAME}/no-secrets`]: ["error", noSecretsOptions],
8183
8194
  [`${_PLUGIN_NAME}/valid-extension-interface`]: "warn"
8184
8195
  };
8185
8196
  var _recommendedRules = {
@@ -7525,6 +7525,16 @@ var originalRule = noSecrets.rules["no-secrets"];
7525
7525
  if (!originalRule) {
7526
7526
  throw new Error("Expected rule 'no-secrets' not found in eslint-plugin-no-secrets");
7527
7527
  }
7528
+ var noSecretsOptions = {
7529
+ tolerance: 5,
7530
+ // High enough to avoid false-positives on normal identifiers.
7531
+ ignoreModules: true,
7532
+ additionalRegexes: {
7533
+ "Stripe Secret Key": "sk_(live|test)_[a-zA-Z0-9]{20,}",
7534
+ "Stripe Restricted Key": "rk_(live|test)_[a-zA-Z0-9]{20,}",
7535
+ "Stripe Webhook Secret": "whsec_[a-zA-Z0-9+/=]{20,}"
7536
+ }
7537
+ };
7528
7538
  var rule = {
7529
7539
  ...originalRule,
7530
7540
  meta: {
@@ -8146,6 +8156,7 @@ var _requiredRules = {
8146
8156
  "no-unmodified-loop-condition": "warn",
8147
8157
  "no-constant-condition": "warn",
8148
8158
  "for-direction": "warn",
8159
+ [`${_PLUGIN_NAME}/no-secrets`]: ["error", noSecretsOptions],
8149
8160
  [`${_PLUGIN_NAME}/valid-extension-interface`]: "warn"
8150
8161
  };
8151
8162
  var _recommendedRules = {
@@ -7569,6 +7569,16 @@ var originalRule = noSecrets.rules["no-secrets"];
7569
7569
  if (!originalRule) {
7570
7570
  throw new Error("Expected rule 'no-secrets' not found in eslint-plugin-no-secrets");
7571
7571
  }
7572
+ var noSecretsOptions = {
7573
+ tolerance: 5,
7574
+ // High enough to avoid false-positives on normal identifiers.
7575
+ ignoreModules: true,
7576
+ additionalRegexes: {
7577
+ "Stripe Secret Key": "sk_(live|test)_[a-zA-Z0-9]{20,}",
7578
+ "Stripe Restricted Key": "rk_(live|test)_[a-zA-Z0-9]{20,}",
7579
+ "Stripe Webhook Secret": "whsec_[a-zA-Z0-9+/=]{20,}"
7580
+ }
7581
+ };
7572
7582
  var rule = {
7573
7583
  ...originalRule,
7574
7584
  meta: {
@@ -8190,6 +8200,7 @@ var _requiredRules = {
8190
8200
  "no-unmodified-loop-condition": "warn",
8191
8201
  "no-constant-condition": "warn",
8192
8202
  "for-direction": "warn",
8203
+ [`${_PLUGIN_NAME}/no-secrets`]: ["error", noSecretsOptions],
8193
8204
  [`${_PLUGIN_NAME}/valid-extension-interface`]: "warn"
8194
8205
  };
8195
8206
  var _recommendedRules = {
@@ -7535,6 +7535,16 @@ var originalRule = noSecrets.rules["no-secrets"];
7535
7535
  if (!originalRule) {
7536
7536
  throw new Error("Expected rule 'no-secrets' not found in eslint-plugin-no-secrets");
7537
7537
  }
7538
+ var noSecretsOptions = {
7539
+ tolerance: 5,
7540
+ // High enough to avoid false-positives on normal identifiers.
7541
+ ignoreModules: true,
7542
+ additionalRegexes: {
7543
+ "Stripe Secret Key": "sk_(live|test)_[a-zA-Z0-9]{20,}",
7544
+ "Stripe Restricted Key": "rk_(live|test)_[a-zA-Z0-9]{20,}",
7545
+ "Stripe Webhook Secret": "whsec_[a-zA-Z0-9+/=]{20,}"
7546
+ }
7547
+ };
7538
7548
  var rule = {
7539
7549
  ...originalRule,
7540
7550
  meta: {
@@ -8156,6 +8166,7 @@ var _requiredRules = {
8156
8166
  "no-unmodified-loop-condition": "warn",
8157
8167
  "no-constant-condition": "warn",
8158
8168
  "for-direction": "warn",
8169
+ [`${_PLUGIN_NAME}/no-secrets`]: ["error", noSecretsOptions],
8159
8170
  [`${_PLUGIN_NAME}/valid-extension-interface`]: "warn"
8160
8171
  };
8161
8172
  var _recommendedRules = {
@@ -7569,6 +7569,16 @@ var originalRule = noSecrets.rules["no-secrets"];
7569
7569
  if (!originalRule) {
7570
7570
  throw new Error("Expected rule 'no-secrets' not found in eslint-plugin-no-secrets");
7571
7571
  }
7572
+ var noSecretsOptions = {
7573
+ tolerance: 5,
7574
+ // High enough to avoid false-positives on normal identifiers.
