Dataset Viewer
Auto-converted to Parquet Duplicate
repo
stringlengths
6
47
file_url
stringlengths
77
269
file_path
stringlengths
5
186
content
stringlengths
0
32.8k
language
stringclasses
1 value
license
stringclasses
7 values
commit_sha
stringlengths
40
40
retrieved_at
stringdate
2026-01-07 08:35:43
2026-01-07 08:55:24
truncated
bool
2 classes
FiloSottile/mkcert
https://github.com/FiloSottile/mkcert/blob/1c1dc4ed27ed5936046b6398d39cab4d657a2d8e/truststore_java.go
truststore_java.go
// Copyright 2018 The mkcert Authors. All rights reserved. // Use of this source code is governed by a BSD-style // license that can be found in the LICENSE file. package main import ( "bytes" "crypto/sha1" "crypto/sha256" "crypto/x509" "encoding/hex" "hash" "os" "os/exec" "path/filepath" "runtime" "strings" ) var ( hasJava bool hasKeytool bool javaHome string cacertsPath string keytoolPath string storePass string = "changeit" ) func init() { if runtime.GOOS == "windows" { keytoolPath = filepath.Join("bin", "keytool.exe") } else { keytoolPath = filepath.Join("bin", "keytool") } if v := os.Getenv("JAVA_HOME"); v != "" { hasJava = true javaHome = v if pathExists(filepath.Join(v, keytoolPath)) { hasKeytool = true keytoolPath = filepath.Join(v, keytoolPath) } if pathExists(filepath.Join(v, "lib", "security", "cacerts")) { cacertsPath = filepath.Join(v, "lib", "security", "cacerts") } if pathExists(filepath.Join(v, "jre", "lib", "security", "cacerts")) { cacertsPath = filepath.Join(v, "jre", "lib", "security", "cacerts") } } } func (m *mkcert) checkJava() bool { if !hasKeytool { return false } // exists returns true if the given x509.Certificate's fingerprint // is in the keytool -list output exists := func(c *x509.Certificate, h hash.Hash, keytoolOutput []byte) bool { h.Write(c.Raw) fp := strings.ToUpper(hex.EncodeToString(h.Sum(nil))) return bytes.Contains(keytoolOutput, []byte(fp)) } keytoolOutput, err := exec.Command(keytoolPath, "-list", "-keystore", cacertsPath, "-storepass", storePass).CombinedOutput() fatalIfCmdErr(err, "keytool -list", keytoolOutput) // keytool outputs SHA1 and SHA256 (Java 9+) certificates in uppercase hex // with each octet pair delimitated by ":". Drop them from the keytool output keytoolOutput = bytes.Replace(keytoolOutput, []byte(":"), nil, -1) // pre-Java 9 uses SHA1 fingerprints s1, s256 := sha1.New(), sha256.New() return exists(m.caCert, s1, keytoolOutput) || exists(m.caCert, s256, keytoolOutput) } func (m *mkcert) installJava() { args := []string{ "-importcert", "-noprompt", "-keystore", cacertsPath, "-storepass", storePass, "-file", filepath.Join(m.CAROOT, rootName), "-alias", m.caUniqueName(), } out, err := execKeytool(exec.Command(keytoolPath, args...)) fatalIfCmdErr(err, "keytool -importcert", out) } func (m *mkcert) uninstallJava() { args := []string{ "-delete", "-alias", m.caUniqueName(), "-keystore", cacertsPath, "-storepass", storePass, } out, err := execKeytool(exec.Command(keytoolPath, args...)) if bytes.Contains(out, []byte("does not exist")) { return // cert didn't exist } fatalIfCmdErr(err, "keytool -delete", out) } // execKeytool will execute a "keytool" command and if needed re-execute // the command with commandWithSudo to work around file permissions. func execKeytool(cmd *exec.Cmd) ([]byte, error) { out, err := cmd.CombinedOutput() if err != nil && bytes.Contains(out, []byte("java.io.FileNotFoundException")) && runtime.GOOS != "windows" { origArgs := cmd.Args[1:] cmd = commandWithSudo(cmd.Path) cmd.Args = append(cmd.Args, origArgs...) cmd.Env = []string{ "JAVA_HOME=" + javaHome, } out, err = cmd.CombinedOutput() } return out, err }
go
BSD-3-Clause
1c1dc4ed27ed5936046b6398d39cab4d657a2d8e
2026-01-07T08:35:43.510017Z
false
FiloSottile/mkcert
https://github.com/FiloSottile/mkcert/blob/1c1dc4ed27ed5936046b6398d39cab4d657a2d8e/truststore_linux.go
truststore_linux.go
// Copyright 2018 The mkcert Authors. All rights reserved. // Use of this source code is governed by a BSD-style // license that can be found in the LICENSE file. package main import ( "bytes" "fmt" "io/ioutil" "log" "os" "path/filepath" "strings" ) var ( FirefoxProfiles = []string{os.Getenv("HOME") + "/.mozilla/firefox/*", os.Getenv("HOME") + "/snap/firefox/common/.mozilla/firefox/*"} NSSBrowsers = "Firefox and/or Chrome/Chromium" SystemTrustFilename string SystemTrustCommand []string CertutilInstallHelp string ) func init() { switch { case binaryExists("apt"): CertutilInstallHelp = "apt install libnss3-tools" case binaryExists("yum"): CertutilInstallHelp = "yum install nss-tools" case binaryExists("zypper"): CertutilInstallHelp = "zypper install mozilla-nss-tools" } if pathExists("/etc/pki/ca-trust/source/anchors/") { SystemTrustFilename = "/etc/pki/ca-trust/source/anchors/%s.pem" SystemTrustCommand = []string{"update-ca-trust", "extract"} } else if pathExists("/usr/local/share/ca-certificates/") { SystemTrustFilename = "/usr/local/share/ca-certificates/%s.crt" SystemTrustCommand = []string{"update-ca-certificates"} } else if pathExists("/etc/ca-certificates/trust-source/anchors/") { SystemTrustFilename = "/etc/ca-certificates/trust-source/anchors/%s.crt" SystemTrustCommand = []string{"trust", "extract-compat"} } else if pathExists("/usr/share/pki/trust/anchors") { SystemTrustFilename = "/usr/share/pki/trust/anchors/%s.pem" SystemTrustCommand = []string{"update-ca-certificates"} } } func (m *mkcert) systemTrustFilename() string { return fmt.Sprintf(SystemTrustFilename, strings.Replace(m.caUniqueName(), " ", "_", -1)) } func (m *mkcert) installPlatform() bool { if SystemTrustCommand == nil { log.Printf("Installing to the system store is not yet supported on this Linux 😣 but %s will still work.", NSSBrowsers) log.Printf("You can also manually install the root certificate at %q.", filepath.Join(m.CAROOT, rootName)) return false } cert, err := ioutil.ReadFile(filepath.Join(m.CAROOT, rootName)) fatalIfErr(err, "failed to read root certificate") cmd := commandWithSudo("tee", m.systemTrustFilename()) cmd.Stdin = bytes.NewReader(cert) out, err := cmd.CombinedOutput() fatalIfCmdErr(err, "tee", out) cmd = commandWithSudo(SystemTrustCommand...) out, err = cmd.CombinedOutput() fatalIfCmdErr(err, strings.Join(SystemTrustCommand, " "), out) return true } func (m *mkcert) uninstallPlatform() bool { if SystemTrustCommand == nil { return false } cmd := commandWithSudo("rm", "-f", m.systemTrustFilename()) out, err := cmd.CombinedOutput() fatalIfCmdErr(err, "rm", out) // We used to install under non-unique filenames. legacyFilename := fmt.Sprintf(SystemTrustFilename, "mkcert-rootCA") if pathExists(legacyFilename) { cmd := commandWithSudo("rm", "-f", legacyFilename) out, err := cmd.CombinedOutput() fatalIfCmdErr(err, "rm (legacy filename)", out) } cmd = commandWithSudo(SystemTrustCommand...) out, err = cmd.CombinedOutput() fatalIfCmdErr(err, strings.Join(SystemTrustCommand, " "), out) return true }
go
BSD-3-Clause
1c1dc4ed27ed5936046b6398d39cab4d657a2d8e
2026-01-07T08:35:43.510017Z
false
FiloSottile/mkcert
https://github.com/FiloSottile/mkcert/blob/1c1dc4ed27ed5936046b6398d39cab4d657a2d8e/truststore_nss.go
truststore_nss.go
// Copyright 2018 The mkcert Authors. All rights reserved. // Use of this source code is governed by a BSD-style // license that can be found in the LICENSE file. package main import ( "bytes" "log" "os" "os/exec" "path/filepath" "runtime" "strings" ) var ( hasNSS bool hasCertutil bool certutilPath string nssDBs = []string{ filepath.Join(os.Getenv("HOME"), ".pki/nssdb"), filepath.Join(os.Getenv("HOME"), "snap/chromium/current/.pki/nssdb"), // Snapcraft "/etc/pki/nssdb", // CentOS 7 } firefoxPaths = []string{ "/usr/bin/firefox", "/usr/bin/firefox-nightly", "/usr/bin/firefox-developer-edition", "/snap/firefox", "/Applications/Firefox.app", "/Applications/FirefoxDeveloperEdition.app", "/Applications/Firefox Developer Edition.app", "/Applications/Firefox Nightly.app", "C:\\Program Files\\Mozilla Firefox", } ) func init() { allPaths := append(append([]string{}, nssDBs...), firefoxPaths...) for _, path := range allPaths { if pathExists(path) { hasNSS = true break } } switch runtime.GOOS { case "darwin": switch { case binaryExists("certutil"): certutilPath, _ = exec.LookPath("certutil") hasCertutil = true case binaryExists("/usr/local/opt/nss/bin/certutil"): // Check the default Homebrew path, to save executing Ruby. #135 certutilPath = "/usr/local/opt/nss/bin/certutil" hasCertutil = true default: out, err := exec.Command("brew", "--prefix", "nss").Output() if err == nil { certutilPath = filepath.Join(strings.TrimSpace(string(out)), "bin", "certutil") hasCertutil = pathExists(certutilPath) } } case "linux": if hasCertutil = binaryExists("certutil"); hasCertutil { certutilPath, _ = exec.LookPath("certutil") } } } func (m *mkcert) checkNSS() bool { if !hasCertutil { return false } success := true if m.forEachNSSProfile(func(profile string) { err := exec.Command(certutilPath, "-V", "-d", profile, "-u", "L", "-n", m.caUniqueName()).Run() if err != nil { success = false } }) == 0 { success = false } return success } func (m *mkcert) installNSS() bool { if m.forEachNSSProfile(func(profile string) { cmd := exec.Command(certutilPath, "-A", "-d", profile, "-t", "C,,", "-n", m.caUniqueName(), "-i", filepath.Join(m.CAROOT, rootName)) out, err := execCertutil(cmd) fatalIfCmdErr(err, "certutil -A -d "+profile, out) }) == 0 { log.Printf("ERROR: no %s security databases found", NSSBrowsers) return false } if !m.checkNSS() { log.Printf("Installing in %s failed. Please report the issue with details about your environment at https://github.com/FiloSottile/mkcert/issues/new 👎", NSSBrowsers) log.Printf("Note that if you never started %s, you need to do that at least once.", NSSBrowsers) return false } return true } func (m *mkcert) uninstallNSS() { m.forEachNSSProfile(func(profile string) { err := exec.Command(certutilPath, "-V", "-d", profile, "-u", "L", "-n", m.caUniqueName()).Run() if err != nil { return } cmd := exec.Command(certutilPath, "-D", "-d", profile, "-n", m.caUniqueName()) out, err := execCertutil(cmd) fatalIfCmdErr(err, "certutil -D -d "+profile, out) }) } // execCertutil will execute a "certutil" command and if needed re-execute // the command with commandWithSudo to work around file permissions. func execCertutil(cmd *exec.Cmd) ([]byte, error) { out, err := cmd.CombinedOutput() if err != nil && bytes.Contains(out, []byte("SEC_ERROR_READ_ONLY")) && runtime.GOOS != "windows" { origArgs := cmd.Args[1:] cmd = commandWithSudo(cmd.Path) cmd.Args = append(cmd.Args, origArgs...) out, err = cmd.CombinedOutput() } return out, err } func (m *mkcert) forEachNSSProfile(f func(profile string)) (found int) { var profiles []string profiles = append(profiles, nssDBs...) for _, ff := range FirefoxProfiles { pp, _ := filepath.Glob(ff) profiles = append(profiles, pp...) } for _, profile := range profiles { if stat, err := os.Stat(profile); err != nil || !stat.IsDir() { continue } if pathExists(filepath.Join(profile, "cert9.db")) { f("sql:" + profile) found++ } else if pathExists(filepath.Join(profile, "cert8.db")) { f("dbm:" + profile) found++ } } return }
go
BSD-3-Clause
1c1dc4ed27ed5936046b6398d39cab4d657a2d8e
2026-01-07T08:35:43.510017Z
false
FiloSottile/mkcert
https://github.com/FiloSottile/mkcert/blob/1c1dc4ed27ed5936046b6398d39cab4d657a2d8e/truststore_windows.go
truststore_windows.go
// Copyright 2018 The mkcert Authors. All rights reserved. // Use of this source code is governed by a BSD-style // license that can be found in the LICENSE file. package main import ( "crypto/x509" "encoding/pem" "fmt" "io/ioutil" "math/big" "os" "path/filepath" "syscall" "unsafe" ) var ( FirefoxProfiles = []string{os.Getenv("USERPROFILE") + "\\AppData\\Roaming\\Mozilla\\Firefox\\Profiles"} CertutilInstallHelp = "" // certutil unsupported on Windows NSSBrowsers = "Firefox" ) var ( modcrypt32 = syscall.NewLazyDLL("crypt32.dll") procCertAddEncodedCertificateToStore = modcrypt32.NewProc("CertAddEncodedCertificateToStore") procCertCloseStore = modcrypt32.NewProc("CertCloseStore") procCertDeleteCertificateFromStore = modcrypt32.NewProc("CertDeleteCertificateFromStore") procCertDuplicateCertificateContext = modcrypt32.NewProc("CertDuplicateCertificateContext") procCertEnumCertificatesInStore = modcrypt32.NewProc("CertEnumCertificatesInStore") procCertOpenSystemStoreW = modcrypt32.NewProc("CertOpenSystemStoreW") ) func (m *mkcert) installPlatform() bool { // Load cert cert, err := ioutil.ReadFile(filepath.Join(m.CAROOT, rootName)) fatalIfErr(err, "failed to read root certificate") // Decode PEM if certBlock, _ := pem.Decode(cert); certBlock == nil || certBlock.Type != "CERTIFICATE" { fatalIfErr(fmt.Errorf("invalid PEM data"), "decode pem") } else { cert = certBlock.Bytes } // Open root store store, err := openWindowsRootStore() fatalIfErr(err, "open root store") defer store.close() // Add cert fatalIfErr(store.addCert(cert), "add cert") return true } func (m *mkcert) uninstallPlatform() bool { // We'll just remove all certs with the same serial number // Open root store store, err := openWindowsRootStore() fatalIfErr(err, "open root store") defer store.close() // Do the deletion deletedAny, err := store.deleteCertsWithSerial(m.caCert.SerialNumber) if err == nil && !deletedAny { err = fmt.Errorf("no certs found") } fatalIfErr(err, "delete cert") return true } type windowsRootStore uintptr func openWindowsRootStore() (windowsRootStore, error) { rootStr, err := syscall.UTF16PtrFromString("ROOT") if err != nil { return 0, err } store, _, err := procCertOpenSystemStoreW.Call(0, uintptr(unsafe.Pointer(rootStr))) if store != 0 { return windowsRootStore(store), nil } return 0, fmt.Errorf("failed to open windows root store: %v", err) } func (w windowsRootStore) close() error { ret, _, err := procCertCloseStore.Call(uintptr(w), 0) if ret != 0 { return nil } return fmt.Errorf("failed to close windows root store: %v", err) } func (w windowsRootStore) addCert(cert []byte) error { // TODO: ok to always overwrite? ret, _, err := procCertAddEncodedCertificateToStore.Call( uintptr(w), // HCERTSTORE hCertStore uintptr(syscall.X509_ASN_ENCODING|syscall.PKCS_7_ASN_ENCODING), // DWORD dwCertEncodingType uintptr(unsafe.Pointer(&cert[0])), // const BYTE *pbCertEncoded uintptr(len(cert)), // DWORD cbCertEncoded 3, // DWORD dwAddDisposition (CERT_STORE_ADD_REPLACE_EXISTING is 3) 0, // PCCERT_CONTEXT *ppCertContext ) if ret != 0 { return nil } return fmt.Errorf("failed adding cert: %v", err) } func (w windowsRootStore) deleteCertsWithSerial(serial *big.Int) (bool, error) { // Go over each, deleting the ones we find var cert *syscall.CertContext deletedAny := false for { // Next enum certPtr, _, err := procCertEnumCertificatesInStore.Call(uintptr(w), uintptr(unsafe.Pointer(cert))) if cert = (*syscall.CertContext)(unsafe.Pointer(certPtr)); cert == nil { if errno, ok := err.(syscall.Errno); ok && errno == 0x80092004 { break } return deletedAny, fmt.Errorf("failed enumerating certs: %v", err) } // Parse cert certBytes := (*[1 << 20]byte)(unsafe.Pointer(cert.EncodedCert))[:cert.Length] parsedCert, err := x509.ParseCertificate(certBytes) // We'll just ignore parse failures for now if err == nil && parsedCert.SerialNumber != nil && parsedCert.SerialNumber.Cmp(serial) == 0 { // Duplicate the context so it doesn't stop the enum when we delete it dupCertPtr, _, err := procCertDuplicateCertificateContext.Call(uintptr(unsafe.Pointer(cert))) if dupCertPtr == 0 { return deletedAny, fmt.Errorf("failed duplicating context: %v", err) } if ret, _, err := procCertDeleteCertificateFromStore.Call(dupCertPtr); ret == 0 { return deletedAny, fmt.Errorf("failed deleting certificate: %v", err) } deletedAny = true } } return deletedAny, nil }
go
BSD-3-Clause
1c1dc4ed27ed5936046b6398d39cab4d657a2d8e
2026-01-07T08:35:43.510017Z
false
FiloSottile/mkcert
https://github.com/FiloSottile/mkcert/blob/1c1dc4ed27ed5936046b6398d39cab4d657a2d8e/truststore_darwin.go
truststore_darwin.go
// Copyright 2018 The mkcert Authors. All rights reserved. // Use of this source code is governed by a BSD-style // license that can be found in the LICENSE file. package main import ( "bytes" "encoding/asn1" "io/ioutil" "log" "os" "path/filepath" "howett.net/plist" ) var ( FirefoxProfiles = []string{os.Getenv("HOME") + "/Library/Application Support/Firefox/Profiles/*"} CertutilInstallHelp = "brew install nss" NSSBrowsers = "Firefox" ) // https://github.com/golang/go/issues/24652#issuecomment-399826583 var trustSettings []interface{} var _, _ = plist.Unmarshal(trustSettingsData, &trustSettings) var trustSettingsData = []byte(` <array> <dict> <key>kSecTrustSettingsPolicy</key> <data> KoZIhvdjZAED </data> <key>kSecTrustSettingsPolicyName</key> <string>sslServer</string> <key>kSecTrustSettingsResult</key> <integer>1</integer> </dict> <dict> <key>kSecTrustSettingsPolicy</key> <data> KoZIhvdjZAEC </data> <key>kSecTrustSettingsPolicyName</key> <string>basicX509</string> <key>kSecTrustSettingsResult</key> <integer>1</integer> </dict> </array> `) func (m *mkcert) installPlatform() bool { cmd := commandWithSudo("security", "add-trusted-cert", "-d", "-k", "/Library/Keychains/System.keychain", filepath.Join(m.CAROOT, rootName)) out, err := cmd.CombinedOutput() fatalIfCmdErr(err, "security add-trusted-cert", out) // Make trustSettings explicit, as older Go does not know the defaults. // https://github.com/golang/go/issues/24652 plistFile, err := ioutil.TempFile("", "trust-settings") fatalIfErr(err, "failed to create temp file") defer os.Remove(plistFile.Name()) cmd = commandWithSudo("security", "trust-settings-export", "-d", plistFile.Name()) out, err = cmd.CombinedOutput() fatalIfCmdErr(err, "security trust-settings-export", out) plistData, err := ioutil.ReadFile(plistFile.Name()) fatalIfErr(err, "failed to read trust settings") var plistRoot map[string]interface{} _, err = plist.Unmarshal(plistData, &plistRoot) fatalIfErr(err, "failed to parse trust settings") rootSubjectASN1, _ := asn1.Marshal(m.caCert.Subject.ToRDNSequence()) if plistRoot["trustVersion"].(uint64) != 1 { log.Fatalln("ERROR: unsupported trust settings version:", plistRoot["trustVersion"]) } trustList := plistRoot["trustList"].(map[string]interface{}) for key := range trustList { entry := trustList[key].(map[string]interface{}) if _, ok := entry["issuerName"]; !ok { continue } issuerName := entry["issuerName"].([]byte) if !bytes.Equal(rootSubjectASN1, issuerName) { continue } entry["trustSettings"] = trustSettings break } plistData, err = plist.MarshalIndent(plistRoot, plist.XMLFormat, "\t") fatalIfErr(err, "failed to serialize trust settings") err = ioutil.WriteFile(plistFile.Name(), plistData, 0600) fatalIfErr(err, "failed to write trust settings") cmd = commandWithSudo("security", "trust-settings-import", "-d", plistFile.Name()) out, err = cmd.CombinedOutput() fatalIfCmdErr(err, "security trust-settings-import", out) return true } func (m *mkcert) uninstallPlatform() bool { cmd := commandWithSudo("security", "remove-trusted-cert", "-d", filepath.Join(m.CAROOT, rootName)) out, err := cmd.CombinedOutput() fatalIfCmdErr(err, "security remove-trusted-cert", out) return true }
go
BSD-3-Clause
1c1dc4ed27ed5936046b6398d39cab4d657a2d8e
2026-01-07T08:35:43.510017Z
false
FiloSottile/mkcert
https://github.com/FiloSottile/mkcert/blob/1c1dc4ed27ed5936046b6398d39cab4d657a2d8e/cert.go
cert.go
