@stripe/extensibility-eslint-plugin 0.15.4 → 0.15.6
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +34 -0
- package/dist/api-surface.d.ts.map +1 -0
- package/dist/configs/async-with-egress.cjs +11 -0
- package/dist/configs/async-with-egress.js +11 -0
- package/dist/configs/billing.bill.discount_calculation.cjs +11 -0
- package/dist/configs/billing.bill.discount_calculation.js +11 -0
- package/dist/configs/billing.customer_balance_application.cjs +11 -0
- package/dist/configs/billing.customer_balance_application.js +11 -0
- package/dist/configs/billing.invoice_collection_setting.cjs +11 -0
- package/dist/configs/billing.invoice_collection_setting.js +11 -0
- package/dist/configs/billing.prorations.cjs +11 -0
- package/dist/configs/billing.prorations.js +11 -0
- package/dist/configs/billing.recurring_billing_item_handling.cjs +11 -0
- package/dist/configs/billing.recurring_billing_item_handling.js +11 -0
- package/dist/configs/core.workflows.custom_action.cjs +11 -0
- package/dist/configs/core.workflows.custom_action.js +11 -0
- package/dist/configs/custom-objects.cjs +11 -0
- package/dist/configs/custom-objects.js +11 -0
- package/dist/configs/extend.objects.custom_objects.cjs +11 -0
- package/dist/configs/extend.objects.custom_objects.js +11 -0
- package/dist/configs/extend.workflows.custom_action.cjs +11 -0
- package/dist/configs/extend.workflows.custom_action.js +11 -0
- package/dist/configs/runtime-core.cjs +11 -0
- package/dist/configs/runtime-core.js +11 -0
- package/dist/configs/sync-no-egress.cjs +11 -0
- package/dist/configs/sync-no-egress.js +11 -0
- package/dist/index.cjs +11 -0
- package/dist/index.d.ts.map +1 -1
- package/dist/index.js +11 -0
- package/dist/rule-config.d.ts.map +1 -1
- package/dist/security-rules/no-secrets.d.ts +13 -0
- package/dist/security-rules/no-secrets.d.ts.map +1 -1
- package/dist/tsconfig.build.tsbuildinfo +1 -1
- package/package.json +3 -3
- package/dist/extensibility-eslint-plugin-alpha.d.ts +0 -49
- package/dist/extensibility-eslint-plugin-beta.d.ts +0 -49
- package/dist/extensibility-eslint-plugin-billing.bill.discount_calculation-alpha.d.ts +0 -11
- package/dist/extensibility-eslint-plugin-billing.bill.discount_calculation-beta.d.ts +0 -11
- package/dist/extensibility-eslint-plugin-billing.bill.discount_calculation-internal.d.ts +0 -11
- package/dist/extensibility-eslint-plugin-billing.bill.discount_calculation-public.d.ts +0 -11
- package/dist/extensibility-eslint-plugin-billing.customer_balance_application-alpha.d.ts +0 -11
- package/dist/extensibility-eslint-plugin-billing.customer_balance_application-beta.d.ts +0 -11
- package/dist/extensibility-eslint-plugin-billing.customer_balance_application-internal.d.ts +0 -11
- package/dist/extensibility-eslint-plugin-billing.customer_balance_application-public.d.ts +0 -11
- package/dist/extensibility-eslint-plugin-billing.invoice_collection_setting-alpha.d.ts +0 -11
- package/dist/extensibility-eslint-plugin-billing.invoice_collection_setting-beta.d.ts +0 -11
- package/dist/extensibility-eslint-plugin-billing.invoice_collection_setting-internal.d.ts +0 -11
- package/dist/extensibility-eslint-plugin-billing.invoice_collection_setting-public.d.ts +0 -11
- package/dist/extensibility-eslint-plugin-billing.prorations-alpha.d.ts +0 -10
- package/dist/extensibility-eslint-plugin-billing.prorations-beta.d.ts +0 -10
- package/dist/extensibility-eslint-plugin-billing.prorations-internal.d.ts +0 -10
- package/dist/extensibility-eslint-plugin-billing.prorations-public.d.ts +0 -10
- package/dist/extensibility-eslint-plugin-billing.recurring_billing_item_handling-alpha.d.ts +0 -11
- package/dist/extensibility-eslint-plugin-billing.recurring_billing_item_handling-beta.d.ts +0 -11
- package/dist/extensibility-eslint-plugin-billing.recurring_billing_item_handling-internal.d.ts +0 -11
- package/dist/extensibility-eslint-plugin-billing.recurring_billing_item_handling-public.d.ts +0 -11
- package/dist/extensibility-eslint-plugin-core.workflows.custom_action-alpha.d.ts +0 -11
- package/dist/extensibility-eslint-plugin-core.workflows.custom_action-beta.d.ts +0 -11
- package/dist/extensibility-eslint-plugin-core.workflows.custom_action-internal.d.ts +0 -11
- package/dist/extensibility-eslint-plugin-core.workflows.custom_action-public.d.ts +0 -11
- package/dist/extensibility-eslint-plugin-custom-objects-alpha.d.ts +0 -11
- package/dist/extensibility-eslint-plugin-custom-objects-beta.d.ts +0 -11
- package/dist/extensibility-eslint-plugin-custom-objects-internal.d.ts +0 -11
- package/dist/extensibility-eslint-plugin-custom-objects-public.d.ts +0 -11
- package/dist/extensibility-eslint-plugin-extend.objects.custom_objects-alpha.d.ts +0 -11
- package/dist/extensibility-eslint-plugin-extend.objects.custom_objects-beta.d.ts +0 -11
- package/dist/extensibility-eslint-plugin-extend.objects.custom_objects-internal.d.ts +0 -11
- package/dist/extensibility-eslint-plugin-extend.objects.custom_objects-public.d.ts +0 -11
- package/dist/extensibility-eslint-plugin-extend.workflows.custom_action-alpha.d.ts +0 -11
- package/dist/extensibility-eslint-plugin-extend.workflows.custom_action-beta.d.ts +0 -11
- package/dist/extensibility-eslint-plugin-extend.workflows.custom_action-internal.d.ts +0 -11
- package/dist/extensibility-eslint-plugin-extend.workflows.custom_action-public.d.ts +0 -11
- package/dist/extensibility-eslint-plugin-internal.d.ts +0 -80
- package/dist/extensibility-eslint-plugin-public.d.ts +0 -49
package/README.md
ADDED
|
@@ -0,0 +1,34 @@
|
|
|
1
|
+
# @stripe/extensibility-eslint-plugin
|
|
2
|
+
|
|
3
|
+
ESLint plugin and flat config for Stripe Apps development. Includes security checks, code quality rules, and FormSpec type-safety rules.
