azure-pipelines-task-lib
Advanced tools
Comparing version 2.9.3 to 2.9.5
@@ -0,0 +0,0 @@ import vm = require('./vault'); |
@@ -0,0 +0,0 @@ "use strict"; |
@@ -0,0 +0,0 @@ { |
@@ -0,0 +0,0 @@ import * as task from './task'; |
@@ -0,0 +0,0 @@ "use strict"; |
@@ -0,0 +0,0 @@ import ma = require('./mock-answer'); |
"use strict"; | ||
Object.defineProperty(exports, "__esModule", { value: true }); | ||
var mockery = require("mockery"); | ||
var im = require("./internal"); | ||
var TaskMockRunner = /** @class */ (function () { | ||
@@ -11,10 +12,12 @@ function TaskMockRunner(taskPath) { | ||
TaskMockRunner.prototype.setInput = function (name, val) { | ||
process.env['INPUT_' + name.replace(' ', '_').toUpperCase()] = val; | ||
var key = im._getVariableKey(name); | ||
process.env['INPUT_' + key] = val; | ||
}; | ||
TaskMockRunner.prototype.setVariableName = function (name, val, isSecret) { | ||
var key = im._getVariableKey(name); | ||
if (isSecret) { | ||
process.env['SECRET_' + name.replace(' ', '_').toUpperCase()] = val; | ||
process.env['SECRET_' + key] = val; | ||
} | ||
else { | ||
process.env['VSTS_TASKVARIABLE_' + name.replace(' ', '_').toUpperCase()] = val; | ||
process.env['VSTS_TASKVARIABLE_' + key] = val; | ||
} | ||
@@ -21,0 +24,0 @@ }; |
@@ -0,0 +0,0 @@ import Q = require('q'); |
@@ -0,0 +0,0 @@ "use strict"; |
@@ -0,0 +0,0 @@ export declare class MockTestRunner { |
@@ -0,0 +0,0 @@ "use strict"; |
@@ -0,0 +0,0 @@ import Q = require('q'); |
@@ -203,7 +203,11 @@ "use strict"; | ||
var code = res.code; | ||
ops.outStream.write('rc:' + res.code + os.EOL); | ||
if (!ops.silent) { | ||
ops.outStream.write('rc:' + res.code + os.EOL); | ||
} | ||
if (code != 0 && !ops.ignoreReturnCode) { | ||
success = false; | ||
} | ||
ops.outStream.write('success:' + success + os.EOL); | ||
if (!ops.silent) { | ||
ops.outStream.write('success:' + success + os.EOL); | ||
} | ||
if (success) { | ||
@@ -210,0 +214,0 @@ defer.resolve(code); |
{ | ||
"name": "azure-pipelines-task-lib", | ||
"version": "2.9.3", | ||
"version": "2.9.5", | ||
"description": "Azure Pipelines Task SDK", | ||
@@ -35,9 +35,9 @@ "main": "./task.js", | ||
"shelljs": "^0.3.0", | ||
"uuid": "^3.0.1" | ||
"uuid": "^3.0.1", | ||
"sync-request": "3.0.1" | ||
}, | ||
"devDependencies": { | ||
"mocha": "5.2.0", | ||
"sync-request": "3.0.1", | ||
"typescript": "^3.0.0" | ||
} | ||
} |
@@ -0,0 +0,0 @@ |
@@ -384,6 +384,5 @@ import Q = require('q'); | ||
* Remove a path recursively with force | ||
* Returns whether it succeeds | ||
* | ||
* @param path path to remove | ||
* @returns void | ||
* @param inputPath path to remove | ||
* @throws when the file or directory exists but could not be deleted. | ||
*/ | ||
@@ -390,0 +389,0 @@ export declare function rmRF(inputPath: string): void; |
@@ -0,0 +0,0 @@ export declare class TaskCommand { |
@@ -0,0 +0,0 @@ "use strict"; |
@@ -21,10 +21,14 @@ import Q = require('q'); | ||
env?: { | ||
[key: string]: string; | ||
[key: string]: string | undefined; | ||
}; | ||
/** optional. defaults to false */ | ||
silent?: boolean; | ||
outStream: stream.Writable; | ||
errStream: stream.Writable; | ||
/** optional. foo.whether to skip quoting/escaping arguments if needed. defaults to false. */ | ||
/** Optional. Default is process.stdout. */ | ||
outStream?: stream.Writable; | ||
/** Optional. Default is process.stderr. */ | ||
errStream?: stream.Writable; | ||
/** optional. Whether to skip quoting/escaping arguments if needed. defaults to false. */ | ||
windowsVerbatimArguments?: boolean; | ||
/** optional. Run command inside of the shell. Defaults to false. */ | ||
shell?: boolean; | ||
} | ||
@@ -31,0 +35,0 @@ /** |
@@ -398,3 +398,4 @@ "use strict"; | ||
ignoreReturnCode: options.ignoreReturnCode || false, | ||
windowsVerbatimArguments: options.windowsVerbatimArguments || false | ||