// Copyright 2018 The mkcert Authors. All rights reserved. // Use of this source code is governed by a BSD-style // license that can be found in the LICENSE file. package main import ( "crypto" "crypto/ecdsa" "crypto/elliptic" "crypto/rand" "crypto/rsa" "crypto/sha1" "crypto/x509" "crypto/x509/pkix" "encoding/asn1" "encoding/pem" "io/ioutil" "log" "math/big" "net" "net/mail" "net/url" "os" "os/user" "path/filepath" "regexp" "strconv" "strings" "time" pkcs12 "software.sslmate.com/src/go-pkcs12" ) var userAndHostname string func init() { u, err := user.Current() if err == nil { userAndHostname = u.Username + "@" } if h, err := os.Hostname(); err == nil { userAndHostname += h } if err == nil && u.Name != "" && u.Name != u.Username { userAndHostname += " (" + u.Name + ")" } } func (m *mkcert) makeCert(hosts []string) { if m.caKey == nil { log.Fatalln("ERROR: can't create new certificates because the CA key (rootCA-key.pem) is missing") } priv, err := m.generateKey(false) fatalIfErr(err, "failed to generate certificate key") pub := priv.(crypto.Signer).Public() // Certificates last for 2 years and 3 months, which is always less than // 825 days, the limit that macOS/iOS apply to all certificates, // including custom roots. See https://support.apple.com/en-us/HT210176. expiration := time.Now().AddDate(2, 3, 0) tpl := &x509.Certificate{ SerialNumber: randomSerialNumber(), Subject: pkix.Name{ Organization: []string{"mkcert development certificate"}, OrganizationalUnit: []string{userAndHostname}, }, NotBefore: time.Now(), NotAfter: expiration, KeyUsage: x509.KeyUsageKeyEncipherment | x509.KeyUsageDigitalSignature, } for _, h := range hosts { if ip := net.ParseIP(h); ip != nil { tpl.IPAddresses = append(tpl.IPAddresses, ip) } else if email, err := mail.ParseAddress(h); err == nil && email.Address == h { tpl.EmailAddresses = append(tpl.EmailAddresses, h) } else if uriName, err := url.Parse(h); err == nil && uriName.Scheme != "" && uriName.Host != "" { tpl.URIs = append(tpl.URIs, uriName) } else { tpl.DNSNames = append(tpl.DNSNames, h) } } if m.client { tpl.ExtKeyUsage = append(tpl.ExtKeyUsage, x509.ExtKeyUsageClientAuth) } if len(tpl.IPAddresses) > 0 || len(tpl.DNSNames) > 0 || len(tpl.URIs) > 0 { tpl.ExtKeyUsage = append(tpl.ExtKeyUsage, x509.ExtKeyUsageServerAuth) } if len(tpl.EmailAddresses) > 0 { tpl.ExtKeyUsage = append(tpl.ExtKeyUsage, x509.ExtKeyUsageEmailProtection) } // IIS (the main target of PKCS #12 files), only shows the deprecated // Common Name in the UI. See issue #115. if m.pkcs12 { tpl.Subject.CommonName = hosts[0] } cert, err := x509.CreateCertificate(rand.Reader, tpl, m.caCert, pub, m.caKey) fatalIfErr(err, "failed to generate certificate") certFile, keyFile, p12File := m.fileNames(hosts) if !m.pkcs12 { certPEM := pem.EncodeToMemory(&pem.Block{Type: "CERTIFICATE", Bytes: cert}) privDER, err := x509.MarshalPKCS8PrivateKey(priv) fatalIfErr(err, "failed to encode certificate key") privPEM := pem.EncodeToMemory(&pem.Block{Type: "PRIVATE KEY", Bytes: privDER}) if certFile == keyFile { err = ioutil.WriteFile(keyFile, append(certPEM, privPEM...), 0600) fatalIfErr(err, "failed to save certificate and key") } else { err = ioutil.WriteFile(certFile, certPEM, 0644) fatalIfErr(err, "failed to save certificate") err = ioutil.WriteFile(keyFile, privPEM, 0600) fatalIfErr(err, "failed to save certificate key") } } else { domainCert, _ := x509.ParseCertificate(cert) pfxData, err := pkcs12.Encode(rand.Reader, priv, domainCert, []*x509.Certificate{m.caCert}, "changeit") fatalIfErr(err, "failed to generate PKCS#12") err = ioutil.WriteFile(p12File, pfxData, 0644) fatalIfErr(err, "failed to save PKCS#12") } m.printHosts(hosts) if !m.pkcs12 { if certFile == keyFile { log.Printf("\nThe certificate and key are at \"%s\" ✅\n\n", certFile) } else { log.Printf("\nThe certificate is at \"%s\" and the key at \"%s\" ✅\n\n", certFile, keyFile) } } else { log.Printf("\nThe PKCS#12 bundle is at \"%s\" ✅\n", p12File) log.Printf("\nThe legacy PKCS#12 encryption password is the often hardcoded default \"changeit\" ℹ️\n\n") } log.Printf("It will expire on %s 🗓\n\n", expiration.Format("2 January 2006")) } func (m *mkcert) printHosts(hosts []string) { secondLvlWildcardRegexp := regexp.MustCompile(`(?i)^\*\.[0-9a-z_-]+$`) log.Printf("\nCreated a new certificate valid for the following names 📜") for _, h := range hosts { log.Printf(" - %q", h) if secondLvlWildcardRegexp.MatchString(h) { log.Printf(" Warning: many browsers don't support second-level wildcards like %q ⚠️", h) } } for _, h := range hosts { if strings.HasPrefix(h, "*.") { log.Printf("\nReminder: X.509 wildcards only go one level deep, so this won't match a.b.%s ℹ️", h[2:]) break } } } func (m *mkcert) generateKey(rootCA bool) (crypto.PrivateKey, error) { if m.ecdsa { return ecdsa.GenerateKey(elliptic.P256(), rand.Reader) } if rootCA { return rsa.GenerateKey(rand.Reader, 3072) } return rsa.GenerateKey(rand.Reader, 2048) } func (m *mkcert) fileNames(hosts []string) (certFile, keyFile, p12File string) { defaultName := strings.Replace(hosts[0], ":", "_", -1) defaultName = strings.Replace(defaultName, "*", "_wildcard", -1) if len(hosts) > 1 { defaultName += "+" + strconv.Itoa(len(hosts)-1) } if m.client { defaultName += "-client" } certFile = "./" + defaultName + ".pem" if m.certFile != "" { certFile = m.certFile } keyFile = "./" + defaultName + "-key.pem" if m.keyFile != "" { keyFile = m.keyFile } p12File = "./" + defaultName + ".p12" if m.p12File != "" { p12File = m.p12File } return } func randomSerialNumber() *big.Int { serialNumberLimit := new(big.Int).Lsh(big.NewInt(1), 128) serialNumber, err := rand.Int(rand.Reader, serialNumberLimit) fatalIfErr(err, "failed to generate serial number") return serialNumber } func (m *mkcert) makeCertFromCSR() { if m.caKey == nil { log.Fatalln("ERROR: can't create new certificates because the CA key (rootCA-key.pem) is missing") } csrPEMBytes, err := ioutil.ReadFile(m.csrPath) fatalIfErr(err, "failed to read the CSR") csrPEM, _ := pem.Decode(csrPEMBytes) if csrPEM == nil { log.Fatalln("ERROR: failed to read the CSR: unexpected content") } if csrPEM.Type != "CERTIFICATE REQUEST" && csrPEM.Type != "NEW CERTIFICATE REQUEST" { log.Fatalln("ERROR: failed to read the CSR: expected CERTIFICATE REQUEST, got " + csrPEM.Type) } csr, err := x509.ParseCertificateRequest(csrPEM.Bytes) fatalIfErr(err, "failed to parse the CSR") fatalIfErr(csr.CheckSignature(), "invalid CSR signature") expiration := time.Now().AddDate(2, 3, 0) tpl := &x509.Certificate{ SerialNumber: randomSerialNumber(), Subject: csr.Subject, ExtraExtensions: csr.Extensions, // includes requested SANs, KUs and EKUs NotBefore: time.Now(), NotAfter: expiration, // If the CSR does not request a SAN extension, fix it up for them as // the Common Name field does not work in modern browsers. Otherwise, // this will get overridden. DNSNames: []string{csr.Subject.CommonName}, // Likewise, if the CSR does not set KUs and EKUs, fix it up as Apple // platforms require serverAuth for TLS. KeyUsage: x509.KeyUsageKeyEncipherment | x509.KeyUsageDigitalSignature, ExtKeyUsage: []x509.ExtKeyUsage{x509.ExtKeyUsageServerAuth}, } if m.client { tpl.ExtKeyUsage = append(tpl.ExtKeyUsage, x509.ExtKeyUsageClientAuth) } if len(csr.EmailAddresses) > 0 { tpl.ExtKeyUsage = append(tpl.ExtKeyUsage, x509.ExtKeyUsageEmailProtection) } cert, err := x509.CreateCertificate(rand.Reader, tpl, m.caCert, csr.PublicKey, m.caKey) fatalIfErr(err, "failed to generate certificate") c, err := x509.ParseCertificate(cert) fatalIfErr(err, "failed to parse generated certificate") var hosts []string hosts = append(hosts, c.DNSNames...) hosts = append(hosts, c.EmailAddresses...) for _, ip := range c.IPAddresses { hosts = append(hosts, ip.String()) } for _, uri := range c.URIs { hosts = append(hosts, uri.String()) } certFile, _, _ := m.fileNames(hosts) err = ioutil.WriteFile(certFile, pem.EncodeToMemory( &pem.Block{Type: "CERTIFICATE", Bytes: cert}), 0644) fatalIfErr(err, "failed to save certificate") m.printHosts(hosts) log.Printf("\nThe certificate is at \"%s\" ✅\n\n", certFile) log.Printf("It will expire on %s 🗓\n\n", expiration.Format("2 January 2006")) } // loadCA will load or create the CA at CAROOT. func (m *mkcert) loadCA() { if !pathExists(filepath.Join(m.CAROOT, rootName)) { m.newCA() } certPEMBlock, err := ioutil.ReadFile(filepath.Join(m.CAROOT, rootName)) fatalIfErr(err, "failed to read the CA certificate") certDERBlock, _ := pem.Decode(certPEMBlock) if certDERBlock == nil || certDERBlock.Type != "CERTIFICATE" { log.Fatalln("ERROR: failed to read the CA certificate: unexpected content") } m.caCert, err = x509.ParseCertificate(certDERBlock.Bytes) fatalIfErr(err, "failed to parse the CA certificate") if !pathExists(filepath.Join(m.CAROOT, rootKeyName)) { return // keyless mode, where only -install works } keyPEMBlock, err := ioutil.ReadFile(filepath.Join(m.CAROOT, rootKeyName)) fatalIfErr(err, "failed to read the CA key") keyDERBlock, _ := pem.Decode(keyPEMBlock) if keyDERBlock == nil || keyDERBlock.Type != "PRIVATE KEY" { log.Fatalln("ERROR: failed to read the CA key: unexpected content") } m.caKey, err = x509.ParsePKCS8PrivateKey(keyDERBlock.Bytes) fatalIfErr(err, "failed to parse the CA key") } func (m *mkcert) newCA() { priv, err := m.generateKey(true) fatalIfErr(err, "failed to generate the CA key") pub := priv.(crypto.Signer).Public() spkiASN1, err := x509.MarshalPKIXPublicKey(pub) fatalIfErr(err, "failed to encode public key") var spki struct { Algorithm pkix.AlgorithmIdentifier SubjectPublicKey asn1.BitString } _, err = asn1.Unmarshal(spkiASN1, &spki) fatalIfErr(err, "failed to decode public key") skid := sha1.Sum(spki.SubjectPublicKey.Bytes) tpl := &x509.Certificate{ SerialNumber: randomSerialNumber(), Subject: pkix.Name{ Organization: []string{"mkcert development CA"}, OrganizationalUnit: []string{userAndHostname}, // The CommonName is required by iOS to show the certificate in the // "Certificate Trust Settings" menu. // https://github.com/FiloSottile/mkcert/issues/47 CommonName: "mkcert " + userAndHostname, }, SubjectKeyId: skid[:], NotAfter: time.Now().AddDate(10, 0, 0), NotBefore: time.Now(), KeyUsage: x509.KeyUsageCertSign, BasicConstraintsValid: true, IsCA: true, MaxPathLenZero: true, } cert, err := x509.CreateCertificate(rand.Reader, tpl, tpl, pub, priv) fatalIfErr(err, "failed to generate CA certificate") privDER, err := x509.MarshalPKCS8PrivateKey(priv) fatalIfErr(err, "failed to encode CA key") err = ioutil.WriteFile(filepath.Join(m.CAROOT, rootKeyName), pem.EncodeToMemory( &pem.Block{Type: "PRIVATE KEY", Bytes: privDER}), 0400) fatalIfErr(err, "failed to save CA key") err = ioutil.WriteFile(filepath.Join(m.CAROOT, rootName), pem.EncodeToMemory( &pem.Block{Type: "CERTIFICATE", Bytes: cert}), 0644) fatalIfErr(err, "failed to save CA certificate") log.Printf("Created a new local CA 💥\n") } func (m *mkcert) caUniqueName() string { return "mkcert development CA " + m.caCert.SerialNumber.String() }
go
BSD-3-Clause
1c1dc4ed27ed5936046b6398d39cab4d657a2d8e
2026-01-07T08:35:43.510017Z
false
FiloSottile/mkcert
https://github.com/FiloSottile/mkcert/blob/1c1dc4ed27ed5936046b6398d39cab4d657a2d8e/main.go
main.go
// Copyright 2018 The mkcert Authors. All rights reserved. // Use of this source code is governed by a BSD-style // license that can be found in the LICENSE file. // Command mkcert is a simple zero-config tool to make development certificates. package main import ( "crypto" "crypto/x509" "flag" "fmt" "log" "net" "net/mail" "net/url" "os" "os/exec" "os/user" "path/filepath" "regexp" "runtime" "runtime/debug" "strings" "sync" "golang.org/x/net/idna" ) const shortUsage = `Usage of mkcert: $ mkcert -install Install the local CA in the system trust store. $ mkcert example.org Generate "example.org.pem" and "example.org-key.pem". $ mkcert example.com myapp.dev localhost 127.0.0.1 ::1 Generate "example.com+4.pem" and "example.com+4-key.pem". $ mkcert "*.example.it" Generate "_wildcard.example.it.pem" and "_wildcard.example.it-key.pem". $ mkcert -uninstall Uninstall the local CA (but do not delete it). ` const advancedUsage = `Advanced options: -cert-file FILE, -key-file FILE, -p12-file FILE Customize the output paths. -client Generate a certificate for client authentication. -ecdsa Generate a certificate with an ECDSA key. -pkcs12 Generate a ".p12" PKCS #12 file, also know as a ".pfx" file, containing certificate and key for legacy applications. -csr CSR Generate a certificate based on the supplied CSR. Conflicts with all other flags and arguments except -install and -cert-file. -CAROOT Print the CA certificate and key storage location. $CAROOT (environment variable) Set the CA certificate and key storage location. (This allows maintaining multiple local CAs in parallel.) $TRUST_STORES (environment variable) A comma-separated list of trust stores to install the local root CA into. Options are: "system", "java" and "nss" (includes Firefox). Autodetected by default. ` // Version can be set at link time to override debug.BuildInfo.Main.Version, // which is "(devel)" when building from within the module. See // golang.org/issue/29814 and golang.org/issue/29228. var Version string func main() { if len(os.Args) == 1 { fmt.Print(shortUsage) return } log.SetFlags(0) var ( installFlag = flag.Bool("install", false, "") uninstallFlag = flag.Bool("uninstall", false, "") pkcs12Flag = flag.Bool("pkcs12", false, "") ecdsaFlag = flag.Bool("ecdsa", false, "") clientFlag = flag.Bool("client", false, "") helpFlag = flag.Bool("help", false, "") carootFlag = flag.Bool("CAROOT", false, "") csrFlag = flag.String("csr", "", "") certFileFlag = flag.String("cert-file", "", "") keyFileFlag = flag.String("key-file", "", "") p12FileFlag = flag.String("p12-file", "", "") versionFlag = flag.Bool("version", false, "") ) flag.Usage = func() { fmt.Fprint(flag.CommandLine.Output(), shortUsage) fmt.Fprintln(flag.CommandLine.Output(), `For more options, run "mkcert -help".`) } flag.Parse() if *helpFlag { fmt.Print(shortUsage) fmt.Print(advancedUsage) return } if *versionFlag { if Version != "" { fmt.Println(Version) return } if buildInfo, ok := debug.ReadBuildInfo(); ok { fmt.Println(buildInfo.Main.Version) return } fmt.Println("(unknown)") return } if *carootFlag { if *installFlag || *uninstallFlag { log.Fatalln("ERROR: you can't set -[un]install and -CAROOT at the same time") } fmt.Println(getCAROOT()) return } if *installFlag && *uninstallFlag { log.Fatalln("ERROR: you can't set -install and -uninstall at the same time") } if *csrFlag != "" && (*pkcs12Flag || *ecdsaFlag || *clientFlag) { log.Fatalln("ERROR: can only combine -csr with -install and -cert-file") } if *csrFlag != "" && flag.NArg() != 0 { log.Fatalln("ERROR: can't specify extra arguments when using -csr") } (&mkcert{ installMode: *installFlag, uninstallMode: *uninstallFlag, csrPath: *csrFlag, pkcs12: *pkcs12Flag, ecdsa: *ecdsaFlag, client: *clientFlag, certFile: *certFileFlag, keyFile: *keyFileFlag, p12File: *p12FileFlag, }).Run(flag.Args()) } const rootName = "rootCA.pem" const rootKeyName = "rootCA-key.pem" type mkcert struct { installMode, uninstallMode bool pkcs12, ecdsa, client bool keyFile, certFile, p12File string csrPath string CAROOT string caCert *x509.Certificate caKey crypto.PrivateKey // The system cert pool is only loaded once. After installing the root, checks // will keep failing until the next execution. TODO: maybe execve? // https://github.com/golang/go/issues/24540 (thanks, myself) ignoreCheckFailure bool } func (m *mkcert) Run(args []string) { m.CAROOT = getCAROOT() if m.CAROOT == "" { log.Fatalln("ERROR: failed to find the default CA location, set one as the CAROOT env var") } fatalIfErr(os.MkdirAll(m.CAROOT, 0755), "failed to create the CAROOT") m.loadCA() if m.installMode { m.install() if len(args) == 0 { return } } else if m.uninstallMode { m.uninstall() return } else { var warning bool if storeEnabled("system") && !m.checkPlatform() { warning = true log.Println("Note: the local CA is not installed in the system trust store.") } if storeEnabled("nss") && hasNSS && CertutilInstallHelp != "" && !m.checkNSS() { warning = true log.Printf("Note: the local CA is not installed in the %s trust store.", NSSBrowsers) } if storeEnabled("java") && hasJava && !m.checkJava() { warning = true log.Println("Note: the local CA is not installed in the Java trust store.") } if warning { log.Println("Run \"mkcert -install\" for certificates to be trusted automatically ⚠️") } } if m.csrPath != "" { m.makeCertFromCSR() return } if len(args) == 0 { flag.Usage() return } hostnameRegexp := regexp.MustCompile(`(?i)^(\*\.)?[0-9a-z_-]([0-9a-z._-]*[0-9a-z_-])?$`) for i, name := range args { if ip := net.ParseIP(name); ip != nil { continue } if email, err := mail.ParseAddress(name); err == nil && email.Address == name { continue } if uriName, err := url.Parse(name); err == nil && uriName.Scheme != "" && uriName.Host != "" { continue } punycode, err := idna.ToASCII(name) if err != nil { log.Fatalf("ERROR: %q is not a valid hostname, IP, URL or email: %s", name, err) } args[i] = punycode if !hostnameRegexp.MatchString(punycode) { log.Fatalf("ERROR: %q is not a valid hostname, IP, URL or email", name) } } m.makeCert(args) } func getCAROOT() string { if env := os.Getenv("CAROOT"); env != "" { return env } var dir string switch { case runtime.GOOS == "windows": dir = os.Getenv("LocalAppData") case os.Getenv("XDG_DATA_HOME") != "": dir = os.Getenv("XDG_DATA_HOME") case runtime.GOOS == "darwin": dir = os.Getenv("HOME") if dir == "" { return "" } dir = filepath.Join(dir, "Library", "Application Support") default: // Unix dir = os.Getenv("HOME") if dir == "" { return "" } dir = filepath.Join(dir, ".local", "share") } return filepath.Join(dir, "mkcert") } func (m *mkcert) install() { if storeEnabled("system") { if m.checkPlatform() { log.Print("The local CA is already installed in the system trust store! 👍") } else { if m.installPlatform() { log.Print("The local CA is now installed in the system trust store! ⚡️") } m.ignoreCheckFailure = true // TODO: replace with a check for a successful install } } if storeEnabled("nss") && hasNSS { if m.checkNSS() { log.Printf("The local CA is already installed in the %s trust store! 👍", NSSBrowsers) } else { if hasCertutil && m.installNSS() { log.Printf("The local CA is now installed in the %s trust store (requires browser restart)! 🦊", NSSBrowsers) } else if CertutilInstallHelp == "" { log.Printf(`Note: %s support is not available on your platform. ℹ️`, NSSBrowsers) } else if !hasCertutil { log.Printf(`Warning: "certutil" is not available, so the CA can't be automatically installed in %s! ⚠️`, NSSBrowsers) log.Printf(`Install "certutil" with "%s" and re-run "mkcert -install" 👈`, CertutilInstallHelp) } } } if storeEnabled("java") && hasJava { if m.checkJava() { log.Println("The local CA is already installed in Java's trust store! 👍") } else { if hasKeytool { m.installJava() log.Println("The local CA is now installed in Java's trust store! ☕️") } else { log.Println(`Warning: "keytool" is not available, so the CA can't be automatically installed in Java's trust store! ⚠️`) } } } log.Print("") } func (m *mkcert) uninstall() { if storeEnabled("nss") && hasNSS { if hasCertutil { m.uninstallNSS() } else if CertutilInstallHelp != "" { log.Print("") log.Printf(`Warning: "certutil" is not available, so the CA can't be automatically uninstalled from %s (if it was ever installed)! ⚠️`, NSSBrowsers) log.Printf(`You can install "certutil" with "%s" and re-run "mkcert -uninstall" 👈`, CertutilInstallHelp) log.Print("") } } if storeEnabled("java") && hasJava { if hasKeytool { m.uninstallJava() } else { log.Print("") log.Println(`Warning: "keytool" is not available, so the CA can't be automatically uninstalled from Java's trust store (if it was ever installed)! ⚠️`) log.Print("") } } if storeEnabled("system") && m.uninstallPlatform() { log.Print("The local CA is now uninstalled from the system trust store(s)! 👋") log.Print("") } else if storeEnabled("nss") && hasCertutil { log.Printf("The local CA is now uninstalled from the %s trust store(s)! 👋", NSSBrowsers) log.Print("") } } func (m *mkcert) checkPlatform() bool { if m.ignoreCheckFailure { return true } _, err := m.caCert.Verify(x509.VerifyOptions{}) return err == nil } func storeEnabled(name string) bool { stores := os.Getenv("TRUST_STORES") if stores == "" { return true } for _, store := range strings.Split(stores, ",") { if store == name { return true } } return false } func fatalIfErr(err error, msg string) { if err != nil { log.Fatalf("ERROR: %s: %s", msg, err) } } func fatalIfCmdErr(err error, cmd string, out []byte) { if err != nil { log.Fatalf("ERROR: failed to execute \"%s\": %s\n\n%s\n", cmd, err, out) } } func pathExists(path string) bool { _, err := os.Stat(path) return err == nil } func binaryExists(name string) bool { _, err := exec.LookPath(name) return err == nil } var sudoWarningOnce sync.Once func commandWithSudo(cmd ...string) *exec.Cmd { if u, err := user.Current(); err == nil && u.Uid == "0" { return exec.Command(cmd[0], cmd[1:]...) } if !binaryExists("sudo") { sudoWarningOnce.Do(func() { log.Println(`Warning: "sudo" is not available, and mkcert is not running as root. The (un)install operation might fail. ⚠️`) }) return exec.Command(cmd[0], cmd[1:]...) } return exec.Command("sudo", append([]string{"--prompt=Sudo password:", "--"}, cmd...)...) }
