@@ -64,14 +64,14 @@ type ENV = Remap<
64
64
NODE_COMPILE_CACHE : string
65
65
PATH : string
66
66
SOCKET_CLI_ACCEPT_RISKS : boolean
67
+ SOCKET_CLI_API_BASE_URL : string
68
+ SOCKET_CLI_API_PROXY : string
69
+ SOCKET_CLI_API_TOKEN : string
67
70
SOCKET_CLI_CONFIG : string
68
71
SOCKET_CLI_DEBUG : boolean
72
+ SOCKET_CLI_GITHUB_TOKEN : string
69
73
SOCKET_CLI_NO_API_TOKEN : boolean
70
74
SOCKET_CLI_VIEW_ALL_RISKS : boolean
71
- SOCKET_SECURITY_API_BASE_URL : string
72
- SOCKET_SECURITY_API_PROXY : string
73
- SOCKET_SECURITY_API_TOKEN : string
74
- SOCKET_SECURITY_GITHUB_PAT : string
75
75
TERM : string
76
76
XDG_DATA_HOME : string
77
77
} >
@@ -216,6 +216,7 @@ const LAZY_ENV = () => {
216
216
envAsString,
217
217
} = require ( '@socketsecurity/registry/lib/env' )
218
218
const { env } = process
219
+ const GITHUB_TOKEN = envAsString ( env [ 'GITHUB_TOKEN' ] )
219
220
// We inline some environment values so that they CANNOT be influenced by user
220
221
// provided environment variables.
221
222
return Object . freeze ( {
@@ -243,7 +244,7 @@ const LAZY_ENV = () => {
243
244
// The GITHUB_TOKEN secret is a GitHub App installation access token. The token's
244
245
// permissions are limited to the repository that contains the workflow.
245
246
// https://docs.github.com/en/actions/security-for-github-actions/security-guides/automatic-token-authentication#about-the-github_token-secret
246
- GITHUB_TOKEN : envAsString ( env [ 'GITHUB_TOKEN' ] ) ,
247
+ GITHUB_TOKEN ,
247
248
// Comp-time inlined @cyclonedx/cdxgen package version.
248
249
// The '@rollup/plugin-replace' will replace "process.env['INLINED_CYCLONEDX_CDXGEN_VERSION']".
249
250
INLINED_CYCLONEDX_CDXGEN_VERSION : envAsString (
@@ -305,44 +306,36 @@ const LAZY_ENV = () => {
305
306
PATH : envAsString ( env [ 'PATH' ] ) ,
306
307
// Flag to accepts risks of safe-npm and safe-npx run.
307
308
SOCKET_CLI_ACCEPT_RISKS : envAsBoolean ( env [ SOCKET_CLI_ACCEPT_RISKS ] ) ,
308
- // Flag containing a JSON stringified Socket configuration object.
309
- SOCKET_CLI_CONFIG : envAsString ( env [ 'SOCKET_CLI_CONFIG' ] ) ,
310
- // Flag to help debug Socket CLI.
311
- SOCKET_CLI_DEBUG : envAsBoolean ( env [ 'SOCKET_CLI_DEBUG' ] ) ,
312
- // Flag to make the default API token `undefined`.
313
- SOCKET_CLI_NO_API_TOKEN : envAsBoolean ( env [ 'SOCKET_CLI_NO_API_TOKEN' ] ) ,
314
- // Flag to view all risks of safe-npm and safe-npx run.
315
- SOCKET_CLI_VIEW_ALL_RISKS : envAsBoolean ( env [ SOCKET_CLI_VIEW_ALL_RISKS ] ) ,
316
309
// Flag to change the base URL for all API-calls.
317
310
// https://github.com/SocketDev/socket-cli?tab=readme-ov-file#environment-variables-for-development
318
- SOCKET_SECURITY_API_BASE_URL :
319
- envAsString ( env [ 'SOCKET_SECURITY_API_BASE_URL' ] ) ||
320
- // For consistency; allow socket_cli prefix too
321
- envAsString ( env [ 'SOCKET_CLI_API_BASE_URL' ] ) ,
311
+ SOCKET_CLI_API_BASE_URL :
312
+ envAsString ( env [ 'SOCKET_CLI_API_BASE_URL' ] ) ||
313
+ envAsString ( env [ 'SOCKET_SECURITY_API_BASE_URL' ] ) ,
322
314
// Flag to set the proxy all requests are routed through.
