@dmatter/pipe-env
Advanced tools
Comparing version 0.0.6 to 0.0.7
@@ -14,2 +14,3 @@ #!/usr/bin/env node | ||
const convertCommand_1 = require("../services/convertCommand"); | ||
const isWindows_1 = require("../services/isWindows"); | ||
const parseCommand_1 = require("../services/parseCommand"); | ||
@@ -31,3 +32,4 @@ ['.env'].forEach(dotenvFile => { | ||
stdio: 'inherit', | ||
}).on('error', console.error); | ||
shell: (0, isWindows_1.isWindows)(), | ||
}); | ||
process.on('SIGTERM', () => proc.kill('SIGTERM')); | ||
@@ -34,0 +36,0 @@ process.on('SIGINT', () => proc.kill('SIGINT')); |
@@ -8,5 +8,5 @@ "use strict"; | ||
const path_1 = __importDefault(require("path")); | ||
const isWindows = () => process.platform === 'win32' || /^(msys|cygwin)$/.test(process.env.OSTYPE || ''); | ||
const isWindows_1 = require("./isWindows"); | ||
function convertCommand(command, normalize = false) { | ||
if (!isWindows()) | ||
if (!(0, isWindows_1.isWindows)()) | ||
return command; | ||
@@ -13,0 +13,0 @@ const envUnixRegex = /\$(\w+)|\${(\w+)}/g; // $my_var or ${my_var} |
{ | ||
"name": "@dmatter/pipe-env", | ||
"version": "0.0.6", | ||
"version": "0.0.7", | ||
"scripts": { | ||
@@ -5,0 +5,0 @@ "start": "tsc -w", |
Environment variable access
Supply chain riskPackage accesses environment variables, which may be a sign of credential stuffing or data theft.
Found 1 instance in 1 package
13935
14
156
3