go
BSD-3-Clause
1c1dc4ed27ed5936046b6398d39cab4d657a2d8e
2026-01-07T08:35:43.510017Z
false
base/node
https://github.com/base/node/blob/29fcaba8537427f848786b62bdcffebba6a33254/dependency_updater/dependency_updater.go
dependency_updater/dependency_updater.go
package main import ( "context" "encoding/json" "fmt" "slices" "time" "github.com/ethereum-optimism/optimism/op-service/retry" "github.com/google/go-github/v72/github" "github.com/urfave/cli/v3" "log" "os" "os/exec" "strings" ) type Info struct { Tag string `json:"tag,omitempty"` Commit string `json:"commit"` TagPrefix string `json:"tagPrefix,omitempty"` Owner string `json:"owner"` Repo string `json:"repo"` Branch string `json:"branch,omitempty"` Tracking string `json:"tracking"` } type VersionUpdateInfo struct { Repo string From string To string DiffUrl string } type Dependencies = map[string]*Info func main() { cmd := &cli.Command{ Name: "updater", Usage: "Updates the dependencies in the geth, nethermind and reth Dockerfiles", Flags: []cli.Flag{ &cli.StringFlag{ Name: "token", Usage: "Auth token used to make requests to the Github API must be set using export", Sources: cli.EnvVars("GITHUB_TOKEN"), Required: true, }, &cli.StringFlag{ Name: "repo", Usage: "Specifies repo location to run the version updater on", Required: true, }, &cli.BoolFlag{ Name: "commit", Usage: "Stages updater changes and creates commit message", Required: false, }, &cli.BoolFlag{ Name: "github-action", Usage: "Specifies whether tool is being used through github action workflow", Required: false, }, }, Action: func(ctx context.Context, cmd *cli.Command) error { err := updater(cmd.String("token"), cmd.String("repo"), cmd.Bool("commit"), cmd.Bool("github-action")) if err != nil { return fmt.Errorf("failed to run updater: %s", err) } return nil }, } if err := cmd.Run(context.Background(), os.Args); err != nil { log.Fatal(err) } } func updater(token string, repoPath string, commit bool, githubAction bool) error { var err error var dependencies Dependencies var updatedDependencies []VersionUpdateInfo f, err := os.ReadFile(repoPath + "/versions.json") if err != nil { return fmt.Errorf("error reading versions JSON: %s", err) } client := github.NewClient(nil).WithAuthToken(token) ctx := context.Background() err = json.Unmarshal(f, &dependencies) if err != nil { return fmt.Errorf("error unmarshalling versions JSON to dependencies: %s", err) } for dependency := range dependencies { var updatedDependency VersionUpdateInfo err := retry.Do0(context.Background(), 3, retry.Fixed(1*time.Second), func() error { updatedDependency, err = getAndUpdateDependency( ctx, client, dependency, repoPath, dependencies, ) return err }) if err != nil { return fmt.Errorf("error getting and updating version/commit for "+dependency+": %s", err) } if updatedDependency != (VersionUpdateInfo{}) { updatedDependencies = append(updatedDependencies, updatedDependency) } } e := createVersionsEnv(repoPath, dependencies) if e != nil { return fmt.Errorf("error creating versions.env: %s", e) } if (commit && updatedDependencies != nil) || (githubAction && updatedDependencies != nil) { err := createCommitMessage(updatedDependencies, repoPath, githubAction) if err != nil { return fmt.Errorf("error creating commit message: %s", err) } } return nil } func createCommitMessage(updatedDependencies []VersionUpdateInfo, repoPath string, githubAction bool) error { var repos []string descriptionLines := []string{ "### Dependency Updates", } commitTitle := "chore: updated " for _, dependency := range updatedDependencies { repo, tag := dependency.Repo, dependency.To descriptionLines = append(descriptionLines, fmt.Sprintf("**%s** - %s: [diff](%s)", repo, tag, dependency.DiffUrl)) repos = append(repos, repo) } commitDescription := strings.Join(descriptionLines, "\n") commitTitle += strings.Join(repos, ", ") if githubAction { err := writeToGithubOutput(commitTitle, commitDescription, repoPath) if err != nil { return fmt.Errorf("error creating git commit message: %s", err) } } else { cmd := exec.Command("git", "commit", "-am", commitTitle, "-m", commitDescription) if err := cmd.Run(); err != nil { return fmt.Errorf("failed to run git commit -m: %s", err) } } return nil } func getAndUpdateDependency(ctx context.Context, client *github.Client, dependencyType string, repoPath string, dependencies Dependencies) (VersionUpdateInfo, error) { version, commit, updatedDependency, err := getVersionAndCommit(ctx, client, dependencies, dependencyType) if err != nil { return VersionUpdateInfo{}, err } if updatedDependency != (VersionUpdateInfo{}) { e := updateVersionTagAndCommit(commit, version, dependencyType, repoPath, dependencies) if e != nil { return VersionUpdateInfo{}, fmt.Errorf("error updating version tag and commit: %s", e) } } return updatedDependency, nil } func getVersionAndCommit(ctx context.Context, client *github.Client, dependencies Dependencies, dependencyType string) (string, string, VersionUpdateInfo, error) { var version *github.RepositoryRelease var commit string var diffUrl string var updatedDependency VersionUpdateInfo foundPrefixVersion := false options := &github.ListOptions{Page: 1} if dependencies[dependencyType].Tracking == "tag" { for { releases, resp, err := client.Repositories.ListReleases( ctx, dependencies[dependencyType].Owner, dependencies[dependencyType].Repo, options) if err != nil { return "", "", VersionUpdateInfo{}, fmt.Errorf("error getting releases: %s", err) } if dependencies[dependencyType].TagPrefix == "" { version = releases[0] if *version.TagName != dependencies[dependencyType].Tag { diffUrl = generateGithubRepoUrl(dependencies, dependencyType) + "/compare/" + dependencies[dependencyType].Tag + "..." + *version.TagName } break } else if dependencies[dependencyType].TagPrefix != "" { for release := range releases { if strings.HasPrefix(*releases[release].TagName, dependencies[dependencyType].TagPrefix) { version = releases[release] foundPrefixVersion = true if *version.TagName != dependencies[dependencyType].Tag { diffUrl = generateGithubRepoUrl(dependencies, dependencyType) + "/compare/" + dependencies[dependencyType].Tag + "..." + *version.TagName } break } } if foundPrefixVersion { break } options.Page = resp.NextPage } else if resp.NextPage == 0 { break } } } if diffUrl != "" { updatedDependency = VersionUpdateInfo{ dependencies[dependencyType].Repo, dependencies[dependencyType].Tag, *version.TagName, diffUrl, } } if dependencies[dependencyType].Tracking == "tag" { versionCommit, _, err := client.Repositories.GetCommit( ctx, dependencies[dependencyType].Owner, dependencies[dependencyType].Repo, "refs/tags/"+*version.TagName, &github.ListOptions{}) if err != nil { return "", "", VersionUpdateInfo{}, fmt.Errorf("error getting commit for "+dependencyType+": %s", err) } commit = *versionCommit.SHA } else if dependencies[dependencyType].Tracking == "branch" { branchCommit, _, err := client.Repositories.ListCommits( ctx, dependencies[dependencyType].Owner, dependencies[dependencyType].Repo, &github.CommitsListOptions{ SHA: dependencies[dependencyType].Branch, }, ) if err != nil { return "", "", VersionUpdateInfo{}, fmt.Errorf("error listing commits for "+dependencyType+": %s", err) } commit = *branchCommit[0].SHA if dependencies[dependencyType].Commit != commit { from, to := dependencies[dependencyType].Commit, commit diffUrl = fmt.Sprintf("%s/compare/%s...%s", generateGithubRepoUrl(dependencies, dependencyType), from, to) updatedDependency = VersionUpdateInfo{ dependencies[dependencyType].Repo, dependencies[dependencyType].Tag, commit, diffUrl, } } } if version != nil { return *version.TagName, commit, updatedDependency, nil } return "", commit, updatedDependency, nil } func updateVersionTagAndCommit( commit string, tag string, dependencyType string, repoPath string, dependencies Dependencies) error { dependencies[dependencyType].Tag = tag dependencies[dependencyType].Commit = commit err := writeToVersionsJson(repoPath, dependencies) if err != nil { return fmt.Errorf("error writing to versions "+dependencyType+": %s", err) } return nil } func writeToVersionsJson(repoPath string, dependencies Dependencies) error { // formatting json updatedJson, err := json.MarshalIndent(dependencies, "", " ") if err != nil { return fmt.Errorf("error marshaling dependencies json: %s", err) } e := os.WriteFile(repoPath+"/versions.json", updatedJson, 0644) if e != nil { return fmt.Errorf("error writing to versions.json: %s", e) } return nil } func createVersionsEnv(repoPath string, dependencies Dependencies) error { envLines := []string{} for dependency := range dependencies { repoUrl := generateGithubRepoUrl(dependencies, dependency) + ".git" dependencyPrefix := strings.ToUpper(dependency) if dependencies[dependency].Tracking == "branch" { dependencies[dependency].Tag = dependencies[dependency].Branch } envLines = append(envLines, fmt.Sprintf("export %s_%s=%s", dependencyPrefix, "TAG", dependencies[dependency].Tag)) envLines = append(envLines, fmt.Sprintf("export %s_%s=%s", dependencyPrefix, "COMMIT", dependencies[dependency].Commit)) envLines = append(envLines, fmt.Sprintf("export %s_%s=%s", dependencyPrefix, "REPO", repoUrl)) } slices.Sort(envLines) file, err := os.Create(repoPath + "/versions.env") if err != nil { return fmt.Errorf("error creating versions.env file: %s", err) } defer file.Close() _, err = file.WriteString(strings.Join(envLines, "\n")) if err != nil { return fmt.Errorf("error writing to versions.env file: %s", err) } return nil } func writeToGithubOutput(title string, description string, repoPath string) error { file := os.Getenv("GITHUB_OUTPUT") f, err := os.OpenFile(file, os.O_APPEND|os.O_CREATE|os.O_WRONLY, 0644) if err != nil { return fmt.Errorf("failed to open GITHUB_OUTPUT file: %s", err) } defer f.Close() titleToWrite := fmt.Sprintf("%s=%s\n", "TITLE", title) _, err = f.WriteString(titleToWrite) if err != nil { return fmt.Errorf("failed to write to GITHUB_OUTPUT file: %s", err) } delimiter := "EOF" descToWrite := fmt.Sprintf("%s<<%s\n%s\n%s\n", "DESC", delimiter, description, delimiter) _, err = f.WriteString(descToWrite) if err != nil { return fmt.Errorf("failed to write to GITHUB_OUTPUT file: %s", err) } return nil } func generateGithubRepoUrl(dependencies Dependencies, dependencyType string) string { return "https://github.com/" + dependencies[dependencyType].Owner + "/" + dependencies[dependencyType].Repo }
go
MIT
29fcaba8537427f848786b62bdcffebba6a33254
2026-01-07T08:35:43.469798Z
false
nektos/act
https://github.com/nektos/act/blob/d93106d194bba273d70d2ba604ea633c3f396b59/main_test.go
main_test.go
package main import ( "os" "testing" ) func TestMain(_ *testing.T) { os.Args = []string{"act", "--help"} main() }
go
MIT
d93106d194bba273d70d2ba604ea633c3f396b59
2026-01-07T08:35:43.481138Z
false
nektos/act
https://github.com/nektos/act/blob/d93106d194bba273d70d2ba604ea633c3f396b59/main.go
main.go
package main import ( _ "embed" "github.com/nektos/act/cmd" "github.com/nektos/act/pkg/common" ) //go:embed VERSION var version string func main() { ctx, cancel := common.CreateGracefulJobCancellationContext() defer cancel() // run the command cmd.Execute(ctx, version) }
go
MIT
d93106d194bba273d70d2ba604ea633c3f396b59
2026-01-07T08:35:43.481138Z
false
nektos/act
https://github.com/nektos/act/blob/d93106d194bba273d70d2ba604ea633c3f396b59/pkg/gh/gh.go
pkg/gh/gh.go
package gh import ( "bufio" "bytes" "context" "os/exec" ) func GetToken(ctx context.Context, workingDirectory string) (string, error) { var token string // Locate the 'gh' executable path, err := exec.LookPath("gh") if err != nil { return "", err } // Command setup cmd := exec.CommandContext(ctx, path, "auth", "token") cmd.Dir = workingDirectory // Capture the output var out bytes.Buffer cmd.Stdout = &out // Run the command err = cmd.Run() if err != nil { return "", err } // Read the first line of the output scanner := bufio.NewScanner(&out) if scanner.Scan() { token = scanner.Text() } return token, nil }
go
MIT
d93106d194bba273d70d2ba604ea633c3f396b59
2026-01-07T08:35:43.481138Z
false
nektos/act
https://github.com/nektos/act/blob/d93106d194bba273d70d2ba604ea633c3f396b59/pkg/gh/gh_test.go
pkg/gh/gh_test.go
package gh import ( "context" "testing" ) func TestGetToken(t *testing.T) { token, _ := GetToken(context.TODO(), "") t.Log(token) }
go
MIT
d93106d194bba273d70d2ba604ea633c3f396b59
2026-01-07T08:35:43.481138Z
false
nektos/act
https://github.com/nektos/act/blob/d93106d194bba273d70d2ba604ea633c3f396b59/pkg/lookpath/error.go
pkg/lookpath/error.go
package lookpath type Error struct { Name string Err error } func (e *Error) Error() string { return e.Err.Error() }
go
MIT
d93106d194bba273d70d2ba604ea633c3f396b59
2026-01-07T08:35:43.481138Z
false
nektos/act
https://github.com/nektos/act/blob/d93106d194bba273d70d2ba604ea633c3f396b59/pkg/lookpath/lp_js.go
pkg/lookpath/lp_js.go
// Copyright 2018 The Go Authors. All rights reserved. // Use of this source code is governed by a BSD-style // license that can be found in the LICENSE file. //go:build js && wasm package lookpath import ( "errors" ) // ErrNotFound is the error resulting if a path search failed to find an executable file. var ErrNotFound = errors.New("executable file not found in $PATH") // LookPath searches for an executable named file in the // directories named by the PATH environment variable. // If file contains a slash, it is tried directly and the PATH is not consulted. // The result may be an absolute path or a path relative to the current directory. func LookPath2(file string, lenv Env) (string, error) { // Wasm can not execute processes, so act as if there are no executables at all. return "", &Error{file, ErrNotFound} }
go
MIT
d93106d194bba273d70d2ba604ea633c3f396b59
2026-01-07T08:35:43.481138Z
false
nektos/act
https://github.com/nektos/act/blob/d93106d194bba273d70d2ba604ea633c3f396b59/pkg/lookpath/lp_windows.go
pkg/lookpath/lp_windows.go
// Copyright 2010 The Go Authors. All rights reserved. // Use of this source code is governed by a BSD-style // license that can be found in the LICENSE file. package lookpath import ( "errors" "io/fs" "os" "path/filepath" "strings" ) // ErrNotFound is the error resulting if a path search failed to find an executable file. var ErrNotFound = errors.New("executable file not found in %PATH%") func chkStat(file string) error { d, err := os.Stat(file) if err != nil { return err } if d.IsDir() { return fs.ErrPermission } return nil } func hasExt(file string) bool { i := strings.LastIndex(file, ".") if i < 0 { return false } return strings.LastIndexAny(file, `:\/`) < i } func findExecutable(file string, exts []string) (string, error) { if len(exts) == 0 { return file, chkStat(file) } if hasExt(file) { if chkStat(file) == nil { return file, nil } } for _, e := range exts { if f := file + e; chkStat(f) == nil { return f, nil } } return "", fs.ErrNotExist } // LookPath searches for an executable named file in the // directories named by the PATH environment variable. // If file contains a slash, it is tried directly and the PATH is not consulted. // LookPath also uses PATHEXT environment variable to match // a suitable candidate. // The result may be an absolute path or a path relative to the current directory. func LookPath2(file string, lenv Env) (string, error) { var exts []string x := lenv.Getenv(`PATHEXT`) if x != "" { for _, e := range strings.Split(strings.ToLower(x), `;`) { if e == "" { continue } if e[0] != '.' { e = "." + e } exts = append(exts, e) } } else { exts = []string{".com", ".exe", ".bat", ".cmd"} } if strings.ContainsAny(file, `:\/`) { if f, err := findExecutable(file, exts); err == nil { return f, nil } else { return "", &Error{file, err} } } if f, err := findExecutable(filepath.Join(".", file), exts); err == nil { return f, nil } path := lenv.Getenv("path") for _, dir := range filepath.SplitList(path) { if f, err := findExecutable(filepath.Join(dir, file), exts); err == nil { return f, nil } } return "", &Error{file, ErrNotFound} }
go
MIT
d93106d194bba273d70d2ba604ea633c3f396b59
2026-01-07T08:35:43.481138Z
false
nektos/act
https://github.com/nektos/act/blob/d93106d194bba273d70d2ba604ea633c3f396b59/pkg/lookpath/env.go
pkg/lookpath/env.go
package lookpath import "os" type Env interface { Getenv(name string) string } type defaultEnv struct { } func (*defaultEnv) Getenv(name string) string { return os.Getenv(name) } func LookPath(file string) (string, error) { return LookPath2(file, &defaultEnv{}) }
go
MIT
d93106d194bba273d70d2ba604ea633c3f396b59
2026-01-07T08:35:43.481138Z
false
nektos/act
https://github.com/nektos/act/blob/d93106d194bba273d70d2ba604ea633c3f396b59/pkg/lookpath/lp_plan9.go
pkg/lookpath/lp_plan9.go
// Copyright 2011 The Go Authors. All rights reserved. // Use of this source code is governed by a BSD-style // license that can be found in the LICENSE file. package lookpath import ( "errors" "io/fs" "os" "path/filepath" "strings" ) // ErrNotFound is the error resulting if a path search failed to find an executable file. var ErrNotFound = errors.New("executable file not found in $path") func findExecutable(file string) error { d, err := os.Stat(file) if err != nil { return err } if m := d.Mode(); !m.IsDir() && m&0111 != 0 { return nil } return fs.ErrPermission } // LookPath searches for an executable named file in the // directories named by the path environment variable. // If file begins with "/", "#", "./", or "../", it is tried // directly and the path is not consulted. // The result may be an absolute path or a path relative to the current directory. func LookPath2(file string, lenv Env) (string, error) { // skip the path lookup for these prefixes skip := []string{"/", "#", "./", "../"} for _, p := range skip { if strings.HasPrefix(file, p) { err := findExecutable(file) if err == nil { return file, nil } return "", &Error{file, err} } } path := lenv.Getenv("path") for _, dir := range filepath.SplitList(path) { path := filepath.Join(dir, file) if err := findExecutable(path); err == nil { return path, nil } } return "", &Error{file, ErrNotFound} }
go
MIT
d93106d194bba273d70d2ba604ea633c3f396b59
2026-01-07T08:35:43.481138Z
false
nektos/act
https://github.com/nektos/act/blob/d93106d194bba273d70d2ba604ea633c3f396b59/pkg/lookpath/lp_unix.go
pkg/lookpath/lp_unix.go
// Copyright 2010 The Go Authors. All rights reserved. // Use of this source code is governed by a BSD-style // license that can be found in the LICENSE file. //go:build aix || darwin || dragonfly || freebsd || linux || netbsd || openbsd || solaris package lookpath import ( "errors" "io/fs" "os" "path/filepath" "strings" ) // ErrNotFound is the error resulting if a path search failed to find an executable file. var ErrNotFound = errors.New("executable file not found in $PATH") func findExecutable(file string) error { d, err := os.Stat(file) if err != nil { return err } if m := d.Mode(); !m.IsDir() && m&0111 != 0 { return nil } return fs.ErrPermission } // LookPath searches for an executable named file in the // directories named by the PATH environment variable. // If file contains a slash, it is tried directly and the PATH is not consulted. // The result may be an absolute path or a path relative to the current directory. func LookPath2(file string, lenv Env) (string, error) { // NOTE(rsc): I wish we could use the Plan 9 behavior here // (only bypass the path if file begins with / or ./ or ../) // but that would not match all the Unix shells. if strings.Contains(file, "/") { err := findExecutable(file) if err == nil { return file, nil } return "", &Error{file, err} } path := lenv.Getenv("PATH") for _, dir := range filepath.SplitList(path) { if dir == "" { // Unix shell semantics: path element "" means "." dir = "." } path := filepath.Join(dir, file) if err := findExecutable(path); err == nil { return path, nil } } return "", &Error{file, ErrNotFound} }
go
MIT
d93106d194bba273d70d2ba604ea633c3f396b59
2026-01-07T08:35:43.481138Z
false
nektos/act
https://github.com/nektos/act/blob/d93106d194bba273d70d2ba604ea633c3f396b59/pkg/model/job_context.go
pkg/model/job_context.go
