mirror of
				https://github.com/actions/checkout.git
				synced 2025-11-04 07:48:09 +08:00 
			
		
		
		
	Compare commits
	
		
			15 Commits
		
	
	
		
			v6-beta
			...
			2bcd7c6585
		
	
	| Author | SHA1 | Date | |
|---|---|---|---|
| 
						 | 
					2bcd7c6585 | ||
| 
						 | 
					857facff5c | ||
| 
						 | 
					ff9f98e487 | ||
| 
						 | 
					aa7e6581cb | ||
| 
						 | 
					6397f22a4f | ||
| 
						 | 
					762bf756aa | ||
| 
						 | 
					96c6589494 | ||
| 
						 | 
					0f2eb6b146 | ||
| 
						 | 
					a60fb6cabe | ||
| 
						 | 
					8e4be9ae12 | ||
| 
						 | 
					74fe54f098 | ||
| 
						 | 
					b13eccf351 | ||
| 
						 | 
					82257b56c2 | ||
| 
						 | 
					d9b320ec70 | ||
| 
						 | 
					bcc5319a0b | 
							
								
								
									
										11
									
								
								.github/workflows/test.yml
									
									
									
									
										vendored
									
									
								
							
							
						
						
									
										11
									
								
								.github/workflows/test.yml
									
									
									
									
										vendored
									
									
								
							@@ -299,15 +299,18 @@ jobs:
 | 
			
		||||
  test-output:
 | 
			
		||||
    runs-on: ubuntu-latest
 | 
			
		||||
    steps:
 | 
			
		||||
      # Clone this repo
 | 
			
		||||
      # Download the action at the current ref
 | 
			
		||||
      - name: Checkout
 | 
			
		||||
        uses: actions/checkout@v4.1.6
 | 
			
		||||
        with:
 | 
			
		||||
          path: actions-checkout
 | 
			
		||||
 | 
			
		||||
      # Basic checkout using git
 | 
			
		||||
      - name: Checkout basic
 | 
			
		||||
        id: checkout
 | 
			
		||||
        uses: ./
 | 
			
		||||
        uses: ./actions-checkout
 | 
			
		||||
        with:
 | 
			
		||||
          path: cloned-using-local-action
 | 
			
		||||
          ref: test-data/v2/basic
 | 
			
		||||
 | 
			
		||||
      # Verify output
 | 
			
		||||
@@ -325,7 +328,3 @@ jobs:
 | 
			
		||||
            echo "Expected commit to be 82f71901cf8c021332310dcc8cdba84c4193ff5d"
 | 
			
		||||
            exit 1
 | 
			
		||||
          fi
 | 
			
		||||
 | 
			
		||||
      # needed to make checkout post cleanup succeed
 | 
			
		||||
      - name: Fix Checkout
 | 
			
		||||
        uses: actions/checkout@v4.1.6
 | 
			
		||||
 
 | 
			
		||||
@@ -86,16 +86,29 @@ describe('git-auth-helper tests', () => {
 | 
			
		||||
    // Act
 | 
			
		||||
    await authHelper.configureAuth()
 | 
			
		||||
 | 
			
		||||
    // Assert config
 | 
			
		||||
    const configContent = (
 | 
			
		||||
    // Assert config - check that .git/config contains includeIf entries
 | 
			
		||||
    const localConfigContent = (
 | 
			
		||||
      await fs.promises.readFile(localGitConfigPath)
 | 
			
		||||
    ).toString()
 | 
			
		||||
    expect(
 | 
			
		||||
      localConfigContent.indexOf('includeIf.gitdir:')
 | 
			
		||||
    ).toBeGreaterThanOrEqual(0)
 | 
			
		||||
 | 
			
		||||
    // Assert credentials config file contains the actual credentials
 | 
			
		||||
    const credentialsFiles = (await fs.promises.readdir(runnerTemp)).filter(
 | 
			
		||||
      f => f.startsWith('git-credentials-') && f.endsWith('.config')
 | 
			
		||||
    )
 | 
			
		||||
    expect(credentialsFiles.length).toBe(1)
 | 
			
		||||
    const credentialsConfigPath = path.join(runnerTemp, credentialsFiles[0])
 | 
			
		||||
    const credentialsContent = (
 | 
			
		||||
      await fs.promises.readFile(credentialsConfigPath)
 | 
			
		||||
    ).toString()
 | 
			
		||||
    const basicCredential = Buffer.from(
 | 
			
		||||
      `x-access-token:${settings.authToken}`,
 | 
			
		||||
      'utf8'
 | 
			
		||||
    ).toString('base64')
 | 
			
		||||
    expect(
 | 
			
		||||
      configContent.indexOf(
 | 
			
		||||
      credentialsContent.indexOf(
 | 
			
		||||
        `http.${expectedServerUrl}/.extraheader AUTHORIZATION: basic ${basicCredential}`
 | 
			
		||||
      )
 | 
			
		||||
    ).toBeGreaterThanOrEqual(0)
 | 
			
		||||
@@ -120,7 +133,7 @@ describe('git-auth-helper tests', () => {
 | 
			
		||||
    'inject https://github.com as github server url'
 | 
			
		||||
  it(configureAuth_AcceptsGitHubServerUrlSetToGHEC, async () => {
 | 
			
		||||
    await testAuthHeader(
 | 
			
		||||
      configureAuth_AcceptsGitHubServerUrl,
 | 
			
		||||
      configureAuth_AcceptsGitHubServerUrlSetToGHEC,
 | 
			
		||||
      'https://github.com'
 | 
			
		||||
    )
 | 
			
		||||
  })
 | 
			
		||||
@@ -141,12 +154,17 @@ describe('git-auth-helper tests', () => {
 | 
			
		||||
      // Act
 | 
			
		||||
      await authHelper.configureAuth()
 | 
			
		||||
 | 
			
		||||
      // Assert config
 | 
			
		||||
      const configContent = (
 | 
			
		||||
        await fs.promises.readFile(localGitConfigPath)
 | 
			
		||||
      // Assert config - check credentials config file (not local .git/config)
 | 
			
		||||
      const credentialsFiles = (await fs.promises.readdir(runnerTemp)).filter(
 | 
			
		||||
        f => f.startsWith('git-credentials-') && f.endsWith('.config')
 | 
			
		||||
      )
 | 
			
		||||
      expect(credentialsFiles.length).toBe(1)
 | 
			
		||||
      const credentialsConfigPath = path.join(runnerTemp, credentialsFiles[0])
 | 
			
		||||
      const credentialsContent = (
 | 
			
		||||
        await fs.promises.readFile(credentialsConfigPath)
 | 
			
		||||
      ).toString()
 | 
			
		||||
      expect(
 | 
			
		||||
        configContent.indexOf(
 | 
			
		||||
        credentialsContent.indexOf(
 | 
			
		||||
          `http.https://github.com/.extraheader AUTHORIZATION`
 | 
			
		||||
        )
 | 
			
		||||
      ).toBeGreaterThanOrEqual(0)
 | 
			
		||||
@@ -251,13 +269,16 @@ describe('git-auth-helper tests', () => {
 | 
			
		||||
      expectedSshCommand
 | 
			
		||||
    )
 | 
			
		||||
 | 
			
		||||
    // Asserty git config
 | 
			
		||||
    // Assert git config
 | 
			
		||||
    const gitConfigLines = (await fs.promises.readFile(localGitConfigPath))
 | 
			
