@@ -32440,12 +32440,12 @@ var __webpack_exports__ = {};
32440
32440
// ESM COMPAT FLAG
32441
32441
__nccwpck_require__.r(__webpack_exports__);
32442
32442
32443
- // EXTERNAL MODULE: external "fs"
32444
- var external_fs_ = __nccwpck_require__(7147 );
32445
- // EXTERNAL MODULE: external "https"
32446
- var external_https_ = __nccwpck_require__(5687 );
32447
- // EXTERNAL MODULE: external "path"
32448
- var external_path_ = __nccwpck_require__(1017 );
32443
+ ; // CONCATENATED MODULE: external "node: fs"
32444
+ const external_node_fs_namespaceObject = require("node:fs" );
32445
+ ; // CONCATENATED MODULE: external "node: https"
32446
+ const external_node_https_namespaceObject = require("node:https" );
32447
+ ; // CONCATENATED MODULE: external "node: path"
32448
+ const external_node_path_namespaceObject = require("node:path" );
32449
32449
// EXTERNAL MODULE: ./node_modules/@actions/exec/lib/exec.js
32450
32450
var exec = __nccwpck_require__(1514);
32451
32451
// EXTERNAL MODULE: ./node_modules/@actions/core/lib/core.js
@@ -32562,7 +32562,21 @@ const getGitService = () => {
32562
32562
}
32563
32563
return 'github';
32564
32564
};
32565
+ const isFork = () => {
32566
+ if (`${context.eventName}` !== 'pull_request' ||
32567
+ `${context.eventName}` !== 'pull_request_target') {
32568
+ return false;
32569
+ }
32570
+ const baseLabel = context.payload.pull_request.base.label;
32571
+ const headLabel = context.payload.pull_request.head.label;
32572
+ core.info(`baseRef: ${baseLabel} | headRef: ${headLabel}`);
32573
+ return (baseLabel.split(':')[0] !== headLabel.split(':')[0]);
32574
+ };
32565
32575
const getToken = () => buildExec_awaiter(void 0, void 0, void 0, function* () {
32576
+ if (isFork()) {
32577
+ core.info('==> Fork detected, tokenless uploading used');
32578
+ return Promise.resolve('');
32579
+ }
32566
32580
let token = core.getInput('token');
32567
32581
let url = core.getInput('url');
32568
32582
const useOIDC = isTrue(core.getInput('use_oidc'));
@@ -32863,8 +32877,8 @@ const buildUploadExec = () => buildExec_awaiter(void 0, void 0, void 0, function
32863
32877
});
32864
32878
32865
32879
32866
- // EXTERNAL MODULE: external "crypto"
32867
- var external_crypto_ = __nccwpck_require__(6113 );
32880
+ ; // CONCATENATED MODULE: external "node: crypto"
32881
+ const external_node_crypto_namespaceObject = require("node:crypto" );
32868
32882
// EXTERNAL MODULE: ./node_modules/gpg/lib/gpg.js
32869
32883
var gpg = __nccwpck_require__(40);
32870
32884
// EXTERNAL MODULE: ./node_modules/undici/index.js
@@ -32896,24 +32910,24 @@ const verify = (filename, platform, version, verbose, failCi) => validate_awaite
32896
32910
if (verbose) {
32897
32911
console.log(`Received SHA256SUM ${shasum}`);
32898
32912
}
32899
- yield external_fs_ .writeFileSync(external_path_ .join(__dirname, `${uploaderName}.SHA256SUM`), shasum);
32913
+ yield external_node_fs_namespaceObject .writeFileSync(external_node_path_namespaceObject .join(__dirname, `${uploaderName}.SHA256SUM`), shasum);
32900
32914
const shaSigRes = yield (0,undici.request)(`${getBaseUrl(platform, version)}.SHA256SUM.sig`);
32901
32915
const shaSig = yield shaSigRes.body.text();
32902
32916
if (verbose) {
32903
32917
console.log(`Received SHA256SUM signature ${shaSig}`);
32904
32918
}
32905
- yield external_fs_ .writeFileSync(external_path_ .join(__dirname, `${uploaderName}.SHA256SUM.sig`), shaSig);
32919
+ yield external_node_fs_namespaceObject .writeFileSync(external_node_path_namespaceObject .join(__dirname, `${uploaderName}.SHA256SUM.sig`), shaSig);
32906
32920
const validateSha = () => validate_awaiter(void 0, void 0, void 0, function* () {
32907
32921
const calculateHash = (filename) => validate_awaiter(void 0, void 0, void 0, function* () {
32908
- const stream = external_fs_ .createReadStream(filename);
32909
- const uploaderSha = external_crypto_ .createHash(`sha256`);
32922
+ const stream = external_node_fs_namespaceObject .createReadStream(filename);