package model type JobContext struct { Status string `json:"status"` Container struct { ID string `json:"id"` Network string `json:"network"` } `json:"container"` Services map[string]struct { ID string `json:"id"` } `json:"services"` }
go
MIT
d93106d194bba273d70d2ba604ea633c3f396b59
2026-01-07T08:35:43.481138Z
false
nektos/act
https://github.com/nektos/act/blob/d93106d194bba273d70d2ba604ea633c3f396b59/pkg/model/anchors_test.go
pkg/model/anchors_test.go
package model import ( "testing" "github.com/stretchr/testify/assert" "gopkg.in/yaml.v3" ) func TestVerifyNilAliasError(t *testing.T) { var node yaml.Node err := yaml.Unmarshal([]byte(` test: - a - b - c`), &node) *node.Content[0].Content[1].Content[1] = yaml.Node{ Kind: yaml.AliasNode, } assert.NoError(t, err) err = resolveAliases(&node) assert.Error(t, err) } func TestVerifyNoRecursion(t *testing.T) { table := []struct { name string yaml string yamlErr bool anchorErr bool }{ { name: "no anchors", yaml: ` a: x b: y c: z `, yamlErr: false, anchorErr: false, }, { name: "simple anchors", yaml: ` a: &a x b: &b y c: *a `, yamlErr: false, anchorErr: false, }, { name: "nested anchors", yaml: ` a: &a val: x b: &b val: y c: *a `, yamlErr: false, anchorErr: false, }, { name: "circular anchors", yaml: ` a: &b ref: *c b: &c ref: *b `, yamlErr: true, anchorErr: false, }, { name: "self-referencing anchor", yaml: ` a: &a ref: *a `, yamlErr: false, anchorErr: true, }, { name: "reuse snippet with anchors", yaml: ` a: &b x b: &a ref: *b c: *a `, yamlErr: false, anchorErr: false, }, } for _, tt := range table { t.Run(tt.name, func(t *testing.T) { var node yaml.Node err := yaml.Unmarshal([]byte(tt.yaml), &node) if tt.yamlErr { assert.Error(t, err) return } assert.NoError(t, err) err = resolveAliases(&node) if tt.anchorErr { assert.Error(t, err) } else { assert.NoError(t, err) } }) } }
go
MIT
d93106d194bba273d70d2ba604ea633c3f396b59
2026-01-07T08:35:43.481138Z
false
nektos/act
https://github.com/nektos/act/blob/d93106d194bba273d70d2ba604ea633c3f396b59/pkg/model/workflow_test.go
pkg/model/workflow_test.go
package model import ( "strings" "testing" "github.com/stretchr/testify/assert" "github.com/stretchr/testify/require" "gopkg.in/yaml.v3" ) func TestReadWorkflow_StringEvent(t *testing.T) { yaml := ` name: local-action-docker-url on: push jobs: test: runs-on: ubuntu-latest steps: - uses: ./actions/docker-url ` workflow, err := ReadWorkflow(strings.NewReader(yaml), false) assert.NoError(t, err, "read workflow should succeed") assert.Len(t, workflow.On(), 1) assert.Contains(t, workflow.On(), "push") } func TestReadWorkflow_ListEvent(t *testing.T) { yaml := ` name: local-action-docker-url on: [push, pull_request] jobs: test: runs-on: ubuntu-latest steps: - uses: ./actions/docker-url ` workflow, err := ReadWorkflow(strings.NewReader(yaml), false) assert.NoError(t, err, "read workflow should succeed") assert.Len(t, workflow.On(), 2) assert.Contains(t, workflow.On(), "push") assert.Contains(t, workflow.On(), "pull_request") } func TestReadWorkflow_MapEvent(t *testing.T) { yaml := ` name: local-action-docker-url on: push: branches: - master pull_request: branches: - master jobs: test: runs-on: ubuntu-latest steps: - uses: ./actions/docker-url ` workflow, err := ReadWorkflow(strings.NewReader(yaml), false) assert.NoError(t, err, "read workflow should succeed") assert.Len(t, workflow.On(), 2) assert.Contains(t, workflow.On(), "push") assert.Contains(t, workflow.On(), "pull_request") } func TestReadWorkflow_RunsOnLabels(t *testing.T) { yaml := ` name: local-action-docker-url jobs: test: container: nginx:latest runs-on: labels: ubuntu-latest steps: - uses: ./actions/docker-url` workflow, err := ReadWorkflow(strings.NewReader(yaml), false) assert.NoError(t, err, "read workflow should succeed") assert.Equal(t, workflow.Jobs["test"].RunsOn(), []string{"ubuntu-latest"}) } func TestReadWorkflow_RunsOnLabelsWithGroup(t *testing.T) { yaml := ` name: local-action-docker-url jobs: test: container: nginx:latest runs-on: labels: [ubuntu-latest] group: linux steps: - uses: ./actions/docker-url` workflow, err := ReadWorkflow(strings.NewReader(yaml), false) assert.NoError(t, err, "read workflow should succeed") assert.Equal(t, workflow.Jobs["test"].RunsOn(), []string{"ubuntu-latest", "linux"}) } func TestReadWorkflow_StringContainer(t *testing.T) { yaml := ` name: local-action-docker-url jobs: test: container: nginx:latest runs-on: ubuntu-latest steps: - uses: ./actions/docker-url test2: container: image: nginx:latest env: foo: bar runs-on: ubuntu-latest steps: - uses: ./actions/docker-url ` workflow, err := ReadWorkflow(strings.NewReader(yaml), false) assert.NoError(t, err, "read workflow should succeed") assert.Len(t, workflow.Jobs, 2) assert.Contains(t, workflow.Jobs["test"].Container().Image, "nginx:latest") assert.Contains(t, workflow.Jobs["test2"].Container().Image, "nginx:latest") assert.Contains(t, workflow.Jobs["test2"].Container().Env["foo"], "bar") } func TestReadWorkflow_ObjectContainer(t *testing.T) { yaml := ` name: local-action-docker-url jobs: test: container: image: r.example.org/something:latest credentials: username: registry-username password: registry-password env: HOME: /home/user volumes: - my_docker_volume:/volume_mount - /data/my_data - /source/directory:/destination/directory runs-on: ubuntu-latest steps: - uses: ./actions/docker-url ` workflow, err := ReadWorkflow(strings.NewReader(yaml), false) assert.NoError(t, err, "read workflow should succeed") assert.Len(t, workflow.Jobs, 1) container := workflow.GetJob("test").Container() assert.Contains(t, container.Image, "r.example.org/something:latest") assert.Contains(t, container.Env["HOME"], "/home/user") assert.Contains(t, container.Credentials["username"], "registry-username") assert.Contains(t, container.Credentials["password"], "registry-password") assert.ElementsMatch(t, container.Volumes, []string{ "my_docker_volume:/volume_mount", "/data/my_data", "/source/directory:/destination/directory", }) } func TestReadWorkflow_JobTypes(t *testing.T) { yaml := ` name: invalid job definition jobs: default-job: runs-on: ubuntu-latest steps: - run: echo remote-reusable-workflow-yml: uses: remote/repo/some/path/to/workflow.yml@main remote-reusable-workflow-yaml: uses: remote/repo/some/path/to/workflow.yaml@main remote-reusable-workflow-custom-path: uses: remote/repo/path/to/workflow.yml@main local-reusable-workflow-yml: uses: ./some/path/to/workflow.yml local-reusable-workflow-yaml: uses: ./some/path/to/workflow.yaml ` workflow, err := ReadWorkflow(strings.NewReader(yaml), false) assert.NoError(t, err, "read workflow should succeed") assert.Len(t, workflow.Jobs, 6) jobType, err := workflow.Jobs["default-job"].Type() assert.Equal(t, nil, err) assert.Equal(t, JobTypeDefault, jobType) jobType, err = workflow.Jobs["remote-reusable-workflow-yml"].Type() assert.Equal(t, nil, err) assert.Equal(t, JobTypeReusableWorkflowRemote, jobType) jobType, err = workflow.Jobs["remote-reusable-workflow-yaml"].Type() assert.Equal(t, nil, err) assert.Equal(t, JobTypeReusableWorkflowRemote, jobType) jobType, err = workflow.Jobs["remote-reusable-workflow-custom-path"].Type() assert.Equal(t, nil, err) assert.Equal(t, JobTypeReusableWorkflowRemote, jobType) jobType, err = workflow.Jobs["local-reusable-workflow-yml"].Type() assert.Equal(t, nil, err) assert.Equal(t, JobTypeReusableWorkflowLocal, jobType) jobType, err = workflow.Jobs["local-reusable-workflow-yaml"].Type() assert.Equal(t, nil, err) assert.Equal(t, JobTypeReusableWorkflowLocal, jobType) } func TestReadWorkflow_JobTypes_InvalidPath(t *testing.T) { yaml := ` name: invalid job definition jobs: remote-reusable-workflow-missing-version: uses: remote/repo/some/path/to/workflow.yml remote-reusable-workflow-bad-extension: uses: remote/repo/some/path/to/workflow.json local-reusable-workflow-bad-extension: uses: ./some/path/to/workflow.json local-reusable-workflow-bad-path: uses: some/path/to/workflow.yaml ` workflow, err := ReadWorkflow(strings.NewReader(yaml), false) assert.NoError(t, err, "read workflow should succeed") assert.Len(t, workflow.Jobs, 4) jobType, err := workflow.Jobs["remote-reusable-workflow-missing-version"].Type() assert.Equal(t, JobTypeInvalid, jobType) assert.NotEqual(t, nil, err) jobType, err = workflow.Jobs["remote-reusable-workflow-bad-extension"].Type() assert.Equal(t, JobTypeInvalid, jobType) assert.NotEqual(t, nil, err) jobType, err = workflow.Jobs["local-reusable-workflow-bad-extension"].Type() assert.Equal(t, JobTypeInvalid, jobType) assert.NotEqual(t, nil, err) jobType, err = workflow.Jobs["local-reusable-workflow-bad-path"].Type() assert.Equal(t, JobTypeInvalid, jobType) assert.NotEqual(t, nil, err) } func TestReadWorkflow_StepsTypes(t *testing.T) { yaml := ` name: invalid step definition jobs: test: runs-on: ubuntu-latest steps: - name: test1 uses: actions/checkout@v2 run: echo - name: test2 run: echo - name: test3 uses: actions/checkout@v2 - name: test4 uses: docker://nginx:latest - name: test5 uses: ./local-action ` _, err := ReadWorkflow(strings.NewReader(yaml), false) assert.Error(t, err, "read workflow should fail") } // See: https://docs.github.com/en/actions/reference/workflow-syntax-for-github-actions#jobsjob_idoutputs func TestReadWorkflow_JobOutputs(t *testing.T) { yaml := ` name: job outputs definition jobs: test1: runs-on: ubuntu-latest steps: - id: test1_1 run: | echo "::set-output name=a_key::some-a_value" echo "::set-output name=b-key::some-b-value" outputs: some_a_key: ${{ steps.test1_1.outputs.a_key }} some-b-key: ${{ steps.test1_1.outputs.b-key }} test2: runs-on: ubuntu-latest needs: - test1 steps: - name: test2_1 run: | echo "${{ needs.test1.outputs.some_a_key }}" echo "${{ needs.test1.outputs.some-b-key }}" ` workflow, err := ReadWorkflow(strings.NewReader(yaml), false) assert.NoError(t, err, "read workflow should succeed") assert.Len(t, workflow.Jobs, 2) assert.Len(t, workflow.Jobs["test1"].Steps, 1) assert.Equal(t, StepTypeRun, workflow.Jobs["test1"].Steps[0].Type()) assert.Equal(t, "test1_1", workflow.Jobs["test1"].Steps[0].ID) assert.Len(t, workflow.Jobs["test1"].Outputs, 2) assert.Contains(t, workflow.Jobs["test1"].Outputs, "some_a_key") assert.Contains(t, workflow.Jobs["test1"].Outputs, "some-b-key") assert.Equal(t, "${{ steps.test1_1.outputs.a_key }}", workflow.Jobs["test1"].Outputs["some_a_key"]) assert.Equal(t, "${{ steps.test1_1.outputs.b-key }}", workflow.Jobs["test1"].Outputs["some-b-key"]) } func TestReadWorkflow_Strategy(t *testing.T) { w, err := NewWorkflowPlanner("testdata/strategy/push.yml", true, false) assert.NoError(t, err) p, err := w.PlanJob("strategy-only-max-parallel") assert.NoError(t, err) assert.Equal(t, len(p.Stages), 1) assert.Equal(t, len(p.Stages[0].Runs), 1) wf := p.Stages[0].Runs[0].Workflow job := wf.Jobs["strategy-only-max-parallel"] matrixes, err := job.GetMatrixes() assert.NoError(t, err) assert.Equal(t, matrixes, []map[string]interface{}{{}}) assert.Equal(t, job.Matrix(), map[string][]interface{}(nil)) assert.Equal(t, job.Strategy.MaxParallel, 2) assert.Equal(t, job.Strategy.FailFast, true) job = wf.Jobs["strategy-only-fail-fast"] matrixes, err = job.GetMatrixes() assert.NoError(t, err) assert.Equal(t, matrixes, []map[string]interface{}{{}}) assert.Equal(t, job.Matrix(), map[string][]interface{}(nil)) assert.Equal(t, job.Strategy.MaxParallel, 4) assert.Equal(t, job.Strategy.FailFast, false) job = wf.Jobs["strategy-no-matrix"] matrixes, err = job.GetMatrixes() assert.NoError(t, err) assert.Equal(t, matrixes, []map[string]interface{}{{}}) assert.Equal(t, job.Matrix(), map[string][]interface{}(nil)) assert.Equal(t, job.Strategy.MaxParallel, 2) assert.Equal(t, job.Strategy.FailFast, false) job = wf.Jobs["strategy-all"] matrixes, err = job.GetMatrixes() assert.NoError(t, err) assert.Equal(t, matrixes, []map[string]interface{}{ {"datacenter": "site-c", "node-version": "14.x", "site": "staging", "php-version": 5.4}, {"datacenter": "site-c", "node-version": "16.x", "site": "staging", "php-version": 5.4}, {"datacenter": "site-d", "node-version": "16.x", "site": "staging", "php-version": 5.4}, {"datacenter": "site-a", "node-version": "10.x", "site": "prod"}, {"datacenter": "site-b", "node-version": "12.x", "site": "dev"}, }, ) assert.Equal(t, job.Matrix(), map[string][]interface{}{ "datacenter": {"site-c", "site-d"}, "exclude": { map[string]interface{}{"datacenter": "site-d", "node-version": "14.x", "site": "staging"}, }, "include": { map[string]interface{}{"php-version": 5.4}, map[string]interface{}{"datacenter": "site-a", "node-version": "10.x", "site": "prod"}, map[string]interface{}{"datacenter": "site-b", "node-version": "12.x", "site": "dev"}, }, "node-version": {"14.x", "16.x"}, "site": {"staging"}, }, ) assert.Equal(t, job.Strategy.MaxParallel, 2) assert.Equal(t, job.Strategy.FailFast, false) } func TestMatrixOnlyIncludes(t *testing.T) { matrix := map[string][]interface{}{ "include": []interface{}{ map[string]interface{}{"a": "1", "b": "2"}, map[string]interface{}{"a": "3", "b": "4"}, }, } rN := yaml.Node{} err := rN.Encode(matrix) require.NoError(t, err, "encoding matrix should succeed") job := &Job{ Strategy: &Strategy{ RawMatrix: rN, }, } assert.Equal(t, job.Matrix(), matrix) matrixes, err := job.GetMatrixes() require.NoError(t, err) assert.Equal(t, matrixes, []map[string]interface{}{ {"a": "1", "b": "2"}, {"a": "3", "b": "4"}, }, ) } func TestStep_ShellCommand(t *testing.T) { tests := []struct { shell string workflowShell string want string }{ {"pwsh -v '. {0}'", "", "pwsh -v '. {0}'"}, {"pwsh", "", "pwsh -command . '{0}'"}, {"powershell", "", "powershell -command . '{0}'"}, {"bash", "", "bash -e {0}"}, {"bash", "bash", "bash --noprofile --norc -e -o pipefail {0}"}, } for _, tt := range tests { t.Run(tt.shell, func(t *testing.T) { got := (&Step{Shell: tt.shell, WorkflowShell: tt.workflowShell}).ShellCommand() assert.Equal(t, got, tt.want) }) } } func TestReadWorkflow_WorkflowDispatchConfig(t *testing.T) { yaml := ` name: local-action-docker-url ` workflow, err := ReadWorkflow(strings.NewReader(yaml), false) assert.NoError(t, err, "read workflow should succeed") workflowDispatch := workflow.WorkflowDispatchConfig() assert.Nil(t, workflowDispatch) yaml = ` name: local-action-docker-url on: push ` workflow, err = ReadWorkflow(strings.NewReader(yaml), false) assert.NoError(t, err, "read workflow should succeed") workflowDispatch = workflow.WorkflowDispatchConfig() assert.Nil(t, workflowDispatch) yaml = ` name: local-action-docker-url on: workflow_dispatch ` workflow, err = ReadWorkflow(strings.NewReader(yaml), false) assert.NoError(t, err, "read workflow should succeed") workflowDispatch = workflow.WorkflowDispatchConfig() assert.NotNil(t, workflowDispatch) assert.Nil(t, workflowDispatch.Inputs) yaml = ` name: local-action-docker-url on: [push, pull_request] ` workflow, err = ReadWorkflow(strings.NewReader(yaml), false) assert.NoError(t, err, "read workflow should succeed") workflowDispatch = workflow.WorkflowDispatchConfig() assert.Nil(t, workflowDispatch) yaml = ` name: local-action-docker-url on: [push, workflow_dispatch] ` workflow, err = ReadWorkflow(strings.NewReader(yaml), false) assert.NoError(t, err, "read workflow should succeed") workflowDispatch = workflow.WorkflowDispatchConfig() assert.NotNil(t, workflowDispatch) assert.Nil(t, workflowDispatch.Inputs) yaml = ` name: local-action-docker-url on: - push - workflow_dispatch ` workflow, err = ReadWorkflow(strings.NewReader(yaml), false) assert.NoError(t, err, "read workflow should succeed") workflowDispatch = workflow.WorkflowDispatchConfig() assert.NotNil(t, workflowDispatch) assert.Nil(t, workflowDispatch.Inputs) yaml = ` name: local-action-docker-url on: push: pull_request: ` workflow, err = ReadWorkflow(strings.NewReader(yaml), false) assert.NoError(t, err, "read workflow should succeed") workflowDispatch = workflow.WorkflowDispatchConfig() assert.Nil(t, workflowDispatch) yaml = ` name: local-action-docker-url on: push: pull_request: workflow_dispatch: inputs: logLevel: description: 'Log level' required: true default: 'warning' type: choice options: - info - warning - debug ` workflow, err = ReadWorkflow(strings.NewReader(yaml), false) assert.NoError(t, err, "read workflow should succeed") workflowDispatch = workflow.WorkflowDispatchConfig() assert.NotNil(t, workflowDispatch) assert.Equal(t, WorkflowDispatchInput{ Default: "warning", Description: "Log level", Options: []string{ "info", "warning", "debug", }, Required: true, Type: "choice", }, workflowDispatch.Inputs["logLevel"]) } func TestReadWorkflow_InvalidStringEvent(t *testing.T) { yaml := ` name: local-action-docker-url on: push2 jobs: test: runs-on: ubuntu-latest steps: - uses: ./actions/docker-url ` _, err := ReadWorkflow(strings.NewReader(yaml), true) assert.Error(t, err, "read workflow should succeed") } func TestReadWorkflow_AnchorStrict(t *testing.T) { yaml := ` on: push jobs: test: runs-on: &runner ubuntu-latest steps: - uses: &checkout actions/checkout@v5 test2: runs-on: *runner steps: - uses: *checkout ` w, err := ReadWorkflow(strings.NewReader(yaml), true) assert.NoError(t, err, "read workflow should succeed") for _, job := range w.Jobs { assert.Equal(t, []string{"ubuntu-latest"}, job.RunsOn()) assert.Equal(t, "actions/checkout@v5", job.Steps[0].Uses) } } func TestReadWorkflow_Anchor(t *testing.T) { yaml := ` jobs: test: runs-on: &runner ubuntu-latest steps: - uses: &checkout actions/checkout@v5 test2: &job runs-on: *runner steps: - uses: *checkout - run: echo $TRIGGER env: TRIGGER: &trigger push test3: *job on: push #*trigger ` w, err := ReadWorkflow(strings.NewReader(yaml), false) assert.NoError(t, err, "read workflow should succeed") for _, job := range w.Jobs { assert.Equal(t, []string{"ubuntu-latest"}, job.RunsOn()) assert.Equal(t, "actions/checkout@v5", job.Steps[0].Uses) } }
go
MIT
d93106d194bba273d70d2ba604ea633c3f396b59
2026-01-07T08:35:43.481138Z
false
nektos/act
https://github.com/nektos/act/blob/d93106d194bba273d70d2ba604ea633c3f396b59/pkg/model/action.go
pkg/model/action.go
package model import ( "fmt" "io" "strings" "github.com/nektos/act/pkg/schema" "gopkg.in/yaml.v3" ) // ActionRunsUsing is the type of runner for the action type ActionRunsUsing string func (a *ActionRunsUsing) UnmarshalYAML(unmarshal func(interface{}) error) error { var using string if err := unmarshal(&using); err != nil { return err } // Force input to lowercase for case insensitive comparison format := ActionRunsUsing(strings.ToLower(using)) switch format { case ActionRunsUsingNode24, ActionRunsUsingNode20, ActionRunsUsingNode16, ActionRunsUsingNode12, ActionRunsUsingDocker, ActionRunsUsingComposite: *a = format default: return fmt.Errorf("The runs.using key in action.yml must be one of: %v, got %s", []string{ ActionRunsUsingComposite, ActionRunsUsingDocker, ActionRunsUsingNode12, ActionRunsUsingNode16, ActionRunsUsingNode20, ActionRunsUsingNode24, }, format) } return nil } const ( // ActionRunsUsingNode12 for running with node12 ActionRunsUsingNode12 = "node12" // ActionRunsUsingNode16 for running with node16 ActionRunsUsingNode16 = "node16" // ActionRunsUsingNode20 for running with node20 ActionRunsUsingNode20 = "node20" // ActionRunsUsingNode24 for running with node24 ActionRunsUsingNode24 = "node24" // ActionRunsUsingDocker for running with docker ActionRunsUsingDocker = "docker" // ActionRunsUsingComposite for running composite ActionRunsUsingComposite = "composite" ) func (a ActionRunsUsing) IsNode() bool { switch a { case ActionRunsUsingNode12, ActionRunsUsingNode16, ActionRunsUsingNode20, ActionRunsUsingNode24: return true default: return false } } func (a ActionRunsUsing) IsDocker() bool { return a == ActionRunsUsingDocker } func (a ActionRunsUsing) IsComposite() bool { return a == ActionRunsUsingComposite } // ActionRuns are a field in Action type ActionRuns struct { Using ActionRunsUsing `yaml:"using"` Env map[string]string `yaml:"env"` Main string `yaml:"main"` Pre string `yaml:"pre"` PreIf string `yaml:"pre-if"` Post string `yaml:"post"` PostIf string `yaml:"post-if"` Image string `yaml:"image"` PreEntrypoint string `yaml:"pre-entrypoint"` Entrypoint string `yaml:"entrypoint"` PostEntrypoint string `yaml:"post-entrypoint"` Args []string `yaml:"args"` Steps []Step `yaml:"steps"` } // Action describes a metadata file for GitHub actions. The metadata filename must be either action.yml or action.yaml. The data in the metadata file defines the inputs, outputs and main entrypoint for your action. type Action struct { Name string `yaml:"name"` Author string `yaml:"author"` Description string `yaml:"description"` Inputs map[string]Input `yaml:"inputs"` Outputs map[string]Output `yaml:"outputs"` Runs ActionRuns `yaml:"runs"` Branding struct { Color string `yaml:"color"` Icon string `yaml:"icon"` } `yaml:"branding"` } func (a *Action) UnmarshalYAML(node *yaml.Node) error { // TODO enable after verifying that this runner side feature has rolled out in actions/runner // // Resolve yaml anchor aliases first // if err := resolveAliases(node); err != nil { // return err // } // Validate the schema before deserializing it into our model if err := (&schema.Node{ Definition: "action-root", Schema: schema.GetActionSchema(), }).UnmarshalYAML(node); err != nil { return err } type ActionDefault Action return node.Decode((*ActionDefault)(a)) } // Input parameters allow you to specify data that the action expects to use during runtime. GitHub stores input parameters as environment variables. Input ids with uppercase letters are converted to lowercase during runtime. We recommended using lowercase input ids. type Input struct { Description string `yaml:"description"` Required bool `yaml:"required"` Default string `yaml:"default"` } // Output parameters allow you to declare data that an action sets. Actions that run later in a workflow can use the output data set in previously run actions. For example, if you had an action that performed the addition of two inputs (x + y = z), the action could output the sum (z) for other actions to use as an input. type Output struct { Description string `yaml:"description"` Value string `yaml:"value"` } // ReadAction reads an action from a reader func ReadAction(in io.Reader) (*Action, error) { a := new(Action) err := yaml.NewDecoder(in).Decode(a) if err != nil { return nil, err } // set defaults if a.Runs.PreIf == "" { a.Runs.PreIf = "always()" } if a.Runs.PostIf == "" { a.Runs.PostIf = "always()" } return a, nil }