|
|
4
|
+
|
|
5
|
+
## Installation
|
|
6
|
+
|
|
7
|
+
```bash
|
|
8
|
+
npm install --save-dev @stripe/extensibility-eslint-plugin
|
|
9
|
+
```
|
|
10
|
+
|
|
11
|
+
Requires `eslint ^9.0.0` and `typescript ^5.8.0` as peer dependencies. The default config uses `@typescript-eslint` rules, so you also need `typescript-eslint` installed:
|
|
12
|
+
|
|
13
|
+
```bash
|
|
14
|
+
npm install --save-dev eslint typescript typescript-eslint
|
|
15
|
+
```
|
|
16
|
+
|
|
17
|
+
## Usage
|
|
18
|
+
|
|
19
|
+
Add the default config to your `eslint.config.mjs`:
|
|
20
|
+
|
|
21
|
+
```javascript
|
|
22
|
+
import stripeAppsConfig from '@stripe/extensibility-eslint-plugin';
|
|
23
|
+
|
|
24
|
+
export default [
|
|
25
|
+
...stripeAppsConfig,
|
|
26
|
+
// Your custom rules here
|
|
27
|
+
];
|
|
28
|
+
```
|
|
29
|
+
|
|
30
|
+
## Exported configs
|
|
31
|
+
|
|
32
|
+
| Export | Description |
|
|
33
|
+
| ------------------------------ | -------------------------------------------------- |
|
|
34
|
+
| `default` / `stripeAppsConfig` | Full flat config with recommended + FormSpec rules |
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"api-surface.d.ts","sourceRoot":"","sources":["../src/api-surface.ts"],"names":[],"mappings":"AAAA;;;;;;;GAOG;AAEH,OAAO,KAAK,aAAa,MAAM,6BAA6B,CAAC;AAC7D,OAAO,KAAK,iCAAiC,MAAM,mDAAmD,CAAC;AACvG,OAAO,KAAK,8BAA8B,MAAM,gDAAgD,CAAC;AACjG,OAAO,KAAK,+BAA+B,MAAM,iDAAiD,CAAC;AACnG,OAAO,KAAK,iBAAiB,MAAM,iCAAiC,CAAC;AACrE,OAAO,KAAK,mCAAmC,MAAM,sDAAsD,CAAC;AAC5G,OAAO,KAAK,yBAAyB,MAAM,2CAA2C,CAAC;AACvF,OAAO,KAAK,0BAA0B,MAAM,4CAA4C,CAAC;AACzF,OAAO,KAAK,2BAA2B,MAAM,6CAA6C,CAAC;AAE3F,cAAc,YAAY,CAAC;AAE3B,cAAc;AACd,OAAO,EAAE,aAAa,EAAE,CAAC;AAEzB,cAAc;AACd,OAAO,EAAE,iCAAiC,EAAE,CAAC;AAE7C,cAAc;AACd,OAAO,EAAE,8BAA8B,EAAE,CAAC;AAE1C,cAAc;AACd,OAAO,EAAE,+BAA+B,EAAE,CAAC;AAE3C,cAAc;AACd,OAAO,EAAE,iBAAiB,EAAE,CAAC;AAE7B,cAAc;AACd,OAAO,EAAE,mCAAmC,EAAE,CAAC;AAE/C,cAAc;AACd,OAAO,EAAE,yBAAyB,EAAE,CAAC;AAErC,cAAc;AACd,OAAO,EAAE,0BAA0B,EAAE,CAAC;AAEtC,cAAc;AACd,OAAO,EAAE,2BAA2B,EAAE,CAAC"}
|
|
@@ -7559,6 +7559,16 @@ var originalRule = noSecrets.rules["no-secrets"];
|
|
|
7559
7559
|
if (!originalRule) {
|
|
7560
7560
|
throw new Error("Expected rule 'no-secrets' not found in eslint-plugin-no-secrets");
|
|
7561
7561
|
}
|
|
7562
|
+
var noSecretsOptions = {
|
|
7563
|
+
tolerance: 5,
|
|
7564
|
+
// High enough to avoid false-positives on normal identifiers.
|
|
7565
|
+
ignoreModules: true,
|
|
7566
|
+
additionalRegexes: {
|
|
7567
|
+
"Stripe Secret Key": "sk_(live|test)_[a-zA-Z0-9]{20,}",
|
|
7568
|
+
"Stripe Restricted Key": "rk_(live|test)_[a-zA-Z0-9]{20,}",
|
|
7569
|
+
"Stripe Webhook Secret": "whsec_[a-zA-Z0-9+/=]{20,}"
|
|
7570
|
+
}
|
|
7571
|
+
};
|
|
7562
7572
|
var rule = {
|
|
7563
7573
|
...originalRule,
|
|
7564
7574
|
meta: {
|
|
@@ -8180,6 +8190,7 @@ var _requiredRules = {
|
|
|
8180
8190
|
"no-unmodified-loop-condition": "warn",
|
|
8181
8191
|
"no-constant-condition": "warn",
|
|
8182
8192
|
"for-direction": "warn",
|
|
8193
|
+
[`${_PLUGIN_NAME}/no-secrets`]: ["error", noSecretsOptions],
|
|
8183
8194
|
[`${_PLUGIN_NAME}/valid-extension-interface`]: "warn"
|
|
8184
8195
|
};
|
|
8185
8196
|
var _recommendedRules = {
|
|
@@ -7525,6 +7525,16 @@ var originalRule = noSecrets.rules["no-secrets"];
|
|
|
7525
7525
|
if (!originalRule) {
|
|
7526
7526
|
throw new Error("Expected rule 'no-secrets' not found in eslint-plugin-no-secrets");
|
|
7527
7527
|
}
|
|
7528
|
+
var noSecretsOptions = {
|
|
7529
|
+
tolerance: 5,
|
|
7530
|
+
// High enough to avoid false-positives on normal identifiers.
