|
|
|
@ -3592,7 +3592,7 @@ var __importStar = (this && this.__importStar) || function (mod) {
|
|
|
|
|
return result;
|
|
|
|
|
};
|
|
|
|
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
|
|
|
exports.setSshKnownHostsPath = exports.setSshKeyPath = exports.setRepositoryPath = exports.SshKnownHostsPath = exports.SshKeyPath = exports.RepositoryPath = exports.IsPost = void 0;
|
|
|
|
|
exports.setSafeDirectory = exports.setSshKnownHostsPath = exports.setSshKeyPath = exports.setRepositoryPath = exports.SshKnownHostsPath = exports.SshKeyPath = exports.PostSetSafeDirectory = exports.RepositoryPath = exports.IsPost = void 0;
|
|
|
|
|
const coreCommand = __importStar(__webpack_require__(431));
|
|
|
|
|
/**
|
|
|
|
|
* Indicates whether the POST action is running
|
|
|
|
@ -3602,6 +3602,10 @@ exports.IsPost = !!process.env['STATE_isPost'];
|
|
|
|
|
* The repository path for the POST action. The value is empty during the MAIN action.
|
|
|
|
|
*/
|
|
|
|
|
exports.RepositoryPath = process.env['STATE_repositoryPath'] || '';
|
|
|
|
|
/**
|
|
|
|
|
* The set-safe-directory for the POST action. The value is set if input: 'safe-directory' is set during the MAIN action.
|
|
|
|
|
*/
|
|
|
|
|
exports.PostSetSafeDirectory = process.env['STATE_setSafeDirectory'] === 'true';
|
|
|
|
|
/**
|
|
|
|
|
* The SSH key path for the POST action. The value is empty during the MAIN action.
|
|
|
|
|
*/
|
|
|
|
@ -3631,6 +3635,13 @@ function setSshKnownHostsPath(sshKnownHostsPath) {
|
|
|
|
|
coreCommand.issueCommand('save-state', { name: 'sshKnownHostsPath' }, sshKnownHostsPath);
|
|
|
|
|
}
|
|
|
|
|
exports.setSshKnownHostsPath = setSshKnownHostsPath;
|
|
|
|
|
/**
|
|
|
|
|
* Save the sef-safe-directory input so the POST action can retrieve the value.
|
|
|
|
|
*/
|
|
|
|
|
function setSafeDirectory() {
|
|
|
|
|
coreCommand.issueCommand('save-state', { name: 'setSafeDirectory' }, 'true');
|
|
|
|
|
}
|
|
|
|
|
exports.setSafeDirectory = setSafeDirectory;
|
|
|
|
|
// Publish a variable so that when the POST action runs, it can determine it should run the cleanup logic.
|
|
|
|
|
// This is necessary since we don't have a separate entry point.
|
|
|
|
|
if (!exports.IsPost) {
|
|
|
|
@ -6572,9 +6583,13 @@ class GitAuthHelper {
|
|
|
|
|
yield this.configureToken();
|
|
|
|
|
});
|
|
|
|
|
}
|
|
|
|
|
configureGlobalAuth() {
|
|
|
|
|
var _a;
|
|
|
|
|
configureTempGlobalConfig() {
|
|
|
|
|
var _a, _b;
|
|
|
|
|
return __awaiter(this, void 0, void 0, function* () {
|
|
|
|
|
// Already setup global config
|
|
|
|
|
if (((_a = this.temporaryHomePath) === null || _a === void 0 ? void 0 : _a.length) > 0) {
|
|
|
|
|
return path.join(this.temporaryHomePath, '.gitconfig');
|
|
|
|
|
}
|
|
|
|
|
// Create a temp home directory
|
|
|
|
|
const runnerTemp = process.env['RUNNER_TEMP'] || '';
|
|
|
|
|
assert.ok(runnerTemp, 'RUNNER_TEMP is not defined');
|
|
|
|
@ -6590,7 +6605,7 @@ class GitAuthHelper {
|
|
|
|
|
configExists = true;
|
|
|
|
|
}
|
|
|
|
|
catch (err) {
|
|
|
|
|
if (((_a = err) === null || _a === void 0 ? void 0 : _a.code) !== 'ENOENT') {
|
|