go
MIT
d93106d194bba273d70d2ba604ea633c3f396b59
2026-01-07T08:35:43.481138Z
false
nektos/act
https://github.com/nektos/act/blob/d93106d194bba273d70d2ba604ea633c3f396b59/pkg/model/workflow.go
pkg/model/workflow.go
package model import ( "errors" "fmt" "io" "reflect" "regexp" "strconv" "strings" "github.com/nektos/act/pkg/common" "github.com/nektos/act/pkg/schema" log "github.com/sirupsen/logrus" "gopkg.in/yaml.v3" ) // Workflow is the structure of the files in .github/workflows type Workflow struct { File string Name string `yaml:"name"` RawOn yaml.Node `yaml:"on"` Env map[string]string `yaml:"env"` Jobs map[string]*Job `yaml:"jobs"` Defaults Defaults `yaml:"defaults"` } // On events for the workflow func (w *Workflow) On() []string { switch w.RawOn.Kind { case yaml.ScalarNode: var val string err := w.RawOn.Decode(&val) if err != nil { log.Fatal(err) } return []string{val} case yaml.SequenceNode: var val []string err := w.RawOn.Decode(&val) if err != nil { log.Fatal(err) } return val case yaml.MappingNode: var val map[string]interface{} err := w.RawOn.Decode(&val) if err != nil { log.Fatal(err) } var keys []string for k := range val { keys = append(keys, k) } return keys } return nil } func (w *Workflow) OnEvent(event string) interface{} { if w.RawOn.Kind == yaml.MappingNode { var val map[string]interface{} if !decodeNode(w.RawOn, &val) { return nil } return val[event] } return nil } func (w *Workflow) UnmarshalYAML(node *yaml.Node) error { // Resolve yaml anchor aliases first if err := resolveAliases(node); err != nil { return err } // Validate the schema before deserializing it into our model if err := (&schema.Node{ Definition: "workflow-root", Schema: schema.GetWorkflowSchema(), }).UnmarshalYAML(node); err != nil { return errors.Join(err, fmt.Errorf("Actions YAML Schema Validation Error detected:\nFor more information, see: https://nektosact.com/usage/schema.html")) } type WorkflowDefault Workflow return node.Decode((*WorkflowDefault)(w)) } type WorkflowStrict Workflow func (w *WorkflowStrict) UnmarshalYAML(node *yaml.Node) error { // Resolve yaml anchor aliases first if err := resolveAliases(node); err != nil { return err } // Validate the schema before deserializing it into our model if err := (&schema.Node{ Definition: "workflow-root-strict", Schema: schema.GetWorkflowSchema(), }).UnmarshalYAML(node); err != nil { return errors.Join(err, fmt.Errorf("Actions YAML Strict Schema Validation Error detected:\nFor more information, see: https://nektosact.com/usage/schema.html")) } type WorkflowDefault Workflow return node.Decode((*WorkflowDefault)(w)) } type WorkflowDispatchInput struct { Description string `yaml:"description"` Required bool `yaml:"required"` Default string `yaml:"default"` Type string `yaml:"type"` Options []string `yaml:"options"` } type WorkflowDispatch struct { Inputs map[string]WorkflowDispatchInput `yaml:"inputs"` } func (w *Workflow) WorkflowDispatchConfig() *WorkflowDispatch { switch w.RawOn.Kind { case yaml.ScalarNode: var val string if !decodeNode(w.RawOn, &val) { return nil } if val == "workflow_dispatch" { return &WorkflowDispatch{} } case yaml.SequenceNode: var val []string if !decodeNode(w.RawOn, &val) { return nil } for _, v := range val { if v == "workflow_dispatch" { return &WorkflowDispatch{} } } case yaml.MappingNode: var val map[string]yaml.Node if !decodeNode(w.RawOn, &val) { return nil } n, found := val["workflow_dispatch"] var workflowDispatch WorkflowDispatch if found && decodeNode(n, &workflowDispatch) { return &workflowDispatch } default: return nil } return nil } type WorkflowCallInput struct { Description string `yaml:"description"` Required bool `yaml:"required"` Default yaml.Node `yaml:"default"` Type string `yaml:"type"` } type WorkflowCallOutput struct { Description string `yaml:"description"` Value string `yaml:"value"` } type WorkflowCall struct { Inputs map[string]WorkflowCallInput `yaml:"inputs"` Outputs map[string]WorkflowCallOutput `yaml:"outputs"` } type WorkflowCallResult struct { Outputs map[string]string } func (w *Workflow) WorkflowCallConfig() *WorkflowCall { if w.RawOn.Kind != yaml.MappingNode { // The callers expect for "on: workflow_call" and "on: [ workflow_call ]" a non nil return value return &WorkflowCall{} } var val map[string]yaml.Node if !decodeNode(w.RawOn, &val) { return &WorkflowCall{} } var config WorkflowCall node := val["workflow_call"] if !decodeNode(node, &config) { return &WorkflowCall{} } return &config } // Job is the structure of one job in a workflow type Job struct { Name string `yaml:"name"` RawNeeds yaml.Node `yaml:"needs"` RawRunsOn yaml.Node `yaml:"runs-on"` Env yaml.Node `yaml:"env"` If yaml.Node `yaml:"if"` Steps []*Step `yaml:"steps"` TimeoutMinutes string `yaml:"timeout-minutes"` Services map[string]*ContainerSpec `yaml:"services"` Strategy *Strategy `yaml:"strategy"` RawContainer yaml.Node `yaml:"container"` Defaults Defaults `yaml:"defaults"` Outputs map[string]string `yaml:"outputs"` Uses string `yaml:"uses"` With map[string]interface{} `yaml:"with"` RawSecrets yaml.Node `yaml:"secrets"` Result string } // Strategy for the job type Strategy struct { FailFast bool MaxParallel int FailFastString string `yaml:"fail-fast"` MaxParallelString string `yaml:"max-parallel"` RawMatrix yaml.Node `yaml:"matrix"` } // Default settings that will apply to all steps in the job or workflow type Defaults struct { Run RunDefaults `yaml:"run"` } // Defaults for all run steps in the job or workflow type RunDefaults struct { Shell string `yaml:"shell"` WorkingDirectory string `yaml:"working-directory"` } // GetMaxParallel sets default and returns value for `max-parallel` func (s Strategy) GetMaxParallel() int { // MaxParallel default value is `GitHub will maximize the number of jobs run in parallel depending on the available runners on GitHub-hosted virtual machines` // So I take the liberty to hardcode default limit to 4 and this is because: // 1: tl;dr: self-hosted does only 1 parallel job - https://github.com/actions/runner/issues/639#issuecomment-825212735 // 2: GH has 20 parallel job limit (for free tier) - https://github.com/github/docs/blob/3ae84420bd10997bb5f35f629ebb7160fe776eae/content/actions/reference/usage-limits-billing-and-administration.md?plain=1#L45 // 3: I want to add support for MaxParallel to act and 20! parallel jobs is a bit overkill IMHO maxParallel := 4 if s.MaxParallelString != "" { var err error if maxParallel, err = strconv.Atoi(s.MaxParallelString); err != nil { log.Errorf("Failed to parse 'max-parallel' option: %v", err) } } return maxParallel } // GetFailFast sets default and returns value for `fail-fast` func (s Strategy) GetFailFast() bool { // FailFast option is true by default: https://github.com/github/docs/blob/3ae84420bd10997bb5f35f629ebb7160fe776eae/content/actions/reference/workflow-syntax-for-github-actions.md?plain=1#L1107 failFast := true log.Debug(s.FailFastString) if s.FailFastString != "" { var err error if failFast, err = strconv.ParseBool(s.FailFastString); err != nil { log.Errorf("Failed to parse 'fail-fast' option: %v", err) } } return failFast } func (j *Job) InheritSecrets() bool { if j.RawSecrets.Kind != yaml.ScalarNode { return false } var val string if !decodeNode(j.RawSecrets, &val) { return false } return val == "inherit" } func (j *Job) Secrets() map[string]string { if j.RawSecrets.Kind != yaml.MappingNode { return nil } var val map[string]string if !decodeNode(j.RawSecrets, &val) { return nil } return val } // Container details for the job func (j *Job) Container() *ContainerSpec { var val *ContainerSpec switch j.RawContainer.Kind { case yaml.ScalarNode: val = new(ContainerSpec) if !decodeNode(j.RawContainer, &val.Image) { return nil } case yaml.MappingNode: val = new(ContainerSpec) if !decodeNode(j.RawContainer, val) { return nil } } return val } // Needs list for Job func (j *Job) Needs() []string { switch j.RawNeeds.Kind { case yaml.ScalarNode: var val string if !decodeNode(j.RawNeeds, &val) { return nil } return []string{val} case yaml.SequenceNode: var val []string if !decodeNode(j.RawNeeds, &val) { return nil } return val } return nil } // RunsOn list for Job func (j *Job) RunsOn() []string { switch j.RawRunsOn.Kind { case yaml.MappingNode: var val struct { Group string Labels yaml.Node } if !decodeNode(j.RawRunsOn, &val) { return nil } labels := nodeAsStringSlice(val.Labels) if val.Group != "" { labels = append(labels, val.Group) } return labels default: return nodeAsStringSlice(j.RawRunsOn) } } func nodeAsStringSlice(node yaml.Node) []string { switch node.Kind { case yaml.ScalarNode: var val string if !decodeNode(node, &val) { return nil } return []string{val} case yaml.SequenceNode: var val []string if !decodeNode(node, &val) { return nil } return val } return nil } func environment(yml yaml.Node) map[string]string { env := make(map[string]string) if yml.Kind == yaml.MappingNode { if !decodeNode(yml, &env) { return nil } } return env } // Environment returns string-based key=value map for a job func (j *Job) Environment() map[string]string { return environment(j.Env) } // Matrix decodes RawMatrix YAML node func (j *Job) Matrix() map[string][]interface{} { if j.Strategy.RawMatrix.Kind == yaml.MappingNode { var val map[string][]interface{} if !decodeNode(j.Strategy.RawMatrix, &val) { return nil } return val } return nil } // GetMatrixes returns the matrix cross product // It skips includes and hard fails excludes for non-existing keys func (j *Job) GetMatrixes() ([]map[string]interface{}, error) { matrixes := make([]map[string]interface{}, 0) if j.Strategy != nil { j.Strategy.FailFast = j.Strategy.GetFailFast() j.Strategy.MaxParallel = j.Strategy.GetMaxParallel() if m := j.Matrix(); m != nil { includes := make([]map[string]interface{}, 0) extraIncludes := make([]map[string]interface{}, 0) for _, v := range m["include"] { switch t := v.(type) { case []interface{}: for _, i := range t { i := i.(map[string]interface{}) includes = append(includes, i) } case interface{}: v := v.(map[string]interface{}) includes = append(includes, v) } } delete(m, "include") excludes := make([]map[string]interface{}, 0) for _, e := range m["exclude"] { e := e.(map[string]interface{}) for k := range e { if _, ok := m[k]; ok { excludes = append(excludes, e) } else { // We fail completely here because that's what GitHub does for non-existing matrix keys, fail on exclude, silent skip on include return nil, fmt.Errorf("the workflow is not valid. Matrix exclude key %q does not match any key within the matrix", k) } } } delete(m, "exclude") matrixProduct := common.CartesianProduct(m) MATRIX: for _, matrix := range matrixProduct { for _, exclude := range excludes { if commonKeysMatch(matrix, exclude) { log.Debugf("Skipping matrix '%v' due to exclude '%v'", matrix, exclude) continue MATRIX } } matrixes = append(matrixes, matrix) } for _, include := range includes { matched := false for _, matrix := range matrixes { if commonKeysMatch2(matrix, include, m) { matched = true log.Debugf("Adding include values '%v' to existing entry", include) for k, v := range include { matrix[k] = v } } } if !matched { extraIncludes = append(extraIncludes, include) } } for _, include := range extraIncludes { log.Debugf("Adding include '%v'", include) matrixes = append(matrixes, include) } if len(matrixes) == 0 { matrixes = append(matrixes, make(map[string]interface{})) } } else { matrixes = append(matrixes, make(map[string]interface{})) } } else { matrixes = append(matrixes, make(map[string]interface{})) log.Debugf("Empty Strategy, matrixes=%v", matrixes) } return matrixes, nil } func commonKeysMatch(a map[string]interface{}, b map[string]interface{}) bool { for aKey, aVal := range a { if bVal, ok := b[aKey]; ok && !reflect.DeepEqual(aVal, bVal) { return false } } return true } func commonKeysMatch2(a map[string]interface{}, b map[string]interface{}, m map[string][]interface{}) bool { for aKey, aVal := range a { _, useKey := m[aKey] if bVal, ok := b[aKey]; useKey && ok && !reflect.DeepEqual(aVal, bVal) { return false } } return true } // JobType describes what type of job we are about to run type JobType int const ( // JobTypeDefault is all jobs that have a `run` attribute JobTypeDefault JobType = iota // JobTypeReusableWorkflowLocal is all jobs that have a `uses` that is a local workflow in the .github/workflows directory JobTypeReusableWorkflowLocal // JobTypeReusableWorkflowRemote is all jobs that have a `uses` that references a workflow file in a github repo JobTypeReusableWorkflowRemote // JobTypeInvalid represents a job which is not configured correctly JobTypeInvalid ) func (j JobType) String() string { switch j { case JobTypeDefault: return "default" case JobTypeReusableWorkflowLocal: return "local-reusable-workflow" case JobTypeReusableWorkflowRemote: return "remote-reusable-workflow" } return "unknown" } // Type returns the type of the job func (j *Job) Type() (JobType, error) { isReusable := j.Uses != "" if isReusable { isYaml, _ := regexp.MatchString(`\.(ya?ml)(?:$|@)`, j.Uses) if isYaml { isLocalPath := strings.HasPrefix(j.Uses, "./") isRemotePath, _ := regexp.MatchString(`^[^.](.+?/){2,}.+\.ya?ml@`, j.Uses) hasVersion, _ := regexp.MatchString(`\.ya?ml@`, j.Uses) if isLocalPath { return JobTypeReusableWorkflowLocal, nil } else if isRemotePath && hasVersion { return JobTypeReusableWorkflowRemote, nil } } return JobTypeInvalid, fmt.Errorf("`uses` key references invalid workflow path '%s'. Must start with './' if it's a local workflow, or must start with '<org>/<repo>/' and include an '@' if it's a remote workflow", j.Uses) } return JobTypeDefault, nil } // ContainerSpec is the specification of the container to use for the job type ContainerSpec struct { Image string `yaml:"image"` Env map[string]string `yaml:"env"` Ports []string `yaml:"ports"` Volumes []string `yaml:"volumes"` Options string `yaml:"options"` Credentials map[string]string `yaml:"credentials"` Entrypoint string Args string Name string Reuse bool } // Step is the structure of one step in a job type Step struct { ID string `yaml:"id"` If yaml.Node `yaml:"if"` Name string `yaml:"name"` Uses string `yaml:"uses"` Run string `yaml:"run"` WorkingDirectory string `yaml:"working-directory"` // WorkflowShell is the shell really configured in the job, directly at step level or higher in defaults.run.shell WorkflowShell string `yaml:"-"` Shell string `yaml:"shell"` Env yaml.Node `yaml:"env"` With map[string]string `yaml:"with"` RawContinueOnError string `yaml:"continue-on-error"` TimeoutMinutes string `yaml:"timeout-minutes"` } // String gets the name of step func (s *Step) String() string { if s.Name != "" { return s.Name } else if s.Uses != "" { return s.Uses } else if s.Run != "" { return s.Run } return s.ID } // Environment returns string-based key=value map for a step func (s *Step) Environment() map[string]string { return environment(s.Env) } // GetEnv gets the env for a step func (s *Step) GetEnv() map[string]string { env := s.Environment() for k, v := range s.With { envKey := regexp.MustCompile("[^A-Z0-9-]").ReplaceAllString(strings.ToUpper(k), "_") envKey = fmt.Sprintf("INPUT_%s", strings.ToUpper(envKey)) env[envKey] = v } return env } // ShellCommand returns the command for the shell func (s *Step) ShellCommand() string { shellCommand := "" //Reference: https://github.com/actions/runner/blob/8109c962f09d9acc473d92c595ff43afceddb347/src/Runner.Worker/Handlers/ScriptHandlerHelpers.cs#L9-L17 switch s.Shell { case "": shellCommand = "bash -e {0}" case "bash": if s.WorkflowShell == "" { shellCommand = "bash -e {0}" } else { shellCommand = "bash --noprofile --norc -e -o pipefail {0}" } case "pwsh": shellCommand = "pwsh -command . '{0}'" case "python": shellCommand = "python {0}" case "sh": shellCommand = "sh -e {0}" case "cmd": shellCommand = "cmd /D /E:ON /V:OFF /S /C \"CALL \"{0}\"\"" case "powershell": shellCommand = "powershell -command . '{0}'" default: shellCommand = s.Shell } return shellCommand } // StepType describes what type of step we are about to run type StepType int const ( // StepTypeRun is all steps that have a `run` attribute StepTypeRun StepType = iota // StepTypeUsesDockerURL is all steps that have a `uses` that is of the form `docker://...` StepTypeUsesDockerURL // StepTypeUsesActionLocal is all steps that have a `uses` that is a local action in a subdirectory StepTypeUsesActionLocal // StepTypeUsesActionRemote is all steps that have a `uses` that is a reference to a github repo StepTypeUsesActionRemote // StepTypeReusableWorkflowLocal is all steps that have a `uses` that is a local workflow in the .github/workflows directory StepTypeReusableWorkflowLocal // StepTypeReusableWorkflowRemote is all steps that have a `uses` that references a workflow file in a github repo StepTypeReusableWorkflowRemote // StepTypeInvalid is for steps that have invalid step action StepTypeInvalid ) func (s StepType) String() string { switch s { case StepTypeInvalid: return "invalid" case StepTypeRun: return "run" case StepTypeUsesActionLocal: return "local-action" case StepTypeUsesActionRemote: return "remote-action" case StepTypeUsesDockerURL: return "docker" case StepTypeReusableWorkflowLocal: return "local-reusable-workflow" case StepTypeReusableWorkflowRemote: return "remote-reusable-workflow" } return "unknown" } // Type returns the type of the step func (s *Step) Type() StepType { if s.Run == "" && s.Uses == "" { return StepTypeInvalid } if s.Run != "" { if s.Uses != "" { return StepTypeInvalid } return StepTypeRun } else if strings.HasPrefix(s.Uses, "docker://") { return StepTypeUsesDockerURL } else if strings.HasPrefix(s.Uses, "./.github/workflows") && (strings.HasSuffix(s.Uses, ".yml") || strings.HasSuffix(s.Uses, ".yaml")) { return StepTypeReusableWorkflowLocal } else if !strings.HasPrefix(s.Uses, "./") && strings.Contains(s.Uses, ".github/workflows") && (strings.Contains(s.Uses, ".yml@") || strings.Contains(s.Uses, ".yaml@")) { return StepTypeReusableWorkflowRemote } else if strings.HasPrefix(s.Uses, "./") { return StepTypeUsesActionLocal } return StepTypeUsesActionRemote } // ReadWorkflow returns a list of jobs for a given workflow file reader func ReadWorkflow(in io.Reader, strict bool) (*Workflow, error) { if strict { w := new(WorkflowStrict) err := yaml.NewDecoder(in).Decode(w) return (*Workflow)(w), err } w := new(Workflow) err := yaml.NewDecoder(in).Decode(w) return w, err } // GetJob will get a job by name in the workflow func (w *Workflow) GetJob(jobID string) *Job { for id, j := range w.Jobs { if jobID == id { if j.Name == "" { j.Name = id } if j.If.Value == "" { j.If.Value = "success()" } return j } } return nil } // GetJobIDs will get all the job names in the workflow func (w *Workflow) GetJobIDs() []string { ids := make([]string, 0) for id := range w.Jobs { ids = append(ids, id) } return ids } var OnDecodeNodeError = func(node yaml.Node, out interface{}, err error) { log.Fatalf("Failed to decode node %v into %T: %v", node, out, err) } func decodeNode(node yaml.Node, out interface{}) bool { if err := node.Decode(out); err != nil { if OnDecodeNodeError != nil { OnDecodeNodeError(node, out, err) } return false } return true }