		||||
      .toString()
 | 
			
		||||
      .split('\n')
 | 
			
		||||
      .filter(x => x)
 | 
			
		||||
    expect(gitConfigLines).toHaveLength(1)
 | 
			
		||||
    expect(gitConfigLines[0]).toMatch(/^http\./)
 | 
			
		||||
    // Should have includeIf entries pointing to credentials file
 | 
			
		||||
    expect(gitConfigLines.length).toBeGreaterThan(0)
 | 
			
		||||
    expect(
 | 
			
		||||
      gitConfigLines.some(line => line.indexOf('includeIf.gitdir:') >= 0)
 | 
			
		||||
    ).toBeTruthy()
 | 
			
		||||
  })
 | 
			
		||||
 | 
			
		||||
  const configureAuth_setsSshCommandWhenPersistCredentialsTrue =
 | 
			
		||||
@@ -419,8 +440,20 @@ describe('git-auth-helper tests', () => {
 | 
			
		||||
    expect(
 | 
			
		||||
      configContent.indexOf('value-from-global-config')
 | 
			
		||||
    ).toBeGreaterThanOrEqual(0)
 | 
			
		||||
    // Global config should have include.path pointing to credentials file
 | 
			
		||||
    expect(configContent.indexOf('include.path')).toBeGreaterThanOrEqual(0)
 | 
			
		||||
 | 
			
		||||
    // Check credentials in the separate config file
 | 
			
		||||
    const credentialsFiles = (await fs.promises.readdir(runnerTemp)).filter(
 | 
			
		||||
      f => f.startsWith('git-credentials-') && f.endsWith('.config')
 | 
			
		||||
    )
 | 
			
		||||
    expect(credentialsFiles.length).toBeGreaterThan(0)
 | 
			
		||||
    const credentialsConfigPath = path.join(runnerTemp, credentialsFiles[0])
 | 
			
		||||
    const credentialsContent = (
 | 
			
		||||
      await fs.promises.readFile(credentialsConfigPath)
 | 
			
		||||
    ).toString()
 | 
			
		||||
    expect(
 | 
			
		||||
      configContent.indexOf(
 | 
			
		||||
      credentialsContent.indexOf(
 | 
			
		||||
        `http.https://github.com/.extraheader AUTHORIZATION: basic ${basicCredential}`
 | 
			
		||||
      )
 | 
			
		||||
    ).toBeGreaterThanOrEqual(0)
 | 
			
		||||
@@ -463,8 +496,20 @@ describe('git-auth-helper tests', () => {
 | 
			
		||||
      const configContent = (
 | 
			
		||||
        await fs.promises.readFile(path.join(git.env['HOME'], '.gitconfig'))
 | 
			
		||||
      ).toString()
 | 
			
		||||
      // Global config should have include.path pointing to credentials file
 | 
			
		||||
      expect(configContent.indexOf('include.path')).toBeGreaterThanOrEqual(0)
 | 
			
		||||
 | 
			
		||||
      // Check credentials in the separate config file
 | 
			
		||||
      const credentialsFiles = (await fs.promises.readdir(runnerTemp)).filter(
 | 
			
		||||
        f => f.startsWith('git-credentials-') && f.endsWith('.config')
 | 
			
		||||
      )
 | 
			
		||||
      expect(credentialsFiles.length).toBeGreaterThan(0)
 | 
			
		||||
      const credentialsConfigPath = path.join(runnerTemp, credentialsFiles[0])
 | 
			
		||||
      const credentialsContent = (
 | 
			
		||||
        await fs.promises.readFile(credentialsConfigPath)
 | 
			
		||||
      ).toString()
 | 
			
		||||
      expect(
 | 
			
		||||
        configContent.indexOf(
 | 
			
		||||
        credentialsContent.indexOf(
 | 
			
		||||
          `http.https://github.com/.extraheader AUTHORIZATION: basic ${basicCredential}`
 | 
			
		||||
        )
 | 
			
		||||
      ).toBeGreaterThanOrEqual(0)
 | 
			
		||||
@@ -550,11 +595,14 @@ describe('git-auth-helper tests', () => {
 | 
			
		||||
      await authHelper.configureSubmoduleAuth()
 | 
			
		||||
 | 
			
		||||
      // Assert
 | 
			
		||||
      // Should get submodule config paths (1 call) and configure insteadOf (2 calls for two values)
 | 
			
		||||
      expect(mockSubmoduleForeach).toHaveBeenCalledTimes(4)
 | 
			
		||||
      expect(mockSubmoduleForeach.mock.calls[0][0]).toMatch(
 | 
			
		||||
        /unset-all.*insteadOf/
 | 
			
		||||
      )
 | 
			
		||||
      expect(mockSubmoduleForeach.mock.calls[1][0]).toMatch(/http.*extraheader/)
 | 
			
		||||
      expect(mockSubmoduleForeach.mock.calls[1][0]).toMatch(
 | 
			
		||||
        /show-origin.*remote\.origin\.url/
 | 
			
		||||
      )
 | 
			
		||||
      expect(mockSubmoduleForeach.mock.calls[2][0]).toMatch(
 | 
			
		||||
        /url.*insteadOf.*git@github.com:/
 | 
			
		||||
      )
 | 
			
		||||
@@ -589,11 +637,14 @@ describe('git-auth-helper tests', () => {
 | 
			
		||||
      await authHelper.configureSubmoduleAuth()
 | 
			
		||||
 | 
			
		||||
      // Assert
 | 
			
		||||
      // Should get submodule config paths (1 call) and configure sshCommand (1 call)
 | 
			
		||||
      expect(mockSubmoduleForeach).toHaveBeenCalledTimes(3)
 | 
			
		||||
      expect(mockSubmoduleForeach.mock.calls[0][0]).toMatch(
 | 
			
		||||
        /unset-all.*insteadOf/
 | 
			
		||||
      )
 | 
			
		||||
      expect(mockSubmoduleForeach.mock.calls[1][0]).toMatch(/http.*extraheader/)
 | 
			
		||||
      expect(mockSubmoduleForeach.mock.calls[1][0]).toMatch(
 | 
			
		||||
        /show-origin.*remote\.origin\.url/
 | 
			
		||||
      )
 | 
			
		||||
      expect(mockSubmoduleForeach.mock.calls[2][0]).toMatch(/core\.sshCommand/)
 | 
			
		||||
    }
 | 
			
		||||
  )
 | 
			
		||||
@@ -660,19 +711,35 @@ describe('git-auth-helper tests', () => {
 | 
			
		||||
    await setup(removeAuth_removesToken)
 | 
			
		||||
    const authHelper = gitAuthHelper.createAuthHelper(git, settings)
 | 
			
		||||
    await authHelper.configureAuth()
 | 
			
		||||
    let gitConfigContent = (
 | 
			
		||||
 | 
			
		||||
    // Sanity check - verify includeIf entries exist in local config
 | 
			
		||||
    let localConfigContent = (
 | 
			
		||||
      await fs.promises.readFile(localGitConfigPath)
 | 
			
		||||
    ).toString()
 | 
			
		||||
    expect(gitConfigContent.indexOf('http.')).toBeGreaterThanOrEqual(0) // sanity check
 | 
			
