File tree Expand file tree Collapse file tree 3 files changed +19
-15
lines changed
modules/integration-node/src Expand file tree Collapse file tree 3 files changed +19
-15
lines changed Original file line number Diff line number Diff line change @@ -80,6 +80,9 @@ module.exports = {
80
80
'@typescript-eslint/ban-ts-comment' : [ 'error' , { 'ts-ignore' : false } ] ,
81
81
// This rule fights with Prettier and no-semi
82
82
'@typescript-eslint/no-extra-semi' : 'off' ,
83
+ // Added in later versions of @typescript -eslint
84
+ '@typescript-eslint/explicit-module-boundary-types' : 'off' ,
85
+ '@typescript-eslint/no-unused-vars' : 'off' ,
83
86
} ,
84
87
// This is a good rule,
85
88
// but in many tests,
Original file line number Diff line number Diff line change @@ -13,19 +13,20 @@ import {
13
13
const cli = yargs
14
14
. command ( 'decrypt' , 'verify decrypt vectors' , ( y ) =>
15
15
y
16
- . option ( 'vectorFile' , {
17
- alias : 'v' ,
18
- describe : 'a vector zip file from aws-encryption-sdk-test-vectors' ,
19
- demandOption : true ,
20
- type : 'string' ,
21
- } )
22
- . option ( 'CVE-2023-46809' , {
23
- alias : 'C' ,
24
- describe : 'Attempt RSA_PKCS1_OAEP_PADDING decrypt vectors, requires node process started with --security-revert=CVE-2023-46809' ,
25
- default : false ,
26
- demandOption : false ,
27
- type : 'boolean' ,
28
- } )
16
+ . option ( 'vectorFile' , {
17
+ alias : 'v' ,
18
+ describe : 'a vector zip file from aws-encryption-sdk-test-vectors' ,
19
+ demandOption : true ,
20
+ type : 'string' ,
21
+ } )
22
+ . option ( 'CVE-2023-46809' , {
23
+ alias : 'C' ,
24
+ describe :
25
+ 'Attempt RSA_PKCS1_OAEP_PADDING decrypt vectors, requires node process started with --security-revert=CVE-2023-46809' ,
26
+ default : false ,
27
+ demandOption : false ,
28
+ type : 'boolean' ,
29
+ } )
29
30
)
30
31
. command ( 'encrypt' , 'verify encrypt manifest' , ( y ) =>
31
32
y
@@ -87,7 +88,7 @@ const cli = yargs
87
88
_ : [ command ] ,
88
89
tolerateFailures,
89
90
testName,
90
- [ 'CVE-2023-46809' ] :CVE202346809 ,
91
+ [ 'CVE-2023-46809' ] : CVE202346809 ,
91
92
concurrency,
92
93
} = await argv
93
94
/* I set the result to 1 so that if I fall through the exit condition is a failure */
Original file line number Diff line number Diff line change @@ -177,7 +177,7 @@ export async function integrationDecryptTestVectors(
177
177
}
178
178
179
179
if (
180
- ! CVE202346809 &&
180
+ ! CVE202346809 &&
181
181
test . keysInfo . some (
182
182
( [ info , _ ] ) =>
183
183
info . type == 'raw' && info [ 'padding-algorithm' ] == 'pkcs1'
You can’t perform that action at this time.
0 commit comments