mirror of
				https://gitea.com/actions/download-artifact.git
				synced 2025-10-31 09:08:16 +07:00 
			
		
		
		
	Update dist
This commit is contained in:
		
							parent
							
								
									956811a503
								
							
						
					
					
						commit
						c5804ef743
					
				
							
								
								
									
										77
									
								
								dist/index.js
									
									
									
									
										vendored
									
									
								
							
							
						
						
									
										77
									
								
								dist/index.js
									
									
									
									
										vendored
									
									
								
							| @ -2725,6 +2725,7 @@ const generated_1 = __nccwpck_require__(49960); | |||||||
| const config_1 = __nccwpck_require__(74610); | const config_1 = __nccwpck_require__(74610); | ||||||
| const user_agent_1 = __nccwpck_require__(85164); | const user_agent_1 = __nccwpck_require__(85164); | ||||||
| const errors_1 = __nccwpck_require__(38182); | const errors_1 = __nccwpck_require__(38182); | ||||||
|  | const util_1 = __nccwpck_require__(63062); | ||||||
| class ArtifactHttpClient { | class ArtifactHttpClient { | ||||||
|     constructor(userAgent, maxAttempts, baseRetryIntervalMilliseconds, retryMultiplier) { |     constructor(userAgent, maxAttempts, baseRetryIntervalMilliseconds, retryMultiplier) { | ||||||
|         this.maxAttempts = 5; |         this.maxAttempts = 5; | ||||||
| @ -2777,6 +2778,7 @@ class ArtifactHttpClient { | |||||||
|                     (0, core_1.debug)(`[Response] - ${response.message.statusCode}`); |                     (0, core_1.debug)(`[Response] - ${response.message.statusCode}`); | ||||||
|                     (0, core_1.debug)(`Headers: ${JSON.stringify(response.message.headers, null, 2)}`); |                     (0, core_1.debug)(`Headers: ${JSON.stringify(response.message.headers, null, 2)}`); | ||||||
|                     const body = JSON.parse(rawBody); |                     const body = JSON.parse(rawBody); | ||||||
|  |                     (0, util_1.maskSecretUrls)(body); | ||||||
|                     (0, core_1.debug)(`Body: ${JSON.stringify(body, null, 2)}`); |                     (0, core_1.debug)(`Body: ${JSON.stringify(body, null, 2)}`); | ||||||
|                     if (this.isSuccessStatusCode(statusCode)) { |                     if (this.isSuccessStatusCode(statusCode)) { | ||||||
|                         return { response, body }; |                         return { response, body }; | ||||||
| @ -3093,10 +3095,11 @@ var __importDefault = (this && this.__importDefault) || function (mod) { | |||||||
|     return (mod && mod.__esModule) ? mod : { "default": mod }; |     return (mod && mod.__esModule) ? mod : { "default": mod }; | ||||||
| }; | }; | ||||||
| Object.defineProperty(exports, "__esModule", ({ value: true })); | Object.defineProperty(exports, "__esModule", ({ value: true })); | ||||||
| exports.getBackendIdsFromToken = void 0; | exports.maskSecretUrls = exports.maskSigUrl = exports.getBackendIdsFromToken = void 0; | ||||||
| const core = __importStar(__nccwpck_require__(42186)); | const core = __importStar(__nccwpck_require__(42186)); | ||||||
| const config_1 = __nccwpck_require__(74610); | const config_1 = __nccwpck_require__(74610); | ||||||
| const jwt_decode_1 = __importDefault(__nccwpck_require__(84329)); | const jwt_decode_1 = __importDefault(__nccwpck_require__(84329)); | ||||||
|  | const core_1 = __nccwpck_require__(42186); | ||||||
| const InvalidJwtError = new Error('Failed to get backend IDs: The provided JWT token is invalid and/or missing claims'); | const InvalidJwtError = new Error('Failed to get backend IDs: The provided JWT token is invalid and/or missing claims'); | ||||||
| // uses the JWT token claims to get the
 | // uses the JWT token claims to get the
 | ||||||
| // workflow run and workflow job run backend ids
 | // workflow run and workflow job run backend ids
 | ||||||
| @ -3145,6 +3148,74 @@ function getBackendIdsFromToken() { | |||||||