		||||
    expect(
 | 
			
		||||
      localConfigContent.indexOf('includeIf.gitdir:')
 | 
			
		||||
    ).toBeGreaterThanOrEqual(0)
 | 
			
		||||
 | 
			
		||||
    // Sanity check - verify credentials file exists
 | 
			
		||||
    let credentialsFiles = (await fs.promises.readdir(runnerTemp)).filter(
 | 
			
		||||
      f => f.startsWith('git-credentials-') && f.endsWith('.config')
 | 
			
		||||
    )
 | 
			
		||||
    expect(credentialsFiles.length).toBe(1)
 | 
			
		||||
 | 
			
		||||
    // Act
 | 
			
		||||
    await authHelper.removeAuth()
 | 
			
		||||
 | 
			
		||||
    // Assert git config
 | 
			
		||||
    gitConfigContent = (
 | 
			
		||||
    // Assert includeIf entries removed from local git config
 | 
			
		||||
    localConfigContent = (
 | 
			
		||||
      await fs.promises.readFile(localGitConfigPath)
 | 
			
		||||
    ).toString()
 | 
			
		||||
    expect(gitConfigContent.indexOf('http.')).toBeLessThan(0)
 | 
			
		||||
    expect(localConfigContent.indexOf('includeIf.gitdir:')).toBeLessThan(0)
 | 
			
		||||
 | 
			
		||||
    // Assert credentials config file deleted
 | 
			
		||||
    credentialsFiles = (await fs.promises.readdir(runnerTemp)).filter(
 | 
			
		||||
      f => f.startsWith('git-credentials-') && f.endsWith('.config')
 | 
			
		||||
    )
 | 
			
		||||
    expect(credentialsFiles.length).toBe(0)
 | 
			
		||||
  })
 | 
			
		||||
 | 
			
		||||
  const removeGlobalConfig_removesOverride =
 | 
			
		||||
@@ -715,6 +782,7 @@ async function setup(testName: string): Promise<void> {
 | 
			
		||||
  await fs.promises.mkdir(tempHomedir, {recursive: true})
 | 
			
		||||
  process.env['RUNNER_TEMP'] = runnerTemp
 | 
			
		||||
  process.env['HOME'] = tempHomedir
 | 
			
		||||
  process.env['GITHUB_WORKSPACE'] = workspace
 | 
			
		||||
 | 
			
		||||
  // Create git config
 | 
			
		||||
  globalGitConfigPath = path.join(tempHomedir, '.gitconfig')
 | 
			
		||||
@@ -733,10 +801,20 @@ async function setup(testName: string): Promise<void> {
 | 
			
		||||
    checkout: jest.fn(),
 | 
			
		||||
    checkoutDetach: jest.fn(),
 | 
			
		||||
    config: jest.fn(
 | 
			
		||||
      async (key: string, value: string, globalConfig?: boolean) => {
 | 
			
		||||
        const configPath = globalConfig
 | 
			
		||||
          ? path.join(git.env['HOME'] || tempHomedir, '.gitconfig')
 | 
			
		||||
          : localGitConfigPath
 | 
			
		||||
      async (
 | 
			
		||||
        key: string,
 | 
			
		||||
        value: string,
 | 
			
		||||
        globalConfig?: boolean,
 | 
			
		||||
        add?: boolean,
 | 
			
		||||
        configFile?: string
 | 
			
		||||
      ) => {
 | 
			
		||||
        const configPath =
 | 
			
		||||
          configFile ||
 | 
			
		||||
          (globalConfig
 | 
			
		||||
            ? path.join(git.env['HOME'] || tempHomedir, '.gitconfig')
 | 
			
		||||
            : localGitConfigPath)
 | 
			
		||||
        // Ensure directory exists
 | 
			
		||||
        await fs.promises.mkdir(path.dirname(configPath), {recursive: true})
 | 
			
		||||
        await fs.promises.appendFile(configPath, `\n${key} ${value}`)
 | 
			
		||||
      }
 | 
			
		||||
    ),
 | 
			
		||||
@@ -830,6 +908,7 @@ async function setup(testName: string): Promise<void> {
 | 
			
		||||
 | 
			
		||||
async function getActualSshKeyPath(): Promise<string> {
 | 
			
		||||
  let actualTempFiles = (await fs.promises.readdir(runnerTemp))
 | 
			
		||||
    .filter(x => !x.startsWith('git-credentials-')) // Exclude credentials config file
 | 
			
		||||
    .sort()
 | 
			
		||||
    .map(x => path.join(runnerTemp, x))
 | 
			
		||||
  if (actualTempFiles.length === 0) {
 | 
			
		||||
@@ -843,6 +922,7 @@ async function getActualSshKeyPath(): Promise<string> {
 | 
			
		||||
 | 
			
		||||
async function getActualSshKnownHostsPath(): Promise<string> {
 | 
			
		||||
  let actualTempFiles = (await fs.promises.readdir(runnerTemp))
 | 
			
		||||
    .filter(x => !x.startsWith('git-credentials-')) // Exclude credentials config file
 | 
			
		||||
    .sort()
 | 
			
		||||
    .map(x => path.join(runnerTemp, x))
 | 
			
		||||
  if (actualTempFiles.length === 0) {
 | 
			
		||||
 
 | 
			
		||||
@@ -17,7 +17,7 @@ fi
 | 
			
		||||
 | 
			
		||||
echo "Testing persisted credential"
 | 
			
		||||
pushd ./submodules-recursive/submodule-level-1/submodule-level-2
 | 
			
		||||
git config --local --name-only --get-regexp http.+extraheader && git fetch
 | 
			
		||||
git config --local --name-only --get-regexp '^includeIf\.' && git fetch
 | 
			
		||||
if [ "$?" != "0" ]; then
 | 
			
		||||
    echo "Failed to validate persisted credential"
 | 
			
		||||
    popd
 | 
			
		||||
 
 | 
			
		||||
@@ -17,7 +17,7 @@ fi
 | 
			
		||||
 | 
			
		||||
echo "Testing persisted credential"
 | 
			
		||||
pushd ./submodules-true/submodule-level-1
 | 
			
		||||
git config --local --name-only --get-regexp http.+extraheader && git fetch
 | 
			
		||||
git config --local --name-only --get-regexp '^includeIf\.' && git fetch
 | 
			
		||||
if [ "$?" != "0" ]; then
 | 
			
		||||
    echo "Failed to validate persisted credential"
 | 
			
		||||
    popd
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										160
									
								
								dist/index.js
									
									
									
									
										vendored
									
									
								
							
							
						
						
									
										160
									
								
								dist/index.js
									
									
									
									
										vendored
									
									
								