|
|
|
if (((_b = err) === null || _b === void 0 ? void 0 : _b.code) !== 'ENOENT') {
|
|
|
|
|
throw err;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
@ -6601,10 +6616,17 @@ class GitAuthHelper {
|
|
|
|
|
else {
|
|
|
|
|
yield fs.promises.writeFile(newGitConfigPath, '');
|
|
|
|
|
}
|
|
|
|
|
try {
|
|
|
|
|
// Override HOME
|
|
|
|
|
core.info(`Temporarily overriding HOME='${this.temporaryHomePath}' before making global git config changes`);
|
|
|
|
|
this.git.setEnvironmentVariable('HOME', this.temporaryHomePath);
|
|
|
|
|
return newGitConfigPath;
|
|
|
|
|
});
|
|
|
|
|
}
|
|
|
|
|
configureGlobalAuth() {
|
|
|
|
|
return __awaiter(this, void 0, void 0, function* () {
|
|
|
|
|
// 'configureTempGlobalConfig' noops if already set, just returns the path
|
|
|
|
|
const newGitConfigPath = yield this.configureTempGlobalConfig();
|
|
|
|
|
try {
|
|
|
|
|
// Configure the token
|
|
|
|
|
yield this.configureToken(newGitConfigPath, true);
|
|
|
|
|
// Configure HTTPS instead of SSH
|
|
|
|
@ -6657,11 +6679,14 @@ class GitAuthHelper {
|
|
|
|
|
yield this.removeToken();
|
|
|
|
|
});
|
|
|
|
|
}
|
|
|
|
|
removeGlobalAuth() {
|
|
|
|
|
removeGlobalConfig() {
|
|
|
|
|
var _a;
|
|
|
|
|
return __awaiter(this, void 0, void 0, function* () {
|
|
|
|
|
if (((_a = this.temporaryHomePath) === null || _a === void 0 ? void 0 : _a.length) > 0) {
|
|
|
|
|
core.debug(`Unsetting HOME override`);
|
|
|
|
|
this.git.removeEnvironmentVariable('HOME');
|
|
|
|
|
yield io.rmRF(this.temporaryHomePath);
|
|
|
|
|
}
|
|
|
|
|
});
|
|
|
|
|
}
|
|
|
|
|
configureSsh() {
|
|
|
|
@ -7326,6 +7351,23 @@ function getSource(settings) {
|
|
|
|
|
core.startGroup('Getting Git version info');
|
|
|
|
|
const git = yield getGitCommandManager(settings);
|
|
|
|
|
core.endGroup();
|
|
|
|
|
let authHelper = null;
|
|
|
|
|
try {
|
|
|
|
|
if (git) {
|
|
|
|
|
authHelper = gitAuthHelper.createAuthHelper(git, settings);
|
|
|
|
|
if (settings.setSafeDirectory) {
|
|
|
|
|
// Setup the repository path as a safe directory, so if we pass this into a container job with a different user it doesn't fail
|
|
|
|
|
// Otherwise all git commands we run in a container fail
|
|
|
|
|
yield authHelper.configureTempGlobalConfig();
|
|
|
|
|
core.info(`Adding repository directory to the temporary git global config as a safe directory`);
|
|
|
|
|
yield git
|
|
|
|
|
.config('safe.directory', settings.repositoryPath, true, true)
|
|
|
|
|
.catch(error => {
|
|
|
|
|
core.info(`Failed to initialize safe directory with error: ${error}`);
|
|
|
|
|
});
|
|
|
|
|
stateHelper.setSafeDirectory();
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
// Prepare existing directory, otherwise recreate
|
|
|
|
|
if (isExisting) {
|
|
|
|
|
yield gitDirectoryHelper.prepareExistingDirectory(git, settings.repositoryPath, repositoryUrl, settings.clean, settings.ref);
|
|
|
|
@ -7358,8 +7400,10 @@ function getSource(settings) {
|
|
|
|
|
core.warning(`Unable to turn off git automatic garbage collection. The git fetch operation may trigger garbage collection and cause a delay.`);
|
|
|
|
|
}
|
|