|     throw InvalidJwtError; |     throw InvalidJwtError; | ||||||
| } | } | ||||||
| exports.getBackendIdsFromToken = getBackendIdsFromToken; | exports.getBackendIdsFromToken = getBackendIdsFromToken; | ||||||
|  | /** | ||||||
|  |  * Masks the `sig` parameter in a URL and sets it as a secret. | ||||||
|  |  * | ||||||
|  |  * @param url - The URL containing the signature parameter to mask | ||||||
|  |  * @remarks | ||||||
|  |  * This function attempts to parse the provided URL and identify the 'sig' query parameter. | ||||||
|  |  * If found, it registers both the raw and URL-encoded signature values as secrets using | ||||||
|  |  * the Actions `setSecret` API, which prevents them from being displayed in logs. | ||||||
|  |  * | ||||||
|  |  * The function handles errors gracefully if URL parsing fails, logging them as debug messages. | ||||||
|  |  * | ||||||
|  |  * @example | ||||||
|  |  * ```typescript
 | ||||||
|  |  * // Mask a signature in an Azure SAS token URL
 | ||||||
|  |  * maskSigUrl('https://example.blob.core.windows.net/container/file.txt?sig=abc123&se=2023-01-01'); | ||||||
|  |  * ``` | ||||||
|  |  */ | ||||||
|  | function maskSigUrl(url) { | ||||||
|  |     if (!url) | ||||||
|  |         return; | ||||||
|  |     try { | ||||||
|  |         const parsedUrl = new URL(url); | ||||||
|  |         const signature = parsedUrl.searchParams.get('sig'); | ||||||
|  |         if (signature) { | ||||||
|  |             (0, core_1.setSecret)(signature); | ||||||
|  |             (0, core_1.setSecret)(encodeURIComponent(signature)); | ||||||
|  |         } | ||||||
|  |     } | ||||||
|  |     catch (error) { | ||||||
|  |         (0, core_1.debug)(`Failed to parse URL: ${url} ${error instanceof Error ? error.message : String(error)}`); | ||||||
|  |     } | ||||||
|  | } | ||||||
|  | exports.maskSigUrl = maskSigUrl; | ||||||
|  | /** | ||||||
|  |  * Masks sensitive information in URLs containing signature parameters. | ||||||
|  |  * Currently supports masking 'sig' parameters in the 'signed_upload_url' | ||||||
|  |  * and 'signed_download_url' properties of the provided object. | ||||||
|  |  * | ||||||
|  |  * @param body - The object should contain a signature | ||||||
|  |  * @remarks | ||||||
|  |  * This function extracts URLs from the object properties and calls maskSigUrl | ||||||
|  |  * on each one to redact sensitive signature information. The function doesn't | ||||||
|  |  * modify the original object; it only marks the signatures as secrets for | ||||||
|  |  * logging purposes. | ||||||
|  |  * | ||||||
|  |  * @example | ||||||
|  |  * ```typescript
 | ||||||
|  |  * const responseBody = { | ||||||
|  |  *   signed_upload_url: 'https://example.com?sig=abc123', | ||||||
|  |  *   signed_download_url: 'https://example.com?sig=def456' | ||||||
|  |  * }; | ||||||
|  |  * maskSecretUrls(responseBody); | ||||||
|  |  * ``` | ||||||
|  |  */ | ||||||
|  | function maskSecretUrls(body) { | ||||||
|  |     if (typeof body !== 'object' || body === null) { | ||||||
|  |         (0, core_1.debug)('body is not an object or is null'); | ||||||
|  |         return; | ||||||
|  |     } | ||||||
|  |     if ('signed_upload_url' in body && | ||||||
|  |         typeof body.signed_upload_url === 'string') { | ||||||
|  |         maskSigUrl(body.signed_upload_url); | ||||||
|  |     } | ||||||
|  |     if ('signed_url' in body && typeof body.signed_url === 'string') { | ||||||
|  |         maskSigUrl(body.signed_url); | ||||||
|  |     } | ||||||
|  | } | ||||||
|  | exports.maskSecretUrls = maskSecretUrls; | ||||||
| //# sourceMappingURL=util.js.map
 | //# sourceMappingURL=util.js.map
 | ||||||
| 
 | 
 | ||||||
| /***/ }), | /***/ }), | ||||||
| @ -3251,7 +3322,7 @@ function uploadZipToBlobStorage(authenticatedUploadURL, zipUploadStream) { | |||||||
|         core.info('Finished uploading artifact content to blob storage!'); |         core.info('Finished uploading artifact content to blob storage!'); | ||||||