							@@ -162,6 +162,8 @@ class GitAuthHelper {
 | 
			
		||||
        this.sshKeyPath = '';
 | 
			
		||||
        this.sshKnownHostsPath = '';
 | 
			
		||||
        this.temporaryHomePath = '';
 | 
			
		||||
        this.credentialsConfigPath = ''; // Path to separate credentials config file in RUNNER_TEMP
 | 
			
		||||
        this.credentialsIncludeKeys = []; // Track includeIf config keys for cleanup
 | 
			
		||||
        this.git = gitCommandManager;
 | 
			
		||||
        this.settings = gitSourceSettings || {};
 | 
			
		||||
        // Token auth header
 | 
			
		||||
@@ -187,6 +189,20 @@ class GitAuthHelper {
 | 
			
		||||
            yield this.configureToken();
 | 
			
		||||
        });
 | 
			
		||||
    }
 | 
			
		||||
    getCredentialsConfigPath() {
 | 
			
		||||
        return __awaiter(this, void 0, void 0, function* () {
 | 
			
		||||
            if (this.credentialsConfigPath) {
 | 
			
		||||
                return this.credentialsConfigPath;
 | 
			
		||||
            }
 | 
			
		||||
            const runnerTemp = process.env['RUNNER_TEMP'] || '';
 | 
			
		||||
            assert.ok(runnerTemp, 'RUNNER_TEMP is not defined');
 | 
			
		||||
            // Create a unique filename for this checkout instance
 | 
			
		||||
            const configFileName = `git-credentials-${(0, uuid_1.v4)()}.config`;
 | 
			
		||||
            this.credentialsConfigPath = path.join(runnerTemp, configFileName);
 | 
			
		||||
            core.debug(`Credentials config path: ${this.credentialsConfigPath}`);
 | 
			
		||||
            return this.credentialsConfigPath;
 | 
			
		||||
        });
 | 
			
		||||
    }
 | 
			
		||||
    configureTempGlobalConfig() {
 | 
			
		||||
        return __awaiter(this, void 0, void 0, function* () {
 | 
			
		||||
            var _a;
 | 
			
		||||
@@ -229,10 +245,10 @@ class GitAuthHelper {
 | 
			
		||||
    configureGlobalAuth() {
 | 
			
		||||
        return __awaiter(this, void 0, void 0, function* () {
 | 
			
		||||
            // 'configureTempGlobalConfig' noops if already set, just returns the path
 | 
			
		||||
            const newGitConfigPath = yield this.configureTempGlobalConfig();
 | 
			
		||||
            yield this.configureTempGlobalConfig();
 | 
			
		||||
            try {
 | 
			
		||||
                // Configure the token
 | 
			
		||||
                yield this.configureToken(newGitConfigPath, true);
 | 
			
		||||
                yield this.configureToken(true);
 | 
			
		||||
                // Configure HTTPS instead of SSH
 | 
			
		||||
                yield this.git.tryConfigUnset(this.insteadOfKey, true);
 | 
			
		||||
                if (!this.settings.sshKey) {
 | 
			
		||||
@@ -252,19 +268,37 @@ class GitAuthHelper {
 | 
			
		||||
    configureSubmoduleAuth() {
 | 
			
		||||
        return __awaiter(this, void 0, void 0, function* () {
 | 
			
		||||
            // Remove possible previous HTTPS instead of SSH
 | 
			
		||||
            yield this.removeGitConfig(this.insteadOfKey, true);
 | 
			
		||||
            yield this.removeSubmoduleGitConfig(this.insteadOfKey);
 | 
			
		||||
            if (this.settings.persistCredentials) {
 | 
			
		||||
                // Configure a placeholder value. This approach avoids the credential being captured
 | 
			
		||||
                // by process creation audit events, which are commonly logged. For more information,
 | 
			
		||||
                // refer to https://docs.microsoft.com/en-us/windows-server/identity/ad-ds/manage/component-updates/command-line-process-auditing
 | 
			
		||||
                const output = yield this.git.submoduleForeach(
 | 
			
		||||
                // wrap the pipeline in quotes to make sure it's handled properly by submoduleForeach, rather than just the first part of the pipeline
 | 
			
		||||
                `sh -c "git config --local '${this.tokenConfigKey}' '${this.tokenPlaceholderConfigValue}' && git config --local --show-origin --name-only --get-regexp remote.origin.url"`, this.settings.nestedSubmodules);
 | 
			
		||||
                // Replace the placeholder
 | 
			
		||||
                // Credentials config path
 | 
			
		||||
                const credentialsConfigPath = yield this.getCredentialsConfigPath();
 | 
			
		||||
                // Container credentials config path
 | 
			
		||||
                const containerCredentialsPath = path.posix.join('/github/runner_temp', path.basename(credentialsConfigPath));
 | 
			
		||||
                // Container repo path
 | 
			
		||||
                const workingDirectory = this.git.getWorkingDirectory();
 | 
			
		||||
                const githubWorkspace = process.env['GITHUB_WORKSPACE'];
 | 
			
		||||
                assert.ok(githubWorkspace, 'GITHUB_WORKSPACE is not defined');
 | 
			
		||||
                let relativePath = path.relative(githubWorkspace, workingDirectory);
 | 
			
		||||
                relativePath = relativePath.replace(/\\/g, '/');
 | 
			
		||||
                const containerRepoPath = path.posix.join('/github/workspace', relativePath);
 | 
			
		||||
                // Get submodule config file paths.
 | 
			
		||||
                // Use `--show-origin` to get the config file path for each submodule.
 | 
			
		||||
                const output = yield this.git.submoduleForeach(`git config --local --show-origin --name-only --get-regexp remote.origin.url`, this.settings.nestedSubmodules);
 | 
			
		||||
                // Extract config file paths from the output (lines starting with "file:").
 | 
			
		||||
                const configPaths = output.match(/(?<=(^|\n)file:)[^\t]+(?=\tremote\.origin\.url)/g) || [];
 | 
			
		||||
                // For each submodule, configure includeIf entries pointing to the shared credentials file.
 | 
			
		||||
                // Configure both host and container paths to support Docker container actions.
 | 
			
		||||
                for (const configPath of configPaths) {
 | 
			
		||||
                    core.debug(`Replacing token placeholder in '${configPath}'`);
 | 
			
		||||
                    yield this.replaceTokenPlaceholder(configPath);
 | 
			
		||||
                    // Submodule Git directory
 | 
			
		||||
                    let submoduleGitDir = path.dirname(configPath); // The config file is at .git/modules/submodule-name/config
 | 
			
		||||
                    submoduleGitDir = submoduleGitDir.replace(/\\/g, '/'); // Use forward slashes, even on Windows
 | 
			
		||||
                    // Configure host includeIf
 | 
			
		||||
                    yield this.git.config(`includeIf.gitdir:${submoduleGitDir}.path`, credentialsConfigPath, false, false, configPath);
 | 
			
		||||
                    // Configure container includeIf
 | 
			
		||||
                    let relativeSubmoduleGitDir = path.relative(githubWorkspace, submoduleGitDir);
 | 
			
		||||
                    relativeSubmoduleGitDir = relativeSubmoduleGitDir.replace(/\\/g, '/'); // Use forward slashes, even on Windows
 | 
			
		||||
                    const containerSubmoduleGitDir = path.posix.join('/github/workspace', relativeSubmoduleGitDir);
 | 
			
		||||
                    yield this.git.config(`includeIf.gitdir:${containerSubmoduleGitDir}.path`, containerCredentialsPath, false, false, configPath);
 | 
			