7575
+ ignoreModules: true,
7576
+ additionalRegexes: {
7577
+ "Stripe Secret Key": "sk_(live|test)_[a-zA-Z0-9]{20,}",
7578
+ "Stripe Restricted Key": "rk_(live|test)_[a-zA-Z0-9]{20,}",
7579
+ "Stripe Webhook Secret": "whsec_[a-zA-Z0-9+/=]{20,}"
7580
+ }
7581
+ };
7572
7582
  var rule = {
7573
7583
  ...originalRule,
7574
7584
  meta: {
@@ -8190,6 +8200,7 @@ var _requiredRules = {
8190
8200
  "no-unmodified-loop-condition": "warn",
8191
8201
  "no-constant-condition": "warn",
8192
8202
  "for-direction": "warn",
8203
+ [`${_PLUGIN_NAME}/no-secrets`]: ["error", noSecretsOptions],
8193
8204
  [`${_PLUGIN_NAME}/valid-extension-interface`]: "warn"
8194
8205
  };
8195
8206
  var _recommendedRules = {
@@ -7535,6 +7535,16 @@ var originalRule = noSecrets.rules["no-secrets"];
7535
7535
  if (!originalRule) {
7536
7536
  throw new Error("Expected rule 'no-secrets' not found in eslint-plugin-no-secrets");
7537
7537
  }
7538
+ var noSecretsOptions = {
7539
+ tolerance: 5,
7540
+ // High enough to avoid false-positives on normal identifiers.
7541
+ ignoreModules: true,
7542
+ additionalRegexes: {
7543
+ "Stripe Secret Key": "sk_(live|test)_[a-zA-Z0-9]{20,}",
7544
+ "Stripe Restricted Key": "rk_(live|test)_[a-zA-Z0-9]{20,}",
7545
+ "Stripe Webhook Secret": "whsec_[a-zA-Z0-9+/=]{20,}"
7546
+ }
7547
+ };
7538
7548
  var rule = {
7539
7549
  ...originalRule,
7540
7550
  meta: {
@@ -8156,6 +8166,7 @@ var _requiredRules = {
8156
8166
  "no-unmodified-loop-condition": "warn",
8157
8167
  "no-constant-condition": "warn",
8158
8168
  "for-direction": "warn",
8169
+ [`${_PLUGIN_NAME}/no-secrets`]: ["error", noSecretsOptions],
8159
8170
  [`${_PLUGIN_NAME}/valid-extension-interface`]: "warn"
8160
8171
  };
8161
8172
  var _recommendedRules = {
@@ -7559,6 +7559,16 @@ var originalRule = noSecrets.rules["no-secrets"];
7559
7559
  if (!originalRule) {
7560
7560
  throw new Error("Expected rule 'no-secrets' not found in eslint-plugin-no-secrets");
7561
7561
  }
7562
+ var noSecretsOptions = {
7563
+ tolerance: 5,
7564
+ // High enough to avoid false-positives on normal identifiers.
7565
+ ignoreModules: true,
7566
+ additionalRegexes: {
7567
+ "Stripe Secret Key": "sk_(live|test)_[a-zA-Z0-9]{20,}",
7568
+ "Stripe Restricted Key": "rk_(live|test)_[a-zA-Z0-9]{20,}",
7569
+ "Stripe Webhook Secret": "whsec_[a-zA-Z0-9+/=]{20,}"
7570
+ }
7571
+ };
7562
7572
  var rule = {
7563
7573
  ...originalRule,
7564
7574
  meta: {
@@ -8180,6 +8190,7 @@ var _requiredRules = {
8180
8190
  "no-unmodified-loop-condition": "warn",
8181
8191
  "no-constant-condition": "warn",
8182
8192
  "for-direction": "warn",
8193
+ [`${_PLUGIN_NAME}/no-secrets`]: ["error", noSecretsOptions],
8183
8194
  [`${_PLUGIN_NAME}/valid-extension-interface`]: "warn"
8184
8195
  };
8185
8196
  var _recommendedRules = {
@@ -7525,6 +7525,16 @@ var originalRule = noSecrets.rules["no-secrets"];
7525
7525
  if (!originalRule) {
7526
7526
  throw new Error("Expected rule 'no-secrets' not found in eslint-plugin-no-secrets");
7527
7527
  }
7528
+ var noSecretsOptions = {
7529
+ tolerance: 5,
7530
+ // High enough to avoid false-positives on normal identifiers.
