mirror of
https://github.com/gradle/actions.git
synced 2025-04-19 17:29:20 +08:00
[bot] Update dist directory
This commit is contained in:
parent
c1bdc4d73b
commit
4a417b5b1a
16
dist/dependency-submission/main/index.js
vendored
16
dist/dependency-submission/main/index.js
vendored
@ -184216,7 +184216,7 @@ async function setup(config) {
|
|||||||
maybeExportVariable('DEVELOCITY_TERMS_OF_USE_URL', config.getBuildScanTermsOfUseUrl());
|
maybeExportVariable('DEVELOCITY_TERMS_OF_USE_URL', config.getBuildScanTermsOfUseUrl());
|
||||||
maybeExportVariable('DEVELOCITY_TERMS_OF_USE_AGREE', config.getBuildScanTermsOfUseAgree());
|
maybeExportVariable('DEVELOCITY_TERMS_OF_USE_AGREE', config.getBuildScanTermsOfUseAgree());
|
||||||
}
|
}
|
||||||
return (0, short_lived_token_1.setupToken)(config.getDevelocityAccessKey(), config.getDevelocityTokenExpiry());
|
return (0, short_lived_token_1.setupToken)(config.getDevelocityAccessKey(), config.getDevelocityAllowUntrustedServer(), config.getDevelocityTokenExpiry());
|
||||||
}
|
}
|
||||||
function maybeExportVariable(variableName, value) {
|
function maybeExportVariable(variableName, value) {
|
||||||
if (!process.env[variableName]) {
|
if (!process.env[variableName]) {
|
||||||
@ -184278,11 +184278,11 @@ const httpm = __importStar(__nccwpck_require__(96184));
|
|||||||
const core = __importStar(__nccwpck_require__(37484));
|
const core = __importStar(__nccwpck_require__(37484));
|
||||||
const configuration_1 = __nccwpck_require__(66081);
|
const configuration_1 = __nccwpck_require__(66081);
|
||||||
const deprecation_collector_1 = __nccwpck_require__(18391);
|
const deprecation_collector_1 = __nccwpck_require__(18391);
|
||||||
async function setupToken(develocityAccessKey, develocityTokenExpiry) {
|
async function setupToken(develocityAccessKey, develocityAllowUntrustedServer, develocityTokenExpiry) {
|
||||||
if (develocityAccessKey) {
|
if (develocityAccessKey) {
|
||||||
try {
|
try {
|
||||||
core.debug('Fetching short-lived token...');
|
core.debug('Fetching short-lived token...');
|
||||||
const tokens = await getToken(develocityAccessKey, develocityTokenExpiry);
|
const tokens = await getToken(develocityAccessKey, develocityAllowUntrustedServer, develocityTokenExpiry);
|
||||||
if (tokens != null && !tokens.isEmpty()) {
|
if (tokens != null && !tokens.isEmpty()) {
|
||||||
core.debug(`Got token(s), setting the access key env vars`);
|
core.debug(`Got token(s), setting the access key env vars`);
|
||||||
const token = tokens.raw();
|
const token = tokens.raw();
|
||||||
@ -184312,10 +184312,10 @@ function handleMissingAccessToken() {
|
|||||||
core.warning(`The ${configuration_1.BuildScanConfig.DevelocityAccessKeyEnvVar} env var should be mapped to a short-lived token`);
|
core.warning(`The ${configuration_1.BuildScanConfig.DevelocityAccessKeyEnvVar} env var should be mapped to a short-lived token`);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
async function getToken(accessKey, expiry) {
|
async function getToken(accessKey, allowUntrustedServer, expiry) {
|
||||||
const empty = new Promise(r => r(null));
|
const empty = new Promise(r => r(null));
|
||||||
const develocityAccessKey = DevelocityAccessCredentials.parse(accessKey);
|
const develocityAccessKey = DevelocityAccessCredentials.parse(accessKey);
|
||||||
const shortLivedTokenClient = new ShortLivedTokenClient();
|
const shortLivedTokenClient = new ShortLivedTokenClient(allowUntrustedServer);
|
||||||
if (develocityAccessKey == null) {
|
if (develocityAccessKey == null) {
|
||||||
return empty;
|
return empty;
|
||||||
}
|
}
|
||||||