323
315
// https://github.com/SocketDev/socket-cli?tab=readme-ov-file#environment-variables-for-development
324
- SOCKET_SECURITY_API_PROXY :
325
- envAsString ( env [ 'SOCKET_SECURITY_API_PROXY' ] ) ||
326
- // For consistency; allow socket_cli prefix too
327
- envAsString ( env [ 'SOCKET_CLI_API_BASE_URL' ] ) ,
316
+ SOCKET_CLI_API_PROXY :
317
+ envAsString ( env [ 'SOCKET_CLI_API_PROXY' ] ) ||
318
+ envAsString ( env [ 'SOCKET_SECURITY_API_PROXY' ] ) ,
328
319
// Flag to set the API token.
329
320
// https://github.com/SocketDev/socket-cli?tab=readme-ov-file#environment-variables
330
- SOCKET_SECURITY_API_TOKEN :
331
- // Note: These are SOCKET_SECURITY prefixed because they're not specific
332
- // to the CLI. For the sake of consistency we'll also support the env
333
- // keys that do have the SOCKET_CLI prefix, it's an easy mistake.
334
- // In case multiple are supplied, the tokens supersede the keys and the
335
- // security prefix supersedes the cli prefix. "Adventure mode" ;)
336
- envAsString ( env [ 'SOCKET_SECURITY_API_TOKEN' ] ) ||
337
- // Keep 'SOCKET_SECURITY_API_KEY' alias.
338
- // TODO: Remove 'SOCKET_SECURITY_API_KEY' alias.
339
- envAsString ( env [ 'SOCKET_SECURITY_API_KEY' ] ) ||
321
+ SOCKET_CLI_API_TOKEN :
340
322
envAsString ( env [ 'SOCKET_CLI_API_TOKEN' ] ) ||
341
- envAsString ( env [ 'SOCKET_CLI_API_KEY' ] ) ,
323
+ envAsString ( env [ 'SOCKET_CLI_API_KEY' ] ) ||
324
+ envAsString ( env [ 'SOCKET_SECURITY_API_TOKEN' ] ) ||
325
+ envAsString ( env [ 'SOCKET_SECURITY_API_KEY' ] ) ,
326
+ // Flag containing a JSON stringified Socket configuration object.
327
+ SOCKET_CLI_CONFIG : envAsString ( env [ 'SOCKET_CLI_CONFIG' ] ) ,
328
+ // Flag to help debug Socket CLI.
329
+ SOCKET_CLI_DEBUG : envAsBoolean ( env [ 'SOCKET_CLI_DEBUG' ] ) ,
342
330
// A classic GitHub personal access token with the "repo" scope or a fine-grained
343
331
// access token with read/write permissions set for "Contents" and "Pull Request".
344
332
// https://docs.github.com/en/authentication/keeping-your-account-and-data-secure/managing-your-personal-access-tokens
345
- SOCKET_SECURITY_GITHUB_PAT : envAsString ( env [ 'SOCKET_SECURITY_GITHUB_PAT' ] ) ,
333
+ SOCKET_CLI_GITHUB_TOKEN :
334
+ envAsString ( env [ 'SOCKET_CLI_GITHUB_TOKEN' ] ) || GITHUB_TOKEN ,
335
+ // Flag to make the default API token `undefined`.
336
+ SOCKET_CLI_NO_API_TOKEN : envAsBoolean ( env [ 'SOCKET_CLI_NO_API_TOKEN' ] ) ,
337
+ // Flag to view all risks of safe-npm and safe-npx run.
338
+ SOCKET_CLI_VIEW_ALL_RISKS : envAsBoolean ( env [ SOCKET_CLI_VIEW_ALL_RISKS ] ) ,
346
339
// Specifies the type of terminal or terminal emulator being used by the process.
347
340
TERM : envAsString ( env [ 'TERM' ] ) ,
348
341
// The location of the base directory on Linux and MacOS used to store
0 commit comments