|
|
7531
|
+
ignoreModules: true,
|
|
7532
|
+
additionalRegexes: {
|
|
7533
|
+
"Stripe Secret Key": "sk_(live|test)_[a-zA-Z0-9]{20,}",
|
|
7534
|
+
"Stripe Restricted Key": "rk_(live|test)_[a-zA-Z0-9]{20,}",
|
|
7535
|
+
"Stripe Webhook Secret": "whsec_[a-zA-Z0-9+/=]{20,}"
|
|
7536
|
+
}
|
|
7537
|
+
};
|
|
7528
7538
|
var rule = {
|
|
7529
7539
|
...originalRule,
|
|
7530
7540
|
meta: {
|
|
@@ -8146,6 +8156,7 @@ var _requiredRules = {
|
|
|
8146
8156
|
"no-unmodified-loop-condition": "warn",
|
|
8147
8157
|
"no-constant-condition": "warn",
|
|
8148
8158
|
"for-direction": "warn",
|
|
8159
|
+
[`${_PLUGIN_NAME}/no-secrets`]: ["error", noSecretsOptions],
|
|
8149
8160
|
[`${_PLUGIN_NAME}/valid-extension-interface`]: "warn"
|
|
8150
8161
|
};
|
|
8151
8162
|
var _recommendedRules = {
|
|
@@ -7569,6 +7569,16 @@ var originalRule = noSecrets.rules["no-secrets"];
|
|
|
7569
7569
|
if (!originalRule) {
|
|
7570
7570
|
throw new Error("Expected rule 'no-secrets' not found in eslint-plugin-no-secrets");
|
|
7571
7571
|
}
|
|
7572
|
+
var noSecretsOptions = {
|
|
7573
|
+
tolerance: 5,
|
|
7574
|
+
// High enough to avoid false-positives on normal identifiers.
|
|
7575
|
+
ignoreModules: true,
|
|
7576
|
+
additionalRegexes: {
|
|
7577
|
+
"Stripe Secret Key": "sk_(live|test)_[a-zA-Z0-9]{20,}",
|
|
7578
|
+
"Stripe Restricted Key": "rk_(live|test)_[a-zA-Z0-9]{20,}",
|
|
7579
|
+
"Stripe Webhook Secret": "whsec_[a-zA-Z0-9+/=]{20,}"
|
|
7580
|
+
}
|
|
7581
|
+
};
|
|
7572
7582
|
var rule = {
|
|
7573
7583
|
...originalRule,
|
|
7574
7584
|
meta: {
|
|
@@ -8190,6 +8200,7 @@ var _requiredRules = {
|
|
|
8190
8200
|
"no-unmodified-loop-condition": "warn",
|
|
8191
8201
|
"no-constant-condition": "warn",
|
|
8192
8202
|
"for-direction": "warn",
|
|
8203
|
+
[`${_PLUGIN_NAME}/no-secrets`]: ["error", noSecretsOptions],
|
|
8193
8204
|
[`${_PLUGIN_NAME}/valid-extension-interface`]: "warn"
|
|
8194
8205
|
};
|
|
8195
8206
|
var _recommendedRules = {
|
|
@@ -7535,6 +7535,16 @@ var originalRule = noSecrets.rules["no-secrets"];
|
|
|
7535
7535
|
if (!originalRule) {
|
|
7536
7536
|
throw new Error("Expected rule 'no-secrets' not found in eslint-plugin-no-secrets");
|
|
7537
7537
|
}
|
|
7538
|
+
var noSecretsOptions = {
|
|
7539
|
+
tolerance: 5,
|
|
7540
|
+
// High enough to avoid false-positives on normal identifiers.
|
|
7541
|
+
ignoreModules: true,
|
|
7542
|
+
additionalRegexes: {
|
|
7543
|
+
"Stripe Secret Key": "sk_(live|test)_[a-zA-Z0-9]{20,}",
|
|
7544
|
+
"Stripe Restricted Key": "rk_(live|test)_[a-zA-Z0-9]{20,}",
|
|
7545
|
+
"Stripe Webhook Secret": "whsec_[a-zA-Z0-9+/=]{20,}"
|
|
7546
|
+
}
|
|
7547
|
+
};
|
|
7538
7548
|
var rule = {
|
|
7539
7549
|
...originalRule,
|
|
7540
7550
|
meta: {
|
|
@@ -8156,6 +8166,7 @@ var _requiredRules = {
|
|
|
8156
8166
|
"no-unmodified-loop-condition": "warn",
|
|
8157
8167
|
"no-constant-condition": "warn",
|
|
8158
8168
|
"for-direction": "warn",
|
|
8169
|
+
[`${_PLUGIN_NAME}/no-secrets`]: ["error", noSecretsOptions],
|
|
8159
8170
|
[`${_PLUGIN_NAME}/valid-extension-interface`]: "warn"
|
|
8160
8171
|
};
|
|
8161
8172
|
var _recommendedRules = {
|
|
@@ -7569,6 +7569,16 @@ var originalRule = noSecrets.rules["no-secrets"];
|
|
|
7569
7569
|
if (!originalRule) {
|
|
7570
7570
|
throw new Error("Expected rule 'no-secrets' not found in eslint-plugin-no-secrets");
|
|
7571
7571
|
}
|
|
7572
|
+
var noSecretsOptions = {
|
|
7573
|
+
tolerance: 5,
|
|
7574
|
+
// High enough to avoid false-positives on normal identifiers.
|
|
7575
|
+
ignoreModules: true,
|
|
7576
|
+
additionalRegexes: {
|
|
7577
|
+
"Stripe Secret Key": "sk_(live|test)_[a-zA-Z0-9]{20,}",
|
|
7578
|
+
"Stripe Restricted Key": "rk_(live|test)_[a-zA-Z0-9]{20,}",
|
|
7579
|
+
"Stripe Webhook Secret": "whsec_[a-zA-Z0-9+/=]{20,}"
|
|
7580
|
+
}
|
|
7581
|
+
};
|
|
7572
7582
|
var rule = {
|
|
7573
7583
|
...originalRule,
|
|
7574
7584
|
meta: {
|
|
@@ -8190,6 +8200,7 @@ var _requiredRules = {
|
|
|
8190
8200
|
"no-unmodified-loop-condition": "warn",
|
|
8191
8201
|
"no-constant-condition": "warn",
|
|
8192
8202
|
"for-direction": "warn",
|
|
8203
|
+
[`${_PLUGIN_NAME}/no-secrets`]: ["error", noSecretsOptions],
|
|
8193
8204
|
[`${_PLUGIN_NAME}/valid-extension-interface`]: "warn"
|
|
8194
8205
|
};
|
|
8195
8206
|
var _recommendedRules = {
|
|
@@ -7535,6 +7535,16 @@ var originalRule = noSecrets.rules["no-secrets"];
|
|
|
7535
7535
|
if (!originalRule) {
|
|
7536
7536
|
throw new Error("Expected rule 'no-secrets' not found in eslint-plugin-no-secrets");
|
|
7537
7537
|
}
|
|
7538
|
+
var noSecretsOptions = {
|
|
7539
|
+
tolerance: 5,
|
|
7540
|
+
// High enough to avoid false-positives on normal identifiers.