@ -184336,10 +184336,12 @@ async function getToken(accessKey, expiry) {
|
|||||||
return empty;
|
return empty;
|
||||||
}
|
}
|
||||||
class ShortLivedTokenClient {
|
class ShortLivedTokenClient {
|
||||||
constructor() {
|
constructor(develocityAllowUntrustedServer) {
|
||||||
this.httpc = new httpm.HttpClient('gradle/actions/setup-gradle');
|
|
||||||
this.maxRetries = 3;
|
this.maxRetries = 3;
|
||||||
this.retryInterval = 1000;
|
this.retryInterval = 1000;
|
||||||
|
this.httpc = new httpm.HttpClient('gradle/actions/setup-gradle', undefined, {
|
||||||
|
ignoreSslError: develocityAllowUntrustedServer
|
||||||
|
});
|
||||||
}
|
}
|
||||||
async fetchToken(serverUrl, accessKey, expiry) {
|
async fetchToken(serverUrl, accessKey, expiry) {
|
||||||
const queryParams = expiry ? `?expiresInHours=${expiry}` : '';
|
const queryParams = expiry ? `?expiresInHours=${expiry}` : '';
|
||||||
|
2
dist/dependency-submission/main/index.js.map
vendored
2
dist/dependency-submission/main/index.js.map
vendored
File diff suppressed because one or more lines are too long
16
dist/dependency-submission/post/index.js
vendored
16
dist/dependency-submission/post/index.js
vendored
@ -142438,7 +142438,7 @@ async function setup(config) {
|
|||||||
maybeExportVariable('DEVELOCITY_TERMS_OF_USE_URL', config.getBuildScanTermsOfUseUrl());
|
maybeExportVariable('DEVELOCITY_TERMS_OF_USE_URL', config.getBuildScanTermsOfUseUrl());
|
||||||
maybeExportVariable('DEVELOCITY_TERMS_OF_USE_AGREE', config.getBuildScanTermsOfUseAgree());
|
maybeExportVariable('DEVELOCITY_TERMS_OF_USE_AGREE', config.getBuildScanTermsOfUseAgree());
|
||||||
}
|
}
|
||||||
return (0, short_lived_token_1.setupToken)(config.getDevelocityAccessKey(), config.getDevelocityTokenExpiry());
|
return (0, short_lived_token_1.setupToken)(config.getDevelocityAccessKey(), config.getDevelocityAllowUntrustedServer(), config.getDevelocityTokenExpiry());
|
||||||
}
|
}
|
||||||
function maybeExportVariable(variableName, value) {
|
function maybeExportVariable(variableName, value) {
|
||||||
if (!process.env[variableName]) {
|
if (!process.env[variableName]) {
|
||||||
@ -142500,11 +142500,11 @@ const httpm = __importStar(__nccwpck_require__(96184));
|
|||||||
const core = __importStar(__nccwpck_require__(37484));
|
const core = __importStar(__nccwpck_require__(37484));
|
||||||
const configuration_1 = __nccwpck_require__(66081);
|
const configuration_1 = __nccwpck_require__(66081);
|
||||||
const deprecation_collector_1 = __nccwpck_require__(18391);
|
const deprecation_collector_1 = __nccwpck_require__(18391);
|
||||||
async function setupToken(develocityAccessKey, develocityTokenExpiry) {
|
async function setupToken(develocityAccessKey, develocityAllowUntrustedServer, develocityTokenExpiry) {
|
||||||
if (develocityAccessKey) {
|
if (develocityAccessKey) {
|
||||||
try {
|
try {
|
||||||
core.debug('Fetching short-lived token...');
|
core.debug('Fetching short-lived token...');
|
||||||
const tokens = await getToken(develocityAccessKey, develocityTokenExpiry);
|
const tokens = await getToken(develocityAccessKey, develocityAllowUntrustedServer, develocityTokenExpiry);
|
||||||
if (tokens != null && !tokens.isEmpty()) {
|
if (tokens != null && !tokens.isEmpty()) {
|
||||||
core.debug(`Got token(s), setting the access key env vars`);
|
core.debug(`Got token(s), setting the access key env vars`);
|
||||||
const token = tokens.raw();
|
const token = tokens.raw();
|
||||||
@ -142534,10 +142534,10 @@ function handleMissingAccessToken() {
|
|||||||
core.warning(`The ${configuration_1.BuildScanConfig.DevelocityAccessKeyEnvVar} env var should be mapped to a short-lived token`);