|
|
|
core.endGroup();
|
|
|
|
|
const authHelper = gitAuthHelper.createAuthHelper(git, settings);
|
|
|
|
|
try {
|
|
|
|
|
// If we didn't initialize it above, do it now
|
|
|
|
|
if (!authHelper) {
|
|
|
|
|
authHelper = gitAuthHelper.createAuthHelper(git, settings);
|
|
|
|
|
}
|
|
|
|
|
// Configure auth
|
|
|
|
|
core.startGroup('Setting up auth');
|
|
|
|
|
yield authHelper.configureAuth();
|
|
|
|
@ -7415,7 +7459,6 @@ function getSource(settings) {
|
|
|
|
|
core.endGroup();
|
|
|
|
|
// Submodules
|
|
|
|
|
if (settings.submodules) {
|
|
|
|
|
try {
|
|
|
|
|
// Temporarily override global config
|
|
|
|
|
core.startGroup('Setting up auth for fetching submodules');
|
|
|
|
|
yield authHelper.configureGlobalAuth();
|
|
|
|
@ -7433,11 +7476,6 @@ function getSource(settings) {
|
|
|
|
|
core.endGroup();
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
finally {
|
|
|
|
|
// Remove temporary global config override
|
|
|
|
|
yield authHelper.removeGlobalAuth();
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
// Get commit information
|
|
|
|
|
const commitInfo = yield git.log1();
|
|
|
|
|
// Log commit sha
|
|
|
|
@ -7447,11 +7485,14 @@ function getSource(settings) {
|
|
|
|
|
}
|
|
|
|
|
finally {
|
|
|
|
|
// Remove auth
|
|
|
|
|
if (authHelper) {
|
|
|
|
|
if (!settings.persistCredentials) {
|
|
|
|
|
core.startGroup('Removing auth');
|
|
|
|
|
yield authHelper.removeAuth();
|
|
|
|
|
core.endGroup();
|
|
|
|
|
}
|
|
|
|
|
authHelper.removeGlobalConfig();
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
});
|
|
|
|
|
}
|
|
|
|
@ -7472,7 +7513,23 @@ function cleanup(repositoryPath) {
|
|
|
|
|
}
|
|
|
|
|
// Remove auth
|
|
|
|
|
const authHelper = gitAuthHelper.createAuthHelper(git);
|
|
|
|
|
try {
|
|
|
|
|
if (stateHelper.PostSetSafeDirectory) {
|
|
|
|
|
// Setup the repository path as a safe directory, so if we pass this into a container job with a different user it doesn't fail
|
|
|
|
|
// Otherwise all git commands we run in a container fail
|
|
|
|
|
yield authHelper.configureTempGlobalConfig();
|
|
|
|
|
core.info(`Adding repository directory to the temporary git global config as a safe directory`);
|
|
|
|
|
yield git
|
|
|
|
|
.config('safe.directory', repositoryPath, true, true)
|
|
|
|
|
.catch(error => {
|
|
|
|
|
core.info(`Failed to initialize safe directory with error: ${error}`);
|
|
|
|
|
});
|
|
|
|
|
}
|
|
|
|
|
yield authHelper.removeAuth();
|
|
|
|
|
}
|
|
|
|
|
finally {
|
|
|
|
|
yield authHelper.removeGlobalConfig();
|
|
|
|
|
}
|
|
|
|
|
});
|
|
|
|
|
}
|
|
|
|
|
exports.cleanup = cleanup;
|
|
|
|
@ -17244,6 +17301,9 @@ function getInputs() {
|
|
|
|
|
(core.getInput('persist-credentials') || 'false').toUpperCase() === 'TRUE';
|
|
|
|
|
// Workflow organization ID
|
|
|
|
|
result.workflowOrganizationId = yield workflowContextHelper.getOrganizationId();
|
|
|
|
|
// Set safe.directory in git global config.
|
|
|
|
|
result.setSafeDirectory =
|
|
|
|
|
(core.getInput('set-safe-directory') || 'true').toUpperCase() === 'TRUE';
|
|
|
|
|
return result;
|
|
|
|
|
});
|
|
|
|
|
}
|
|
|
|
|