|
|
7541
|
+
ignoreModules: true,
|
|
7542
|
+
additionalRegexes: {
|
|
7543
|
+
"Stripe Secret Key": "sk_(live|test)_[a-zA-Z0-9]{20,}",
|
|
7544
|
+
"Stripe Restricted Key": "rk_(live|test)_[a-zA-Z0-9]{20,}",
|
|
7545
|
+
"Stripe Webhook Secret": "whsec_[a-zA-Z0-9+/=]{20,}"
|
|
7546
|
+
}
|
|
7547
|
+
};
|
|
7538
7548
|
var rule = {
|
|
7539
7549
|
...originalRule,
|
|
7540
7550
|
meta: {
|
|
@@ -8156,6 +8166,7 @@ var _requiredRules = {
|
|
|
8156
8166
|
"no-unmodified-loop-condition": "warn",
|
|
8157
8167
|
"no-constant-condition": "warn",
|
|
8158
8168
|
"for-direction": "warn",
|
|
8169
|
+
[`${_PLUGIN_NAME}/no-secrets`]: ["error", noSecretsOptions],
|
|
8159
8170
|
[`${_PLUGIN_NAME}/valid-extension-interface`]: "warn"
|
|
8160
8171
|
};
|
|
8161
8172
|
var _recommendedRules = {
|
|
@@ -7569,6 +7569,16 @@ var originalRule = noSecrets.rules["no-secrets"];
|
|
|
7569
7569
|
if (!originalRule) {
|
|
7570
7570
|
throw new Error("Expected rule 'no-secrets' not found in eslint-plugin-no-secrets");
|
|
7571
7571
|
}
|
|
7572
|
+
var noSecretsOptions = {
|
|
7573
|
+
tolerance: 5,
|
|
7574
|
+
// High enough to avoid false-positives on normal identifiers.
|
|
7575
|
+
ignoreModules: true,
|
|
7576
|
+
additionalRegexes: {
|
|
7577
|
+
"Stripe Secret Key": "sk_(live|test)_[a-zA-Z0-9]{20,}",
|
|
7578
|
+
"Stripe Restricted Key": "rk_(live|test)_[a-zA-Z0-9]{20,}",
|
|
7579
|
+
"Stripe Webhook Secret": "whsec_[a-zA-Z0-9+/=]{20,}"
|
|
7580
|
+
}
|
|
7581
|
+
};
|
|
7572
7582
|
var rule = {
|
|
7573
7583
|
...originalRule,
|
|
7574
7584
|
meta: {
|
|
@@ -8190,6 +8200,7 @@ var _requiredRules = {
|
|
|
8190
8200
|
"no-unmodified-loop-condition": "warn",
|
|
8191
8201
|
"no-constant-condition": "warn",
|
|
8192
8202
|
"for-direction": "warn",
|
|
8203
|
+
[`${_PLUGIN_NAME}/no-secrets`]: ["error", noSecretsOptions],
|
|
8193
8204
|
[`${_PLUGIN_NAME}/valid-extension-interface`]: "warn"
|
|
8194
8205
|
};
|
|
8195
8206
|
var _recommendedRules = {
|
|
@@ -7535,6 +7535,16 @@ var originalRule = noSecrets.rules["no-secrets"];
|
|
|
7535
7535
|
if (!originalRule) {
|
|
7536
7536
|
throw new Error("Expected rule 'no-secrets' not found in eslint-plugin-no-secrets");
|
|
7537
7537
|
}
|
|
7538
|
+
var noSecretsOptions = {
|
|
7539
|
+
tolerance: 5,
|
|
7540
|
+
// High enough to avoid false-positives on normal identifiers.
|
|
7541
|
+
ignoreModules: true,
|
|
7542
|
+
additionalRegexes: {
|
|
7543
|
+
"Stripe Secret Key": "sk_(live|test)_[a-zA-Z0-9]{20,}",
|
|
7544
|
+
"Stripe Restricted Key": "rk_(live|test)_[a-zA-Z0-9]{20,}",
|
|
7545
|
+
"Stripe Webhook Secret": "whsec_[a-zA-Z0-9+/=]{20,}"
|
|
7546
|
+
}
|
|
7547
|
+
};
|
|
7538
7548
|
var rule = {
|
|
7539
7549
|
...originalRule,
|
|
7540
7550
|
meta: {
|
|
@@ -8156,6 +8166,7 @@ var _requiredRules = {
|
|
|
8156
8166
|
"no-unmodified-loop-condition": "warn",
|
|
8157
8167
|
"no-constant-condition": "warn",
|
|
8158
8168
|
"for-direction": "warn",
|
|
8169
|
+
[`${_PLUGIN_NAME}/no-secrets`]: ["error", noSecretsOptions],
|
|
8159
8170
|
[`${_PLUGIN_NAME}/valid-extension-interface`]: "warn"
|
|
8160
8171
|
};
|
|
8161
8172
|
var _recommendedRules = {
|
|
@@ -7569,6 +7569,16 @@ var originalRule = noSecrets.rules["no-secrets"];
|
|
|
7569
7569
|
if (!originalRule) {
|
|
7570
7570
|
throw new Error("Expected rule 'no-secrets' not found in eslint-plugin-no-secrets");
|
|
7571
7571
|
}
|
|
7572
|
+
var noSecretsOptions = {
|
|
7573
|
+
tolerance: 5,
|
|
7574
|
+
// High enough to avoid false-positives on normal identifiers.
|
|
7575
|
+
ignoreModules: true,
|
|
7576
|
+
additionalRegexes: {
|
|
7577
|
+
"Stripe Secret Key": "sk_(live|test)_[a-zA-Z0-9]{20,}",
|
|
7578
|
+
"Stripe Restricted Key": "rk_(live|test)_[a-zA-Z0-9]{20,}",
|
|
7579
|
+
"Stripe Webhook Secret": "whsec_[a-zA-Z0-9+/=]{20,}"
|
|
7580
|
+
}
|
|
7581
|
+
};
|
|
7572
7582
|
var rule = {
|
|
7573
7583
|
...originalRule,
|
|
7574
7584
|
meta: {
|
|
@@ -8190,6 +8200,7 @@ var _requiredRules = {
|
|
|
8190
8200
|
"no-unmodified-loop-condition": "warn",
|
|
8191
8201
|
"no-constant-condition": "warn",
|
|
8192
8202
|
"for-direction": "warn",
|
|
8203
|
+
[`${_PLUGIN_NAME}/no-secrets`]: ["error", noSecretsOptions],
|
|
8193
8204
|
[`${_PLUGIN_NAME}/valid-extension-interface`]: "warn"
|
|
8194
8205
|
};
|
|
8195
8206
|
var _recommendedRules = {
|
|
@@ -7535,6 +7535,16 @@ var originalRule = noSecrets.rules["no-secrets"];
|
|
|
7535
7535
|
if (!originalRule) {
|
|
7536
7536
|
throw new Error("Expected rule 'no-secrets' not found in eslint-plugin-no-secrets");
|
|
7537
7537
|
}
|
|
7538
|
+
var noSecretsOptions = {
|
|
7539
|
+
tolerance: 5,
|
|
7540
|
+
// High enough to avoid false-positives on normal identifiers.
