summaryrefslogtreecommitdiffstats
path: root/pkg/runner/testdata/actions/node12/node_modules/@octokit/auth-token
diff options
context:
space:
mode:
Diffstat (limited to 'pkg/runner/testdata/actions/node12/node_modules/@octokit/auth-token')
-rw-r--r--pkg/runner/testdata/actions/node12/node_modules/@octokit/auth-token/LICENSE21
-rw-r--r--pkg/runner/testdata/actions/node12/node_modules/@octokit/auth-token/README.md290
-rw-r--r--pkg/runner/testdata/actions/node12/node_modules/@octokit/auth-token/dist-node/index.js55
-rw-r--r--pkg/runner/testdata/actions/node12/node_modules/@octokit/auth-token/dist-node/index.js.map1
-rw-r--r--pkg/runner/testdata/actions/node12/node_modules/@octokit/auth-token/dist-src/auth.js21
-rw-r--r--pkg/runner/testdata/actions/node12/node_modules/@octokit/auth-token/dist-src/hook.js6
-rw-r--r--pkg/runner/testdata/actions/node12/node_modules/@octokit/auth-token/dist-src/index.js14
-rw-r--r--pkg/runner/testdata/actions/node12/node_modules/@octokit/auth-token/dist-src/types.js1
-rw-r--r--pkg/runner/testdata/actions/node12/node_modules/@octokit/auth-token/dist-src/with-authorization-prefix.js11
-rw-r--r--pkg/runner/testdata/actions/node12/node_modules/@octokit/auth-token/dist-types/auth.d.ts2
-rw-r--r--pkg/runner/testdata/actions/node12/node_modules/@octokit/auth-token/dist-types/hook.d.ts2
-rw-r--r--pkg/runner/testdata/actions/node12/node_modules/@octokit/auth-token/dist-types/index.d.ts7
-rw-r--r--pkg/runner/testdata/actions/node12/node_modules/@octokit/auth-token/dist-types/types.d.ts33
-rw-r--r--pkg/runner/testdata/actions/node12/node_modules/@octokit/auth-token/dist-types/with-authorization-prefix.d.ts6
-rw-r--r--pkg/runner/testdata/actions/node12/node_modules/@octokit/auth-token/dist-web/index.js55
-rw-r--r--pkg/runner/testdata/actions/node12/node_modules/@octokit/auth-token/dist-web/index.js.map1
-rw-r--r--pkg/runner/testdata/actions/node12/node_modules/@octokit/auth-token/package.json45
17 files changed, 571 insertions, 0 deletions
diff --git a/pkg/runner/testdata/actions/node12/node_modules/@octokit/auth-token/LICENSE b/pkg/runner/testdata/actions/node12/node_modules/@octokit/auth-token/LICENSE
new file mode 100644
index 0000000..ef2c18e
--- /dev/null
+++ b/pkg/runner/testdata/actions/node12/node_modules/@octokit/auth-token/LICENSE
@@ -0,0 +1,21 @@
+The MIT License
+
+Copyright (c) 2019 Octokit contributors
+
+Permission is hereby granted, free of charge, to any person obtaining a copy
+of this software and associated documentation files (the "Software"), to deal
+in the Software without restriction, including without limitation the rights
+to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
+copies of the Software, and to permit persons to whom the Software is
+furnished to do so, subject to the following conditions:
+
+The above copyright notice and this permission notice shall be included in
+all copies or substantial portions of the Software.
+
+THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
+IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
+FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
+AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
+LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
+OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
+THE SOFTWARE.
diff --git a/pkg/runner/testdata/actions/node12/node_modules/@octokit/auth-token/README.md b/pkg/runner/testdata/actions/node12/node_modules/@octokit/auth-token/README.md
new file mode 100644
index 0000000..a1f6d35
--- /dev/null
+++ b/pkg/runner/testdata/actions/node12/node_modules/@octokit/auth-token/README.md
@@ -0,0 +1,290 @@
+# auth-token.js
+
+> GitHub API token authentication for browsers and Node.js
+
+[![@latest](https://img.shields.io/npm/v/@octokit/auth-token.svg)](https://www.npmjs.com/package/@octokit/auth-token)
+[![Build Status](https://github.com/octokit/auth-token.js/workflows/Test/badge.svg)](https://github.com/octokit/auth-token.js/actions?query=workflow%3ATest)
+
+`@octokit/auth-token` is the simplest of [GitHub’s authentication strategies](https://github.com/octokit/auth.js).