		||||
                }
 | 
			
		||||
                if (this.settings.sshKey) {
 | 
			
		||||
                    // Configure core.sshCommand
 | 
			
		||||
@@ -351,20 +385,44 @@ class GitAuthHelper {
 | 
			
		||||
            }
 | 
			
		||||
        });
 | 
			
		||||
    }
 | 
			
		||||
    configureToken(configPath, globalConfig) {
 | 
			
		||||
    configureToken(globalConfig) {
 | 
			
		||||
        return __awaiter(this, void 0, void 0, function* () {
 | 
			
		||||
            // Validate args
 | 
			
		||||
            assert.ok((configPath && globalConfig) || (!configPath && !globalConfig), 'Unexpected configureToken parameter combinations');
 | 
			
		||||
            // Default config path
 | 
			
		||||
            if (!configPath && !globalConfig) {
 | 
			
		||||
                configPath = path.join(this.git.getWorkingDirectory(), '.git', 'config');
 | 
			
		||||
            // Get the credentials config file path in RUNNER_TEMP
 | 
			
		||||
            const credentialsConfigPath = yield this.getCredentialsConfigPath();
 | 
			
		||||
            // Write placeholder to the separate credentials config file using git config.
 | 
			
		||||
            // This approach avoids the credential being captured by process creation audit events,
 | 
			
		||||
            // which are commonly logged. For more information, refer to
 | 
			
		||||
            // https://docs.microsoft.com/en-us/windows-server/identity/ad-ds/manage/component-updates/command-line-process-auditing
 | 
			
		||||
            yield this.git.config(this.tokenConfigKey, this.tokenPlaceholderConfigValue, false, false, credentialsConfigPath);
 | 
			
		||||
            // Replace the placeholder in the credentials config file
 | 
			
		||||
            yield this.replaceTokenPlaceholder(credentialsConfigPath);
 | 
			
		||||
            // Add include or includeIf to reference the credentials config
 | 
			
		||||
            if (globalConfig) {
 | 
			
		||||
                // Global config file is temporary
 | 
			
		||||
                yield this.git.config('include.path', credentialsConfigPath, true);
 | 
			
		||||
            }
 | 
			
		||||
            else {
 | 
			
		||||
                // Host git directory
 | 
			
		||||
                let gitDir = path.join(this.git.getWorkingDirectory(), '.git');
 | 
			
		||||
                gitDir = gitDir.replace(/\\/g, '/'); // Use forward slashes, even on Windows
 | 
			
		||||
                // Configure host includeIf
 | 
			
		||||
                const hostIncludeKey = `includeIf.gitdir:${gitDir}.path`;
 | 
			
		||||
                yield this.git.config(hostIncludeKey, credentialsConfigPath);
 | 
			
		||||
                this.credentialsIncludeKeys.push(hostIncludeKey);
 | 
			
		||||
                // Container git directory
 | 
			
		||||
                const githubWorkspace = process.env['GITHUB_WORKSPACE'];
 | 
			
		||||
                assert.ok(githubWorkspace, 'GITHUB_WORKSPACE is not defined');
 | 
			
		||||
                const workingDirectory = this.git.getWorkingDirectory();
 | 
			
		||||
                let relativePath = path.relative(githubWorkspace, workingDirectory);
 | 
			
		||||
                relativePath = relativePath.replace(/\\/g, '/'); // Use forward slashes, even on Windows
 | 
			
		||||
                const containerGitDir = path.posix.join('/github/workspace', relativePath, '.git');
 | 
			
		||||
                // Container credentials config path
 | 
			
		||||
                const containerCredentialsPath = path.posix.join('/github/runner_temp', path.basename(credentialsConfigPath));
 | 
			
		||||
                // Configure container includeIf
 | 
			
		||||
                const containerIncludeKey = `includeIf.gitdir:${containerGitDir}.path`;
 | 
			
		||||
                yield this.git.config(containerIncludeKey, containerCredentialsPath);
 | 
			
		||||
                this.credentialsIncludeKeys.push(containerIncludeKey);
 | 
			
		||||
            }
 | 
			
		||||
            // Configure a placeholder value. This approach avoids the credential being captured
 | 
			
		||||
            // by process creation audit events, which are commonly logged. For more information,
 | 
			
		||||
            // refer to https://docs.microsoft.com/en-us/windows-server/identity/ad-ds/manage/component-updates/command-line-process-auditing
 | 
			
		||||
            yield this.git.config(this.tokenConfigKey, this.tokenPlaceholderConfigValue, globalConfig);
 | 
			
		||||
            // Replace the placeholder
 | 
			
		||||
            yield this.replaceTokenPlaceholder(configPath || '');
 | 
			
		||||
        });
 | 
			
		||||
    }
 | 
			
		||||
    replaceTokenPlaceholder(configPath) {
 | 
			
		||||
@@ -407,26 +465,48 @@ class GitAuthHelper {
 | 
			
		||||
            }
 | 
			
		||||
            // SSH command
 | 
			
		||||
            yield this.removeGitConfig(SSH_COMMAND_KEY);
 | 
			
		||||
            yield this.removeSubmoduleGitConfig(SSH_COMMAND_KEY);
 | 
			
		||||
        });
 | 
			
		||||
    }
 | 
			
		||||
    removeToken() {
 | 
			
		||||
        return __awaiter(this, void 0, void 0, function* () {
 | 
			
		||||
            // HTTP extra header
 | 
			
		||||
            var _a;
 | 
			
		||||
            // Remove HTTP extra header
 | 
			
		||||
            yield this.removeGitConfig(this.tokenConfigKey);
 | 
			
		||||
        });
 | 
			
		||||
    }
 | 
			
		||||
    removeGitConfig(configKey_1) {
 | 
			
		||||
        return __awaiter(this, arguments, void 0, function* (configKey, submoduleOnly = false) {
 | 
			
		||||
            if (!submoduleOnly) {
 | 
			
		||||
                if ((yield this.git.configExists(configKey)) &&
 | 
			
		||||
                    !(yield this.git.tryConfigUnset(configKey))) {
 | 
			
		||||
                    // Load the config contents
 | 
			
		||||
                    core.warning(`Failed to remove '${configKey}' from the git config`);
 | 
			
		||||
            yield this.removeSubmoduleGitConfig(this.tokenConfigKey);
 | 
			
		||||
            // Remove includeIf
 | 
			
		||||
            for (const includeKey of this.credentialsIncludeKeys) {
 | 
			
		||||
                yield this.removeGitConfig(includeKey);
 | 
			
		||||
            }
 | 
			
		||||
            this.credentialsIncludeKeys = [];
 | 
			
		||||
            // Remove submodule includeIf
 | 
			
		||||
            yield this.git.submoduleForeach(`sh -c "git config --local --get-regexp '^includeIf\\.' && git config --local --remove-section includeIf || :"`, true);
 | 
			
		||||
            // Remove credentials config file
 | 
			
		||||
            if (this.credentialsConfigPath) {
 | 
			
		||||
                try {
 | 
			
		||||
                    yield io.rmRF(this.credentialsConfigPath);
 | 
			
		||||
                }
 | 
			
		||||
                catch (err) {
 | 
			
		||||
                    core.debug(`${(_a = err === null || err === void 0 ? void 0 : err.message) !== null && _a !== void 0 ? _a : err}`);
 | 
			
		||||
                    core.warning(`Failed to remove credentials config '${this.credentialsConfigPath}'`);
 | 
			
