ado-npm-auth
Advanced tools
Comparing version
@@ -5,4 +5,5 @@ export interface Args { | ||
configFile?: string; | ||
azureAuthLocation?: string; | ||
} | ||
export declare function parseArgs(args: string[]): Args; | ||
//# sourceMappingURL=args.d.ts.map |
@@ -8,2 +8,3 @@ import { Feed, FileProvider } from "../fileProvider.js"; | ||
writeWorkspaceRegistries(feedsToPatch: Iterable<Feed>): Promise<void>; | ||
writeYarnRc(filePath: string, yarnrc: YarnRc): Promise<void>; | ||
paseYarnRc(filePath: string): Promise<YarnRc>; | ||
@@ -10,0 +11,0 @@ } |
{ | ||
"name": "ado-npm-auth", | ||
"version": "0.3.1", | ||
"version": "0.3.2", | ||
"description": "The ado-npm-auth package can automatically use the azureauth CLI to fetch tokens and update a user's .npmrc file for authenticating to ADO package feeds.", | ||
@@ -25,4 +25,4 @@ "repository": "https://github.com/microsoft/ado-npm-auth", | ||
"bundle": "npm run bundleBin && npm run bundleIndex", | ||
"bundleBin": "esbuild --sourcemap --bundle --minify --platform=node src/cli.ts --outfile=dist/ado-npm-auth.cjs", | ||
"bundleIndex": "esbuild --sourcemap --bundle --minify --platform=node --format=esm src/index.ts --outfile=dist/index.js", | ||
"bundleBin": "esbuild --sourcemap=external --bundle --minify --platform=node src/cli.ts --outfile=dist/ado-npm-auth.cjs", | ||
"bundleIndex": "esbuild --sourcemap=external --bundle --minify --platform=node --format=esm src/index.ts --outfile=dist/index.js", | ||
"lint": "prettier --check src/**/*.ts", | ||
@@ -36,3 +36,3 @@ "performance-test": "node lib/tests/performance.test.js", | ||
"devDependencies": { | ||
"@npmcli/config": "^4.0.1", | ||
"@npmcli/config": "^10.0.0", | ||
"@types/js-yaml": "4.0.9", | ||
@@ -39,0 +39,0 @@ "@types/node": "^20.5.9", |
Sorry, the diff of this file is not supported yet
Sorry, the diff of this file is too big to display
Uses eval
Supply chain riskPackage uses dynamic code execution (e.g., eval()), which is a dangerous practice. This can prevent the code from running in certain environments and increases the risk that the code may contain exploits or malicious behavior.
Found 1 instance in 1 package
Debug access
Supply chain riskUses debug, reflection and dynamic code execution features.
Found 1 instance in 1 package
Dynamic require
Supply chain riskDynamic require can indicate the package is performing dangerous or unsafe dynamic code execution.
Found 1 instance in 1 package
Environment variable access
Supply chain riskPackage accesses environment variables, which may be a sign of credential stuffing or data theft.
Found 10 instances in 1 package
Filesystem access
Supply chain riskAccesses the file system, and could potentially read sensitive data.
Found 1 instance in 1 package
Uses eval
Supply chain riskPackage uses dynamic code execution (e.g., eval()), which is a dangerous practice. This can prevent the code from running in certain environments and increases the risk that the code may contain exploits or malicious behavior.
Found 1 instance in 1 package
Environment variable access
Supply chain riskPackage accesses environment variables, which may be a sign of credential stuffing or data theft.
Found 4 instances in 1 package
1409023
24.35%5439
24.04%169
14.19%10
11.11%