+
+It is useful if you want to support multiple authentication strategies, as it’s API is compatible with its sibling packages for [basic](https://github.com/octokit/auth-basic.js), [GitHub App](https://github.com/octokit/auth-app.js) and [OAuth app](https://github.com/octokit/auth.js) authentication.
+
+<!-- toc -->
+
+- [Usage](#usage)
+- [`createTokenAuth(token) options`](#createtokenauthtoken-options)
+- [`auth()`](#auth)
+- [Authentication object](#authentication-object)
+- [`auth.hook(request, route, options)` or `auth.hook(request, options)`](#authhookrequest-route-options-or-authhookrequest-options)
+- [Find more information](#find-more-information)
+ - [Find out what scopes are enabled for oauth tokens](#find-out-what-scopes-are-enabled-for-oauth-tokens)
+ - [Find out if token is a personal access token or if it belongs to an OAuth app](#find-out-if-token-is-a-personal-access-token-or-if-it-belongs-to-an-oauth-app)
+ - [Find out what permissions are enabled for a repository](#find-out-what-permissions-are-enabled-for-a-repository)
+ - [Use token for git operations](#use-token-for-git-operations)
+- [License](#license)
+
+<!-- tocstop -->
+
+## Usage
+
+<table>
+<tbody valign=top align=left>
+<tr><th>
+Browsers
+</th><td width=100%>
+
+Load `@octokit/auth-token` directly from [cdn.skypack.dev](https://cdn.skypack.dev)
+
+```html
+<script type="module">
+ import { createTokenAuth } from "https://cdn.skypack.dev/@octokit/auth-token";
+</script>
+```
+
+</td></tr>
+<tr><th>
+Node
+</th><td>
+
+Install with <code>npm install @octokit/auth-token</code>
+
+```js
+const { createTokenAuth } = require("@octokit/auth-token");
+// or: import { createTokenAuth } from "@octokit/auth-token";
+```
+
+</td></tr>
+</tbody>
+</table>
+
+```js
+const auth = createTokenAuth("ghp_PersonalAccessToken01245678900000000");
+const authentication = await auth();
+// {
+// type: 'token',
+// token: 'ghp_PersonalAccessToken01245678900000000',
+// tokenType: 'oauth'
+// }
+```
+
+## `createTokenAuth(token) options`
+
+The `createTokenAuth` method accepts a single argument of type string, which is the token. The passed token can be one of the following:
+
+- [Personal access token](https://help.github.com/en/articles/creating-a-personal-access-token-for-the-command-line)
+- [OAuth access token](https://developer.github.com/apps/building-oauth-apps/authorizing-oauth-apps/)
+- [GITHUB_TOKEN provided to GitHub Actions](https://developer.github.com/actions/creating-github-actions/accessing-the-runtime-environment/#environment-variables)
+- Installation access token ([server-to-server](https://developer.github.com/apps/building-github-apps/authenticating-with-github-apps/#authenticating-as-an-installation))
+- User authentication for installation ([user-to-server](https://docs.github.com/en/developers/apps/building-github-apps/identifying-and-authorizing-users-for-github-apps))
+
+Examples
+
+```js
+// Personal access token or OAuth access token
+createTokenAuth("ghp_PersonalAccessToken01245678900000000");
+// {
+// type: 'token',
+// token: 'ghp_PersonalAccessToken01245678900000000',
+// tokenType: 'oauth'
+// }
+
+// Installation access token or GitHub Action token
+createTokenAuth("ghs_InstallallationOrActionToken00000000");
+// {
+// type: 'token',
+// token: 'ghs_InstallallationOrActionToken00000000',
+// tokenType: 'installation'
+// }
+
+// Installation access token or GitHub Action token
+createTokenAuth("ghu_InstallationUserToServer000000000000");
+// {
+// type: 'token',
+// token: 'ghu_InstallationUserToServer000000000000',
+// tokenType: 'user-to-server'
+// }
+```
+
+## `auth()`
+
+The `auth()` method has no options. It returns a promise which resolves with the the authentication object.