		||||
                }
 | 
			
		||||
            }
 | 
			
		||||
        });
 | 
			
		||||
    }
 | 
			
		||||
    removeGitConfig(configKey) {
 | 
			
		||||
        return __awaiter(this, void 0, void 0, function* () {
 | 
			
		||||
            if ((yield this.git.configExists(configKey)) &&
 | 
			
		||||
                !(yield this.git.tryConfigUnset(configKey))) {
 | 
			
		||||
                // Load the config contents
 | 
			
		||||
                core.warning(`Failed to remove '${configKey}' from the git config`);
 | 
			
		||||
            }
 | 
			
		||||
        });
 | 
			
		||||
    }
 | 
			
		||||
    removeSubmoduleGitConfig(configKey) {
 | 
			
		||||
        return __awaiter(this, void 0, void 0, function* () {
 | 
			
		||||
            const pattern = regexpHelper.escape(configKey);
 | 
			
		||||
            yield this.git.submoduleForeach(
 | 
			
		||||
            // wrap the pipeline in quotes to make sure it's handled properly by submoduleForeach, rather than just the first part of the pipeline
 | 
			
		||||
            // Wrap the pipeline in quotes to make sure it's handled properly by submoduleForeach, rather than just the first part of the pipeline.
 | 
			
		||||
            `sh -c "git config --local --name-only --get-regexp '${pattern}' && git config --local --unset-all '${configKey}' || :"`, true);
 | 
			
		||||
        });
 | 
			
		||||
    }
 | 
			
		||||
@@ -627,9 +707,15 @@ class GitCommandManager {
 | 
			
		||||
            yield this.execGit(args);
 | 
			
		||||
        });
 | 
			
		||||
    }
 | 
			
		||||
    config(configKey, configValue, globalConfig, add) {
 | 
			
		||||
    config(configKey, configValue, globalConfig, add, configFile) {
 | 
			
		||||
        return __awaiter(this, void 0, void 0, function* () {
 | 
			
		||||
            const args = ['config', globalConfig ? '--global' : '--local'];
 | 
			
		||||
            const args = ['config'];
 | 
			
		||||
            if (configFile) {
 | 
			
		||||
                args.push('--file', configFile);
 | 
			
		||||
            }
 | 
			
		||||
            else {
 | 
			
		||||
                args.push(globalConfig ? '--global' : '--local');
 | 
			
		||||
            }
 | 
			
		||||
            if (add) {
 | 
			
		||||
                args.push('--add');
 | 
			
		||||
            }
 | 
			
		||||
 
 | 
			
		||||
@@ -43,6 +43,8 @@ class GitAuthHelper {
 | 
			
		||||
  private sshKeyPath = ''
 | 
			
		||||
  private sshKnownHostsPath = ''
 | 
			
		||||
  private temporaryHomePath = ''
 | 
			
		||||
  private credentialsConfigPath = '' // Path to separate credentials config file in RUNNER_TEMP
 | 
			
		||||
  private credentialsIncludeKeys: string[] = [] // Track includeIf config keys for cleanup
 | 
			
		||||
 | 
			
		||||
  constructor(
 | 
			
		||||
    gitCommandManager: IGitCommandManager,
 | 
			
		||||
@@ -81,6 +83,22 @@ class GitAuthHelper {
 | 
			
		||||
    await this.configureToken()
 | 
			
		||||
  }
 | 
			
		||||
 | 
			
		||||
  private async getCredentialsConfigPath(): Promise<string> {
 | 
			
		||||
    if (this.credentialsConfigPath) {
 | 
			
		||||
      return this.credentialsConfigPath
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    const runnerTemp = process.env['RUNNER_TEMP'] || ''
 | 
			
		||||
    assert.ok(runnerTemp, 'RUNNER_TEMP is not defined')
 | 
			
		||||
 | 
			
		||||
    // Create a unique filename for this checkout instance
 | 
			
		||||
    const configFileName = `git-credentials-${uuid()}.config`
 | 
			
		||||
    this.credentialsConfigPath = path.join(runnerTemp, configFileName)
 | 
			
		||||
 | 
			
		||||
    core.debug(`Credentials config path: ${this.credentialsConfigPath}`)
 | 
			
		||||
    return this.credentialsConfigPath
 | 
			
		||||
  }
 | 
			
		||||
 | 
			
		||||
  async configureTempGlobalConfig(): Promise<string> {
 | 
			
		||||
    // Already setup global config
 | 
			
		||||
    if (this.temporaryHomePath?.length > 0) {
 | 
			
		||||
@@ -126,10 +144,10 @@ class GitAuthHelper {
 | 
			
		||||
 | 
			
		||||
  async configureGlobalAuth(): Promise<void> {
 | 
			
		||||
    // 'configureTempGlobalConfig' noops if already set, just returns the path
 | 
			
		||||
    const newGitConfigPath = await this.configureTempGlobalConfig()
 | 
			
		||||
    await this.configureTempGlobalConfig()
 | 
			
		||||
    try {
 | 
			
		||||
      // Configure the token
 | 
			
		||||
      await this.configureToken(newGitConfigPath, true)
 | 
			
		||||
      await this.configureToken(true)
 | 
			
		||||
 | 
			
		||||
      // Configure HTTPS instead of SSH
 | 
			
		||||
      await this.git.tryConfigUnset(this.insteadOfKey, true)
 | 
			
		||||
@@ -150,24 +168,73 @@ class GitAuthHelper {
 | 
			
		||||
 | 
			
		||||
  async configureSubmoduleAuth(): Promise<void> {
 | 
			
		||||
    // Remove possible previous HTTPS instead of SSH
 | 
			
		||||
    await this.removeGitConfig(this.insteadOfKey, true)
 | 
			
		||||
    await this.removeSubmoduleGitConfig(this.insteadOfKey)
 | 
			
		||||
 | 
			
		||||
    if (this.settings.persistCredentials) {
 | 
			
		||||
      // Configure a placeholder value. This approach avoids the credential being captured
 | 
			
		||||
      // by process creation audit events, which are commonly logged. For more information,
 | 
			
		||||
      // refer to https://docs.microsoft.com/en-us/windows-server/identity/ad-ds/manage/component-updates/command-line-process-auditing
 | 
			
		||||
      // Credentials config path
 | 
			
		||||
      const credentialsConfigPath = await this.getCredentialsConfigPath()
 | 
			
		||||
 | 
			
		||||
      // Container credentials config path
 | 
			
		||||
      const containerCredentialsPath = path.posix.join(
 | 
			
		||||
        '/github/runner_temp',
 | 
			
		||||
        path.basename(credentialsConfigPath)
 | 
			
		||||
      )
 | 
			
		||||
 | 
			
		||||
      // Container repo path
 | 
			
		||||
      const workingDirectory = this.git.getWorkingDirectory()
 | 
			
		||||
      const githubWorkspace = process.env['GITHUB_WORKSPACE']
 | 
			
		||||
      assert.ok(githubWorkspace, 'GITHUB_WORKSPACE is not defined')
 | 
			
		||||
      let relativePath = path.relative(githubWorkspace, workingDirectory)
 | 
			