|
|
7541
|
+
ignoreModules: true,
|
|
7542
|
+
additionalRegexes: {
|
|
7543
|
+
"Stripe Secret Key": "sk_(live|test)_[a-zA-Z0-9]{20,}",
|
|
7544
|
+
"Stripe Restricted Key": "rk_(live|test)_[a-zA-Z0-9]{20,}",
|
|
7545
|
+
"Stripe Webhook Secret": "whsec_[a-zA-Z0-9+/=]{20,}"
|
|
7546
|
+
}
|
|
7547
|
+
};
|
|
7538
7548
|
var rule = {
|
|
7539
7549
|
...originalRule,
|
|
7540
7550
|
meta: {
|
|
@@ -8156,6 +8166,7 @@ var _requiredRules = {
|
|
|
8156
8166
|
"no-unmodified-loop-condition": "warn",
|
|
8157
8167
|
"no-constant-condition": "warn",
|
|
8158
8168
|
"for-direction": "warn",
|
|
8169
|
+
[`${_PLUGIN_NAME}/no-secrets`]: ["error", noSecretsOptions],
|
|
8159
8170
|
[`${_PLUGIN_NAME}/valid-extension-interface`]: "warn"
|
|
8160
8171
|
};
|
|
8161
8172
|
var _recommendedRules = {
|
|
@@ -7569,6 +7569,16 @@ var originalRule = noSecrets.rules["no-secrets"];
|
|
|
7569
7569
|
if (!originalRule) {
|
|
7570
7570
|
throw new Error("Expected rule 'no-secrets' not found in eslint-plugin-no-secrets");
|
|
7571
7571
|
}
|
|
7572
|
+
var noSecretsOptions = {
|
|
7573
|
+
tolerance: 5,
|
|
7574
|
+
// High enough to avoid false-positives on normal identifiers.
|
|
7575
|
+
ignoreModules: true,
|
|
7576
|
+
additionalRegexes: {
|
|
7577
|
+
"Stripe Secret Key": "sk_(live|test)_[a-zA-Z0-9]{20,}",
|
|
7578
|
+
"Stripe Restricted Key": "rk_(live|test)_[a-zA-Z0-9]{20,}",
|
|
7579
|
+
"Stripe Webhook Secret": "whsec_[a-zA-Z0-9+/=]{20,}"
|
|
7580
|
+
}
|
|
7581
|
+
};
|
|
7572
7582
|
var rule = {
|
|
7573
7583
|
...originalRule,
|
|
7574
7584
|
meta: {
|
|
@@ -8190,6 +8200,7 @@ var _requiredRules = {
|
|
|
8190
8200
|
"no-unmodified-loop-condition": "warn",
|
|
8191
8201
|
"no-constant-condition": "warn",
|
|
8192
8202
|
"for-direction": "warn",
|
|
8203
|
+
[`${_PLUGIN_NAME}/no-secrets`]: ["error", noSecretsOptions],
|
|
8193
8204
|
[`${_PLUGIN_NAME}/valid-extension-interface`]: "warn"
|
|
8194
8205
|
};
|
|
8195
8206
|
var _recommendedRules = {
|
|
@@ -7535,6 +7535,16 @@ var originalRule = noSecrets.rules["no-secrets"];
|
|
|
7535
7535
|
if (!originalRule) {
|
|
7536
7536
|
throw new Error("Expected rule 'no-secrets' not found in eslint-plugin-no-secrets");
|
|
7537
7537
|
}
|
|
7538
|
+
var noSecretsOptions = {
|
|
7539
|
+
tolerance: 5,
|
|
7540
|
+
// High enough to avoid false-positives on normal identifiers.
|
|
7541
|
+
ignoreModules: true,
|
|
7542
|
+
additionalRegexes: {
|
|
7543
|
+
"Stripe Secret Key": "sk_(live|test)_[a-zA-Z0-9]{20,}",
|
|
7544
|
+
"Stripe Restricted Key": "rk_(live|test)_[a-zA-Z0-9]{20,}",
|
|
7545
|
+
"Stripe Webhook Secret": "whsec_[a-zA-Z0-9+/=]{20,}"
|
|
7546
|
+
}
|
|
7547
|
+
};
|
|
7538
7548
|
var rule = {
|
|
7539
7549
|
...originalRule,
|
|
7540
7550
|
meta: {
|
|
@@ -8156,6 +8166,7 @@ var _requiredRules = {
|
|
|
8156
8166
|
"no-unmodified-loop-condition": "warn",
|
|
8157
8167
|
"no-constant-condition": "warn",
|
|
8158
8168
|
"for-direction": "warn",
|
|
8169
|
+
[`${_PLUGIN_NAME}/no-secrets`]: ["error", noSecretsOptions],
|
|
8159
8170
|
[`${_PLUGIN_NAME}/valid-extension-interface`]: "warn"
|
|
8160
8171
|
};
|
|
8161
8172
|
var _recommendedRules = {
|
|
@@ -7569,6 +7569,16 @@ var originalRule = noSecrets.rules["no-secrets"];
|
|
|
7569
7569
|
if (!originalRule) {
|
|
7570
7570
|
throw new Error("Expected rule 'no-secrets' not found in eslint-plugin-no-secrets");
|
|
7571
7571
|
}
|
|
7572
|
+
var noSecretsOptions = {
|
|
7573
|
+
tolerance: 5,
|
|
7574
|
+
// High enough to avoid false-positives on normal identifiers.
|
|
7575
|
+
ignoreModules: true,
|
|
7576
|
+
additionalRegexes: {
|
|
7577
|
+
"Stripe Secret Key": "sk_(live|test)_[a-zA-Z0-9]{20,}",
|
|
7578
|
+
"Stripe Restricted Key": "rk_(live|test)_[a-zA-Z0-9]{20,}",
|
|
7579
|
+
"Stripe Webhook Secret": "whsec_[a-zA-Z0-9+/=]{20,}"
|
|
7580
|
+
}
|
|
7581
|
+
};
|
|
7572
7582
|
var rule = {
|
|
7573
7583
|
...originalRule,
|
|
7574
7584
|
meta: {
|
|
@@ -8190,6 +8200,7 @@ var _requiredRules = {
|
|
|
8190
8200
|
"no-unmodified-loop-condition": "warn",
|
|
8191
8201
|
"no-constant-condition": "warn",
|
|
8192
8202
|
"for-direction": "warn",
|
|
8203
|
+
[`${_PLUGIN_NAME}/no-secrets`]: ["error", noSecretsOptions],
|
|
8193
8204
|
[`${_PLUGIN_NAME}/valid-extension-interface`]: "warn"
|
|
8194
8205
|
};
|
|
8195
8206
|
var _recommendedRules = {
|
|
@@ -7535,6 +7535,16 @@ var originalRule = noSecrets.rules["no-secrets"];
|
|
|
7535
7535
|
if (!originalRule) {
|
|
7536
7536
|
throw new Error("Expected rule 'no-secrets' not found in eslint-plugin-no-secrets");
|
|
7537
7537
|
}
|
|
7538
|
+
var noSecretsOptions = {
|
|
7539
|
+
tolerance: 5,
|
|
7540
|
+
// High enough to avoid false-positives on normal identifiers.