+
+## Authentication object
+
+<table width="100%">
+ <thead align=left>
+ <tr>
+ <th width=150>
+ name
+ </th>
+ <th width=70>
+ type
+ </th>
+ <th>
+ description
+ </th>
+ </tr>
+ </thead>
+ <tbody align=left valign=top>
+ <tr>
+ <th>
+ <code>type</code>
+ </th>
+ <th>
+ <code>string</code>
+ </th>
+ <td>
+ <code>"token"</code>
+ </td>
+ </tr>
+ <tr>
+ <th>
+ <code>token</code>
+ </th>
+ <th>
+ <code>string</code>
+ </th>
+ <td>
+ The provided token.
+ </td>
+ </tr>
+ <tr>
+ <th>
+ <code>tokenType</code>
+ </th>
+ <th>
+ <code>string</code>
+ </th>
+ <td>
+ Can be either <code>"oauth"</code> for personal access tokens and OAuth tokens, <code>"installation"</code> for installation access tokens (includes <code>GITHUB_TOKEN</code> provided to GitHub Actions), <code>"app"</code> for a GitHub App JSON Web Token, or <code>"user-to-server"</code> for a user authentication token through an app installation.
+ </td>
+ </tr>
+ </tbody>
+</table>
+
+## `auth.hook(request, route, options)` or `auth.hook(request, options)`
+
+`auth.hook()` hooks directly into the request life cycle. It authenticates the request using the provided token.
+
+The `request` option is an instance of [`@octokit/request`](https://github.com/octokit/request.js#readme). The `route`/`options` parameters are the same as for the [`request()` method](https://github.com/octokit/request.js#request).
+
+`auth.hook()` can be called directly to send an authenticated request
+
+```js
+const { data: authorizations } = await auth.hook(
+ request,
+ "GET /authorizations"
+);
+```
+
+Or it can be passed as option to [`request()`](https://github.com/octokit/request.js#request).
+
+```js
+const requestWithAuth = request.defaults({
+ request: {
+ hook: auth.hook,
+ },
+});
+
+const { data: authorizations } = await requestWithAuth("GET /authorizations");
+```
+
+## Find more information
+
+`auth()` does not send any requests, it only transforms the provided token string into an authentication object.
+
+Here is a list of things you can do to retrieve further information
+
+### Find out what scopes are enabled for oauth tokens
+
+Note that this does not work for installations. There is no way to retrieve permissions based on an installation access tokens.
+
+```js
+const TOKEN = "ghp_PersonalAccessToken01245678900000000";
+
+const auth = createTokenAuth(TOKEN);
+const authentication = await auth();
+
+const response = await request("HEAD /", {
+ headers: authentication.headers,
+});
+const scopes = response.headers["x-oauth-scopes"].split(/,\s+/);
+
+if (scopes.length) {
+ console.log(
+ `"${TOKEN}" has ${scopes.length} scopes enabled: ${scopes.join(", ")}`
+ );
+} else {
+ console.log(`"${TOKEN}" has no scopes enabled`);
+}
+```
+
+### Find out if token is a personal access token or if it belongs to an OAuth app
+
+```js
+const TOKEN = "ghp_PersonalAccessToken01245678900000000";
+
+const auth = createTokenAuth(TOKEN);
+const authentication = await auth();
+
+const response = await request("HEAD /", {
+ headers: authentication.headers,
+});
+const clientId = response.headers["x-oauth-client-id"];
+
+if (clientId) {
+ console.log(
+ `"${token}" is an OAuth token, its app’s client_id is ${clientId}.`
+ );
+} else {
+ console.log(`"${token}" is a personal access token`);
+}
+```
+
+### Find out what permissions are enabled for a repository
+
+Note that the `permissions` key is not set when authenticated using an installation access token.