		||||
      relativePath = relativePath.replace(/\\/g, '/')
 | 
			
		||||
      const containerRepoPath = path.posix.join(
 | 
			
		||||
        '/github/workspace',
 | 
			
		||||
        relativePath
 | 
			
		||||
      )
 | 
			
		||||
 | 
			
		||||
      // Get submodule config file paths.
 | 
			
		||||
      // Use `--show-origin` to get the config file path for each submodule.
 | 
			
		||||
      const output = await this.git.submoduleForeach(
 | 
			
		||||
        // wrap the pipeline in quotes to make sure it's handled properly by submoduleForeach, rather than just the first part of the pipeline
 | 
			
		||||
        `sh -c "git config --local '${this.tokenConfigKey}' '${this.tokenPlaceholderConfigValue}' && git config --local --show-origin --name-only --get-regexp remote.origin.url"`,
 | 
			
		||||
        `git config --local --show-origin --name-only --get-regexp remote.origin.url`,
 | 
			
		||||
        this.settings.nestedSubmodules
 | 
			
		||||
      )
 | 
			
		||||
 | 
			
		||||
      // Replace the placeholder
 | 
			
		||||
      const configPaths: string[] =
 | 
			
		||||
      // Extract config file paths from the output (lines starting with "file:").
 | 
			
		||||
      const configPaths =
 | 
			
		||||
        output.match(/(?<=(^|\n)file:)[^\t]+(?=\tremote\.origin\.url)/g) || []
 | 
			
		||||
 | 
			
		||||
      // For each submodule, configure includeIf entries pointing to the shared credentials file.
 | 
			
		||||
      // Configure both host and container paths to support Docker container actions.
 | 
			
		||||
      for (const configPath of configPaths) {
 | 
			
		||||
        core.debug(`Replacing token placeholder in '${configPath}'`)
 | 
			
		||||
        await this.replaceTokenPlaceholder(configPath)
 | 
			
		||||
        // Submodule Git directory
 | 
			
		||||
        let submoduleGitDir = path.dirname(configPath) // The config file is at .git/modules/submodule-name/config
 | 
			
		||||
        submoduleGitDir = submoduleGitDir.replace(/\\/g, '/') // Use forward slashes, even on Windows
 | 
			
		||||
 | 
			
		||||
        // Configure host includeIf
 | 
			
		||||
        await this.git.config(
 | 
			
		||||
          `includeIf.gitdir:${submoduleGitDir}.path`,
 | 
			
		||||
          credentialsConfigPath,
 | 
			
		||||
          false,
 | 
			
		||||
          false,
 | 
			
		||||
          configPath
 | 
			
		||||
        )
 | 
			
		||||
 | 
			
		||||
        // Configure container includeIf
 | 
			
		||||
        let relativeSubmoduleGitDir = path.relative(
 | 
			
		||||
          githubWorkspace,
 | 
			
		||||
          submoduleGitDir
 | 
			
		||||
        )
 | 
			
		||||
        relativeSubmoduleGitDir = relativeSubmoduleGitDir.replace(/\\/g, '/') // Use forward slashes, even on Windows
 | 
			
		||||
        const containerSubmoduleGitDir = path.posix.join(
 | 
			
		||||
          '/github/workspace',
 | 
			
		||||
          relativeSubmoduleGitDir
 | 
			
		||||
        )
 | 
			
		||||
        await this.git.config(
 | 
			
		||||
          `includeIf.gitdir:${containerSubmoduleGitDir}.path`,
 | 
			
		||||
          containerCredentialsPath,
 | 
			
		||||
          false,
 | 
			
		||||
          false,
 | 
			
		||||
          configPath
 | 
			
		||||
        )
 | 
			
		||||
      }
 | 
			
		||||
 | 
			
		||||
      if (this.settings.sshKey) {
 | 
			
		||||
@@ -272,32 +339,62 @@ class GitAuthHelper {
 | 
			
		||||
    }
 | 
			
		||||
  }
 | 
			
		||||
 | 
			
		||||
  private async configureToken(
 | 
			
		||||
    configPath?: string,
 | 
			
		||||
    globalConfig?: boolean
 | 
			
		||||
  ): Promise<void> {
 | 
			
		||||
    // Validate args
 | 
			
		||||
    assert.ok(
 | 
			
		||||
      (configPath && globalConfig) || (!configPath && !globalConfig),
 | 
			
		||||
      'Unexpected configureToken parameter combinations'
 | 
			
		||||
    )
 | 
			
		||||
  private async configureToken(globalConfig?: boolean): Promise<void> {
 | 
			
		||||
    // Get the credentials config file path in RUNNER_TEMP
 | 
			
		||||
    const credentialsConfigPath = await this.getCredentialsConfigPath()
 | 
			
		||||
 | 
			
		||||
    // Default config path
 | 
			
		||||
    if (!configPath && !globalConfig) {
 | 
			
		||||
      configPath = path.join(this.git.getWorkingDirectory(), '.git', 'config')
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    // Configure a placeholder value. This approach avoids the credential being captured
 | 
			
		||||
    // by process creation audit events, which are commonly logged. For more information,
 | 
			
		||||
    // refer to https://docs.microsoft.com/en-us/windows-server/identity/ad-ds/manage/component-updates/command-line-process-auditing
 | 
			
		||||
    // Write placeholder to the separate credentials config file using git config.
 | 
			
		||||
    // This approach avoids the credential being captured by process creation audit events,
 | 
			
		||||
    // which are commonly logged. For more information, refer to
 | 
			
		||||
    // https://docs.microsoft.com/en-us/windows-server/identity/ad-ds/manage/component-updates/command-line-process-auditing
 | 
			
		||||
    await this.git.config(
 | 
			
		||||
      this.tokenConfigKey,
 | 
			
		||||
      this.tokenPlaceholderConfigValue,
 | 
			
		||||
      globalConfig
 | 
			
		||||
      false,
 | 
			
		||||
      false,
 | 
			
		||||
      credentialsConfigPath
 | 
			
		||||
    )
 | 
			
		||||
 | 
			
		||||
    // Replace the placeholder
 | 
			
		||||
    await this.replaceTokenPlaceholder(configPath || '')
 | 
			
		||||
    // Replace the placeholder in the credentials config file
 | 
			
		||||
    await this.replaceTokenPlaceholder(credentialsConfigPath)
 | 
			
		||||
 | 
			
		||||
    // Add include or includeIf to reference the credentials config
 | 
			
		||||
    if (globalConfig) {
 | 
			
		||||
      // Global config file is temporary
 | 
			
		||||
      await this.git.config('include.path', credentialsConfigPath, true)
 | 
			
		||||
    } else {
 | 
			
		||||
      // Host git directory
 | 
			
		||||
      let gitDir = path.join(this.git.getWorkingDirectory(), '.git')
 | 
			
		||||
      gitDir = gitDir.replace(/\\/g, '/') // Use forward slashes, even on Windows
 | 
			
		||||
 | 
			
		||||
      // Configure host includeIf
 | 
			
		||||
      const hostIncludeKey = `includeIf.gitdir:${gitDir}.path`
 | 
			
		||||
      await this.git.config(hostIncludeKey, credentialsConfigPath)
 | 
			
		||||
      this.credentialsIncludeKeys.push(hostIncludeKey)
 | 
			
		||||
 | 
			
		||||
      // Container git directory
 | 
			
		||||
      const githubWorkspace = process.env['GITHUB_WORKSPACE']
 | 
			
		||||
      assert.ok(githubWorkspace, 'GITHUB_WORKSPACE is not defined')
 | 
			
		||||
      const workingDirectory = this.git.getWorkingDirectory()
 | 
			
		||||
      let relativePath = path.relative(githubWorkspace, workingDirectory)
 | 
			
