Skip to content

Commit 0a39b85

Browse files
committed
lint
1 parent a6a178a commit 0a39b85

File tree

3 files changed

+19
-15
lines changed

3 files changed

+19
-15
lines changed

.eslintrc.js

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -80,6 +80,9 @@ module.exports = {
8080
'@typescript-eslint/ban-ts-comment': ['error', { 'ts-ignore': false }],
8181
// This rule fights with Prettier and no-semi
8282
'@typescript-eslint/no-extra-semi': 'off',
83+
// Added in later versions of @typescript-eslint
84+
'@typescript-eslint/explicit-module-boundary-types': 'off',
85+
'@typescript-eslint/no-unused-vars': 'off',
8386
},
8487
// This is a good rule,
8588
// but in many tests,

modules/integration-node/src/cli.ts

Lines changed: 15 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -13,19 +13,20 @@ import {
1313
const cli = yargs
1414
.command('decrypt', 'verify decrypt vectors', (y) =>
1515
y
16-
.option('vectorFile', {
17-
alias: 'v',
18-
describe: 'a vector zip file from aws-encryption-sdk-test-vectors',
19-
demandOption: true,
20-
type: 'string',
21-
})
22-
.option('CVE-2023-46809', {
23-
alias: 'C',
24-
describe: 'Attempt RSA_PKCS1_OAEP_PADDING decrypt vectors, requires node process started with --security-revert=CVE-2023-46809',
25-
default: false,
26-
demandOption: false,
27-
type: 'boolean',
28-
})
16+
.option('vectorFile', {
17+
alias: 'v',
18+
describe: 'a vector zip file from aws-encryption-sdk-test-vectors',
19+
demandOption: true,
20+
type: 'string',
21+
})
22+
.option('CVE-2023-46809', {
23+
alias: 'C',
24+
describe:
25+
'Attempt RSA_PKCS1_OAEP_PADDING decrypt vectors, requires node process started with --security-revert=CVE-2023-46809',
26+
default: false,
27+
demandOption: false,
28+
type: 'boolean',
29+
})
2930
)
3031
.command('encrypt', 'verify encrypt manifest', (y) =>
3132
y
@@ -87,7 +88,7 @@ const cli = yargs
8788
_: [command],
8889
tolerateFailures,
8990
testName,
90-
['CVE-2023-46809']:CVE202346809,
91+
['CVE-2023-46809']: CVE202346809,
9192
concurrency,
9293
} = await argv
9394
/* I set the result to 1 so that if I fall through the exit condition is a failure */

modules/integration-node/src/integration_tests.ts

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -177,7 +177,7 @@ export async function integrationDecryptTestVectors(
177177
}
178178

179179
if (
180-
!CVE202346809 &&
180+
!CVE202346809 &&
181181
test.keysInfo.some(
182182
([info, _]) =>
183183
info.type == 'raw' && info['padding-algorithm'] == 'pkcs1'

0 commit comments

Comments
 (0)