mirror of
https://github.com/gradle/actions.git
synced 2025-04-19 01:09:20 +08:00
[bot] Update dist directory
This commit is contained in:
parent
c1bdc4d73b
commit
4a417b5b1a
16
dist/dependency-submission/main/index.js
vendored
16
dist/dependency-submission/main/index.js
vendored
@ -184216,7 +184216,7 @@ async function setup(config) {
|
||||
maybeExportVariable('DEVELOCITY_TERMS_OF_USE_URL', config.getBuildScanTermsOfUseUrl());
|
||||
maybeExportVariable('DEVELOCITY_TERMS_OF_USE_AGREE', config.getBuildScanTermsOfUseAgree());
|
||||
}
|
||||
return (0, short_lived_token_1.setupToken)(config.getDevelocityAccessKey(), config.getDevelocityTokenExpiry());
|
||||
return (0, short_lived_token_1.setupToken)(config.getDevelocityAccessKey(), config.getDevelocityAllowUntrustedServer(), config.getDevelocityTokenExpiry());
|
||||
}
|
||||
function maybeExportVariable(variableName, value) {
|
||||
if (!process.env[variableName]) {
|
||||
@ -184278,11 +184278,11 @@ const httpm = __importStar(__nccwpck_require__(96184));
|
||||
const core = __importStar(__nccwpck_require__(37484));
|
||||
const configuration_1 = __nccwpck_require__(66081);
|
||||
const deprecation_collector_1 = __nccwpck_require__(18391);
|
||||
async function setupToken(develocityAccessKey, develocityTokenExpiry) {
|
||||
async function setupToken(develocityAccessKey, develocityAllowUntrustedServer, develocityTokenExpiry) {
|
||||
if (develocityAccessKey) {
|
||||
try {
|
||||
core.debug('Fetching short-lived token...');
|
||||
const tokens = await getToken(develocityAccessKey, develocityTokenExpiry);
|
||||
const tokens = await getToken(develocityAccessKey, develocityAllowUntrustedServer, develocityTokenExpiry);
|
||||
if (tokens != null && !tokens.isEmpty()) {
|
||||
core.debug(`Got token(s), setting the access key env vars`);
|
||||
const token = tokens.raw();
|
||||
@ -184312,10 +184312,10 @@ function handleMissingAccessToken() {
|
||||
core.warning(`The ${configuration_1.BuildScanConfig.DevelocityAccessKeyEnvVar} env var should be mapped to a short-lived token`);
|
||||
}
|
||||
}
|
||||
async function getToken(accessKey, expiry) {
|
||||
async function getToken(accessKey, allowUntrustedServer, expiry) {
|
||||
const empty = new Promise(r => r(null));
|
||||
const develocityAccessKey = DevelocityAccessCredentials.parse(accessKey);
|
||||
const shortLivedTokenClient = new ShortLivedTokenClient();
|
||||
const shortLivedTokenClient = new ShortLivedTokenClient(allowUntrustedServer);
|
||||
if (develocityAccessKey == null) {
|
||||
return empty;
|
||||
}
|
||||
@ -184336,10 +184336,12 @@ async function getToken(accessKey, expiry) {
|
||||
return empty;
|
||||
}
|
||||
class ShortLivedTokenClient {
|
||||
constructor() {
|
||||
this.httpc = new httpm.HttpClient('gradle/actions/setup-gradle');
|
||||
constructor(develocityAllowUntrustedServer) {
|
||||
this.maxRetries = 3;
|
||||
this.retryInterval = 1000;
|
||||
this.httpc = new httpm.HttpClient('gradle/actions/setup-gradle', undefined, {
|
||||
ignoreSslError: develocityAllowUntrustedServer
|
||||
});
|
||||
}
|
||||
async fetchToken(serverUrl, accessKey, expiry) {
|
||||
const queryParams = expiry ? `?expiresInHours=${expiry}` : '';
|
||||
|
2
dist/dependency-submission/main/index.js.map