windowsVerbatimArguments: options.windowsVerbatimArguments || false, | ||
shell: options.shell || false | ||
}; | ||
@@ -410,2 +411,3 @@ result.outStream = options.outStream || process.stdout; | ||
result.env = options.env; | ||
result.shell = options.shell; | ||
result['windowsVerbatimArguments'] = options.windowsVerbatimArguments || this._isCmdFile(); | ||
@@ -418,2 +420,3 @@ return result; | ||
result.env = options.env; | ||
result.shell = options.shell; | ||
result['windowsVerbatimArguments'] = options.windowsVerbatimArguments || this._isCmdFile(); | ||
@@ -420,0 +423,0 @@ return result; |
@@ -0,0 +0,0 @@ { |
@@ -0,0 +0,0 @@ export declare class Vault { |
@@ -0,0 +0,0 @@ "use strict"; |
Sorry, the diff of this file is not supported yet
Sorry, the diff of this file is not supported yet
Sorry, the diff of this file is not supported yet
Sorry, the diff of this file is not supported yet
Sorry, the diff of this file is not supported yet
Sorry, the diff of this file is not supported yet
Sorry, the diff of this file is not supported yet
Sorry, the diff of this file is not supported yet
Sorry, the diff of this file is not supported yet
Sorry, the diff of this file is not supported yet
Sorry, the diff of this file is too big to display
Sorry, the diff of this file is too big to display
License Policy Violation
LicenseThis package is not allowed per your license policy. Review the package's license to ensure compliance.
Found 1 instance in 1 package
New author
Supply chain riskA new npm collaborator published a version of the package for the first time. New collaborators are usually benign additions to a project, but do indicate a change to the security surface area of a package.
Found 1 instance in 1 package
Environment variable access
Supply chain riskPackage accesses environment variables, which may be a sign of credential stuffing or data theft.
Found 1 instance in 1 package
License Policy Violation
LicenseThis package is not allowed per your license policy. Review the package's license to ensure compliance.
Found 1 instance in 1 package
Major refactor
Supply chain riskPackage has recently undergone a major refactor. It may be unstable or indicate significant internal changes. Use caution when updating to versions that include significant changes.
Found 1 instance in 1 package
Environment variable access
Supply chain riskPackage accesses environment variables, which may be a sign of credential stuffing or data theft.
Found 1 instance in 1 package
431169
2
37
6076
7
+ Addedsync-request@3.0.1
+ Addedasap@2.0.6(transitive)
+ Addedbuffer-from@1.1.2(transitive)
+ Addedcall-bind@1.0.7(transitive)
+ Addedcaseless@0.11.0(transitive)
+ Addedconcat-stream@1.6.2(transitive)
+ Addedcore-util-is@1.0.3(transitive)
+ Addeddefine-data-property@1.1.4(transitive)
+ Addedes-define-property@1.0.0(transitive)
+ Addedes-errors@1.3.0(transitive)
+ Addedfunction-bind@1.1.2(transitive)
+ Addedget-intrinsic@1.2.4(transitive)
+ Addedgopd@1.0.1(transitive)
+ Addedhas-property-descriptors@1.0.2(transitive)
+ Addedhas-proto@1.0.3(transitive)
+ Addedhas-symbols@1.0.3(transitive)
+ Addedhasown@2.0.2(transitive)
+ Addedhttp-basic@2.5.1(transitive)
+ Addedhttp-response-object@1.1.0(transitive)
+ Addedinherits@2.0.4(transitive)
+ Addedisarray@1.0.0(transitive)
+ Addedobject-inspect@1.13.2(transitive)
+ Addedprocess-nextick-args@2.0.1(transitive)
+ Addedpromise@7.3.1(transitive)
+ Addedqs@6.13.0(transitive)
+ Addedreadable-stream@2.3.8(transitive)
+ Addedsafe-buffer@5.1.2(transitive)
+ Addedset-function-length@1.2.2(transitive)
+ Addedside-channel@1.0.6(transitive)
+ Addedstring_decoder@1.1.1(transitive)
+ Addedsync-request@3.0.1(transitive)
+ Addedthen-request@2.2.0(transitive)
+ Addedtypedarray@0.0.6(transitive)
+ Addedutil-deprecate@1.0.2(transitive)