Socket
Socket
Sign inDemoInstall

@secretlint/secretlint-rule-aws

Package Overview
Dependencies
Maintainers
0
Versions
81
Alerts
File Explorer

Advanced tools

Socket logo

Install Socket

Detect and block malicious and high-risk dependencies

Install

@secretlint/secretlint-rule-aws - npm Package Compare versions

Comparing version 8.5.0 to 9.0.0

3

module/index.d.ts

@@ -6,4 +6,3 @@ import { SecretLintRuleCreator } from "@secretlint/types";

* Enable ID Scan Rule
* Default: true
* TODO: This will be false by default in secretlint v9
* Default: false
*/

@@ -10,0 +9,0 @@ enableIDScanRule?: boolean;

@@ -130,4 +130,3 @@ import { matchPatterns } from "@textlint/regexp-string-matcher";

allows: options.allows || [],
// TODO: This will be false by default in secretlint v9
enableIDScanRule: options.enableIDScanRule ?? true,
enableIDScanRule: options.enableIDScanRule ?? false,
};

@@ -139,5 +138,5 @@ const t = context.createTranslator(messages);

reportAWSAccessKey({ t, source: source, context: context, options: normalizedOptions });
reportAWSSecretAccessKey({ t, source: source, context: context, options: normalizedOptions });
reportAWSAccountID({ t, source: source, context: context, options: normalizedOptions });
}
reportAWSAccountID({ t, source: source, context: context, options: normalizedOptions });
reportAWSSecretAccessKey({ t, source: source, context: context, options: normalizedOptions });
},

@@ -144,0 +143,0 @@ };

{
"name": "@secretlint/secretlint-rule-aws",
"version": "8.5.0",
"version": "9.0.0",
"description": "A secretlint rule for AWS.",

@@ -58,7 +58,7 @@ "keywords": [

"dependencies": {
"@secretlint/types": "^8.5.0",
"@secretlint/types": "^9.0.0",
"@textlint/regexp-string-matcher": "^2.0.2"
},
"devDependencies": {
"@secretlint/tester": "^8.5.0",
"@secretlint/tester": "^9.0.0",
"@types/node": "^20.16.10",

@@ -77,3 +77,3 @@ "prettier": "^2.8.1",

},
"gitHead": "89bb8beb62231dc7e958702d7c763b37d7123689"
"gitHead": "7079af4c706b46f66f7301042157259005905968"
}

@@ -49,7 +49,7 @@ # @secretlint/secretlint-rule-aws

- `enableIDScanRule: boolean`
- Default: `true`
- Default: `false`
- Enable ID scan rules
- `AWSAccountID`
- `AWSAccessKeyID`
- These rules may be false-positive. You can disable it by setting `false`.
- These rules may be false-positive. You can enable it by setting `true`.

@@ -56,0 +56,0 @@ ## Examples

@@ -9,4 +9,3 @@ import { SecretLintRuleContext, SecretLintRuleCreator, SecretLintSourceCode } from "@secretlint/types";

* Enable ID Scan Rule
* Default: true
* TODO: This will be false by default in secretlint v9
* Default: false
*/

@@ -182,4 +181,3 @@ enableIDScanRule?: boolean;

allows: options.allows || [],
// TODO: This will be false by default in secretlint v9
enableIDScanRule: options.enableIDScanRule ?? true,
enableIDScanRule: options.enableIDScanRule ?? false,
};

@@ -191,5 +189,5 @@ const t = context.createTranslator(messages);

reportAWSAccessKey({ t, source: source, context: context, options: normalizedOptions });
reportAWSSecretAccessKey({ t, source: source, context: context, options: normalizedOptions });
reportAWSAccountID({ t, source: source, context: context, options: normalizedOptions });
}
reportAWSAccountID({ t, source: source, context: context, options: normalizedOptions });
reportAWSSecretAccessKey({ t, source: source, context: context, options: normalizedOptions });
},

@@ -196,0 +194,0 @@ };

Sorry, the diff of this file is not supported yet

Sorry, the diff of this file is not supported yet

SocketSocket SOC 2 Logo

Product

  • Package Alerts
  • Integrations
  • Docs
  • Pricing
  • FAQ
  • Roadmap
  • Changelog

Packages

npm

Stay in touch

Get open source security insights delivered straight into your inbox.


  • Terms
  • Privacy
  • Security

Made with ⚡️ by Socket Inc