7531
+ ignoreModules: true,
7532
+ additionalRegexes: {
7533
+ "Stripe Secret Key": "sk_(live|test)_[a-zA-Z0-9]{20,}",
7534
+ "Stripe Restricted Key": "rk_(live|test)_[a-zA-Z0-9]{20,}",
7535
+ "Stripe Webhook Secret": "whsec_[a-zA-Z0-9+/=]{20,}"
7536
+ }
7537
+ };
7528
7538
  var rule = {
7529
7539
  ...originalRule,
7530
7540
  meta: {
@@ -8146,6 +8156,7 @@ var _requiredRules = {
8146
8156
  "no-unmodified-loop-condition": "warn",
8147
8157
  "no-constant-condition": "warn",
8148
8158
  "for-direction": "warn",
8159
+ [`${_PLUGIN_NAME}/no-secrets`]: ["error", noSecretsOptions],
8149
8160
  [`${_PLUGIN_NAME}/valid-extension-interface`]: "warn"
8150
8161
  };
8151
8162
  var _recommendedRules = {
@@ -7559,6 +7559,16 @@ var originalRule = noSecrets.rules["no-secrets"];
7559
7559
  if (!originalRule) {
7560
7560
  throw new Error("Expected rule 'no-secrets' not found in eslint-plugin-no-secrets");
7561
7561
  }
7562
+ var noSecretsOptions = {
7563
+ tolerance: 5,
7564
+ // High enough to avoid false-positives on normal identifiers.
7565
+ ignoreModules: true,
7566
+ additionalRegexes: {
7567
+ "Stripe Secret Key": "sk_(live|test)_[a-zA-Z0-9]{20,}",
7568
+ "Stripe Restricted Key": "rk_(live|test)_[a-zA-Z0-9]{20,}",
7569
+ "Stripe Webhook Secret": "whsec_[a-zA-Z0-9+/=]{20,}"
7570
+ }
7571
+ };
7562
7572
  var rule = {
7563
7573
  ...originalRule,
7564
7574
  meta: {
@@ -8180,6 +8190,7 @@ var _requiredRules = {
8180
8190
  "no-unmodified-loop-condition": "warn",
8181
8191
  "no-constant-condition": "warn",
8182
8192
  "for-direction": "warn",
8193
+ [`${_PLUGIN_NAME}/no-secrets`]: ["error", noSecretsOptions],
8183
8194
  [`${_PLUGIN_NAME}/valid-extension-interface`]: "warn"
8184
8195
  };
8185
8196
  var _recommendedRules = {
@@ -7525,6 +7525,16 @@ var originalRule = noSecrets.rules["no-secrets"];
7525
7525
  if (!originalRule) {
7526
7526
  throw new Error("Expected rule 'no-secrets' not found in eslint-plugin-no-secrets");
7527
7527
  }
7528
+ var noSecretsOptions = {
7529
+ tolerance: 5,
7530
+ // High enough to avoid false-positives on normal identifiers.
7531
+ ignoreModules: true,
7532
+ additionalRegexes: {
7533
+ "Stripe Secret Key": "sk_(live|test)_[a-zA-Z0-9]{20,}",
7534
+ "Stripe Restricted Key": "rk_(live|test)_[a-zA-Z0-9]{20,}",
7535
+ "Stripe Webhook Secret": "whsec_[a-zA-Z0-9+/=]{20,}"
7536
+ }
7537
+ };
7528
7538
  var rule = {
7529
7539
  ...originalRule,
7530
7540
  meta: {
@@ -8146,6 +8156,7 @@ var _requiredRules = {
8146
8156
  "no-unmodified-loop-condition": "warn",
8147
8157
  "no-constant-condition": "warn",
8148
8158
  "for-direction": "warn",
8159
+ [`${_PLUGIN_NAME}/no-secrets`]: ["error", noSecretsOptions],
8149
8160
  [`${_PLUGIN_NAME}/valid-extension-interface`]: "warn"
8150
8161
  };
8151
8162
  var _recommendedRules = {
package/dist/index.cjs CHANGED
@@ -36872,6 +36872,16 @@ var originalRule = noSecrets.rules["no-secrets"];
36872
36872
  if (!originalRule) {
36873
36873
  throw new Error("Expected rule 'no-secrets' not found in eslint-plugin-no-secrets");
36874
36874
  }
36875
+ var noSecretsOptions = {
36876
+ tolerance: 5,
36877
+ // High enough to avoid false-positives on normal identifiers.