32923
+ const uploaderSha = external_node_crypto_namespaceObject .createHash(`sha256`);
32910
32924
stream.pipe(uploaderSha);
32911
32925
return new Promise((resolve, reject) => {
32912
32926
stream.on('end', () => resolve(`${uploaderSha.digest('hex')} ${uploaderName}`));
32913
32927
stream.on('error', reject);
32914
32928
});
32915
32929
});
32916
- const hash = yield calculateHash(external_path_ .join(__dirname, `${uploaderName}`));
32930
+ const hash = yield calculateHash(external_node_path_namespaceObject .join(__dirname, `${uploaderName}`));
32917
32931
if (hash === shasum) {
32918
32932
core.info(`==> Uploader SHASUM verified (${hash})`);
32919
32933
}
@@ -32927,11 +32941,11 @@ const verify = (filename, platform, version, verbose, failCi) => validate_awaite
32927
32941
'--logger-fd',
32928
32942
'1',
32929
32943
'--verify',
32930
- external_path_ .join(__dirname, `${uploaderName}.SHA256SUM.sig`),
32931
- external_path_ .join(__dirname, `${uploaderName}.SHA256SUM`),
32944
+ external_node_path_namespaceObject .join(__dirname, `${uploaderName}.SHA256SUM.sig`),
32945
+ external_node_path_namespaceObject .join(__dirname, `${uploaderName}.SHA256SUM`),
32932
32946
], (err, verifyResult) => validate_awaiter(void 0, void 0, void 0, function* () {
32933
32947
if (err) {
32934
- setFailure(' Codecov: Error importing pgp key' , failCi);
32948
+ setFailure(` Codecov: Error importing pgp key: ${err.message}` , failCi);
32935
32949
}
32936
32950
core.info(verifyResult);
32937
32951
yield validateSha();
@@ -32943,10 +32957,10 @@ const verify = (filename, platform, version, verbose, failCi) => validate_awaite
32943
32957
'1',
32944
32958
'--no-default-keyring',
32945
32959
'--import',
32946
- __nccwpck_require__.ab + " pgp_keys.asc" ,
32960
+ external_node_path_namespaceObject.join(__dirname, ' pgp_keys.asc') ,
32947
32961
], (err, importResult) => validate_awaiter(void 0, void 0, void 0, function* () {
32948
32962
if (err) {
32949
- setFailure(' Codecov: Error importing pgp key' , failCi);
32963
+ setFailure(` Codecov: Error importing pgp key: ${err.message}` , failCi);
32950
32964
}
32951
32965
core.info(importResult);
32952
32966
verifySignature();
@@ -33011,10 +33025,10 @@ const run = () => src_awaiter(void 0, void 0, void 0, function* () {
33011
33025
const { uploadExecArgs, uploadOptions, disableSafeDirectory, failCi, os, uploaderVersion, uploadCommand, } = yield buildUploadExec();
33012
33026
const { args, verbose } = buildGeneralExec();
33013
33027
const platform = getPlatform(os);
33014
- const filename = external_path_ .join(__dirname, getUploaderName(platform));
33015
- external_https_ .get(getBaseUrl(platform, uploaderVersion), (res) => {
33028
+ const filename = external_node_path_namespaceObject .join(__dirname, getUploaderName(platform));
33029
+ external_node_https_namespaceObject .get(getBaseUrl(platform, uploaderVersion), (res) => {
33016
33030
// Image will be stored at this path
33017
- const filePath = external_fs_ .createWriteStream(filename);
33031
+ const filePath = external_node_fs_namespaceObject .createWriteStream(filename);
33018
33032
res.pipe(filePath);
33019
33033
filePath
33020
33034
.on('error', (err) => {
@@ -33023,12 +33037,12 @@ const run = () => src_awaiter(void 0, void 0, void 0, function* () {
33023
33037
filePath.close();
33024
33038
yield validate(filename, platform, uploaderVersion, verbose, failCi);
33025
33039
yield version(platform, uploaderVersion);
33026
- yield external_fs_ .chmodSync(filename, '777');
33040
+ yield external_node_fs_namespaceObject .chmodSync(filename, '777');
33027
33041
if (!disableSafeDirectory) {
33028
33042
yield setSafeDirectory();
33029
33043
}
33030
33044
const unlink = () => {
33031
- external_fs_ .unlink(filename, (err) => {
33045
+ external_node_fs_namespaceObject .unlink(filename, (err) => {
33032
33046
if (err) {
33033
33047
setFailure(`Codecov: Could not unlink uploader: ${err.message}`, failCi);
33034
33048
}
0 commit comments