|
|
7541
|
+
ignoreModules: true,
|
|
7542
|
+
additionalRegexes: {
|
|
7543
|
+
"Stripe Secret Key": "sk_(live|test)_[a-zA-Z0-9]{20,}",
|
|
7544
|
+
"Stripe Restricted Key": "rk_(live|test)_[a-zA-Z0-9]{20,}",
|
|
7545
|
+
"Stripe Webhook Secret": "whsec_[a-zA-Z0-9+/=]{20,}"
|
|
7546
|
+
}
|
|
7547
|
+
};
|
|
7538
7548
|
var rule = {
|
|
7539
7549
|
...originalRule,
|
|
7540
7550
|
meta: {
|
|
@@ -8156,6 +8166,7 @@ var _requiredRules = {
|
|
|
8156
8166
|
"no-unmodified-loop-condition": "warn",
|
|
8157
8167
|
"no-constant-condition": "warn",
|
|
8158
8168
|
"for-direction": "warn",
|
|
8169
|
+
[`${_PLUGIN_NAME}/no-secrets`]: ["error", noSecretsOptions],
|
|
8159
8170
|
[`${_PLUGIN_NAME}/valid-extension-interface`]: "warn"
|
|
8160
8171
|
};
|
|
8161
8172
|
var _recommendedRules = {
|
|
@@ -7559,6 +7559,16 @@ var originalRule = noSecrets.rules["no-secrets"];
|
|
|
7559
7559
|
if (!originalRule) {
|
|
7560
7560
|
throw new Error("Expected rule 'no-secrets' not found in eslint-plugin-no-secrets");
|
|
7561
7561
|
}
|
|
7562
|
+
var noSecretsOptions = {
|
|
7563
|
+
tolerance: 5,
|
|
7564
|
+
// High enough to avoid false-positives on normal identifiers.
|
|
7565
|
+
ignoreModules: true,
|
|
7566
|
+
additionalRegexes: {
|
|
7567
|
+
"Stripe Secret Key": "sk_(live|test)_[a-zA-Z0-9]{20,}",
|
|
7568
|
+
"Stripe Restricted Key": "rk_(live|test)_[a-zA-Z0-9]{20,}",
|
|
7569
|
+
"Stripe Webhook Secret": "whsec_[a-zA-Z0-9+/=]{20,}"
|
|
7570
|
+
}
|
|
7571
|
+
};
|
|
7562
7572
|
var rule = {
|
|
7563
7573
|
...originalRule,
|
|
7564
7574
|
meta: {
|
|
@@ -8180,6 +8190,7 @@ var _requiredRules = {
|
|
|
8180
8190
|
"no-unmodified-loop-condition": "warn",
|
|
8181
8191
|
"no-constant-condition": "warn",
|
|
8182
8192
|
"for-direction": "warn",
|
|
8193
|
+
[`${_PLUGIN_NAME}/no-secrets`]: ["error", noSecretsOptions],
|
|
8183
8194
|
[`${_PLUGIN_NAME}/valid-extension-interface`]: "warn"
|
|
8184
8195
|
};
|
|
8185
8196
|
var _recommendedRules = {
|
|
@@ -7525,6 +7525,16 @@ var originalRule = noSecrets.rules["no-secrets"];
|
|
|
7525
7525
|
if (!originalRule) {
|
|
7526
7526
|
throw new Error("Expected rule 'no-secrets' not found in eslint-plugin-no-secrets");
|
|
7527
7527
|
}
|
|
7528
|
+
var noSecretsOptions = {
|
|
7529
|
+
tolerance: 5,
|
|
7530
|
+
// High enough to avoid false-positives on normal identifiers.
|
|
7531
|
+
ignoreModules: true,
|
|
7532
|
+
additionalRegexes: {
|
|
7533
|
+
"Stripe Secret Key": "sk_(live|test)_[a-zA-Z0-9]{20,}",
|
|
7534
|
+
"Stripe Restricted Key": "rk_(live|test)_[a-zA-Z0-9]{20,}",
|
|
7535
|
+
"Stripe Webhook Secret": "whsec_[a-zA-Z0-9+/=]{20,}"
|
|
7536
|
+
}
|
|
7537
|
+
};
|
|
7528
7538
|
var rule = {
|
|
7529
7539
|
...originalRule,
|
|
7530
7540
|
meta: {
|
|
@@ -8146,6 +8156,7 @@ var _requiredRules = {
|
|
|
8146
8156
|
"no-unmodified-loop-condition": "warn",
|
|
8147
8157
|
"no-constant-condition": "warn",
|
|
8148
8158
|
"for-direction": "warn",
|
|
8159
|
+
[`${_PLUGIN_NAME}/no-secrets`]: ["error", noSecretsOptions],
|
|
8149
8160
|
[`${_PLUGIN_NAME}/valid-extension-interface`]: "warn"
|
|
8150
8161
|
};
|
|
8151
8162
|
var _recommendedRules = {
|
|
@@ -7569,6 +7569,16 @@ var originalRule = noSecrets.rules["no-secrets"];
|
|
|
7569
7569
|
if (!originalRule) {
|
|
7570
7570
|
throw new Error("Expected rule 'no-secrets' not found in eslint-plugin-no-secrets");
|
|
7571
7571
|
}
|
|
7572
|
+
var noSecretsOptions = {
|
|
7573
|
+
tolerance: 5,
|
|
7574
|
+
// High enough to avoid false-positives on normal identifiers.