go
MIT
d93106d194bba273d70d2ba604ea633c3f396b59
2026-01-07T08:35:43.481138Z
false
nektos/act
https://github.com/nektos/act/blob/d93106d194bba273d70d2ba604ea633c3f396b59/pkg/model/planner.go
pkg/model/planner.go
package model import ( "fmt" "io" "io/fs" "math" "os" "path/filepath" "regexp" "sort" log "github.com/sirupsen/logrus" ) // WorkflowPlanner contains methods for creating plans type WorkflowPlanner interface { PlanEvent(eventName string) (*Plan, error) PlanJob(jobName string) (*Plan, error) PlanAll() (*Plan, error) GetEvents() []string } // Plan contains a list of stages to run in series type Plan struct { Stages []*Stage } // Stage contains a list of runs to execute in parallel type Stage struct { Runs []*Run } // Run represents a job from a workflow that needs to be run type Run struct { Workflow *Workflow JobID string } func (r *Run) String() string { jobName := r.Job().Name if jobName == "" { jobName = r.JobID } return jobName } // Job returns the job for this Run func (r *Run) Job() *Job { return r.Workflow.GetJob(r.JobID) } type WorkflowFiles struct { workflowDirEntry os.DirEntry dirPath string } // NewWorkflowPlanner will load a specific workflow, all workflows from a directory or all workflows from a directory and its subdirectories func NewWorkflowPlanner(path string, noWorkflowRecurse, strict bool) (WorkflowPlanner, error) { path, err := filepath.Abs(path) if err != nil { return nil, err } fi, err := os.Stat(path) if err != nil { return nil, err } var workflows []WorkflowFiles if fi.IsDir() { log.Debugf("Loading workflows from '%s'", path) if noWorkflowRecurse { files, err := os.ReadDir(path) if err != nil { return nil, err } for _, v := range files { workflows = append(workflows, WorkflowFiles{ dirPath: path, workflowDirEntry: v, }) } } else { log.Debug("Loading workflows recursively") if err := filepath.Walk(path, func(p string, f os.FileInfo, err error) error { if err != nil { return err } if !f.IsDir() { log.Debugf("Found workflow '%s' in '%s'", f.Name(), p) workflows = append(workflows, WorkflowFiles{ dirPath: filepath.Dir(p), workflowDirEntry: fs.FileInfoToDirEntry(f), }) } return nil }); err != nil { return nil, err } } } else { log.Debugf("Loading workflow '%s'", path) dirname := filepath.Dir(path) workflows = append(workflows, WorkflowFiles{ dirPath: dirname, workflowDirEntry: fs.FileInfoToDirEntry(fi), }) } wp := new(workflowPlanner) for _, wf := range workflows { ext := filepath.Ext(wf.workflowDirEntry.Name()) if ext == ".yml" || ext == ".yaml" { f, err := os.Open(filepath.Join(wf.dirPath, wf.workflowDirEntry.Name())) if err != nil { return nil, err } log.Debugf("Reading workflow '%s'", f.Name()) workflow, err := ReadWorkflow(f, strict) if err != nil { _ = f.Close() if err == io.EOF { return nil, fmt.Errorf("unable to read workflow '%s': file is empty: %w", wf.workflowDirEntry.Name(), err) } return nil, fmt.Errorf("workflow is not valid. '%s': %w", wf.workflowDirEntry.Name(), err) } _, err = f.Seek(0, 0) if err != nil { _ = f.Close() return nil, fmt.Errorf("error occurring when resetting io pointer in '%s': %w", wf.workflowDirEntry.Name(), err) } workflow.File = wf.workflowDirEntry.Name() if workflow.Name == "" { workflow.Name = wf.workflowDirEntry.Name() } err = validateJobName(workflow) if err != nil { _ = f.Close() return nil, err } wp.workflows = append(wp.workflows, workflow) _ = f.Close() } } return wp, nil } func NewSingleWorkflowPlanner(name string, f io.Reader) (WorkflowPlanner, error) { wp := new(workflowPlanner) log.Debugf("Reading workflow %s", name) workflow, err := ReadWorkflow(f, false) if err != nil { if err == io.EOF { return nil, fmt.Errorf("unable to read workflow '%s': file is empty: %w", name, err) } return nil, fmt.Errorf("workflow is not valid. '%s': %w", name, err) } workflow.File = name if workflow.Name == "" { workflow.Name = name } err = validateJobName(workflow) if err != nil { return nil, err } wp.workflows = append(wp.workflows, workflow) return wp, nil } func validateJobName(workflow *Workflow) error { jobNameRegex := regexp.MustCompile(`^([[:alpha:]_][[:alnum:]_\-]*)$`) for k := range workflow.Jobs { if ok := jobNameRegex.MatchString(k); !ok { return fmt.Errorf("workflow is not valid. '%s': Job name '%s' is invalid. Names must start with a letter or '_' and contain only alphanumeric characters, '-', or '_'", workflow.Name, k) } } return nil } type workflowPlanner struct { workflows []*Workflow } // PlanEvent builds a new list of runs to execute in parallel for an event name func (wp *workflowPlanner) PlanEvent(eventName string) (*Plan, error) { plan := new(Plan) if len(wp.workflows) == 0 { log.Debug("no workflows found by planner") return plan, nil } var lastErr error for _, w := range wp.workflows { events := w.On() if len(events) == 0 { log.Debugf("no events found for workflow: %s", w.File) continue } for _, e := range events { if e == eventName { stages, err := createStages(w, w.GetJobIDs()...) if err != nil { log.Warn(err) lastErr = err } else { plan.mergeStages(stages) } } } } return plan, lastErr } // PlanJob builds a new run to execute in parallel for a job name func (wp *workflowPlanner) PlanJob(jobName string) (*Plan, error) { plan := new(Plan) if len(wp.workflows) == 0 { log.Debugf("no jobs found for workflow: %s", jobName) } var lastErr error for _, w := range wp.workflows { stages, err := createStages(w, jobName) if err != nil { log.Warn(err) lastErr = err } else { plan.mergeStages(stages) } } return plan, lastErr } // PlanAll builds a new run to execute in parallel all func (wp *workflowPlanner) PlanAll() (*Plan, error) { plan := new(Plan) if len(wp.workflows) == 0 { log.Debug("no workflows found by planner") return plan, nil } var lastErr error for _, w := range wp.workflows { stages, err := createStages(w, w.GetJobIDs()...) if err != nil { log.Warn(err) lastErr = err } else { plan.mergeStages(stages) } } return plan, lastErr } // GetEvents gets all the events in the workflows file func (wp *workflowPlanner) GetEvents() []string { events := make([]string, 0) for _, w := range wp.workflows { found := false for _, e := range events { for _, we := range w.On() { if e == we { found = true break } } if found { break } } if !found { events = append(events, w.On()...) } } // sort the list based on depth of dependencies sort.Slice(events, func(i, j int) bool { return events[i] < events[j] }) return events } // MaxRunNameLen determines the max name length of all jobs func (p *Plan) MaxRunNameLen() int { maxRunNameLen := 0 for _, stage := range p.Stages { for _, run := range stage.Runs { runNameLen := len(run.String()) if runNameLen > maxRunNameLen { maxRunNameLen = runNameLen } } } return maxRunNameLen } // GetJobIDs will get all the job names in the stage func (s *Stage) GetJobIDs() []string { names := make([]string, 0) for _, r := range s.Runs { names = append(names, r.JobID) } return names } // Merge stages with existing stages in plan func (p *Plan) mergeStages(stages []*Stage) { newStages := make([]*Stage, int(math.Max(float64(len(p.Stages)), float64(len(stages))))) for i := 0; i < len(newStages); i++ { newStages[i] = new(Stage) if i >= len(p.Stages) { newStages[i].Runs = append(newStages[i].Runs, stages[i].Runs...) } else if i >= len(stages) { newStages[i].Runs = append(newStages[i].Runs, p.Stages[i].Runs...) } else { newStages[i].Runs = append(newStages[i].Runs, p.Stages[i].Runs...) newStages[i].Runs = append(newStages[i].Runs, stages[i].Runs...) } } p.Stages = newStages } func createStages(w *Workflow, jobIDs ...string) ([]*Stage, error) { // first, build a list of all the necessary jobs to run, and their dependencies jobDependencies := make(map[string][]string) for len(jobIDs) > 0 { newJobIDs := make([]string, 0) for _, jID := range jobIDs { // make sure we haven't visited this job yet if _, ok := jobDependencies[jID]; !ok { if job := w.GetJob(jID); job != nil { jobDependencies[jID] = job.Needs() newJobIDs = append(newJobIDs, job.Needs()...) } } } jobIDs = newJobIDs } // next, build an execution graph stages := make([]*Stage, 0) for len(jobDependencies) > 0 { stage := new(Stage) for jID, jDeps := range jobDependencies { // make sure all deps are in the graph already if listInStages(jDeps, stages...) { stage.Runs = append(stage.Runs, &Run{ Workflow: w, JobID: jID, }) delete(jobDependencies, jID) } } if len(stage.Runs) == 0 { return nil, fmt.Errorf("unable to build dependency graph for %s (%s)", w.Name, w.File) } stages = append(stages, stage) } return stages, nil } // return true iff all strings in srcList exist in at least one of the stages func listInStages(srcList []string, stages ...*Stage) bool { for _, src := range srcList { found := false for _, stage := range stages { for _, search := range stage.GetJobIDs() { if src == search { found = true } } } if !found { return false } } return true }
go
MIT
d93106d194bba273d70d2ba604ea633c3f396b59
2026-01-07T08:35:43.481138Z
false
nektos/act
https://github.com/nektos/act/blob/d93106d194bba273d70d2ba604ea633c3f396b59/pkg/model/github_context_test.go
pkg/model/github_context_test.go
package model import ( "context" "fmt" "testing" log "github.com/sirupsen/logrus" "github.com/stretchr/testify/assert" ) func TestSetRef(t *testing.T) { log.SetLevel(log.DebugLevel) oldFindGitRef := findGitRef oldFindGitRevision := findGitRevision defer func() { findGitRef = oldFindGitRef }() defer func() { findGitRevision = oldFindGitRevision }() findGitRef = func(_ context.Context, _ string) (string, error) { return "refs/heads/master", nil } findGitRevision = func(_ context.Context, _ string) (string, string, error) { return "", "1234fakesha", nil } tables := []struct { eventName string event map[string]interface{} ref string refName string }{ { eventName: "pull_request_target", event: map[string]interface{}{}, ref: "refs/heads/master", refName: "master", }, { eventName: "pull_request", event: map[string]interface{}{ "number": 1234., }, ref: "refs/pull/1234/merge", refName: "1234/merge", }, { eventName: "deployment", event: map[string]interface{}{ "deployment": map[string]interface{}{ "ref": "refs/heads/somebranch", }, }, ref: "refs/heads/somebranch", refName: "somebranch", }, { eventName: "release", event: map[string]interface{}{ "release": map[string]interface{}{ "tag_name": "v1.0.0", }, }, ref: "refs/tags/v1.0.0", refName: "v1.0.0", }, { eventName: "push", event: map[string]interface{}{ "ref": "refs/heads/somebranch", }, ref: "refs/heads/somebranch", refName: "somebranch", }, { eventName: "unknown", event: map[string]interface{}{ "repository": map[string]interface{}{ "default_branch": "main", }, }, ref: "refs/heads/main", refName: "main", }, { eventName: "no-event", event: map[string]interface{}{}, ref: "refs/heads/master", refName: "master", }, } for _, table := range tables { t.Run(table.eventName, func(t *testing.T) { ghc := &GithubContext{ EventName: table.eventName, BaseRef: "master", Event: table.event, } ghc.SetRef(context.Background(), "main", "/some/dir") ghc.SetRefTypeAndName() assert.Equal(t, table.ref, ghc.Ref) assert.Equal(t, table.refName, ghc.RefName) }) } t.Run("no-default-branch", func(t *testing.T) { findGitRef = func(_ context.Context, _ string) (string, error) { return "", fmt.Errorf("no default branch") } ghc := &GithubContext{ EventName: "no-default-branch", Event: map[string]interface{}{}, } ghc.SetRef(context.Background(), "", "/some/dir") assert.Equal(t, "refs/heads/master", ghc.Ref) }) } func TestSetSha(t *testing.T) { log.SetLevel(log.DebugLevel) oldFindGitRef := findGitRef oldFindGitRevision := findGitRevision defer func() { findGitRef = oldFindGitRef }() defer func() { findGitRevision = oldFindGitRevision }() findGitRef = func(_ context.Context, _ string) (string, error) { return "refs/heads/master", nil } findGitRevision = func(_ context.Context, _ string) (string, string, error) { return "", "1234fakesha", nil } tables := []struct { eventName string event map[string]interface{} sha string }{ { eventName: "pull_request_target", event: map[string]interface{}{ "pull_request": map[string]interface{}{ "base": map[string]interface{}{ "sha": "pr-base-sha", }, }, }, sha: "pr-base-sha", }, { eventName: "pull_request", event: map[string]interface{}{ "number": 1234., }, sha: "1234fakesha", }, { eventName: "deployment", event: map[string]interface{}{ "deployment": map[string]interface{}{ "sha": "deployment-sha", }, }, sha: "deployment-sha", }, { eventName: "release", event: map[string]interface{}{}, sha: "1234fakesha", }, { eventName: "push", event: map[string]interface{}{ "after": "push-sha", "deleted": false, }, sha: "push-sha", }, { eventName: "unknown", event: map[string]interface{}{}, sha: "1234fakesha", }, { eventName: "no-event", event: map[string]interface{}{}, sha: "1234fakesha", }, } for _, table := range tables { t.Run(table.eventName, func(t *testing.T) { ghc := &GithubContext{ EventName: table.eventName, BaseRef: "master", Event: table.event, } ghc.SetSha(context.Background(), "/some/dir") assert.Equal(t, table.sha, ghc.Sha) }) } }
go
MIT
d93106d194bba273d70d2ba604ea633c3f396b59
2026-01-07T08:35:43.481138Z
false
nektos/act
https://github.com/nektos/act/blob/d93106d194bba273d70d2ba604ea633c3f396b59/pkg/model/github_context.go
pkg/model/github_context.go
package model import ( "context" "fmt" "strings" "github.com/nektos/act/pkg/common" "github.com/nektos/act/pkg/common/git" ) type GithubContext struct { Event map[string]interface{} `json:"event"` EventPath string `json:"event_path"` Workflow string `json:"workflow"` RunAttempt string `json:"run_attempt"` RunID string `json:"run_id"` RunNumber string `json:"run_number"` Actor string `json:"actor"` Repository string `json:"repository"` EventName string `json:"event_name"` Sha string `json:"sha"` Ref string `json:"ref"` RefName string `json:"ref_name"` RefType string `json:"ref_type"` HeadRef string `json:"head_ref"` BaseRef string `json:"base_ref"` Token string `json:"token"` Workspace string `json:"workspace"` Action string `json:"action"` ActionPath string `json:"action_path"` ActionRef string `json:"action_ref"` ActionRepository string `json:"action_repository"` Job string `json:"job"` JobName string `json:"job_name"` RepositoryOwner string `json:"repository_owner"` RetentionDays string `json:"retention_days"` RunnerPerflog string `json:"runner_perflog"` RunnerTrackingID string `json:"runner_tracking_id"` ServerURL string `json:"server_url"` APIURL string `json:"api_url"` GraphQLURL string `json:"graphql_url"` } func asString(v interface{}) string { if v == nil { return "" } else if s, ok := v.(string); ok { return s } return "" } func nestedMapLookup(m map[string]interface{}, ks ...string) (rval interface{}) { var ok bool if len(ks) == 0 { // degenerate input return nil } if rval, ok = m[ks[0]]; !ok { return nil } else if len(ks) == 1 { // we've reached the final key return rval } else if m, ok = rval.(map[string]interface{}); !ok { return nil } // 1+ more keys return nestedMapLookup(m, ks[1:]...) } func withDefaultBranch(ctx context.Context, b string, event map[string]interface{}) map[string]interface{} { repoI, ok := event["repository"] if !ok { repoI = make(map[string]interface{}) } repo, ok := repoI.(map[string]interface{}) if !ok { common.Logger(ctx).Warnf("unable to set default branch to %v", b) return event } // if the branch is already there return with no changes if _, ok = repo["default_branch"]; ok { return event } repo["default_branch"] = b event["repository"] = repo return event } var findGitRef = git.FindGitRef var findGitRevision = git.FindGitRevision func (ghc *GithubContext) SetRef(ctx context.Context, defaultBranch string, repoPath string) { logger := common.Logger(ctx) // https://docs.github.com/en/actions/learn-github-actions/events-that-trigger-workflows // https://docs.github.com/en/developers/webhooks-and-events/webhooks/webhook-events-and-payloads switch ghc.EventName { case "pull_request_target": ghc.Ref = fmt.Sprintf("refs/heads/%s", ghc.BaseRef) case "pull_request", "pull_request_review", "pull_request_review_comment": ghc.Ref = fmt.Sprintf("refs/pull/%.0f/merge", ghc.Event["number"]) case "deployment", "deployment_status": ghc.Ref = asString(nestedMapLookup(ghc.Event, "deployment", "ref")) case "release": ghc.Ref = fmt.Sprintf("refs/tags/%s", asString(nestedMapLookup(ghc.Event, "release", "tag_name"))) case "push", "create", "workflow_dispatch": ghc.Ref = asString(ghc.Event["ref"]) default: defaultBranch := asString(nestedMapLookup(ghc.Event, "repository", "default_branch")) if defaultBranch != "" { ghc.Ref = fmt.Sprintf("refs/heads/%s", defaultBranch) } } if ghc.Ref == "" { ref, err := findGitRef(ctx, repoPath) if err != nil { logger.Warningf("unable to get git ref: %v", err) } else { logger.Debugf("using github ref: %s", ref) ghc.Ref = ref } // set the branch in the event data if defaultBranch != "" { ghc.Event = withDefaultBranch(ctx, defaultBranch, ghc.Event) } else { ghc.Event = withDefaultBranch(ctx, "master", ghc.Event) } if ghc.Ref == "" { ghc.Ref = fmt.Sprintf("refs/heads/%s", asString(nestedMapLookup(ghc.Event, "repository", "default_branch"))) } } } func (ghc *GithubContext) SetSha(ctx context.Context, repoPath string) { logger := common.Logger(ctx) // https://docs.github.com/en/actions/learn-github-actions/events-that-trigger-workflows // https://docs.github.com/en/developers/webhooks-and-events/webhooks/webhook-events-and-payloads switch ghc.EventName { case "pull_request_target": ghc.Sha = asString(nestedMapLookup(ghc.Event, "pull_request", "base", "sha")) case "deployment", "deployment_status": ghc.Sha = asString(nestedMapLookup(ghc.Event, "deployment", "sha")) case "push", "create", "workflow_dispatch": if deleted, ok := ghc.Event["deleted"].(bool); ok && !deleted { ghc.Sha = asString(ghc.Event["after"]) } } if ghc.Sha == "" { _, sha, err := findGitRevision(ctx, repoPath) if err != nil { logger.Warningf("unable to get git revision: %v", err) } else { ghc.Sha = sha } } } func (ghc *GithubContext) SetRepositoryAndOwner(ctx context.Context, githubInstance string, remoteName string, repoPath string) { if ghc.Repository == "" { repo, err := git.FindGithubRepo(ctx, repoPath, githubInstance, remoteName) if err != nil { common.Logger(ctx).Debugf("unable to get git repo (githubInstance: %v; remoteName: %v, repoPath: %v): %v", githubInstance, remoteName, repoPath, err) // nektos/act is used as a default action, so why not a repo? ghc.Repository = "nektos/act" ghc.RepositoryOwner = strings.Split(ghc.Repository, "/")[0] return } ghc.Repository = repo } ghc.RepositoryOwner = strings.Split(ghc.Repository, "/")[0] } func (ghc *GithubContext) SetRefTypeAndName() { var refType, refName string // https://docs.github.com/en/actions/learn-github-actions/environment-variables if strings.HasPrefix(ghc.Ref, "refs/tags/") { refType = "tag" refName = ghc.Ref[len("refs/tags/"):] } else if strings.HasPrefix(ghc.Ref, "refs/heads/") { refType = "branch" refName = ghc.Ref[len("refs/heads/"):] } else if strings.HasPrefix(ghc.Ref, "refs/pull/") { refType = "" refName = ghc.Ref[len("refs/pull/"):] } if ghc.RefType == "" { ghc.RefType = refType } if ghc.RefName == "" { ghc.RefName = refName } } func (ghc *GithubContext) SetBaseAndHeadRef() { if ghc.EventName == "pull_request" || ghc.EventName == "pull_request_target" { if ghc.BaseRef == "" { ghc.BaseRef = asString(nestedMapLookup(ghc.Event, "pull_request", "base", "ref")) } if ghc.HeadRef == "" { ghc.HeadRef = asString(nestedMapLookup(ghc.Event, "pull_request", "head", "ref")) } } }