+
+```js
+const TOKEN = "ghp_PersonalAccessToken01245678900000000";
+
+const auth = createTokenAuth(TOKEN);
+const authentication = await auth();
+
+const response = await request("GET /repos/{owner}/{repo}", {
+ owner: 'octocat',
+ repo: 'hello-world'
+ headers: authentication.headers
+});
+
+console.log(response.data.permissions)
+// {
+// admin: true,
+// push: true,
+// pull: true
+// }
+```
+
+### Use token for git operations
+
+Both OAuth and installation access tokens can be used for git operations. However, when using with an installation, [the token must be prefixed with `x-access-token`](https://developer.github.com/apps/building-github-apps/authenticating-with-github-apps/#http-based-git-access-by-an-installation).
+
+This example is using the [`execa`](https://github.com/sindresorhus/execa) package to run a `git push` command.
+
+```js
+const TOKEN = "ghp_PersonalAccessToken01245678900000000";
+
+const auth = createTokenAuth(TOKEN);
+const { token, tokenType } = await auth();
+const tokenWithPrefix =
+ tokenType === "installation" ? `x-access-token:${token}` : token;
+
+const repositoryUrl = `https://${tokenWithPrefix}@github.com/octocat/hello-world.git`;
+
+const { stdout } = await execa("git", ["push", repositoryUrl]);
+console.log(stdout);
+```
+
+## License
+
+[MIT](LICENSE)
diff --git a/pkg/runner/testdata/actions/node12/node_modules/@octokit/auth-token/dist-node/index.js b/pkg/runner/testdata/actions/node12/node_modules/@octokit/auth-token/dist-node/index.js
new file mode 100644
index 0000000..af0f0a6
--- /dev/null
+++ b/pkg/runner/testdata/actions/node12/node_modules/@octokit/auth-token/dist-node/index.js
@@ -0,0 +1,55 @@
+'use strict';
+
+Object.defineProperty(exports, '__esModule', { value: true });
+
+const REGEX_IS_INSTALLATION_LEGACY = /^v1\./;
+const REGEX_IS_INSTALLATION = /^ghs_/;
+const REGEX_IS_USER_TO_SERVER = /^ghu_/;
+async function auth(token) {
+ const isApp = token.split(/\./).length === 3;
+ const isInstallation = REGEX_IS_INSTALLATION_LEGACY.test(token) || REGEX_IS_INSTALLATION.test(token);
+ const isUserToServer = REGEX_IS_USER_TO_SERVER.test(token);
+ const tokenType = isApp ? "app" : isInstallation ? "installation" : isUserToServer ? "user-to-server" : "oauth";
+ return {
+ type: "token",
+ token: token,
+ tokenType
+ };
+}
+
+/**
+ * Prefix token for usage in the Authorization header
+ *
+ * @param token OAuth token or JSON Web Token
+ */
+function withAuthorizationPrefix(token) {
+ if (token.split(/\./).length === 3) {
+ return `bearer ${token}`;
+ }
+
+ return `token ${token}`;
+}
+
+async function hook(token, request, route, parameters) {
+ const endpoint = request.endpoint.merge(route, parameters);
+ endpoint.headers.authorization = withAuthorizationPrefix(token);
+ return request(endpoint);
+}
+
+const createTokenAuth = function createTokenAuth(token) {
+ if (!token) {
+ throw new Error("[@octokit/auth-token] No token passed to createTokenAuth");
+ }
+
+ if (typeof token !== "string") {
+ throw new Error("[@octokit/auth-token] Token passed to createTokenAuth is not a string");
+ }
+
+ token = token.replace(/^(token|bearer) +/i, "");