		||||
      relativePath = relativePath.replace(/\\/g, '/') // Use forward slashes, even on Windows
 | 
			
		||||
      const containerGitDir = path.posix.join(
 | 
			
		||||
        '/github/workspace',
 | 
			
		||||
        relativePath,
 | 
			
		||||
        '.git'
 | 
			
		||||
      )
 | 
			
		||||
 | 
			
		||||
      // Container credentials config path
 | 
			
		||||
      const containerCredentialsPath = path.posix.join(
 | 
			
		||||
        '/github/runner_temp',
 | 
			
		||||
        path.basename(credentialsConfigPath)
 | 
			
		||||
      )
 | 
			
		||||
 | 
			
		||||
      // Configure container includeIf
 | 
			
		||||
      const containerIncludeKey = `includeIf.gitdir:${containerGitDir}.path`
 | 
			
		||||
      await this.git.config(containerIncludeKey, containerCredentialsPath)
 | 
			
		||||
      this.credentialsIncludeKeys.push(containerIncludeKey)
 | 
			
		||||
    }
 | 
			
		||||
  }
 | 
			
		||||
 | 
			
		||||
  private async replaceTokenPlaceholder(configPath: string): Promise<void> {
 | 
			
		||||
@@ -343,30 +440,53 @@ class GitAuthHelper {
 | 
			
		||||
 | 
			
		||||
    // SSH command
 | 
			
		||||
    await this.removeGitConfig(SSH_COMMAND_KEY)
 | 
			
		||||
    await this.removeSubmoduleGitConfig(SSH_COMMAND_KEY)
 | 
			
		||||
  }
 | 
			
		||||
 | 
			
		||||
  private async removeToken(): Promise<void> {
 | 
			
		||||
    // HTTP extra header
 | 
			
		||||
    // Remove HTTP extra header
 | 
			
		||||
    await this.removeGitConfig(this.tokenConfigKey)
 | 
			
		||||
  }
 | 
			
		||||
    await this.removeSubmoduleGitConfig(this.tokenConfigKey)
 | 
			
		||||
 | 
			
		||||
  private async removeGitConfig(
 | 
			
		||||
    configKey: string,
 | 
			
		||||
    submoduleOnly: boolean = false
 | 
			
		||||
  ): Promise<void> {
 | 
			
		||||
    if (!submoduleOnly) {
 | 
			
		||||
      if (
 | 
			
		||||
        (await this.git.configExists(configKey)) &&
 | 
			
		||||
        !(await this.git.tryConfigUnset(configKey))
 | 
			
		||||
      ) {
 | 
			
		||||
        // Load the config contents
 | 
			
		||||
        core.warning(`Failed to remove '${configKey}' from the git config`)
 | 
			
		||||
    // Remove includeIf
 | 
			
		||||
    for (const includeKey of this.credentialsIncludeKeys) {
 | 
			
		||||
      await this.removeGitConfig(includeKey)
 | 
			
		||||
    }
 | 
			
		||||
    this.credentialsIncludeKeys = []
 | 
			
		||||
 | 
			
		||||
    // Remove submodule includeIf
 | 
			
		||||
    await this.git.submoduleForeach(
 | 
			
		||||
      `sh -c "git config --local --get-regexp '^includeIf\\.' && git config --local --remove-section includeIf || :"`,
 | 
			
		||||
      true
 | 
			
		||||
    )
 | 
			
		||||
 | 
			
		||||
    // Remove credentials config file
 | 
			
		||||
    if (this.credentialsConfigPath) {
 | 
			
		||||
      try {
 | 
			
		||||
        await io.rmRF(this.credentialsConfigPath)
 | 
			
		||||
      } catch (err) {
 | 
			
		||||
        core.debug(`${(err as any)?.message ?? err}`)
 | 
			
		||||
        core.warning(
 | 
			
		||||
          `Failed to remove credentials config '${this.credentialsConfigPath}'`
 | 
			
		||||
        )
 | 
			
		||||
      }
 | 
			
		||||
    }
 | 
			
		||||
  }
 | 
			
		||||
 | 
			
		||||
  private async removeGitConfig(configKey: string): Promise<void> {
 | 
			
		||||
    if (
 | 
			
		||||
      (await this.git.configExists(configKey)) &&
 | 
			
		||||
      !(await this.git.tryConfigUnset(configKey))
 | 
			
		||||
    ) {
 | 
			
		||||
      // Load the config contents
 | 
			
		||||
      core.warning(`Failed to remove '${configKey}' from the git config`)
 | 
			
		||||
    }
 | 
			
		||||
  }
 | 
			
		||||
 | 
			
		||||
  private async removeSubmoduleGitConfig(configKey: string): Promise<void> {
 | 
			
		||||
    const pattern = regexpHelper.escape(configKey)
 | 
			
		||||
    await this.git.submoduleForeach(
 | 
			
		||||
      // wrap the pipeline in quotes to make sure it's handled properly by submoduleForeach, rather than just the first part of the pipeline
 | 
			
		||||
      // Wrap the pipeline in quotes to make sure it's handled properly by submoduleForeach, rather than just the first part of the pipeline.
 | 
			
		||||
      `sh -c "git config --local --name-only --get-regexp '${pattern}' && git config --local --unset-all '${configKey}' || :"`,
 | 
			
		||||
      true
 | 
			
		||||
    )
 | 
			
		||||
 
 | 
			
		||||
@@ -28,7 +28,8 @@ export interface IGitCommandManager {
 | 
			
		||||
    configKey: string,
 | 
			
		||||
    configValue: string,
 | 
			
		||||
    globalConfig?: boolean,
 | 
			
		||||
    add?: boolean
 | 
			
		||||
    add?: boolean,
 | 
			
		||||
    configFile?: string
 | 
			
		||||
  ): Promise<void>
 | 
			
		||||
  configExists(configKey: string, globalConfig?: boolean): Promise<boolean>
 | 
			
		||||
  fetch(
 | 
			
		||||
@@ -223,9 +224,15 @@ class GitCommandManager {
 | 
			
		||||
    configKey: string,
 | 
			
		||||
    configValue: string,
 | 
			
		||||
    globalConfig?: boolean,
 | 
			
		||||
    add?: boolean
 | 
			
		||||
    add?: boolean,
 | 
			
		||||
    configFile?: string
 | 
			
		||||
  ): Promise<void> {
 | 
			
		||||
    const args: string[] = ['config', globalConfig ? '--global' : '--local']
 | 
			
		||||
    const args: string[] = ['config']
 | 
			
		||||
    if (configFile) {
 | 
			
		||||
      args.push('--file', configFile)
 | 
			
		||||
    } else {
 | 
			
		||||
      args.push(globalConfig ? '--global' : '--local')
 | 
			
		||||
    }
 | 
			
		||||
    if (add) {
 | 
			
		||||
      args.push('--add')
 | 
			
		||||
    }
 | 
			
		||||
 
 | 
			
		||||
		Reference in New Issue
	
	Block a user