go
MIT
d93106d194bba273d70d2ba604ea633c3f396b59
2026-01-07T08:35:43.481138Z
false
nektos/act
https://github.com/nektos/act/blob/d93106d194bba273d70d2ba604ea633c3f396b59/pkg/model/planner_test.go
pkg/model/planner_test.go
package model import ( "path/filepath" "testing" log "github.com/sirupsen/logrus" "github.com/stretchr/testify/assert" ) type WorkflowPlanTest struct { workflowPath string errorMessage string noWorkflowRecurse bool } func TestPlanner(t *testing.T) { log.SetLevel(log.DebugLevel) tables := []WorkflowPlanTest{ {"invalid-job-name/invalid-1.yml", "workflow is not valid. 'invalid-job-name-1': Job name 'invalid-JOB-Name-v1.2.3-docker_hub' is invalid. Names must start with a letter or '_' and contain only alphanumeric characters, '-', or '_'", false}, {"invalid-job-name/invalid-2.yml", "workflow is not valid. 'invalid-job-name-2': Job name '1234invalid-JOB-Name-v123-docker_hub' is invalid. Names must start with a letter or '_' and contain only alphanumeric characters, '-', or '_'", false}, {"invalid-job-name/valid-1.yml", "", false}, {"invalid-job-name/valid-2.yml", "", false}, {"empty-workflow", "unable to read workflow 'push.yml': file is empty: EOF", false}, {"nested", "unable to read workflow 'fail.yml': file is empty: EOF", false}, {"nested", "", true}, } workdir, err := filepath.Abs("testdata") assert.NoError(t, err, workdir) for _, table := range tables { fullWorkflowPath := filepath.Join(workdir, table.workflowPath) _, err = NewWorkflowPlanner(fullWorkflowPath, table.noWorkflowRecurse, false) if table.errorMessage == "" { assert.NoError(t, err, "WorkflowPlanner should exit without any error") } else { assert.EqualError(t, err, table.errorMessage) } } } func TestWorkflow(t *testing.T) { log.SetLevel(log.DebugLevel) workflow := Workflow{ Jobs: map[string]*Job{ "valid_job": { Name: "valid_job", }, }, } // Check that a valid job id returns non-error result, err := createStages(&workflow, "valid_job") assert.Nil(t, err) assert.NotNil(t, result) }
go
MIT
d93106d194bba273d70d2ba604ea633c3f396b59
2026-01-07T08:35:43.481138Z
false
nektos/act
https://github.com/nektos/act/blob/d93106d194bba273d70d2ba604ea633c3f396b59/pkg/model/step_result.go
pkg/model/step_result.go
package model import "fmt" type stepStatus int const ( StepStatusSuccess stepStatus = iota StepStatusFailure StepStatusSkipped ) var stepStatusStrings = [...]string{ "success", "failure", "skipped", } func (s stepStatus) MarshalText() ([]byte, error) { return []byte(s.String()), nil } func (s *stepStatus) UnmarshalText(b []byte) error { str := string(b) for i, name := range stepStatusStrings { if name == str { *s = stepStatus(i) return nil } } return fmt.Errorf("invalid step status %q", str) } func (s stepStatus) String() string { if int(s) >= len(stepStatusStrings) { return "" } return stepStatusStrings[s] } type StepResult struct { Outputs map[string]string `json:"outputs"` Conclusion stepStatus `json:"conclusion"` Outcome stepStatus `json:"outcome"` }
go
MIT
d93106d194bba273d70d2ba604ea633c3f396b59
2026-01-07T08:35:43.481138Z
false
nektos/act
https://github.com/nektos/act/blob/d93106d194bba273d70d2ba604ea633c3f396b59/pkg/model/anchors.go
pkg/model/anchors.go
package model import ( "errors" "gopkg.in/yaml.v3" ) func resolveAliasesExt(node *yaml.Node, path map[*yaml.Node]bool, skipCheck bool) error { if !skipCheck && path[node] { return errors.New("circular alias") } switch node.Kind { case yaml.AliasNode: aliasTarget := node.Alias if aliasTarget == nil { return errors.New("unresolved alias node") } path[node] = true *node = *aliasTarget if err := resolveAliasesExt(node, path, true); err != nil { return err } delete(path, node) case yaml.DocumentNode, yaml.MappingNode, yaml.SequenceNode: for _, child := range node.Content { if err := resolveAliasesExt(child, path, false); err != nil { return err } } } return nil } func resolveAliases(node *yaml.Node) error { return resolveAliasesExt(node, map[*yaml.Node]bool{}, false) }
go
MIT
d93106d194bba273d70d2ba604ea633c3f396b59
2026-01-07T08:35:43.481138Z
false
nektos/act
https://github.com/nektos/act/blob/d93106d194bba273d70d2ba604ea633c3f396b59/pkg/container/docker_volume.go
pkg/container/docker_volume.go
//go:build !(WITHOUT_DOCKER || !(linux || darwin || windows || netbsd)) package container import ( "context" "github.com/docker/docker/api/types/filters" "github.com/docker/docker/api/types/volume" "github.com/nektos/act/pkg/common" ) func NewDockerVolumeRemoveExecutor(volumeName string, force bool) common.Executor { return func(ctx context.Context) error { cli, err := GetDockerClient(ctx) if err != nil { return err } defer cli.Close() list, err := cli.VolumeList(ctx, volume.ListOptions{Filters: filters.NewArgs()}) if err != nil { return err } for _, vol := range list.Volumes { if vol.Name == volumeName { return removeExecutor(volumeName, force)(ctx) } } // Volume not found - do nothing return nil } } func removeExecutor(volume string, force bool) common.Executor { return func(ctx context.Context) error { logger := common.Logger(ctx) logger.Debugf("%sdocker volume rm %s", logPrefix, volume) if common.Dryrun(ctx) { return nil } cli, err := GetDockerClient(ctx) if err != nil { return err } defer cli.Close() return cli.VolumeRemove(ctx, volume, force) } }
go
MIT
d93106d194bba273d70d2ba604ea633c3f396b59
2026-01-07T08:35:43.481138Z
false
nektos/act
https://github.com/nektos/act/blob/d93106d194bba273d70d2ba604ea633c3f396b59/pkg/container/docker_pull.go
pkg/container/docker_pull.go
//go:build !(WITHOUT_DOCKER || !(linux || darwin || windows || netbsd)) package container import ( "context" "encoding/base64" "encoding/json" "fmt" "strings" "github.com/distribution/reference" "github.com/docker/docker/api/types/image" "github.com/docker/docker/api/types/registry" "github.com/nektos/act/pkg/common" ) // NewDockerPullExecutor function to create a run executor for the container func NewDockerPullExecutor(input NewDockerPullExecutorInput) common.Executor { return func(ctx context.Context) error { logger := common.Logger(ctx) logger.Debugf("%sdocker pull %v", logPrefix, input.Image) if common.Dryrun(ctx) { return nil } pull := input.ForcePull if !pull { imageExists, err := ImageExistsLocally(ctx, input.Image, input.Platform) logger.Debugf("Image exists? %v", imageExists) if err != nil { return fmt.Errorf("unable to determine if image already exists for image '%s' (%s): %w", input.Image, input.Platform, err) } if !imageExists { pull = true } } if !pull { return nil } imageRef := cleanImage(ctx, input.Image) logger.Debugf("pulling image '%v' (%s)", imageRef, input.Platform) cli, err := GetDockerClient(ctx) if err != nil { return err } defer cli.Close() imagePullOptions, err := getImagePullOptions(ctx, input) if err != nil { return err } reader, err := cli.ImagePull(ctx, imageRef, imagePullOptions) _ = logDockerResponse(logger, reader, err != nil) if err != nil { if imagePullOptions.RegistryAuth != "" && strings.Contains(err.Error(), "unauthorized") { logger.Errorf("pulling image '%v' (%s) failed with credentials %s retrying without them, please check for stale docker config files", imageRef, input.Platform, err.Error()) imagePullOptions.RegistryAuth = "" reader, err = cli.ImagePull(ctx, imageRef, imagePullOptions) _ = logDockerResponse(logger, reader, err != nil) } return err } return nil } } func getImagePullOptions(ctx context.Context, input NewDockerPullExecutorInput) (image.PullOptions, error) { imagePullOptions := image.PullOptions{ Platform: input.Platform, } logger := common.Logger(ctx) if input.Username != "" && input.Password != "" { logger.Debugf("using authentication for docker pull") authConfig := registry.AuthConfig{ Username: input.Username, Password: input.Password, } encodedJSON, err := json.Marshal(authConfig) if err != nil { return imagePullOptions, err } imagePullOptions.RegistryAuth = base64.URLEncoding.EncodeToString(encodedJSON) } else { authConfig, err := LoadDockerAuthConfig(ctx, input.Image) if err != nil { return imagePullOptions, err } if authConfig.Username == "" && authConfig.Password == "" { return imagePullOptions, nil } logger.Info("using DockerAuthConfig authentication for docker pull") encodedJSON, err := json.Marshal(authConfig) if err != nil { return imagePullOptions, err } imagePullOptions.RegistryAuth = base64.URLEncoding.EncodeToString(encodedJSON) } return imagePullOptions, nil } func cleanImage(ctx context.Context, image string) string { ref, err := reference.ParseAnyReference(image) if err != nil { common.Logger(ctx).Error(err) return "" } return ref.String() }
go
MIT
d93106d194bba273d70d2ba604ea633c3f396b59
2026-01-07T08:35:43.481138Z
false
nektos/act
https://github.com/nektos/act/blob/d93106d194bba273d70d2ba604ea633c3f396b59/pkg/container/docker_auth.go
pkg/container/docker_auth.go
//go:build !(WITHOUT_DOCKER || !(linux || darwin || windows || netbsd)) package container import ( "context" "strings" "github.com/docker/cli/cli/config" "github.com/docker/cli/cli/config/credentials" "github.com/docker/docker/api/types/registry" "github.com/nektos/act/pkg/common" ) func LoadDockerAuthConfig(ctx context.Context, image string) (registry.AuthConfig, error) { logger := common.Logger(ctx) config, err := config.Load(config.Dir()) if err != nil { logger.Warnf("Could not load docker config: %v", err) return registry.AuthConfig{}, err } if !config.ContainsAuth() { config.CredentialsStore = credentials.DetectDefaultStore(config.CredentialsStore) } hostName := "index.docker.io" index := strings.IndexRune(image, '/') if index > -1 && (strings.ContainsAny(image[:index], ".:") || image[:index] == "localhost") { hostName = image[:index] } authConfig, err := config.GetAuthConfig(hostName) if err != nil { logger.Warnf("Could not get auth config from docker config: %v", err) return registry.AuthConfig{}, err } return registry.AuthConfig(authConfig), nil } func LoadDockerAuthConfigs(ctx context.Context) map[string]registry.AuthConfig { logger := common.Logger(ctx) config, err := config.Load(config.Dir()) if err != nil { logger.Warnf("Could not load docker config: %v", err) return nil } if !config.ContainsAuth() { config.CredentialsStore = credentials.DetectDefaultStore(config.CredentialsStore) } creds, _ := config.GetAllCredentials() authConfigs := make(map[string]registry.AuthConfig, len(creds)) for k, v := range creds { authConfigs[k] = registry.AuthConfig(v) } return authConfigs }
go
MIT
d93106d194bba273d70d2ba604ea633c3f396b59
2026-01-07T08:35:43.481138Z
false
nektos/act
https://github.com/nektos/act/blob/d93106d194bba273d70d2ba604ea633c3f396b59/pkg/container/docker_run_test.go
pkg/container/docker_run_test.go
package container import ( "bufio" "bytes" "context" "fmt" "io" "net" "strings" "testing" "time" "github.com/docker/docker/api/types" "github.com/docker/docker/api/types/container" "github.com/docker/docker/client" "github.com/nektos/act/pkg/common" "github.com/stretchr/testify/assert" "github.com/stretchr/testify/mock" ) func TestDocker(t *testing.T) { ctx := context.Background() client, err := GetDockerClient(ctx) assert.NoError(t, err) defer client.Close() dockerBuild := NewDockerBuildExecutor(NewDockerBuildExecutorInput{ ContextDir: "testdata", ImageTag: "envmergetest", }) err = dockerBuild(ctx) assert.NoError(t, err) cr := &containerReference{ cli: client, input: &NewContainerInput{ Image: "envmergetest", }, } env := map[string]string{ "PATH": "/usr/local/bin:/usr/bin:/usr/sbin:/bin:/sbin", "RANDOM_VAR": "WITH_VALUE", "ANOTHER_VAR": "", "CONFLICT_VAR": "I_EXIST_IN_MULTIPLE_PLACES", } envExecutor := cr.extractFromImageEnv(&env) err = envExecutor(ctx) assert.NoError(t, err) assert.Equal(t, map[string]string{ "PATH": "/usr/local/bin:/usr/bin:/usr/sbin:/bin:/sbin:/this/path/does/not/exists/anywhere:/this/either", "RANDOM_VAR": "WITH_VALUE", "ANOTHER_VAR": "", "SOME_RANDOM_VAR": "", "ANOTHER_ONE": "BUT_I_HAVE_VALUE", "CONFLICT_VAR": "I_EXIST_IN_MULTIPLE_PLACES", }, env) } type mockDockerClient struct { client.APIClient mock.Mock } func (m *mockDockerClient) ContainerExecCreate(ctx context.Context, id string, opts container.ExecOptions) (container.ExecCreateResponse, error) { args := m.Called(ctx, id, opts) return args.Get(0).(container.ExecCreateResponse), args.Error(1) } func (m *mockDockerClient) ContainerExecAttach(ctx context.Context, id string, opts container.ExecStartOptions) (types.HijackedResponse, error) { args := m.Called(ctx, id, opts) return args.Get(0).(types.HijackedResponse), args.Error(1) } func (m *mockDockerClient) ContainerExecInspect(ctx context.Context, execID string) (container.ExecInspect, error) { args := m.Called(ctx, execID) return args.Get(0).(container.ExecInspect), args.Error(1) } func (m *mockDockerClient) CopyToContainer(ctx context.Context, id string, path string, content io.Reader, options container.CopyToContainerOptions) error { args := m.Called(ctx, id, path, content, options) return args.Error(0) } type endlessReader struct { io.Reader } func (r endlessReader) Read(_ []byte) (n int, err error) { return 1, nil } type mockConn struct { net.Conn mock.Mock } func (m *mockConn) Write(b []byte) (n int, err error) { args := m.Called(b) return args.Int(0), args.Error(1) } func (m *mockConn) Close() (err error) { return nil } func TestDockerExecAbort(t *testing.T) { ctx, cancel := context.WithCancel(context.Background()) conn := &mockConn{} conn.On("Write", mock.AnythingOfType("[]uint8")).Return(1, nil) client := &mockDockerClient{} client.On("ContainerExecCreate", ctx, "123", mock.AnythingOfType("container.ExecOptions")).Return(container.ExecCreateResponse{ID: "id"}, nil) client.On("ContainerExecAttach", ctx, "id", mock.AnythingOfType("container.ExecStartOptions")).Return(types.HijackedResponse{ Conn: conn, Reader: bufio.NewReader(endlessReader{}), }, nil) cr := &containerReference{ id: "123", cli: client, input: &NewContainerInput{ Image: "image", }, } channel := make(chan error) go func() { channel <- cr.exec([]string{""}, map[string]string{}, "user", "workdir")(ctx) }() time.Sleep(500 * time.Millisecond) cancel() err := <-channel assert.ErrorIs(t, err, context.Canceled) conn.AssertExpectations(t) client.AssertExpectations(t) } func TestDockerExecFailure(t *testing.T) { ctx := context.Background() conn := &mockConn{} client := &mockDockerClient{} client.On("ContainerExecCreate", ctx, "123", mock.AnythingOfType("container.ExecOptions")).Return(container.ExecCreateResponse{ID: "id"}, nil) client.On("ContainerExecAttach", ctx, "id", mock.AnythingOfType("container.ExecStartOptions")).Return(types.HijackedResponse{ Conn: conn, Reader: bufio.NewReader(strings.NewReader("output")), }, nil) client.On("ContainerExecInspect", ctx, "id").Return(container.ExecInspect{ ExitCode: 1, }, nil) cr := &containerReference{ id: "123", cli: client, input: &NewContainerInput{ Image: "image", }, } err := cr.exec([]string{""}, map[string]string{}, "user", "workdir")(ctx) assert.Error(t, err, "exit with `FAILURE`: 1") conn.AssertExpectations(t) client.AssertExpectations(t) } func TestDockerCopyTarStream(t *testing.T) { ctx := context.Background() conn := &mockConn{} client := &mockDockerClient{} client.On("CopyToContainer", ctx, "123", "/", mock.Anything, mock.AnythingOfType("container.CopyToContainerOptions")).Return(nil) client.On("CopyToContainer", ctx, "123", "/var/run/act", mock.Anything, mock.AnythingOfType("container.CopyToContainerOptions")).Return(nil) cr := &containerReference{ id: "123", cli: client, input: &NewContainerInput{ Image: "image", }, } _ = cr.CopyTarStream(ctx, "/var/run/act", &bytes.Buffer{}) conn.AssertExpectations(t) client.AssertExpectations(t) } func TestDockerCopyTarStreamDryRun(t *testing.T) { ctx := common.WithDryrun(context.Background(), true) conn := &mockConn{} client := &mockDockerClient{} client.AssertNotCalled(t, "CopyToContainer", ctx, "123", "/", mock.Anything, mock.AnythingOfType("container.CopyToContainerOptions")) client.AssertNotCalled(t, "CopyToContainer", ctx, "123", "/var/run/act", mock.Anything, mock.AnythingOfType("container.CopyToContainerOptions")) cr := &containerReference{ id: "123", cli: client, input: &NewContainerInput{ Image: "image", }, } _ = cr.CopyTarStream(ctx, "/var/run/act", &bytes.Buffer{}) conn.AssertExpectations(t) client.AssertExpectations(t) } func TestDockerCopyTarStreamErrorInCopyFiles(t *testing.T) { ctx := context.Background() conn := &mockConn{} merr := fmt.Errorf("Failure") client := &mockDockerClient{} client.On("CopyToContainer", ctx, "123", "/", mock.Anything, mock.AnythingOfType("container.CopyToContainerOptions")).Return(merr) client.On("CopyToContainer", ctx, "123", "/", mock.Anything, mock.AnythingOfType("container.CopyToContainerOptions")).Return(merr) cr := &containerReference{ id: "123", cli: client, input: &NewContainerInput{ Image: "image", }, } err := cr.CopyTarStream(ctx, "/var/run/act", &bytes.Buffer{}) assert.ErrorIs(t, err, merr) conn.AssertExpectations(t) client.AssertExpectations(t) } func TestDockerCopyTarStreamErrorInMkdir(t *testing.T) { ctx := context.Background() conn := &mockConn{} merr := fmt.Errorf("Failure") client := &mockDockerClient{} client.On("CopyToContainer", ctx, "123", "/", mock.Anything, mock.AnythingOfType("container.CopyToContainerOptions")).Return(nil) client.On("CopyToContainer", ctx, "123", "/var/run/act", mock.Anything, mock.AnythingOfType("container.CopyToContainerOptions")).Return(merr) cr := &containerReference{ id: "123", cli: client, input: &NewContainerInput{ Image: "image", }, } err := cr.CopyTarStream(ctx, "/var/run/act", &bytes.Buffer{}) assert.ErrorIs(t, err, merr) conn.AssertExpectations(t) client.AssertExpectations(t) } // Type assert containerReference implements ExecutionsEnvironment var _ ExecutionsEnvironment = &containerReference{}
go
MIT
d93106d194bba273d70d2ba604ea633c3f396b59
2026-01-07T08:35:43.481138Z
false
nektos/act
https://github.com/nektos/act/blob/d93106d194bba273d70d2ba604ea633c3f396b59/pkg/container/docker_socket_test.go
pkg/container/docker_socket_test.go