+ return Object.assign(auth.bind(null, token), {
+ hook: hook.bind(null, token)
+ });
+};
+
+exports.createTokenAuth = createTokenAuth;
+//# sourceMappingURL=index.js.map
diff --git a/pkg/runner/testdata/actions/node12/node_modules/@octokit/auth-token/dist-node/index.js.map b/pkg/runner/testdata/actions/node12/node_modules/@octokit/auth-token/dist-node/index.js.map
new file mode 100644
index 0000000..af0c2e2
--- /dev/null
+++ b/pkg/runner/testdata/actions/node12/node_modules/@octokit/auth-token/dist-node/index.js.map
@@ -0,0 +1 @@
+{"version":3,"file":"index.js","sources":["../dist-src/auth.js","../dist-src/with-authorization-prefix.js","../dist-src/hook.js","../dist-src/index.js"],"sourcesContent":["const REGEX_IS_INSTALLATION_LEGACY = /^v1\\./;\nconst REGEX_IS_INSTALLATION = /^ghs_/;\nconst REGEX_IS_USER_TO_SERVER = /^ghu_/;\nexport async function auth(token) {\n const isApp = token.split(/\\./).length === 3;\n const isInstallation = REGEX_IS_INSTALLATION_LEGACY.test(token) ||\n REGEX_IS_INSTALLATION.test(token);\n const isUserToServer = REGEX_IS_USER_TO_SERVER.test(token);\n const tokenType = isApp\n ? \"app\"\n : isInstallation\n ? \"installation\"\n : isUserToServer\n ? \"user-to-server\"\n : \"oauth\";\n return {\n type: \"token\",\n token: token,\n tokenType,\n };\n}\n","/**\n * Prefix token for usage in the Authorization header\n *\n * @param token OAuth token or JSON Web Token\n */\nexport function withAuthorizationPrefix(token) {\n if (token.split(/\\./).length === 3) {\n return `bearer ${token}`;\n }\n return `token ${token}`;\n}\n","import { withAuthorizationPrefix } from \"./with-authorization-prefix\";\nexport async function hook(token, request, route, parameters) {\n const endpoint = request.endpoint.merge(route, parameters);\n endpoint.headers.authorization = withAuthorizationPrefix(token);\n return request(endpoint);\n}\n","import { auth } from \"./auth\";\nimport { hook } from \"./hook\";\nexport const createTokenAuth = function createTokenAuth(token) {\n if (!token) {\n throw new Error(\"[@octokit/auth-token] No token passed to createTokenAuth\");\n }\n if (typeof token !== \"string\") {\n throw new Error(\"[@octokit/auth-token] Token passed to createTokenAuth is not a string\");\n }\n token = token.replace(/^(token|bearer) +/i, \"\");\n return Object.assign(auth.bind(null, token), {\n hook: hook.bind(null, token),\n });\n};\n"],"names":["REGEX_IS_INSTALLATION_LEGACY","REGEX_IS_INSTALLATION","REGEX_IS_USER_TO_SERVER","auth","token","isApp","split","length","isInstallation","test","isUserToServer","tokenType","type","withAuthorizationPrefix","hook","request","route","parameters","endpoint","merge","headers","authorization","createTokenAuth","Error","replace","Object","assign","bind"],"mappings":";;;;AAAA,MAAMA,4BAA4B,GAAG,OAArC;AACA,MAAMC,qBAAqB,GAAG,OAA9B;AACA,MAAMC,uBAAuB,GAAG,OAAhC;AACO,eAAeC,IAAf,CAAoBC,KAApB,EAA2B;AAC9B,QAAMC,KAAK,GAAGD,KAAK,CAACE,KAAN,CAAY,IAAZ,EAAkBC,MAAlB,KAA6B,CAA3C;AACA,QAAMC,cAAc,GAAGR,4BAA4B,CAACS,IAA7B,CAAkCL,KAAlC,KACnBH,qBAAqB,CAACQ,IAAtB,CAA2BL,KAA3B,CADJ;AAEA,QAAMM,cAAc,GAAGR,uBAAuB,CAACO,IAAxB,CAA6BL,KAA7B,CAAvB;AACA,QAAMO,SAAS,GAAGN,KAAK,GACjB,KADiB,GAEjBG,cAAc,GACV,cADU,GAEVE,cAAc,GACV,gBADU,GAEV,OANd;AAOA,SAAO;AACHE,IAAAA,IAAI,EAAE,OADH;AAEHR,IAAAA,KAAK,EAAEA,KAFJ;AAGHO,IAAAA;AAHG,GAAP;AAKH;;ACpBD;AACA;AACA;AACA;AACA;AACA,AAAO,SAASE,uBAAT,CAAiCT,KAAjC,EAAwC;AAC3C,MAAIA,KAAK,CAACE,KAAN,CAAY,IAAZ,EAAkBC,MAAlB,KAA6B,CAAjC,EAAoC;AAChC,WAAQ,UAASH,KAAM,EAAvB;AACH;;AACD,SAAQ,SAAQA,KAAM,EAAtB;AACH;;ACTM,eAAeU,IAAf,CAAoBV,KAApB,EAA2BW,OAA3B,EAAoCC,KAApC,EAA2CC,UAA3C,EAAuD;AAC1D,QAAMC,QAAQ,GAAGH,OAAO,CAACG,QAAR,CAAiBC,KAAjB,CAAuBH,KAAvB,EAA8BC,UAA9B,CAAjB;AACAC,EAAAA,QAAQ,CAACE,OAAT,CAAiBC,aAAjB,GAAiCR,uBAAuB,CAACT,KAAD,CAAxD;AACA,SAAOW,OAAO,CAACG,QAAD,CAAd;AACH;;MCHYI,eAAe,GAAG,SAASA,eAAT,CAAyBlB,KAAzB,EAAgC;AAC3D,MAAI,CAACA,KAAL,EAAY;AACR,UAAM,IAAImB,KAAJ,CAAU,0DAAV,CAAN;AACH;;AACD,MAAI,OAAOnB,KAAP,KAAiB,QAArB,EAA+B;AAC3B,UAAM,IAAImB,KAAJ,CAAU,uEAAV,CAAN;AACH;;AACDnB,EAAAA,KAAK,GAAGA,KAAK,CAACoB,OAAN,CAAc,oBAAd,EAAoC,EAApC,CAAR;AACA,SAAOC,MAAM,CAACC,MAAP,CAAcvB,IAAI,CAACwB,IAAL,CAAU,IAAV,EAAgBvB,KAAhB,CAAd,EAAsC;AACzCU,IAAAA,IAAI,EAAEA,IAAI,CAACa,IAAL,CAAU,IAAV,EAAgBvB,KAAhB;AADmC,GAAtC,CAAP;AAGH,CAXM;;;;"} \ No newline at end of file
diff --git a/pkg/runner/testdata/actions/node12/node_modules/@octokit/auth-token/dist-src/auth.js b/pkg/runner/testdata/actions/node12/node_modules/@octokit/auth-token/dist-src/auth.js
new file mode 100644
index 0000000..b22ce98
--- /dev/null
+++ b/pkg/runner/testdata/actions/node12/node_modules/@octokit/auth-token/dist-src/auth.js
@@ -0,0 +1,21 @@
+const REGEX_IS_INSTALLATION_LEGACY = /^v1\./;
+const REGEX_IS_INSTALLATION = /^ghs_/;
+const REGEX_IS_USER_TO_SERVER = /^ghu_/;
+export async function auth(token) {
+ const isApp = token.split(/\./).length === 3;
+ const isInstallation = REGEX_IS_INSTALLATION_LEGACY.test(token) ||
+ REGEX_IS_INSTALLATION.test(token);
+ const isUserToServer = REGEX_IS_USER_TO_SERVER.test(token);
+ const tokenType = isApp
+ ? "app"
+ : isInstallation
+ ? "installation"
+ : isUserToServer
+ ? "user-to-server"
+ : "oauth";
+ return {
+ type: "token",
+ token: token,
+ tokenType,
+ };
+}
diff --git a/pkg/runner/testdata/actions/node12/node_modules/@octokit/auth-token/dist-src/hook.js b/pkg/runner/testdata/actions/node12/node_modules/@octokit/auth-token/dist-src/hook.js
new file mode 100644
index 0000000..f8e47f0
--- /dev/null
+++ b/pkg/runner/testdata/actions/node12/node_modules/@octokit/auth-token/dist-src/hook.js
@@ -0,0 +1,6 @@
+import { withAuthorizationPrefix } from "./with-authorization-prefix";
+export async function hook(token, request, route, parameters) {
+ const endpoint = request.endpoint.merge(route, parameters);
+ endpoint.headers.authorization = withAuthorizationPrefix(token);
+ return request(endpoint);
+}
diff --git a/pkg/runner/testdata/actions/node12/node_modules/@octokit/auth-token/dist-src/index.js b/pkg/runner/testdata/actions/node12/node_modules/@octokit/auth-token/dist-src/index.js
new file mode 100644
index 0000000..f2ddd63
--- /dev/null
+++ b/pkg/runner/testdata/actions/node12/node_modules/@octokit/auth-token/dist-src/index.js
@@ -0,0 +1,14 @@
+import { auth } from "./auth";
+import { hook } from "./hook";
+export const createTokenAuth = function createTokenAuth(token) {
