@genezio/auth
Advanced tools
Comparing version 1.0.0 to 1.0.1
@@ -42,3 +42,6 @@ "use strict"; | ||
let url; | ||
if (cloud === "0") { | ||
if (typeof process !== "undefined" && process.env != null && process.env.GNZ_AUTH_FUNCTION_URL != null) { | ||
url = process.env.GNZ_AUTH_FUNCTION_URL; | ||
} | ||
else if (cloud === "0") { | ||
url = `https://${id}.lambda-url.${region}.on.aws/AuthService`; | ||
@@ -45,0 +48,0 @@ } |
@@ -36,3 +36,6 @@ /** | ||
let url; | ||
if (cloud === "0") { | ||
if (typeof process !== "undefined" && process.env != null && process.env.GNZ_AUTH_FUNCTION_URL != null) { | ||
url = process.env.GNZ_AUTH_FUNCTION_URL; | ||
} | ||
else if (cloud === "0") { | ||
url = `https://${id}.lambda-url.${region}.on.aws/AuthService`; | ||
@@ -39,0 +42,0 @@ } |
{ | ||
"name": "@genezio/auth", | ||
"version": "1.0.0", | ||
"version": "1.0.1", | ||
"description": "SDK for accessing genezio authentication system.", | ||
@@ -5,0 +5,0 @@ "main": "./dist/cjs/index.js", |
Environment variable access
Supply chain riskPackage accesses environment variables, which may be a sign of credential stuffing or data theft.
Found 2 instances in 1 package
22185
619
7