[bot] Update dist directory

This commit is contained in:
Bot Githubaction 2025-03-13 14:55:33 +00:00 committed by github-actions[bot]
parent c1bdc4d73b
commit 4a417b5b1a
8 changed files with 40 additions and 32 deletions

View File

@ -184216,7 +184216,7 @@ async function setup(config) {
maybeExportVariable('DEVELOCITY_TERMS_OF_USE_URL', config.getBuildScanTermsOfUseUrl());
maybeExportVariable('DEVELOCITY_TERMS_OF_USE_AGREE', config.getBuildScanTermsOfUseAgree());
}
return (0, short_lived_token_1.setupToken)(config.getDevelocityAccessKey(), config.getDevelocityTokenExpiry());
return (0, short_lived_token_1.setupToken)(config.getDevelocityAccessKey(), config.getDevelocityAllowUntrustedServer(), config.getDevelocityTokenExpiry());
}
function maybeExportVariable(variableName, value) {
if (!process.env[variableName]) {
@ -184278,11 +184278,11 @@ const httpm = __importStar(__nccwpck_require__(96184));
const core = __importStar(__nccwpck_require__(37484));
const configuration_1 = __nccwpck_require__(66081);
const deprecation_collector_1 = __nccwpck_require__(18391);
async function setupToken(develocityAccessKey, develocityTokenExpiry) {
async function setupToken(develocityAccessKey, develocityAllowUntrustedServer, develocityTokenExpiry) {
if (develocityAccessKey) {
try {
core.debug('Fetching short-lived token...');
const tokens = await getToken(develocityAccessKey, develocityTokenExpiry);
const tokens = await getToken(develocityAccessKey, develocityAllowUntrustedServer, develocityTokenExpiry);
if (tokens != null && !tokens.isEmpty()) {
core.debug(`Got token(s), setting the access key env vars`);
const token = tokens.raw();
@ -184312,10 +184312,10 @@ function handleMissingAccessToken() {
core.warning(`The ${configuration_1.BuildScanConfig.DevelocityAccessKeyEnvVar} env var should be mapped to a short-lived token`);
}
}
async function getToken(accessKey, expiry) {
async function getToken(accessKey, allowUntrustedServer, expiry) {
const empty = new Promise(r => r(null));
const develocityAccessKey = DevelocityAccessCredentials.parse(accessKey);
const shortLivedTokenClient = new ShortLivedTokenClient();
const shortLivedTokenClient = new ShortLivedTokenClient(allowUntrustedServer);
if (develocityAccessKey == null) {
return empty;
}
@ -184336,10 +184336,12 @@ async function getToken(accessKey, expiry) {
return empty;
}
class ShortLivedTokenClient {
constructor() {
this.httpc = new httpm.HttpClient('gradle/actions/setup-gradle');
constructor(develocityAllowUntrustedServer) {
this.maxRetries = 3;
this.retryInterval = 1000;
this.httpc = new httpm.HttpClient('gradle/actions/setup-gradle', undefined, {
ignoreSslError: develocityAllowUntrustedServer
});
}
async fetchToken(serverUrl, accessKey, expiry) {
const queryParams = expiry ? `?expiresInHours=${expiry}` : '';

