@secretlint/secretlint-rule-aws
Advanced tools
Comparing version 8.5.0 to 9.0.0
@@ -6,4 +6,3 @@ import { SecretLintRuleCreator } from "@secretlint/types"; | ||
* Enable ID Scan Rule | ||
* Default: true | ||
* TODO: This will be false by default in secretlint v9 | ||
* Default: false | ||
*/ | ||
@@ -10,0 +9,0 @@ enableIDScanRule?: boolean; |
@@ -130,4 +130,3 @@ import { matchPatterns } from "@textlint/regexp-string-matcher"; | ||
allows: options.allows || [], | ||
// TODO: This will be false by default in secretlint v9 | ||
enableIDScanRule: options.enableIDScanRule ?? true, | ||
enableIDScanRule: options.enableIDScanRule ?? false, | ||
}; | ||
@@ -139,5 +138,5 @@ const t = context.createTranslator(messages); | ||
reportAWSAccessKey({ t, source: source, context: context, options: normalizedOptions }); | ||
reportAWSSecretAccessKey({ t, source: source, context: context, options: normalizedOptions }); | ||
reportAWSAccountID({ t, source: source, context: context, options: normalizedOptions }); | ||
} | ||
reportAWSAccountID({ t, source: source, context: context, options: normalizedOptions }); | ||
reportAWSSecretAccessKey({ t, source: source, context: context, options: normalizedOptions }); | ||
}, | ||
@@ -144,0 +143,0 @@ }; |
{ | ||
"name": "@secretlint/secretlint-rule-aws", | ||
"version": "8.5.0", | ||
"version": "9.0.0", | ||
"description": "A secretlint rule for AWS.", | ||
@@ -58,7 +58,7 @@ "keywords": [ | ||
"dependencies": { | ||
"@secretlint/types": "^8.5.0", | ||
"@secretlint/types": "^9.0.0", | ||
"@textlint/regexp-string-matcher": "^2.0.2" | ||
}, | ||
"devDependencies": { | ||
"@secretlint/tester": "^8.5.0", | ||
"@secretlint/tester": "^9.0.0", | ||
"@types/node": "^20.16.10", | ||
@@ -77,3 +77,3 @@ "prettier": "^2.8.1", | ||
}, | ||
"gitHead": "89bb8beb62231dc7e958702d7c763b37d7123689" | ||
"gitHead": "7079af4c706b46f66f7301042157259005905968" | ||
} |
@@ -49,7 +49,7 @@ # @secretlint/secretlint-rule-aws | ||
- `enableIDScanRule: boolean` | ||
- Default: `true` | ||
- Default: `false` | ||
- Enable ID scan rules | ||
- `AWSAccountID` | ||
- `AWSAccessKeyID` | ||
- These rules may be false-positive. You can disable it by setting `false`. | ||
- These rules may be false-positive. You can enable it by setting `true`. | ||
@@ -56,0 +56,0 @@ ## Examples |
@@ -9,4 +9,3 @@ import { SecretLintRuleContext, SecretLintRuleCreator, SecretLintSourceCode } from "@secretlint/types"; | ||
* Enable ID Scan Rule | ||
* Default: true | ||
* TODO: This will be false by default in secretlint v9 | ||
* Default: false | ||
*/ | ||
@@ -182,4 +181,3 @@ enableIDScanRule?: boolean; | ||
allows: options.allows || [], | ||
// TODO: This will be false by default in secretlint v9 | ||
enableIDScanRule: options.enableIDScanRule ?? true, | ||
enableIDScanRule: options.enableIDScanRule ?? false, | ||
}; | ||
@@ -191,5 +189,5 @@ const t = context.createTranslator(messages); | ||
reportAWSAccessKey({ t, source: source, context: context, options: normalizedOptions }); | ||
reportAWSSecretAccessKey({ t, source: source, context: context, options: normalizedOptions }); | ||
reportAWSAccountID({ t, source: source, context: context, options: normalizedOptions }); | ||
} | ||
reportAWSAccountID({ t, source: source, context: context, options: normalizedOptions }); | ||
reportAWSSecretAccessKey({ t, source: source, context: context, options: normalizedOptions }); | ||
}, | ||
@@ -196,0 +194,0 @@ }; |
Sorry, the diff of this file is not supported yet
Sorry, the diff of this file is not supported yet
License Policy Violation
LicenseThis package is not allowed per your license policy. Review the package's license to ensure compliance.
Found 1 instance in 1 package
License Policy Violation
LicenseThis package is not allowed per your license policy. Review the package's license to ensure compliance.
Found 1 instance in 1 package
23990
366
+ Added@secretlint/types@9.0.0(transitive)
- Removed@secretlint/types@8.5.0(transitive)
Updated@secretlint/types@^9.0.0