|
core.warning(`The ${configuration_1.BuildScanConfig.DevelocityAccessKeyEnvVar} env var should be mapped to a short-lived token`);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
async function getToken(accessKey, expiry) {
|
async function getToken(accessKey, allowUntrustedServer, expiry) {
|
||||||
const empty = new Promise(r => r(null));
|
const empty = new Promise(r => r(null));
|
||||||
const develocityAccessKey = DevelocityAccessCredentials.parse(accessKey);
|
const develocityAccessKey = DevelocityAccessCredentials.parse(accessKey);
|
||||||
const shortLivedTokenClient = new ShortLivedTokenClient();
|
const shortLivedTokenClient = new ShortLivedTokenClient(allowUntrustedServer);
|
||||||
if (develocityAccessKey == null) {
|
if (develocityAccessKey == null) {
|
||||||
return empty;
|
return empty;
|
||||||
}
|
}
|
||||||
@ -142558,10 +142558,12 @@ async function getToken(accessKey, expiry) {
|
|||||||
return empty;
|
return empty;
|
||||||
}
|
}
|
||||||
class ShortLivedTokenClient {
|
class ShortLivedTokenClient {
|
||||||
constructor() {
|
constructor(develocityAllowUntrustedServer) {
|
||||||
this.httpc = new httpm.HttpClient('gradle/actions/setup-gradle');
|
|
||||||
this.maxRetries = 3;
|
this.maxRetries = 3;
|
||||||
this.retryInterval = 1000;
|
this.retryInterval = 1000;
|
||||||
|
this.httpc = new httpm.HttpClient('gradle/actions/setup-gradle', undefined, {
|
||||||
|
ignoreSslError: develocityAllowUntrustedServer
|
||||||
|
});
|
||||||
}
|
}
|
||||||
async fetchToken(serverUrl, accessKey, expiry) {
|
async fetchToken(serverUrl, accessKey, expiry) {
|
||||||
const queryParams = expiry ? `?expiresInHours=${expiry}` : '';
|
const queryParams = expiry ? `?expiresInHours=${expiry}` : '';
|
||||||
|
2
dist/dependency-submission/post/index.js.map
vendored
2
dist/dependency-submission/post/index.js.map
vendored
File diff suppressed because one or more lines are too long
16
dist/setup-gradle/main/index.js
vendored
16
dist/setup-gradle/main/index.js
vendored
@ -184201,7 +184201,7 @@ async function setup(config) {
|
|||||||
maybeExportVariable('DEVELOCITY_TERMS_OF_USE_URL', config.getBuildScanTermsOfUseUrl());
|
maybeExportVariable('DEVELOCITY_TERMS_OF_USE_URL', config.getBuildScanTermsOfUseUrl());
|
||||||
maybeExportVariable('DEVELOCITY_TERMS_OF_USE_AGREE', config.getBuildScanTermsOfUseAgree());
|
maybeExportVariable('DEVELOCITY_TERMS_OF_USE_AGREE', config.getBuildScanTermsOfUseAgree());
|
||||||
}
|
}
|
||||||
return (0, short_lived_token_1.setupToken)(config.getDevelocityAccessKey(), config.getDevelocityTokenExpiry());
|
return (0, short_lived_token_1.setupToken)(config.getDevelocityAccessKey(), config.getDevelocityAllowUntrustedServer(), config.getDevelocityTokenExpiry());
|
||||||
}
|
}
|
||||||
function maybeExportVariable(variableName, value) {
|
function maybeExportVariable(variableName, value) {
|
||||||
if (!process.env[variableName]) {
|
if (!process.env[variableName]) {
|
||||||
@ -184263,11 +184263,11 @@ const httpm = __importStar(__nccwpck_require__(96184));
|
|||||||
const core = __importStar(__nccwpck_require__(37484));
|
const core = __importStar(__nccwpck_require__(37484));
|
||||||
const configuration_1 = __nccwpck_require__(66081);
|
const configuration_1 = __nccwpck_require__(66081);
|
||||||
const deprecation_collector_1 = __nccwpck_require__(18391);
|
const deprecation_collector_1 = __nccwpck_require__(18391);
|
||||||
async function setupToken(develocityAccessKey, develocityTokenExpiry) {
|
async function setupToken(develocityAccessKey, develocityAllowUntrustedServer, develocityTokenExpiry) {
|
||||||
if (develocityAccessKey) {
|