vendored
2
dist/dependency-submission/main/index.js.map
vendored
File diff suppressed because one or more lines are too long
16
dist/dependency-submission/post/index.js
vendored
16
dist/dependency-submission/post/index.js
vendored
@ -142438,7 +142438,7 @@ async function setup(config) {
|
||||
maybeExportVariable('DEVELOCITY_TERMS_OF_USE_URL', config.getBuildScanTermsOfUseUrl());
|
||||
maybeExportVariable('DEVELOCITY_TERMS_OF_USE_AGREE', config.getBuildScanTermsOfUseAgree());
|
||||
}
|
||||
return (0, short_lived_token_1.setupToken)(config.getDevelocityAccessKey(), config.getDevelocityTokenExpiry());
|
||||
return (0, short_lived_token_1.setupToken)(config.getDevelocityAccessKey(), config.getDevelocityAllowUntrustedServer(), config.getDevelocityTokenExpiry());
|
||||
}
|
||||
function maybeExportVariable(variableName, value) {
|
||||
if (!process.env[variableName]) {
|
||||
@ -142500,11 +142500,11 @@ const httpm = __importStar(__nccwpck_require__(96184));
|
||||
const core = __importStar(__nccwpck_require__(37484));
|
||||
const configuration_1 = __nccwpck_require__(66081);
|
||||
const deprecation_collector_1 = __nccwpck_require__(18391);
|
||||
async function setupToken(develocityAccessKey, develocityTokenExpiry) {
|
||||
async function setupToken(develocityAccessKey, develocityAllowUntrustedServer, develocityTokenExpiry) {
|
||||
if (develocityAccessKey) {
|
||||
try {
|
||||
core.debug('Fetching short-lived token...');
|
||||
const tokens = await getToken(develocityAccessKey, develocityTokenExpiry);
|
||||
const tokens = await getToken(develocityAccessKey, develocityAllowUntrustedServer, develocityTokenExpiry);
|
||||
if (tokens != null && !tokens.isEmpty()) {
|
||||
core.debug(`Got token(s), setting the access key env vars`);
|
||||
const token = tokens.raw();
|
||||
@ -142534,10 +142534,10 @@ function handleMissingAccessToken() {
|
||||
core.warning(`The ${configuration_1.BuildScanConfig.DevelocityAccessKeyEnvVar} env var should be mapped to a short-lived token`);
|
||||
}
|
||||
}
|
||||
async function getToken(accessKey, expiry) {
|
||||
async function getToken(accessKey, allowUntrustedServer, expiry) {
|
||||
const empty = new Promise(r => r(null));
|
||||
const develocityAccessKey = DevelocityAccessCredentials.parse(accessKey);
|
||||
const shortLivedTokenClient = new ShortLivedTokenClient();
|
||||
const shortLivedTokenClient = new ShortLivedTokenClient(allowUntrustedServer);
|
||||
if (develocityAccessKey == null) {
|
||||
return empty;
|
||||
}
|
||||
@ -142558,10 +142558,12 @@ async function getToken(accessKey, expiry) {
|
||||
return empty;
|
||||
}
|
||||
class ShortLivedTokenClient {
|
||||
constructor() {
|
||||
this.httpc = new httpm.HttpClient('gradle/actions/setup-gradle');
|
||||
constructor(develocityAllowUntrustedServer) {
|
||||
this.maxRetries = 3;
|
||||
this.retryInterval = 1000;
|
||||
this.httpc = new httpm.HttpClient('gradle/actions/setup-gradle', undefined, {
|
||||
ignoreSslError: develocityAllowUntrustedServer
|
||||
});
|
||||
}
|
||||
async fetchToken(serverUrl, accessKey, expiry) {
|
||||
const queryParams = expiry ? `?expiresInHours=${expiry}` : '';
|
||||
|
2
dist/dependency-submission/post/index.js.map
vendored
2