+ if (!token) {
+ throw new Error("[@octokit/auth-token] No token passed to createTokenAuth");
+ }
+ if (typeof token !== "string") {
+ throw new Error("[@octokit/auth-token] Token passed to createTokenAuth is not a string");
+ }
+ token = token.replace(/^(token|bearer) +/i, "");
+ return Object.assign(auth.bind(null, token), {
+ hook: hook.bind(null, token),
+ });
+};
diff --git a/pkg/runner/testdata/actions/node12/node_modules/@octokit/auth-token/dist-src/types.js b/pkg/runner/testdata/actions/node12/node_modules/@octokit/auth-token/dist-src/types.js
new file mode 100644
index 0000000..cb0ff5c
--- /dev/null
+++ b/pkg/runner/testdata/actions/node12/node_modules/@octokit/auth-token/dist-src/types.js
@@ -0,0 +1 @@
+export {};
diff --git a/pkg/runner/testdata/actions/node12/node_modules/@octokit/auth-token/dist-src/with-authorization-prefix.js b/pkg/runner/testdata/actions/node12/node_modules/@octokit/auth-token/dist-src/with-authorization-prefix.js
new file mode 100644
index 0000000..9035813
--- /dev/null
+++ b/pkg/runner/testdata/actions/node12/node_modules/@octokit/auth-token/dist-src/with-authorization-prefix.js
@@ -0,0 +1,11 @@
+/**
+ * Prefix token for usage in the Authorization header
+ *
+ * @param token OAuth token or JSON Web Token
+ */
+export function withAuthorizationPrefix(token) {
+ if (token.split(/\./).length === 3) {
+ return `bearer ${token}`;
+ }
+ return `token ${token}`;
+}
diff --git a/pkg/runner/testdata/actions/node12/node_modules/@octokit/auth-token/dist-types/auth.d.ts b/pkg/runner/testdata/actions/node12/node_modules/@octokit/auth-token/dist-types/auth.d.ts
new file mode 100644
index 0000000..dc41835
--- /dev/null
+++ b/pkg/runner/testdata/actions/node12/node_modules/@octokit/auth-token/dist-types/auth.d.ts
@@ -0,0 +1,2 @@
+import { Token, Authentication } from "./types";
+export declare function auth(token: Token): Promise<Authentication>;
diff --git a/pkg/runner/testdata/actions/node12/node_modules/@octokit/auth-token/dist-types/hook.d.ts b/pkg/runner/testdata/actions/node12/node_modules/@octokit/auth-token/dist-types/hook.d.ts
new file mode 100644
index 0000000..21e4b6f
--- /dev/null
+++ b/pkg/runner/testdata/actions/node12/node_modules/@octokit/auth-token/dist-types/hook.d.ts
@@ -0,0 +1,2 @@
+import { AnyResponse, EndpointOptions, RequestInterface, RequestParameters, Route, Token } from "./types";
+export declare function hook(token: Token, request: RequestInterface, route: Route | EndpointOptions, parameters?: RequestParameters): Promise<AnyResponse>;
diff --git a/pkg/runner/testdata/actions/node12/node_modules/@octokit/auth-token/dist-types/index.d.ts b/pkg/runner/testdata/actions/node12/node_modules/@octokit/auth-token/dist-types/index.d.ts
new file mode 100644
index 0000000..5999429
--- /dev/null
+++ b/pkg/runner/testdata/actions/node12/node_modules/@octokit/auth-token/dist-types/index.d.ts
@@ -0,0 +1,7 @@
+import { StrategyInterface, Token, Authentication } from "./types";
+export declare type Types = {
+ StrategyOptions: Token;
+ AuthOptions: never;
+ Authentication: Authentication;
+};
+export declare const createTokenAuth: StrategyInterface;