if (develocityAccessKey) {
|
||||||
try {
|
try {
|
||||||
core.debug('Fetching short-lived token...');
|
core.debug('Fetching short-lived token...');
|
||||||
const tokens = await getToken(develocityAccessKey, develocityTokenExpiry);
|
const tokens = await getToken(develocityAccessKey, develocityAllowUntrustedServer, develocityTokenExpiry);
|
||||||
if (tokens != null && !tokens.isEmpty()) {
|
if (tokens != null && !tokens.isEmpty()) {
|
||||||
core.debug(`Got token(s), setting the access key env vars`);
|
core.debug(`Got token(s), setting the access key env vars`);
|
||||||
const token = tokens.raw();
|
const token = tokens.raw();
|
||||||
@ -184297,10 +184297,10 @@ function handleMissingAccessToken() {
|
|||||||
core.warning(`The ${configuration_1.BuildScanConfig.DevelocityAccessKeyEnvVar} env var should be mapped to a short-lived token`);
|
core.warning(`The ${configuration_1.BuildScanConfig.DevelocityAccessKeyEnvVar} env var should be mapped to a short-lived token`);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
async function getToken(accessKey, expiry) {
|
async function getToken(accessKey, allowUntrustedServer, expiry) {
|
||||||
const empty = new Promise(r => r(null));
|
const empty = new Promise(r => r(null));
|
||||||
const develocityAccessKey = DevelocityAccessCredentials.parse(accessKey);
|
const develocityAccessKey = DevelocityAccessCredentials.parse(accessKey);
|
||||||
const shortLivedTokenClient = new ShortLivedTokenClient();
|
const shortLivedTokenClient = new ShortLivedTokenClient(allowUntrustedServer);
|
||||||
if (develocityAccessKey == null) {
|
if (develocityAccessKey == null) {
|
||||||
return empty;
|
return empty;
|
||||||
}
|
}
|
||||||
@ -184321,10 +184321,12 @@ async function getToken(accessKey, expiry) {
|
|||||||
return empty;
|
return empty;
|
||||||
}
|
}
|
||||||
class ShortLivedTokenClient {
|
class ShortLivedTokenClient {
|
||||||
constructor() {
|
constructor(develocityAllowUntrustedServer) {
|
||||||
this.httpc = new httpm.HttpClient('gradle/actions/setup-gradle');
|
|
||||||
this.maxRetries = 3;
|
this.maxRetries = 3;
|
||||||
this.retryInterval = 1000;
|
this.retryInterval = 1000;
|
||||||
|
this.httpc = new httpm.HttpClient('gradle/actions/setup-gradle', undefined, {
|
||||||
|
ignoreSslError: develocityAllowUntrustedServer
|
||||||
|
});
|
||||||
}
|
}
|
||||||
async fetchToken(serverUrl, accessKey, expiry) {
|
async fetchToken(serverUrl, accessKey, expiry) {
|
||||||
const queryParams = expiry ? `?expiresInHours=${expiry}` : '';
|
const queryParams = expiry ? `?expiresInHours=${expiry}` : '';
|
||||||
|
2
dist/setup-gradle/main/index.js.map
vendored
2
dist/setup-gradle/main/index.js.map
vendored
File diff suppressed because one or more lines are too long
16
dist/setup-gradle/post/index.js
vendored
16
dist/setup-gradle/post/index.js
vendored
@ -184196,7 +184196,7 @@ async function setup(config) {
|
|||||||
maybeExportVariable('DEVELOCITY_TERMS_OF_USE_URL', config.getBuildScanTermsOfUseUrl());
|
maybeExportVariable('DEVELOCITY_TERMS_OF_USE_URL', config.getBuildScanTermsOfUseUrl());
|
||||||
maybeExportVariable('DEVELOCITY_TERMS_OF_USE_AGREE', config.getBuildScanTermsOfUseAgree());
|
maybeExportVariable('DEVELOCITY_TERMS_OF_USE_AGREE', config.getBuildScanTermsOfUseAgree());
|
||||||
}
|
}
|
||||||
return (0, short_lived_token_1.setupToken)(config.getDevelocityAccessKey(), config.getDevelocityTokenExpiry());
|
return (0, short_lived_token_1.setupToken)(config.getDevelocityAccessKey(), config.getDevelocityAllowUntrustedServer(), config.getDevelocityTokenExpiry());
|
||||||
}
|
}
|
||||||
function maybeExportVariable(variableName, value) {