36878
+ ignoreModules: true,
36879
+ additionalRegexes: {
36880
+ "Stripe Secret Key": "sk_(live|test)_[a-zA-Z0-9]{20,}",
36881
+ "Stripe Restricted Key": "rk_(live|test)_[a-zA-Z0-9]{20,}",
36882
+ "Stripe Webhook Secret": "whsec_[a-zA-Z0-9+/=]{20,}"
36883
+ }
36884
+ };
36875
36885
  var rule16 = {
36876
36886
  ...originalRule,
36877
36887
  meta: {
@@ -37274,6 +37284,7 @@ var _requiredRules = {
37274
37284
  "no-unmodified-loop-condition": "warn",
37275
37285
  "no-constant-condition": "warn",
37276
37286
  "for-direction": "warn",
37287
+ [`${_PLUGIN_NAME}/no-secrets`]: ["error", noSecretsOptions],
37277
37288
  [`${_PLUGIN_NAME}/valid-extension-interface`]: "warn"
37278
37289
  };
37279
37290
  var _recommendedRules = {
@@ -1 +1 @@
1
- {"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../src/index.ts"],"names":[],"mappings":"AAAA;;;;;;;;;;;;;;;;;GAiBG;AAEH,OAAO,KAAK,EAAE,MAAM,EAAE,MAAM,EAAE,MAAM,QAAQ,CAAC;AA0B7C;;;GAGG;AACH,eAAO,MAAM,YAAY,wCAAwC,CAAC;AAClE;;;GAGG;AACH,eAAO,MAAM,0BAA0B,OAAO,CAAC;AAE/C;;;GAGG;AACH,eAAO,MAAM,yBAAyB,EAAE,MAAM,CAAC,MAE9C,CAAC;AAEF;;;GAGG;AACH,eAAO,MAAM,wBAAwB,EAAE,MAAM,CAAC,MAE7C,CAAC;AAEF;;;GAGG;AACH,eAAO,MAAM,cAAc,EAAE,MAAM,CAAC,WAWnC,CAAC;AAEF;;;;;;GAMG;AACH,eAAO,MAAM,iBAAiB,EAAE,MAAM,CAAC,WAmBtC,CAAC;AAEF;;;GAGG;AACH,eAAO,MAAM,YAAY,EAAE,MAAM,CAAC,WAOjC,CAAC;AAIF;;;;;;;GAOG;AACH,QAAA,MAAM,MAAM,EAAE,MAAM,CAAC,MAAM,EAwG1B,CAAC;AAEF,eAAe,MAAM,CAAC;AACtB,OAAO,EAAE,MAAM,IAAI,gBAAgB,EAAE,CAAC"}
1
+ {"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../src/index.ts"],"names":[],"mappings":"AAAA;;;;;;;;;;;;;;;;;GAiBG;AAEH,OAAO,KAAK,EAAE,MAAM,EAAE,MAAM,EAAE,MAAM,QAAQ,CAAC;AA2B7C;;;GAGG;AACH,eAAO,MAAM,YAAY,wCAAwC,CAAC;AAClE;;;GAGG;AACH,eAAO,MAAM,0BAA0B,OAAO,CAAC;AAE/C;;;GAGG;AACH,eAAO,MAAM,yBAAyB,EAAE,MAAM,CAAC,MAE9C,CAAC;AAEF;;;GAGG;AACH,eAAO,MAAM,wBAAwB,EAAE,MAAM,CAAC,MAE7C,CAAC;AAEF;;;GAGG;AACH,eAAO,MAAM,cAAc,EAAE,MAAM,CAAC,WAYnC,CAAC;AAEF;;;;;;GAMG;AACH,eAAO,MAAM,iBAAiB,EAAE,MAAM,CAAC,WAmBtC,CAAC;AAEF;;;GAGG;AACH,eAAO,MAAM,YAAY,EAAE,MAAM,CAAC,WAOjC,CAAC;AAIF;;;;;;;GAOG;AACH,QAAA,MAAM,MAAM,EAAE,MAAM,CAAC,MAAM,EAwG1B,CAAC;AAEF,eAAe,MAAM,CAAC;AACtB,OAAO,EAAE,MAAM,IAAI,gBAAgB,EAAE,CAAC"}