package container import ( "os" "testing" log "github.com/sirupsen/logrus" assert "github.com/stretchr/testify/assert" ) func init() { log.SetLevel(log.DebugLevel) } var originalCommonSocketLocations = CommonSocketLocations func TestGetSocketAndHostWithSocket(t *testing.T) { // Arrange CommonSocketLocations = originalCommonSocketLocations dockerHost := "unix:///my/docker/host.sock" socketURI := "/path/to/my.socket" os.Setenv("DOCKER_HOST", dockerHost) // Act ret, err := GetSocketAndHost(socketURI) // Assert assert.Nil(t, err) assert.Equal(t, SocketAndHost{socketURI, dockerHost}, ret) } func TestGetSocketAndHostNoSocket(t *testing.T) { // Arrange dockerHost := "unix:///my/docker/host.sock" os.Setenv("DOCKER_HOST", dockerHost) // Act ret, err := GetSocketAndHost("") // Assert assert.Nil(t, err) assert.Equal(t, SocketAndHost{dockerHost, dockerHost}, ret) } func TestGetSocketAndHostOnlySocket(t *testing.T) { // Arrange socketURI := "/path/to/my.socket" os.Unsetenv("DOCKER_HOST") CommonSocketLocations = originalCommonSocketLocations defaultSocket, defaultSocketFound := socketLocation() // Act ret, err := GetSocketAndHost(socketURI) // Assert assert.NoError(t, err, "Expected no error from GetSocketAndHost") assert.Equal(t, true, defaultSocketFound, "Expected to find default socket") assert.Equal(t, socketURI, ret.Socket, "Expected socket to match common location") assert.Equal(t, defaultSocket, ret.Host, "Expected ret.Host to match default socket location") } func TestGetSocketAndHostDontMount(t *testing.T) { // Arrange CommonSocketLocations = originalCommonSocketLocations dockerHost := "unix:///my/docker/host.sock" os.Setenv("DOCKER_HOST", dockerHost) // Act ret, err := GetSocketAndHost("-") // Assert assert.Nil(t, err) assert.Equal(t, SocketAndHost{"-", dockerHost}, ret) } func TestGetSocketAndHostNoHostNoSocket(t *testing.T) { // Arrange CommonSocketLocations = originalCommonSocketLocations os.Unsetenv("DOCKER_HOST") defaultSocket, found := socketLocation() // Act ret, err := GetSocketAndHost("") // Assert assert.Equal(t, true, found, "Expected a default socket to be found") assert.Nil(t, err, "Expected no error from GetSocketAndHost") assert.Equal(t, SocketAndHost{defaultSocket, defaultSocket}, ret, "Expected to match default socket location") } // Catch // > Your code breaks setting DOCKER_HOST if shouldMount is false. // > This happens if neither DOCKER_HOST nor --container-daemon-socket has a value, but socketLocation() returns a URI func TestGetSocketAndHostNoHostNoSocketDefaultLocation(t *testing.T) { // Arrange mySocketFile, tmpErr := os.CreateTemp("", "act-*.sock") mySocket := mySocketFile.Name() unixSocket := "unix://" + mySocket defer os.RemoveAll(mySocket) assert.NoError(t, tmpErr) os.Unsetenv("DOCKER_HOST") CommonSocketLocations = []string{mySocket} defaultSocket, found := socketLocation() // Act ret, err := GetSocketAndHost("") // Assert assert.Equal(t, unixSocket, defaultSocket, "Expected default socket to match common socket location") assert.Equal(t, true, found, "Expected default socket to be found") assert.Nil(t, err, "Expected no error from GetSocketAndHost") assert.Equal(t, SocketAndHost{unixSocket, unixSocket}, ret, "Expected to match default socket location") } func TestGetSocketAndHostNoHostInvalidSocket(t *testing.T) { // Arrange os.Unsetenv("DOCKER_HOST") mySocket := "/my/socket/path.sock" CommonSocketLocations = []string{"/unusual", "/socket", "/location"} defaultSocket, found := socketLocation() // Act ret, err := GetSocketAndHost(mySocket) // Assert assert.Equal(t, false, found, "Expected no default socket to be found") assert.Equal(t, "", defaultSocket, "Expected no default socket to be found") assert.Equal(t, SocketAndHost{}, ret, "Expected to match default socket location") assert.Error(t, err, "Expected an error in invalid state") } func TestGetSocketAndHostOnlySocketValidButUnusualLocation(t *testing.T) { // Arrange socketURI := "unix:///path/to/my.socket" CommonSocketLocations = []string{"/unusual", "/location"} os.Unsetenv("DOCKER_HOST") defaultSocket, found := socketLocation() // Act ret, err := GetSocketAndHost(socketURI) // Assert // Default socket locations assert.Equal(t, "", defaultSocket, "Expect default socket location to be empty") assert.Equal(t, false, found, "Expected no default socket to be found") // Sane default assert.Nil(t, err, "Expect no error from GetSocketAndHost") assert.Equal(t, socketURI, ret.Host, "Expect host to default to unusual socket") }
go
MIT
d93106d194bba273d70d2ba604ea633c3f396b59
2026-01-07T08:35:43.481138Z
false
nektos/act
https://github.com/nektos/act/blob/d93106d194bba273d70d2ba604ea633c3f396b59/pkg/container/linux_container_environment_extensions.go
pkg/container/linux_container_environment_extensions.go
package container import ( "context" "path/filepath" "regexp" "runtime" "strings" log "github.com/sirupsen/logrus" ) type LinuxContainerEnvironmentExtensions struct { } // Resolves the equivalent host path inside the container // This is required for windows and WSL 2 to translate things like C:\Users\Myproject to /mnt/users/Myproject // For use in docker volumes and binds func (*LinuxContainerEnvironmentExtensions) ToContainerPath(path string) string { if runtime.GOOS == "windows" && strings.Contains(path, "/") { log.Error("You cannot specify linux style local paths (/mnt/etc) on Windows as it does not understand them.") return "" } abspath, err := filepath.Abs(path) if err != nil { log.Error(err) return "" } // Test if the path is a windows path windowsPathRegex := regexp.MustCompile(`^([a-zA-Z]):\\(.+)$`) windowsPathComponents := windowsPathRegex.FindStringSubmatch(abspath) // Return as-is if no match if windowsPathComponents == nil { return abspath } // Convert to WSL2-compatible path if it is a windows path // NOTE: Cannot use filepath because it will use the wrong path separators assuming we want the path to be windows // based if running on Windows, and because we are feeding this to Docker, GoLang auto-path-translate doesn't work. driveLetter := strings.ToLower(windowsPathComponents[1]) translatedPath := strings.ReplaceAll(windowsPathComponents[2], `\`, `/`) // Should make something like /mnt/c/Users/person/My Folder/MyActProject result := strings.Join([]string{"/mnt", driveLetter, translatedPath}, `/`) return result } func (*LinuxContainerEnvironmentExtensions) GetActPath() string { return "/var/run/act" } func (*LinuxContainerEnvironmentExtensions) GetPathVariableName() string { return "PATH" } func (*LinuxContainerEnvironmentExtensions) DefaultPathVariable() string { return "/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin" } func (*LinuxContainerEnvironmentExtensions) JoinPathVariable(paths ...string) string { return strings.Join(paths, ":") } func (*LinuxContainerEnvironmentExtensions) GetRunnerContext(ctx context.Context) map[string]interface{} { return map[string]interface{}{ "os": "Linux", "arch": RunnerArch(ctx), "temp": "/tmp", "tool_cache": "/opt/hostedtoolcache", } } func (*LinuxContainerEnvironmentExtensions) IsEnvironmentCaseInsensitive() bool { return false }
go
MIT
d93106d194bba273d70d2ba604ea633c3f396b59
2026-01-07T08:35:43.481138Z
false
nektos/act
https://github.com/nektos/act/blob/d93106d194bba273d70d2ba604ea633c3f396b59/pkg/container/parse_env_file.go
pkg/container/parse_env_file.go
package container import ( "archive/tar" "bufio" "context" "fmt" "io" "strings" "github.com/nektos/act/pkg/common" ) func parseEnvFile(e Container, srcPath string, env *map[string]string) common.Executor { localEnv := *env return func(ctx context.Context) error { envTar, err := e.GetContainerArchive(ctx, srcPath) if err != nil { return nil } defer envTar.Close() reader := tar.NewReader(envTar) _, err = reader.Next() if err != nil && err != io.EOF { return err } s := bufio.NewScanner(reader) s.Buffer(nil, 1024*1024*1024) // increase buffer to 1GB to avoid scanner buffer overflow firstLine := true for s.Scan() { line := s.Text() if firstLine { firstLine = false // skip utf8 bom, powershell 5 legacy uses it for utf8 if len(line) >= 3 && line[0] == 239 && line[1] == 187 && line[2] == 191 { line = line[3:] } } singleLineEnv := strings.Index(line, "=") multiLineEnv := strings.Index(line, "<<") if singleLineEnv != -1 && (multiLineEnv == -1 || singleLineEnv < multiLineEnv) { localEnv[line[:singleLineEnv]] = line[singleLineEnv+1:] } else if multiLineEnv != -1 { multiLineEnvContent := "" multiLineEnvDelimiter := line[multiLineEnv+2:] delimiterFound := false for s.Scan() { content := s.Text() if content == multiLineEnvDelimiter { delimiterFound = true break } if multiLineEnvContent != "" { multiLineEnvContent += "\n" } multiLineEnvContent += content } if !delimiterFound { return fmt.Errorf("invalid format delimiter '%v' not found before end of file", multiLineEnvDelimiter) } localEnv[line[:multiLineEnv]] = multiLineEnvContent } else { return fmt.Errorf("invalid format '%v', expected a line with '=' or '<<'", line) } } env = &localEnv return s.Err() } }
go
MIT
d93106d194bba273d70d2ba604ea633c3f396b59
2026-01-07T08:35:43.481138Z
false
nektos/act
https://github.com/nektos/act/blob/d93106d194bba273d70d2ba604ea633c3f396b59/pkg/container/host_environment.go
pkg/container/host_environment.go
package container import ( "archive/tar" "bytes" "context" "errors" "fmt" "io" "io/fs" "os" "os/exec" "path/filepath" "runtime" "strings" "time" "github.com/go-git/go-billy/v5/helper/polyfill" "github.com/go-git/go-billy/v5/osfs" "github.com/go-git/go-git/v5/plumbing/format/gitignore" "golang.org/x/term" "github.com/nektos/act/pkg/common" "github.com/nektos/act/pkg/filecollector" "github.com/nektos/act/pkg/lookpath" ) type HostEnvironment struct { Path string TmpDir string ToolCache string Workdir string ActPath string CleanUp func() StdOut io.Writer } func (e *HostEnvironment) Create(_ []string, _ []string) common.Executor { return func(_ context.Context) error { return nil } } func (e *HostEnvironment) Close() common.Executor { return func(_ context.Context) error { return nil } } func (e *HostEnvironment) Copy(destPath string, files ...*FileEntry) common.Executor { return func(_ context.Context) error { for _, f := range files { if err := os.MkdirAll(filepath.Dir(filepath.Join(destPath, f.Name)), 0o777); err != nil { return err } if err := os.WriteFile(filepath.Join(destPath, f.Name), []byte(f.Body), fs.FileMode(f.Mode)); err != nil { return err } } return nil } } func (e *HostEnvironment) CopyTarStream(ctx context.Context, destPath string, tarStream io.Reader) error { if err := os.RemoveAll(destPath); err != nil { return err } tr := tar.NewReader(tarStream) cp := &filecollector.CopyCollector{ DstDir: destPath, } for { ti, err := tr.Next() if errors.Is(err, io.EOF) { return nil } else if err != nil { return err } if ti.FileInfo().IsDir() { continue } if ctx.Err() != nil { return fmt.Errorf("CopyTarStream has been cancelled") } if err := cp.WriteFile(ti.Name, ti.FileInfo(), ti.Linkname, tr); err != nil { return err } } } func (e *HostEnvironment) CopyDir(destPath string, srcPath string, useGitIgnore bool) common.Executor { return func(ctx context.Context) error { logger := common.Logger(ctx) srcPrefix := filepath.Dir(srcPath) if !strings.HasSuffix(srcPrefix, string(filepath.Separator)) { srcPrefix += string(filepath.Separator) } logger.Debugf("Stripping prefix:%s src:%s", srcPrefix, srcPath) var ignorer gitignore.Matcher if useGitIgnore { ps, err := gitignore.ReadPatterns(polyfill.New(osfs.New(srcPath)), nil) if err != nil { logger.Debugf("Error loading .gitignore: %v", err) } ignorer = gitignore.NewMatcher(ps) } fc := &filecollector.FileCollector{ Fs: &filecollector.DefaultFs{}, Ignorer: ignorer, SrcPath: srcPath, SrcPrefix: srcPrefix, Handler: &filecollector.CopyCollector{ DstDir: destPath, }, } return filepath.Walk(srcPath, fc.CollectFiles(ctx, []string{})) } } func (e *HostEnvironment) GetContainerArchive(ctx context.Context, srcPath string) (io.ReadCloser, error) { buf := &bytes.Buffer{} tw := tar.NewWriter(buf) defer tw.Close() srcPath = filepath.Clean(srcPath) fi, err := os.Lstat(srcPath) if err != nil { return nil, err } tc := &filecollector.TarCollector{ TarWriter: tw, } if fi.IsDir() { srcPrefix := srcPath if !strings.HasSuffix(srcPrefix, string(filepath.Separator)) { srcPrefix += string(filepath.Separator) } fc := &filecollector.FileCollector{ Fs: &filecollector.DefaultFs{}, SrcPath: srcPath, SrcPrefix: srcPrefix, Handler: tc, } err = filepath.Walk(srcPath, fc.CollectFiles(ctx, []string{})) if err != nil { return nil, err } } else { var f io.ReadCloser var linkname string if fi.Mode()&fs.ModeSymlink != 0 { linkname, err = os.Readlink(srcPath) if err != nil { return nil, err } } else { f, err = os.Open(srcPath) if err != nil { return nil, err } defer f.Close() } err := tc.WriteFile(fi.Name(), fi, linkname, f) if err != nil { return nil, err } } return io.NopCloser(buf), nil } func (e *HostEnvironment) Pull(_ bool) common.Executor { return func(_ context.Context) error { return nil } } func (e *HostEnvironment) Start(_ bool) common.Executor { return func(_ context.Context) error { return nil } } type ptyWriter struct { Out io.Writer AutoStop bool dirtyLine bool } func (w *ptyWriter) Write(buf []byte) (int, error) { if w.AutoStop && len(buf) > 0 && buf[len(buf)-1] == 4 { n, err := w.Out.Write(buf[:len(buf)-1]) if err != nil { return n, err } if w.dirtyLine || len(buf) > 1 && buf[len(buf)-2] != '\n' { _, _ = w.Out.Write([]byte("\n")) return n, io.EOF } return n, io.EOF } w.dirtyLine = strings.LastIndex(string(buf), "\n") < len(buf)-1 return w.Out.Write(buf) } type localEnv struct { env map[string]string } func (l *localEnv) Getenv(name string) string { if runtime.GOOS == "windows" { for k, v := range l.env { if strings.EqualFold(name, k) { return v } } return "" } return l.env[name] } func lookupPathHost(cmd string, env map[string]string, writer io.Writer) (string, error) { f, err := lookpath.LookPath2(cmd, &localEnv{env: env}) if err != nil { err := "Cannot find: " + fmt.Sprint(cmd) + " in PATH" if _, _err := writer.Write([]byte(err + "\n")); _err != nil { return "", fmt.Errorf("%v: %w", err, _err) } return "", errors.New(err) } return f, nil } func setupPty(cmd *exec.Cmd, cmdline string) (*os.File, *os.File, error) { ppty, tty, err := openPty() if err != nil { return nil, nil, err } if term.IsTerminal(int(tty.Fd())) { _, err := term.MakeRaw(int(tty.Fd())) if err != nil { ppty.Close() tty.Close() return nil, nil, err } } cmd.Stdin = tty cmd.Stdout = tty cmd.Stderr = tty cmd.SysProcAttr = getSysProcAttr(cmdline, true) return ppty, tty, nil } func writeKeepAlive(ppty io.Writer) { c := 1 var err error for c == 1 && err == nil { c, err = ppty.Write([]byte{4}) <-time.After(time.Second) } } func copyPtyOutput(writer io.Writer, ppty io.Reader, finishLog context.CancelFunc) { defer func() { finishLog() }() if _, err := io.Copy(writer, ppty); err != nil { return } } func (e *HostEnvironment) UpdateFromImageEnv(_ *map[string]string) common.Executor { return func(_ context.Context) error { return nil } } func getEnvListFromMap(env map[string]string) []string { envList := make([]string, 0) for k, v := range env { envList = append(envList, fmt.Sprintf("%s=%s", k, v)) } return envList } func (e *HostEnvironment) exec(ctx context.Context, command []string, cmdline string, env map[string]string, _, workdir string) error { envList := getEnvListFromMap(env) var wd string if workdir != "" { if filepath.IsAbs(workdir) { wd = workdir } else { wd = filepath.Join(e.Path, workdir) } } else { wd = e.Path } f, err := lookupPathHost(command[0], env, e.StdOut) if err != nil { return err } cmd := exec.CommandContext(ctx, f) cmd.Path = f cmd.Args = command cmd.Stdin = nil cmd.Stdout = e.StdOut cmd.Env = envList cmd.Stderr = e.StdOut cmd.Dir = wd cmd.SysProcAttr = getSysProcAttr(cmdline, false) var ppty *os.File var tty *os.File defer func() { if ppty != nil { ppty.Close() } if tty != nil { tty.Close() } }() if true /* allocate Terminal */ { var err error ppty, tty, err = setupPty(cmd, cmdline) if err != nil { common.Logger(ctx).Debugf("Failed to setup Pty %v\n", err.Error()) } } writer := &ptyWriter{Out: e.StdOut} logctx, finishLog := context.WithCancel(context.Background()) if ppty != nil { go copyPtyOutput(writer, ppty, finishLog) } else { finishLog() } if ppty != nil { go writeKeepAlive(ppty) } err = cmd.Run() if err != nil { return err } if tty != nil { writer.AutoStop = true if _, err := tty.Write([]byte("\x04")); err != nil { common.Logger(ctx).Debug("Failed to write EOT") } } <-logctx.Done() if ppty != nil { ppty.Close() ppty = nil } return err } func (e *HostEnvironment) Exec(command []string /*cmdline string, */, env map[string]string, user, workdir string) common.Executor { return e.ExecWithCmdLine(command, "", env, user, workdir) } func (e *HostEnvironment) ExecWithCmdLine(command []string, cmdline string, env map[string]string, user, workdir string) common.Executor { return func(ctx context.Context) error { if err := e.exec(ctx, command, cmdline, env, user, workdir); err != nil { select { case <-ctx.Done(): return fmt.Errorf("this step has been cancelled: %w", err) default: return err } } return nil } } func (e *HostEnvironment) UpdateFromEnv(srcPath string, env *map[string]string) common.Executor { return parseEnvFile(e, srcPath, env) } func (e *HostEnvironment) Remove() common.Executor { return func(_ context.Context) error { if e.CleanUp != nil { e.CleanUp() } return os.RemoveAll(e.Path) } } func (e *HostEnvironment) ToContainerPath(path string) string { if bp, err := filepath.Rel(e.Workdir, path); err != nil { return filepath.Join(e.Path, bp) } else if filepath.Clean(e.Workdir) == filepath.Clean(path) { return e.Path } return path } func (e *HostEnvironment) GetActPath() string { actPath := e.ActPath if runtime.GOOS == "windows" { actPath = strings.ReplaceAll(actPath, "\\", "/") } return actPath } func (*HostEnvironment) GetPathVariableName() string { if runtime.GOOS == "plan9" { return "path" } else if runtime.GOOS == "windows" { return "Path" // Actually we need a case insensitive map } return "PATH" } func (e *HostEnvironment) DefaultPathVariable() string { v, _ := os.LookupEnv(e.GetPathVariableName()) return v } func (*HostEnvironment) JoinPathVariable(paths ...string) string { return strings.Join(paths, string(filepath.ListSeparator)) } // Reference for Arch values for runner.arch // https://docs.github.com/en/actions/learn-github-actions/contexts#runner-context func goArchToActionArch(arch string) string { archMapper := map[string]string{ "amd64": "X64", "x86_64": "X64", "386": "X86", "aarch64": "ARM64", } if arch, ok := archMapper[arch]; ok { return arch } return arch } func goOsToActionOs(os string) string { osMapper := map[string]string{ "linux": "Linux", "windows": "Windows", "darwin": "macOS", } if os, ok := osMapper[os]; ok { return os } return os } func (e *HostEnvironment) GetRunnerContext(_ context.Context) map[string]interface{} { return map[string]interface{}{ "os": goOsToActionOs(runtime.GOOS), "arch": goArchToActionArch(runtime.GOARCH), "temp": e.TmpDir, "tool_cache": e.ToolCache, } } func (e *HostEnvironment) GetHealth(_ context.Context) Health { return HealthHealthy } func (e *HostEnvironment) ReplaceLogWriter(stdout io.Writer, _ io.Writer) (io.Writer, io.Writer) { org := e.StdOut e.StdOut = stdout return org, org } func (*HostEnvironment) IsEnvironmentCaseInsensitive() bool { return runtime.GOOS == "windows" }
go
MIT
d93106d194bba273d70d2ba604ea633c3f396b59
2026-01-07T08:35:43.481138Z
false
nektos/act
https://github.com/nektos/act/blob/d93106d194bba273d70d2ba604ea633c3f396b59/pkg/container/docker_stub.go
pkg/container/docker_stub.go
//go:build WITHOUT_DOCKER || !(linux || darwin || windows || netbsd) package container import ( "context" "runtime" "github.com/docker/docker/api/types/system" "github.com/nektos/act/pkg/common" "github.com/pkg/errors" ) // ImageExistsLocally returns a boolean indicating if an image with the // requested name, tag and architecture exists in the local docker image store func ImageExistsLocally(ctx context.Context, imageName string, platform string) (bool, error) { return false, errors.New("Unsupported Operation") } // RemoveImage removes image from local store, the function is used to run different // container image architectures func RemoveImage(ctx context.Context, imageName string, force bool, pruneChildren bool) (bool, error) { return false, errors.New("Unsupported Operation") } // NewDockerBuildExecutor function to create a run executor for the container func NewDockerBuildExecutor(input NewDockerBuildExecutorInput) common.Executor { return func(ctx context.Context) error { return errors.New("Unsupported Operation") } } // NewDockerPullExecutor function to create a run executor for the container func NewDockerPullExecutor(input NewDockerPullExecutorInput) common.Executor { return func(ctx context.Context) error { return errors.New("Unsupported Operation") } } // NewContainer creates a reference to a container func NewContainer(input *NewContainerInput) ExecutionsEnvironment { return nil } func RunnerArch(ctx context.Context) string { return runtime.GOOS } func GetHostInfo(ctx context.Context) (info system.Info, err error) { return system.Info{}, nil } func NewDockerVolumeRemoveExecutor(volume string, force bool) common.Executor { return func(ctx context.Context) error { return nil } } func NewDockerNetworkCreateExecutor(name string) common.Executor { return func(ctx context.Context) error { return nil } } func NewDockerNetworkRemoveExecutor(name string) common.Executor { return func(ctx context.Context) error { return nil } }
go
MIT
d93106d194bba273d70d2ba604ea633c3f396b59
2026-01-07T08:35:43.481138Z
false
nektos/act
https://github.com/nektos/act/blob/d93106d194bba273d70d2ba604ea633c3f396b59/pkg/container/util.go
pkg/container/util.go
//go:build (!windows && !plan9 && !openbsd) || (!windows && !plan9 && !mips64) package container import ( "os" "syscall" "github.com/creack/pty" ) func getSysProcAttr(_ string, tty bool) *syscall.SysProcAttr { if tty { return &syscall.SysProcAttr{ Setsid: true, Setctty: true, } } return &syscall.SysProcAttr{ Setpgid: true, } } func openPty() (*os.File, *os.File, error) { return pty.Open() }
go
MIT
d93106d194bba273d70d2ba604ea633c3f396b59
2026-01-07T08:35:43.481138Z
false
End of preview. Expand in Data Studio
README.md exists but content is empty.
Downloads last month
204

Models trained or fine-tuned on Shuu12121/github-file-programs-dataset-go