Socket
Socket
Sign inDemoInstall

@secretlint/secretlint-rule-aws

Package Overview
Dependencies
Maintainers
2
Versions
81
Alerts
File Explorer

Advanced tools

Socket logo

Install Socket

Detect and block malicious and high-risk dependencies

Install

@secretlint/secretlint-rule-aws - npm Package Compare versions

Comparing version 7.0.6 to 7.0.7

7

module/index.js
import { matchPatterns } from "@textlint/regexp-string-matcher";
// @ts-expect-error: missing types
import regx_ from "regx";
const regx = regx_.default("g");
/**

@@ -75,3 +72,3 @@ * These should be ignored by default, because these are used in AWS example.

// This Pattern match only `AWS?_SECRET_ACCESS_KEY=XXX`
const AWSSecretPatten = regx `${QUOTE}${AWS}(?:SECRET|secret|Secret)_?(?:ACCESS|access|Access)_?(?:KEY|key|Key)${QUOTE}${CONNECT}${QUOTE}([A-Za-z0-9/\+=]{40})${QUOTE}\b`;
const AWSSecretPatten = new RegExp(String.raw `${QUOTE}${AWS}(?:SECRET|secret|Secret)_?(?:ACCESS|access|Access)_?(?:KEY|key|Key)${QUOTE}${CONNECT}${QUOTE}([A-Za-z0-9/\+=]{40})${QUOTE}\b`, "g");
const results = source.content.matchAll(AWSSecretPatten);

@@ -102,3 +99,3 @@ for (const result of results) {

const CONNECT = "\\s*(:|=>|=)\\s*";
const AWSSecretPatten = regx `${QUOTE}${AWS}(ACCOUNT|account|Account)_?(ID|id|Id)?${QUOTE}${CONNECT}${QUOTE}[0-9]{4}\-?[0-9]{4}\-?[0-9]{4}${QUOTE}\b`;
const AWSSecretPatten = new RegExp(String.raw `${QUOTE}${AWS}(ACCOUNT|account|Account)_?(ID|id|Id)?${QUOTE}${CONNECT}${QUOTE}[0-9]{4}\-?[0-9]{4}\-?[0-9]{4}${QUOTE}\b`, "g");
const results = source.content.matchAll(AWSSecretPatten);

@@ -105,0 +102,0 @@ for (const result of results) {

{
"name": "@secretlint/secretlint-rule-aws",
"version": "7.0.6",
"version": "7.0.7",
"description": "A secretlint rule for AWS.",

@@ -58,8 +58,7 @@ "keywords": [

"dependencies": {
"@secretlint/types": "^7.0.6",
"@textlint/regexp-string-matcher": "^2.0.2",
"regx": "^1.0.4"
"@secretlint/types": "^7.0.7",
"@textlint/regexp-string-matcher": "^2.0.2"
},
"devDependencies": {
"@secretlint/tester": "^7.0.6",
"@secretlint/tester": "^7.0.7",
"@types/node": "^20.4.5",

@@ -78,3 +77,3 @@ "prettier": "^2.8.1",

},
"gitHead": "4b4f6919dccf59b4ff645cafacf2ee7e7a85ceb8"
"gitHead": "681b8920b9a563d7726f701b846a0ffeb7e38b8d"
}

@@ -5,6 +5,2 @@ import { SecretLintRuleContext, SecretLintRuleCreator, SecretLintSourceCode } from "@secretlint/types";

// @ts-expect-error: missing types
import regx_ from "regx";
const regx = regx_.default("g");
export interface Options {

@@ -104,3 +100,6 @@ allows?: string[];

// This Pattern match only `AWS?_SECRET_ACCESS_KEY=XXX`
const AWSSecretPatten = regx`${QUOTE}${AWS}(?:SECRET|secret|Secret)_?(?:ACCESS|access|Access)_?(?:KEY|key|Key)${QUOTE}${CONNECT}${QUOTE}([A-Za-z0-9/\+=]{40})${QUOTE}\b`;
const AWSSecretPatten = new RegExp(
String.raw`${QUOTE}${AWS}(?:SECRET|secret|Secret)_?(?:ACCESS|access|Access)_?(?:KEY|key|Key)${QUOTE}${CONNECT}${QUOTE}([A-Za-z0-9/\+=]{40})${QUOTE}\b`,
"g"
);
const results = source.content.matchAll(AWSSecretPatten);

@@ -142,3 +141,6 @@ for (const result of results) {

const CONNECT = "\\s*(:|=>|=)\\s*";
const AWSSecretPatten = regx`${QUOTE}${AWS}(ACCOUNT|account|Account)_?(ID|id|Id)?${QUOTE}${CONNECT}${QUOTE}[0-9]{4}\-?[0-9]{4}\-?[0-9]{4}${QUOTE}\b`;
const AWSSecretPatten = new RegExp(
String.raw`${QUOTE}${AWS}(ACCOUNT|account|Account)_?(ID|id|Id)?${QUOTE}${CONNECT}${QUOTE}[0-9]{4}\-?[0-9]{4}\-?[0-9]{4}${QUOTE}\b`,
"g"
);
const results = source.content.matchAll(AWSSecretPatten);

@@ -145,0 +147,0 @@ for (const result of results) {

Sorry, the diff of this file is not supported yet

Sorry, the diff of this file is not supported yet

SocketSocket SOC 2 Logo

Product

  • Package Alerts
  • Integrations
  • Docs
  • Pricing
  • FAQ
  • Roadmap
  • Changelog

Packages

npm

Stay in touch

Get open source security insights delivered straight into your inbox.


  • Terms
  • Privacy
  • Security

Made with ⚑️ by Socket Inc