File diff suppressed because one or more lines are too long

View File

@ -142438,7 +142438,7 @@ async function setup(config) {
maybeExportVariable('DEVELOCITY_TERMS_OF_USE_URL', config.getBuildScanTermsOfUseUrl());
maybeExportVariable('DEVELOCITY_TERMS_OF_USE_AGREE', config.getBuildScanTermsOfUseAgree());
}
return (0, short_lived_token_1.setupToken)(config.getDevelocityAccessKey(), config.getDevelocityTokenExpiry());
return (0, short_lived_token_1.setupToken)(config.getDevelocityAccessKey(), config.getDevelocityAllowUntrustedServer(), config.getDevelocityTokenExpiry());
}
function maybeExportVariable(variableName, value) {
if (!process.env[variableName]) {
@ -142500,11 +142500,11 @@ const httpm = __importStar(__nccwpck_require__(96184));
const core = __importStar(__nccwpck_require__(37484));
const configuration_1 = __nccwpck_require__(66081);
const deprecation_collector_1 = __nccwpck_require__(18391);
async function setupToken(develocityAccessKey, develocityTokenExpiry) {
async function setupToken(develocityAccessKey, develocityAllowUntrustedServer, develocityTokenExpiry) {
if (develocityAccessKey) {
try {
core.debug('Fetching short-lived token...');
const tokens = await getToken(develocityAccessKey, develocityTokenExpiry);
const tokens = await getToken(develocityAccessKey, develocityAllowUntrustedServer, develocityTokenExpiry);
if (tokens != null && !tokens.isEmpty()) {
core.debug(`Got token(s), setting the access key env vars`);
const token = tokens.raw();
@ -142534,10 +142534,10 @@ function handleMissingAccessToken() {
core.warning(`The ${configuration_1.BuildScanConfig.DevelocityAccessKeyEnvVar} env var should be mapped to a short-lived token`);
}
}
async function getToken(accessKey, expiry) {
async function getToken(accessKey, allowUntrustedServer, expiry) {
const empty = new Promise(r => r(null));
const develocityAccessKey = DevelocityAccessCredentials.parse(accessKey);
const shortLivedTokenClient = new ShortLivedTokenClient();
const shortLivedTokenClient = new ShortLivedTokenClient(allowUntrustedServer);
if (develocityAccessKey == null) {
return empty;
}
@ -142558,10 +142558,12 @@ async function getToken(accessKey, expiry) {
return empty;
}
class ShortLivedTokenClient {
constructor() {
this.httpc = new httpm.HttpClient('gradle/actions/setup-gradle');
constructor(develocityAllowUntrustedServer) {
this.maxRetries = 3;
this.retryInterval = 1000;
this.httpc = new httpm.HttpClient('gradle/actions/setup-gradle', undefined, {
ignoreSslError: develocityAllowUntrustedServer
});
}
async fetchToken(serverUrl, accessKey, expiry) {
const queryParams = expiry ? `?expiresInHours=${expiry}` : '';

File diff suppressed because one or more lines are too long

View File

@ -184201,7 +184201,7 @@ async function setup(config) {
maybeExportVariable('DEVELOCITY_TERMS_OF_USE_URL', config.getBuildScanTermsOfUseUrl());
maybeExportVariable('DEVELOCITY_TERMS_OF_USE_AGREE', config.getBuildScanTermsOfUseAgree());
}
return (0, short_lived_token_1.setupToken)(config.getDevelocityAccessKey(), config.getDevelocityTokenExpiry());
return (0, short_lived_token_1.setupToken)(config.getDevelocityAccessKey(), config.getDevelocityAllowUntrustedServer(), config.getDevelocityTokenExpiry());
}
function maybeExportVariable(variableName, value) {
if (!process.env[variableName]) {
@ -184263,11 +184263,11 @@ const httpm = __importStar(__nccwpck_require__(96184));
const core = __importStar(__nccwpck_require__(37484));
const configuration_1 = __nccwpck_require__(66081);
const deprecation_collector_1 = __nccwpck_require__(18391);
async function setupToken(develocityAccessKey, develocityTokenExpiry) {
async function setupToken(develocityAccessKey, develocityAllowUntrustedServer, develocityTokenExpiry) {
if (develocityAccessKey) {
try {
core.debug('Fetching short-lived token...');
const tokens = await getToken(develocityAccessKey, develocityTokenExpiry);
const tokens = await getToken(develocityAccessKey, develocityAllowUntrustedServer, develocityTokenExpiry);
if (tokens != null && !tokens.isEmpty()) {
core.debug(`Got token(s), setting the access key env vars`);
const token = tokens.raw();
@ -184297,10 +184297,10 @@ function handleMissingAccessToken() {
core.warning(`The ${configuration_1.BuildScanConfig.DevelocityAccessKeyEnvVar} env var should be mapped to a short-lived token`);
}
}
async function getToken(accessKey, expiry) {
async function getToken(accessKey, allowUntrustedServer, expiry) {
const empty = new Promise(r => r(null));
const develocityAccessKey = DevelocityAccessCredentials.parse(accessKey);
const shortLivedTokenClient = new ShortLivedTokenClient();
const shortLivedTokenClient = new ShortLivedTokenClient(allowUntrustedServer);
if (develocityAccessKey == null) {
return empty;
}
@ -184321,10 +184321,12 @@ async function getToken(accessKey, expiry) {
return empty;
}
class ShortLivedTokenClient {
constructor() {
this.httpc = new httpm.HttpClient('gradle/actions/setup-gradle');
constructor(develocityAllowUntrustedServer) {
this.maxRetries = 3;
this.retryInterval = 1000;
this.httpc = new httpm.HttpClient('gradle/actions/setup-gradle', undefined, {
ignoreSslError: develocityAllowUntrustedServer
});
}
async fetchToken(serverUrl, accessKey, expiry) {
const queryParams = expiry ? `?expiresInHours=${expiry}` : '';