|
function maybeExportVariable(variableName, value) {
|
||||||
if (!process.env[variableName]) {
|
if (!process.env[variableName]) {
|
||||||
@ -184258,11 +184258,11 @@ const httpm = __importStar(__nccwpck_require__(96184));
|
|||||||
const core = __importStar(__nccwpck_require__(37484));
|
const core = __importStar(__nccwpck_require__(37484));
|
||||||
const configuration_1 = __nccwpck_require__(66081);
|
const configuration_1 = __nccwpck_require__(66081);
|
||||||
const deprecation_collector_1 = __nccwpck_require__(18391);
|
const deprecation_collector_1 = __nccwpck_require__(18391);
|
||||||
async function setupToken(develocityAccessKey, develocityTokenExpiry) {
|
async function setupToken(develocityAccessKey, develocityAllowUntrustedServer, develocityTokenExpiry) {
|
||||||
if (develocityAccessKey) {
|
if (develocityAccessKey) {
|
||||||
try {
|
try {
|
||||||
core.debug('Fetching short-lived token...');
|
core.debug('Fetching short-lived token...');
|
||||||
const tokens = await getToken(develocityAccessKey, develocityTokenExpiry);
|
const tokens = await getToken(develocityAccessKey, develocityAllowUntrustedServer, develocityTokenExpiry);
|
||||||
if (tokens != null && !tokens.isEmpty()) {
|
if (tokens != null && !tokens.isEmpty()) {
|
||||||
core.debug(`Got token(s), setting the access key env vars`);
|
core.debug(`Got token(s), setting the access key env vars`);
|
||||||
const token = tokens.raw();
|
const token = tokens.raw();
|
||||||
@ -184292,10 +184292,10 @@ function handleMissingAccessToken() {
|
|||||||
core.warning(`The ${configuration_1.BuildScanConfig.DevelocityAccessKeyEnvVar} env var should be mapped to a short-lived token`);
|
core.warning(`The ${configuration_1.BuildScanConfig.DevelocityAccessKeyEnvVar} env var should be mapped to a short-lived token`);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
async function getToken(accessKey, expiry) {
|
async function getToken(accessKey, allowUntrustedServer, expiry) {
|
||||||
const empty = new Promise(r => r(null));
|
const empty = new Promise(r => r(null));
|
||||||
const develocityAccessKey = DevelocityAccessCredentials.parse(accessKey);
|
const develocityAccessKey = DevelocityAccessCredentials.parse(accessKey);
|
||||||
const shortLivedTokenClient = new ShortLivedTokenClient();
|
const shortLivedTokenClient = new ShortLivedTokenClient(allowUntrustedServer);
|
||||||
if (develocityAccessKey == null) {
|
if (develocityAccessKey == null) {
|
||||||
return empty;
|
return empty;
|
||||||
}
|
}
|
||||||
@ -184316,10 +184316,12 @@ async function getToken(accessKey, expiry) {
|
|||||||
return empty;
|
return empty;
|
||||||
}
|
}
|
||||||
class ShortLivedTokenClient {
|
class ShortLivedTokenClient {
|
||||||
constructor() {
|
constructor(develocityAllowUntrustedServer) {
|
||||||
this.httpc = new httpm.HttpClient('gradle/actions/setup-gradle');
|
|
||||||
this.maxRetries = 3;
|
this.maxRetries = 3;
|
||||||
this.retryInterval = 1000;
|
this.retryInterval = 1000;
|
||||||
|
this.httpc = new httpm.HttpClient('gradle/actions/setup-gradle', undefined, {
|
||||||
|
ignoreSslError: develocityAllowUntrustedServer
|
||||||
|
});
|
||||||
}
|
}
|
||||||
async fetchToken(serverUrl, accessKey, expiry) {
|
async fetchToken(serverUrl, accessKey, expiry) {
|
||||||
const queryParams = expiry ? `?expiresInHours=${expiry}` : '';
|
const queryParams = expiry ? `?expiresInHours=${expiry}` : '';
|
||||||
|
2
dist/setup-gradle/post/index.js.map
vendored
2
dist/setup-gradle/post/index.js.map
vendored
File diff suppressed because one or more lines are too long
Loading…
x
Reference in New Issue
Block a user