dist/dependency-submission/post/index.js.map
vendored
File diff suppressed because one or more lines are too long
16
dist/setup-gradle/main/index.js
vendored
16
dist/setup-gradle/main/index.js
vendored
@ -184201,7 +184201,7 @@ async function setup(config) {
|
||||
maybeExportVariable('DEVELOCITY_TERMS_OF_USE_URL', config.getBuildScanTermsOfUseUrl());
|
||||
maybeExportVariable('DEVELOCITY_TERMS_OF_USE_AGREE', config.getBuildScanTermsOfUseAgree());
|
||||
}
|
||||
return (0, short_lived_token_1.setupToken)(config.getDevelocityAccessKey(), config.getDevelocityTokenExpiry());
|
||||
return (0, short_lived_token_1.setupToken)(config.getDevelocityAccessKey(), config.getDevelocityAllowUntrustedServer(), config.getDevelocityTokenExpiry());
|
||||
}
|
||||
function maybeExportVariable(variableName, value) {
|
||||
if (!process.env[variableName]) {
|
||||
@ -184263,11 +184263,11 @@ const httpm = __importStar(__nccwpck_require__(96184));
|
||||
const core = __importStar(__nccwpck_require__(37484));
|
||||
const configuration_1 = __nccwpck_require__(66081);
|
||||
const deprecation_collector_1 = __nccwpck_require__(18391);
|
||||
async function setupToken(develocityAccessKey, develocityTokenExpiry) {
|
||||
async function setupToken(develocityAccessKey, develocityAllowUntrustedServer, develocityTokenExpiry) {
|
||||
if (develocityAccessKey) {
|
||||
try {
|
||||
core.debug('Fetching short-lived token...');
|
||||
const tokens = await getToken(develocityAccessKey, develocityTokenExpiry);
|
||||
const tokens = await getToken(develocityAccessKey, develocityAllowUntrustedServer, develocityTokenExpiry);
|
||||
if (tokens != null && !tokens.isEmpty()) {
|
||||
core.debug(`Got token(s), setting the access key env vars`);
|
||||
const token = tokens.raw();
|
||||
@ -184297,10 +184297,10 @@ function handleMissingAccessToken() {
|
||||
core.warning(`The ${configuration_1.BuildScanConfig.DevelocityAccessKeyEnvVar} env var should be mapped to a short-lived token`);
|
||||
}
|
||||
}
|
||||
async function getToken(accessKey, expiry) {
|
||||
async function getToken(accessKey, allowUntrustedServer, expiry) {
|
||||
const empty = new Promise(r => r(null));
|
||||
const develocityAccessKey = DevelocityAccessCredentials.parse(accessKey);
|
||||
const shortLivedTokenClient = new ShortLivedTokenClient();
|
||||
const shortLivedTokenClient = new ShortLivedTokenClient(allowUntrustedServer);
|
||||
if (develocityAccessKey == null) {
|
||||
return empty;
|
||||
}
|
||||
@ -184321,10 +184321,12 @@ async function getToken(accessKey, expiry) {
|
||||
return empty;
|
||||
}
|
||||
class ShortLivedTokenClient {
|
||||
constructor() {
|
||||
this.httpc = new httpm.HttpClient('gradle/actions/setup-gradle');
|
||||
constructor(develocityAllowUntrustedServer) {
|
||||
this.maxRetries = 3;
|
||||
this.retryInterval = 1000;
|
||||
this.httpc = new httpm.HttpClient('gradle/actions/setup-gradle', undefined, {
|
||||
ignoreSslError: develocityAllowUntrustedServer
|
||||
});
|
||||
}
|
||||
async fetchToken(serverUrl, accessKey, expiry) {
|
||||
const queryParams = expiry ? `?expiresInHours=${expiry}` : '';
|
||||
|
2
dist/setup-gradle/main/index.js.map
vendored
2
dist/setup-gradle/main/index.js.map
vendored
File diff suppressed because one or more lines are too long