File diff suppressed because one or more lines are too long

View File

@ -184196,7 +184196,7 @@ async function setup(config) {
maybeExportVariable('DEVELOCITY_TERMS_OF_USE_URL', config.getBuildScanTermsOfUseUrl());
maybeExportVariable('DEVELOCITY_TERMS_OF_USE_AGREE', config.getBuildScanTermsOfUseAgree());
}
return (0, short_lived_token_1.setupToken)(config.getDevelocityAccessKey(), config.getDevelocityTokenExpiry());
return (0, short_lived_token_1.setupToken)(config.getDevelocityAccessKey(), config.getDevelocityAllowUntrustedServer(), config.getDevelocityTokenExpiry());
}
function maybeExportVariable(variableName, value) {
if (!process.env[variableName]) {
@ -184258,11 +184258,11 @@ const httpm = __importStar(__nccwpck_require__(96184));
const core = __importStar(__nccwpck_require__(37484));
const configuration_1 = __nccwpck_require__(66081);
const deprecation_collector_1 = __nccwpck_require__(18391);
async function setupToken(develocityAccessKey, develocityTokenExpiry) {
async function setupToken(develocityAccessKey, develocityAllowUntrustedServer, develocityTokenExpiry) {
if (develocityAccessKey) {
try {
core.debug('Fetching short-lived token...');
const tokens = await getToken(develocityAccessKey, develocityTokenExpiry);
const tokens = await getToken(develocityAccessKey, develocityAllowUntrustedServer, develocityTokenExpiry);
if (tokens != null && !tokens.isEmpty()) {
core.debug(`Got token(s), setting the access key env vars`);
const token = tokens.raw();
@ -184292,10 +184292,10 @@ function handleMissingAccessToken() {
core.warning(`The ${configuration_1.BuildScanConfig.DevelocityAccessKeyEnvVar} env var should be mapped to a short-lived token`);
}
}
async function getToken(accessKey, expiry) {
async function getToken(accessKey, allowUntrustedServer, expiry) {
const empty = new Promise(r => r(null));
const develocityAccessKey = DevelocityAccessCredentials.parse(accessKey);
const shortLivedTokenClient = new ShortLivedTokenClient();
const shortLivedTokenClient = new ShortLivedTokenClient(allowUntrustedServer);
if (develocityAccessKey == null) {
return empty;
}
@ -184316,10 +184316,12 @@ async function getToken(accessKey, expiry) {
return empty;
}
class ShortLivedTokenClient {
constructor() {
this.httpc = new httpm.HttpClient('gradle/actions/setup-gradle');
constructor(develocityAllowUntrustedServer) {
this.maxRetries = 3;
this.retryInterval = 1000;
this.httpc = new httpm.HttpClient('gradle/actions/setup-gradle', undefined, {
ignoreSslError: develocityAllowUntrustedServer
});
}
async fetchToken(serverUrl, accessKey, expiry) {
const queryParams = expiry ? `?expiresInHours=${expiry}` : '';

File diff suppressed because one or more lines are too long