|
|
7575
|
+
ignoreModules: true,
|
|
7576
|
+
additionalRegexes: {
|
|
7577
|
+
"Stripe Secret Key": "sk_(live|test)_[a-zA-Z0-9]{20,}",
|
|
7578
|
+
"Stripe Restricted Key": "rk_(live|test)_[a-zA-Z0-9]{20,}",
|
|
7579
|
+
"Stripe Webhook Secret": "whsec_[a-zA-Z0-9+/=]{20,}"
|
|
7580
|
+
}
|
|
7581
|
+
};
|
|
7572
7582
|
var rule = {
|
|
7573
7583
|
...originalRule,
|
|
7574
7584
|
meta: {
|
|
@@ -8190,6 +8200,7 @@ var _requiredRules = {
|
|
|
8190
8200
|
"no-unmodified-loop-condition": "warn",
|
|
8191
8201
|
"no-constant-condition": "warn",
|
|
8192
8202
|
"for-direction": "warn",
|
|
8203
|
+
[`${_PLUGIN_NAME}/no-secrets`]: ["error", noSecretsOptions],
|
|
8193
8204
|
[`${_PLUGIN_NAME}/valid-extension-interface`]: "warn"
|
|
8194
8205
|
};
|
|
8195
8206
|
var _recommendedRules = {
|
|
@@ -7535,6 +7535,16 @@ var originalRule = noSecrets.rules["no-secrets"];
|
|
|
7535
7535
|
if (!originalRule) {
|
|
7536
7536
|
throw new Error("Expected rule 'no-secrets' not found in eslint-plugin-no-secrets");
|
|
7537
7537
|
}
|
|
7538
|
+
var noSecretsOptions = {
|
|
7539
|
+
tolerance: 5,
|
|
7540
|
+
// High enough to avoid false-positives on normal identifiers.
|
|
7541
|
+
ignoreModules: true,
|
|
7542
|
+
additionalRegexes: {
|
|
7543
|
+
"Stripe Secret Key": "sk_(live|test)_[a-zA-Z0-9]{20,}",
|
|
7544
|
+
"Stripe Restricted Key": "rk_(live|test)_[a-zA-Z0-9]{20,}",
|
|
7545
|
+
"Stripe Webhook Secret": "whsec_[a-zA-Z0-9+/=]{20,}"
|
|
7546
|
+
}
|
|
7547
|
+
};
|
|
7538
7548
|
var rule = {
|
|
7539
7549
|
...originalRule,
|
|
7540
7550
|
meta: {
|
|
@@ -8156,6 +8166,7 @@ var _requiredRules = {
|
|
|
8156
8166
|
"no-unmodified-loop-condition": "warn",
|
|
8157
8167
|
"no-constant-condition": "warn",
|
|
8158
8168
|
"for-direction": "warn",
|
|
8169
|
+
[`${_PLUGIN_NAME}/no-secrets`]: ["error", noSecretsOptions],
|
|
8159
8170
|
[`${_PLUGIN_NAME}/valid-extension-interface`]: "warn"
|
|
8160
8171
|
};
|
|
8161
8172
|
var _recommendedRules = {
|
|
@@ -7569,6 +7569,16 @@ var originalRule = noSecrets.rules["no-secrets"];
|
|
|
7569
7569
|
if (!originalRule) {
|
|
7570
7570
|
throw new Error("Expected rule 'no-secrets' not found in eslint-plugin-no-secrets");
|
|
7571
7571
|
}
|
|
7572
|
+
var noSecretsOptions = {
|
|
7573
|
+
tolerance: 5,
|
|
7574
|
+
// High enough to avoid false-positives on normal identifiers.
|
|
7575
|
+
ignoreModules: true,
|
|
7576
|
+
additionalRegexes: {
|
|
7577
|
+
"Stripe Secret Key": "sk_(live|test)_[a-zA-Z0-9]{20,}",
|
|
7578
|
+
"Stripe Restricted Key": "rk_(live|test)_[a-zA-Z0-9]{20,}",
|
|
7579
|
+
"Stripe Webhook Secret": "whsec_[a-zA-Z0-9+/=]{20,}"
|
|
7580
|
+
}
|
|
7581
|
+
};
|
|
7572
7582
|
var rule = {
|
|
7573
7583
|
...originalRule,
|
|
7574
7584
|
meta: {
|
|
@@ -8190,6 +8200,7 @@ var _requiredRules = {
|
|
|
8190
8200
|
"no-unmodified-loop-condition": "warn",
|
|
8191
8201
|
"no-constant-condition": "warn",
|
|
8192
8202
|
"for-direction": "warn",
|
|
8203
|
+
[`${_PLUGIN_NAME}/no-secrets`]: ["error", noSecretsOptions],
|
|
8193
8204
|
[`${_PLUGIN_NAME}/valid-extension-interface`]: "warn"
|
|
8194
8205
|
};
|
|
8195
8206
|
var _recommendedRules = {
|
|
@@ -7535,6 +7535,16 @@ var originalRule = noSecrets.rules["no-secrets"];
|
|
|
7535
7535
|
if (!originalRule) {
|
|
7536
7536
|
throw new Error("Expected rule 'no-secrets' not found in eslint-plugin-no-secrets");
|
|
7537
7537
|
}
|
|
7538
|
+
var noSecretsOptions = {
|
|
7539
|
+
tolerance: 5,
|
|
7540
|
+
// High enough to avoid false-positives on normal identifiers.
|
|
7541
|
+
ignoreModules: true,
|
|
7542
|
+
additionalRegexes: {
|
|
7543
|
+
"Stripe Secret Key": "sk_(live|test)_[a-zA-Z0-9]{20,}",
|
|
7544
|
+
"Stripe Restricted Key": "rk_(live|test)_[a-zA-Z0-9]{20,}",
|
|
7545
|
+
"Stripe Webhook Secret": "whsec_[a-zA-Z0-9+/=]{20,}"
|
|
7546
|
+
}
|
|
7547
|
+
};
|
|
7538
7548
|
var rule = {
|
|
7539
7549
|
...originalRule,
|
|
7540
7550
|
meta: {
|
|
@@ -8156,6 +8166,7 @@ var _requiredRules = {
|
|
|
8156
8166
|
"no-unmodified-loop-condition": "warn",
|
|
8157
8167
|
"no-constant-condition": "warn",
|
|
8158
8168
|
"for-direction": "warn",
|
|
8169
|
+
[`${_PLUGIN_NAME}/no-secrets`]: ["error", noSecretsOptions],
|
|
8159
8170
|
[`${_PLUGIN_NAME}/valid-extension-interface`]: "warn"
|
|
8160
8171
|
};
|
|
8161
8172
|
var _recommendedRules = {
|
|
@@ -7559,6 +7559,16 @@ var originalRule = noSecrets.rules["no-secrets"];
|
|
|
7559
7559
|
if (!originalRule) {
|
|
7560
7560
|
throw new Error("Expected rule 'no-secrets' not found in eslint-plugin-no-secrets");
|
|
7561
7561
|
}
|
|
7562
|
+
var noSecretsOptions = {
|
|
7563
|
+
tolerance: 5,
|
|
7564
|
+
// High enough to avoid false-positives on normal identifiers.