16
dist/setup-gradle/post/index.js
vendored
16
dist/setup-gradle/post/index.js
vendored
@ -184196,7 +184196,7 @@ async function setup(config) {
|
||||
maybeExportVariable('DEVELOCITY_TERMS_OF_USE_URL', config.getBuildScanTermsOfUseUrl());
|
||||
maybeExportVariable('DEVELOCITY_TERMS_OF_USE_AGREE', config.getBuildScanTermsOfUseAgree());
|
||||
}
|
||||
return (0, short_lived_token_1.setupToken)(config.getDevelocityAccessKey(), config.getDevelocityTokenExpiry());
|
||||
return (0, short_lived_token_1.setupToken)(config.getDevelocityAccessKey(), config.getDevelocityAllowUntrustedServer(), config.getDevelocityTokenExpiry());
|
||||
}
|
||||
function maybeExportVariable(variableName, value) {
|
||||
if (!process.env[variableName]) {
|
||||
@ -184258,11 +184258,11 @@ const httpm = __importStar(__nccwpck_require__(96184));
|
||||
const core = __importStar(__nccwpck_require__(37484));
|
||||
const configuration_1 = __nccwpck_require__(66081);
|
||||
const deprecation_collector_1 = __nccwpck_require__(18391);
|
||||
async function setupToken(develocityAccessKey, develocityTokenExpiry) {
|
||||
async function setupToken(develocityAccessKey, develocityAllowUntrustedServer, develocityTokenExpiry) {
|
||||
if (develocityAccessKey) {
|
||||
try {
|
||||
core.debug('Fetching short-lived token...');
|
||||
const tokens = await getToken(develocityAccessKey, develocityTokenExpiry);
|
||||
const tokens = await getToken(develocityAccessKey, develocityAllowUntrustedServer, develocityTokenExpiry);
|
||||
if (tokens != null && !tokens.isEmpty()) {
|
||||
core.debug(`Got token(s), setting the access key env vars`);
|
||||
const token = tokens.raw();
|
||||
@ -184292,10 +184292,10 @@ function handleMissingAccessToken() {
|
||||
core.warning(`The ${configuration_1.BuildScanConfig.DevelocityAccessKeyEnvVar} env var should be mapped to a short-lived token`);
|
||||
}
|
||||
}
|
||||
async function getToken(accessKey, expiry) {
|
||||
async function getToken(accessKey, allowUntrustedServer, expiry) {
|
||||
const empty = new Promise(r => r(null));
|
||||
const develocityAccessKey = DevelocityAccessCredentials.parse(accessKey);
|
||||
const shortLivedTokenClient = new ShortLivedTokenClient();
|
||||
const shortLivedTokenClient = new ShortLivedTokenClient(allowUntrustedServer);
|
||||
if (develocityAccessKey == null) {
|
||||
return empty;
|
||||
}
|
||||
@ -184316,10 +184316,12 @@ async function getToken(accessKey, expiry) {
|
||||
return empty;
|
||||
}
|
||||
class ShortLivedTokenClient {
|
||||
constructor() {
|
||||
this.httpc = new httpm.HttpClient('gradle/actions/setup-gradle');
|
||||
constructor(develocityAllowUntrustedServer) {
|
||||
this.maxRetries = 3;
|
||||
this.retryInterval = 1000;
|
||||
this.httpc = new httpm.HttpClient('gradle/actions/setup-gradle', undefined, {
|
||||
ignoreSslError: develocityAllowUntrustedServer
|
||||
});
|
||||
}
|
||||
async fetchToken(serverUrl, accessKey, expiry) {
|
||||
const queryParams = expiry ? `?expiresInHours=${expiry}` : '';
|
||||
|
2
dist/setup-gradle/post/index.js.map
vendored
2
dist/setup-gradle/post/index.js.map
vendored
File diff suppressed because one or more lines are too long
Loading…
x
Reference in New Issue
Block a user