| /** | |
| * Key-value pair form constraints and sanitization patterns. | |
| * | |
| * Both regexes target characters dangerous in HTTP-header / env-var contexts: | |
| * \x00 – null byte (injection) | |
| * \x0A (\n) – LF (HTTP header injection / response splitting) | |
| * \x0D (\r) – CR (HTTP header injection / response splitting) | |
| * \x01–\x08, \x0B–\x0C, \x0E–\x1F, \x7F – other C0/DEL control chars | |
| * | |
| * KEY_UNSAFE_RE additionally strips TAB (\x09); values keep TAB because it is | |
| * a valid header-value continuation character per RFC 7230. | |
| */ | |
| export const KEY_VALUE_PAIR_KEY_MAX_LENGTH = 256; | |
| export const KEY_VALUE_PAIR_VALUE_MAX_LENGTH = 8192; | |
| // eslint-disable-next-line no-control-regex | |
| export const KEY_VALUE_PAIR_UNSAFE_KEY_RE = /[\x00-\x1F\x7F]/g; | |
| // eslint-disable-next-line no-control-regex | |
| export const KEY_VALUE_PAIR_UNSAFE_VALUE_RE = /[\x00-\x08\x0A-\x0D\x0E-\x1F\x7F]/g; | |