|
|
7565
|
+
ignoreModules: true,
|
|
7566
|
+
additionalRegexes: {
|
|
7567
|
+
"Stripe Secret Key": "sk_(live|test)_[a-zA-Z0-9]{20,}",
|
|
7568
|
+
"Stripe Restricted Key": "rk_(live|test)_[a-zA-Z0-9]{20,}",
|
|
7569
|
+
"Stripe Webhook Secret": "whsec_[a-zA-Z0-9+/=]{20,}"
|
|
7570
|
+
}
|
|
7571
|
+
};
|
|
7562
7572
|
var rule = {
|
|
7563
7573
|
...originalRule,
|
|
7564
7574
|
meta: {
|
|
@@ -8180,6 +8190,7 @@ var _requiredRules = {
|
|
|
8180
8190
|
"no-unmodified-loop-condition": "warn",
|
|
8181
8191
|
"no-constant-condition": "warn",
|
|
8182
8192
|
"for-direction": "warn",
|
|
8193
|
+
[`${_PLUGIN_NAME}/no-secrets`]: ["error", noSecretsOptions],
|
|
8183
8194
|
[`${_PLUGIN_NAME}/valid-extension-interface`]: "warn"
|
|
8184
8195
|
};
|
|
8185
8196
|
var _recommendedRules = {
|
|
@@ -7525,6 +7525,16 @@ var originalRule = noSecrets.rules["no-secrets"];
|
|
|
7525
7525
|
if (!originalRule) {
|
|
7526
7526
|
throw new Error("Expected rule 'no-secrets' not found in eslint-plugin-no-secrets");
|
|
7527
7527
|
}
|
|
7528
|
+
var noSecretsOptions = {
|
|
7529
|
+
tolerance: 5,
|
|
7530
|
+
// High enough to avoid false-positives on normal identifiers.
|
|
7531
|
+
ignoreModules: true,
|
|
7532
|
+
additionalRegexes: {
|
|
7533
|
+
"Stripe Secret Key": "sk_(live|test)_[a-zA-Z0-9]{20,}",
|
|
7534
|
+
"Stripe Restricted Key": "rk_(live|test)_[a-zA-Z0-9]{20,}",
|
|
7535
|
+
"Stripe Webhook Secret": "whsec_[a-zA-Z0-9+/=]{20,}"
|
|
7536
|
+
}
|
|
7537
|
+
};
|
|
7528
7538
|
var rule = {
|
|
7529
7539
|
...originalRule,
|
|
7530
7540
|
meta: {
|
|
@@ -8146,6 +8156,7 @@ var _requiredRules = {
|
|
|
8146
8156
|
"no-unmodified-loop-condition": "warn",
|
|
8147
8157
|
"no-constant-condition": "warn",
|
|
8148
8158
|
"for-direction": "warn",
|
|
8159
|
+
[`${_PLUGIN_NAME}/no-secrets`]: ["error", noSecretsOptions],
|
|
8149
8160
|
[`${_PLUGIN_NAME}/valid-extension-interface`]: "warn"
|
|
8150
8161
|
};
|
|
8151
8162
|
var _recommendedRules = {
|
|
@@ -7559,6 +7559,16 @@ var originalRule = noSecrets.rules["no-secrets"];
|
|
|
7559
7559
|
if (!originalRule) {
|
|
7560
7560
|
throw new Error("Expected rule 'no-secrets' not found in eslint-plugin-no-secrets");
|
|
7561
7561
|
}
|
|
7562
|
+
var noSecretsOptions = {
|
|
7563
|
+
tolerance: 5,
|
|
7564
|
+
// High enough to avoid false-positives on normal identifiers.
|
|
7565
|
+
ignoreModules: true,
|
|
7566
|
+
additionalRegexes: {
|
|
7567
|
+
"Stripe Secret Key": "sk_(live|test)_[a-zA-Z0-9]{20,}",
|
|
7568
|
+
"Stripe Restricted Key": "rk_(live|test)_[a-zA-Z0-9]{20,}",
|
|
7569
|
+
"Stripe Webhook Secret": "whsec_[a-zA-Z0-9+/=]{20,}"
|
|
7570
|
+
}
|
|
7571
|
+
};
|
|
7562
7572
|
var rule = {
|
|
7563
7573
|
...originalRule,
|
|
7564
7574
|
meta: {
|
|
@@ -8180,6 +8190,7 @@ var _requiredRules = {
|
|
|
8180
8190
|
"no-unmodified-loop-condition": "warn",
|
|
8181
8191
|
"no-constant-condition": "warn",
|
|
8182
8192
|
"for-direction": "warn",
|
|
8193
|
+
[`${_PLUGIN_NAME}/no-secrets`]: ["error", noSecretsOptions],
|
|
8183
8194
|
[`${_PLUGIN_NAME}/valid-extension-interface`]: "warn"
|
|
8184
8195
|
};
|
|
8185
8196
|
var _recommendedRules = {
|
|
@@ -7525,6 +7525,16 @@ var originalRule = noSecrets.rules["no-secrets"];
|
|
|
7525
7525
|
if (!originalRule) {
|
|
7526
7526
|
throw new Error("Expected rule 'no-secrets' not found in eslint-plugin-no-secrets");
|
|
7527
7527
|
}
|
|
7528
|
+
var noSecretsOptions = {
|
|
7529
|
+
tolerance: 5,
|
|
7530
|
+
// High enough to avoid false-positives on normal identifiers.
|
|
7531
|
+
ignoreModules: true,
|
|
7532
|
+
additionalRegexes: {
|
|
7533
|
+
"Stripe Secret Key": "sk_(live|test)_[a-zA-Z0-9]{20,}",
|
|
7534
|
+
"Stripe Restricted Key": "rk_(live|test)_[a-zA-Z0-9]{20,}",
|
|
7535
|
+
"Stripe Webhook Secret": "whsec_[a-zA-Z0-9+/=]{20,}"
|
|
7536
|
+
}
|
|
7537
|
+
};
|
|
7528
7538
|
var rule = {
|
|
7529
7539
|
...originalRule,
|
|
7530
7540
|
meta: {
|
|
@@ -8146,6 +8156,7 @@ var _requiredRules = {
|
|
|
8146
8156
|
"no-unmodified-loop-condition": "warn",
|
|
8147
8157
|
"no-constant-condition": "warn",
|
|
8148
8158
|
"for-direction": "warn",
|
|
8159
|
+
[`${_PLUGIN_NAME}/no-secrets`]: ["error", noSecretsOptions],
|
|
8149
8160
|
[`${_PLUGIN_NAME}/valid-extension-interface`]: "warn"
|
|
8150
8161
|
};
|
|
8151
8162
|
var _recommendedRules = {
|