|         hashStream.end(); |         hashStream.end(); | ||||||
|         sha256Hash = hashStream.read(); |         sha256Hash = hashStream.read(); | ||||||
|         core.info(`SHA256 hash of uploaded artifact zip is ${sha256Hash}`); |         core.info(`SHA256 digest of uploaded artifact zip is ${sha256Hash}`); | ||||||
|         if (uploadByteCount === 0) { |         if (uploadByteCount === 0) { | ||||||
|             core.warning(`No data was uploaded to blob storage. Reported upload byte count is 0.`); |             core.warning(`No data was uploaded to blob storage. Reported upload byte count is 0.`); | ||||||
|         } |         } | ||||||
| @ -128767,7 +128838,7 @@ module.exports = index; | |||||||
| /***/ ((module) => { | /***/ ((module) => { | ||||||
| 
 | 
 | ||||||
| "use strict"; | "use strict"; | ||||||
| module.exports = JSON.parse('{"name":"@actions/artifact","version":"2.3.1","preview":true,"description":"Actions artifact lib","keywords":["github","actions","artifact"],"homepage":"https://github.com/actions/toolkit/tree/main/packages/artifact","license":"MIT","main":"lib/artifact.js","types":"lib/artifact.d.ts","directories":{"lib":"lib","test":"__tests__"},"files":["lib","!.DS_Store"],"publishConfig":{"access":"public"},"repository":{"type":"git","url":"git+https://github.com/actions/toolkit.git","directory":"packages/artifact"},"scripts":{"audit-moderate":"npm install && npm audit --json --audit-level=moderate > audit.json","test":"cd ../../ && npm run test ./packages/artifact","bootstrap":"cd ../../ && npm run bootstrap","tsc-run":"tsc","tsc":"npm run bootstrap && npm run tsc-run","gen:docs":"typedoc --plugin typedoc-plugin-markdown --out docs/generated src/artifact.ts --githubPages false --readme none"},"bugs":{"url":"https://github.com/actions/toolkit/issues"},"dependencies":{"@actions/core":"^1.10.0","@actions/github":"^5.1.1","@actions/http-client":"^2.1.0","@azure/storage-blob":"^12.15.0","@octokit/core":"^3.5.1","@octokit/plugin-request-log":"^1.0.4","@octokit/plugin-retry":"^3.0.9","@octokit/request-error":"^5.0.0","@protobuf-ts/plugin":"^2.2.3-alpha.1","archiver":"^7.0.1","jwt-decode":"^3.1.2","unzip-stream":"^0.3.1"},"devDependencies":{"@types/archiver":"^5.3.2","@types/unzip-stream":"^0.3.4","typedoc":"^0.25.4","typedoc-plugin-markdown":"^3.17.1","typescript":"^5.2.2"}}'); | module.exports = JSON.parse('{"name":"@actions/artifact","version":"2.3.2","preview":true,"description":"Actions artifact lib","keywords":["github","actions","artifact"],"homepage":"https://github.com/actions/toolkit/tree/main/packages/artifact","license":"MIT","main":"lib/artifact.js","types":"lib/artifact.d.ts","directories":{"lib":"lib","test":"__tests__"},"files":["lib","!.DS_Store"],"publishConfig":{"access":"public"},"repository":{"type":"git","url":"git+https://github.com/actions/toolkit.git","directory":"packages/artifact"},"scripts":{"audit-moderate":"npm install && npm audit --json --audit-level=moderate > audit.json","test":"cd ../../ && npm run test ./packages/artifact","bootstrap":"cd ../../ && npm run bootstrap","tsc-run":"tsc","tsc":"npm run bootstrap && npm run tsc-run","gen:docs":"typedoc --plugin typedoc-plugin-markdown --out docs/generated src/artifact.ts --githubPages false --readme none"},"bugs":{"url":"https://github.com/actions/toolkit/issues"},"dependencies":{"@actions/core":"^1.10.0","@actions/github":"^5.1.1","@actions/http-client":"^2.1.0","@azure/storage-blob":"^12.15.0","@octokit/core":"^3.5.1","@octokit/plugin-request-log":"^1.0.4","@octokit/plugin-retry":"^3.0.9","@octokit/request-error":"^5.0.0","@protobuf-ts/plugin":"^2.2.3-alpha.1","archiver":"^7.0.1","jwt-decode":"^3.1.2","unzip-stream":"^0.3.1"},"devDependencies":{"@types/archiver":"^5.3.2","@types/unzip-stream":"^0.3.4","typedoc":"^0.25.4","typedoc-plugin-markdown":"^3.17.1","typescript":"^5.2.2"}}'); | ||||||
| 
 | 
 | ||||||
| /***/ }), | /***/ }), | ||||||
| 
 | 
 | ||||||
|  | |||||||
		Loading…
	
	
			
			x
			
			
		
	
		Reference in New Issue
	
	Block a user