+1
-1
| { | ||
| "name": "vault-cli", | ||
| "version": "0.0.11", | ||
| "version": "0.0.12", | ||
| "description": "CLI for HashiCorp's Vault", | ||
@@ -5,0 +5,0 @@ "author": "Michael Herman", |
+8
-13
@@ -16,4 +16,4 @@ 'use strict'; | ||
| function authenticate() { | ||
| return new Promise((resolve, reject) => { | ||
| if (VAULT_AUTH_METHOD === 'github') { | ||
| if (VAULT_AUTH_METHOD === 'github') { | ||
| return new Promise((resolve, reject) => { | ||
| return request({ | ||
@@ -27,13 +27,8 @@ method: 'POST', | ||
| .catch((err) => { reject(err); }); | ||
| } else if (VAULT_AUTH_METHOD === 'token') { | ||
| return request({ | ||
| method: 'POST', | ||
| uri: `${VAULT_ADDR}/v1/auth/token/lookup`, | ||
| body: { token: VAULT_AUTH_TOKEN }, | ||
| json: true | ||
| }) | ||
| .then((res) => { resolve(VAULT_AUTH_TOKEN); }) | ||
| .catch((err) => { reject(err); }); | ||
| } | ||
| }); | ||
| }); | ||
| } else if (VAULT_AUTH_METHOD === 'token') { | ||
| return new Promise((resolve, reject) => { | ||
| resolve(VAULT_AUTH_TOKEN); | ||
| }); | ||
| } | ||
| } | ||
@@ -40,0 +35,0 @@ |
Environment variable access
Supply chain riskPackage accesses environment variables, which may be a sign of credential stuffing or data theft.
Found 4 instances in 1 package
Filesystem access
Supply chain riskAccesses the file system, and could potentially read sensitive data.
Found 1 instance in 1 package
Environment variable access
Supply chain riskPackage accesses environment variables, which may be a sign of credential stuffing or data theft.
Found 4 instances in 1 package
Filesystem access
Supply chain riskAccesses the file system, and could potentially read sensitive data.
Found 1 instance in 1 package
9688
-1.8%181
-2.69%1
-98.39%