diff --git a/pkg/runner/testdata/actions/node12/node_modules/@octokit/auth-token/dist-types/types.d.ts b/pkg/runner/testdata/actions/node12/node_modules/@octokit/auth-token/dist-types/types.d.ts
new file mode 100644
index 0000000..0ae24de
--- /dev/null
+++ b/pkg/runner/testdata/actions/node12/node_modules/@octokit/auth-token/dist-types/types.d.ts
@@ -0,0 +1,33 @@
+import * as OctokitTypes from "@octokit/types";
+export declare type AnyResponse = OctokitTypes.OctokitResponse<any>;
+export declare type StrategyInterface = OctokitTypes.StrategyInterface<[
+ Token
+], [
+], Authentication>;
+export declare type EndpointDefaults = OctokitTypes.EndpointDefaults;
+export declare type EndpointOptions = OctokitTypes.EndpointOptions;
+export declare type RequestParameters = OctokitTypes.RequestParameters;
+export declare type RequestInterface = OctokitTypes.RequestInterface;
+export declare type Route = OctokitTypes.Route;
+export declare type Token = string;
+export declare type OAuthTokenAuthentication = {
+ type: "token";
+ tokenType: "oauth";
+ token: Token;
+};
+export declare type InstallationTokenAuthentication = {
+ type: "token";
+ tokenType: "installation";
+ token: Token;
+};
+export declare type AppAuthentication = {
+ type: "token";
+ tokenType: "app";
+ token: Token;
+};
+export declare type UserToServerAuthentication = {
+ type: "token";
+ tokenType: "user-to-server";
+ token: Token;
+};
+export declare type Authentication = OAuthTokenAuthentication | InstallationTokenAuthentication | AppAuthentication | UserToServerAuthentication;
diff --git a/pkg/runner/testdata/actions/node12/node_modules/@octokit/auth-token/dist-types/with-authorization-prefix.d.ts b/pkg/runner/testdata/actions/node12/node_modules/@octokit/auth-token/dist-types/with-authorization-prefix.d.ts
new file mode 100644
index 0000000..2e52c31
--- /dev/null
+++ b/pkg/runner/testdata/actions/node12/node_modules/@octokit/auth-token/dist-types/with-authorization-prefix.d.ts
@@ -0,0 +1,6 @@
+/**
+ * Prefix token for usage in the Authorization header
+ *
+ * @param token OAuth token or JSON Web Token
+ */
+export declare function withAuthorizationPrefix(token: string): string;
diff --git a/pkg/runner/testdata/actions/node12/node_modules/@octokit/auth-token/dist-web/index.js b/pkg/runner/testdata/actions/node12/node_modules/@octokit/auth-token/dist-web/index.js
new file mode 100644
index 0000000..8b1cd7d
--- /dev/null
+++ b/pkg/runner/testdata/actions/node12/node_modules/@octokit/auth-token/dist-web/index.js
@@ -0,0 +1,55 @@
+const REGEX_IS_INSTALLATION_LEGACY = /^v1\./;
+const REGEX_IS_INSTALLATION = /^ghs_/;
+const REGEX_IS_USER_TO_SERVER = /^ghu_/;
+async function auth(token) {
+ const isApp = token.split(/\./).length === 3;
+ const isInstallation = REGEX_IS_INSTALLATION_LEGACY.test(token) ||
+ REGEX_IS_INSTALLATION.test(token);
+ const isUserToServer = REGEX_IS_USER_TO_SERVER.test(token);
+ const tokenType = isApp
+ ? "app"
+ : isInstallation
+ ? "installation"
+ : isUserToServer
+ ? "user-to-server"
+ : "oauth";
+ return {
+ type: "token",
+ token: token,
+ tokenType,
+ };
+}
+
+/**
+ * Prefix token for usage in the Authorization header
+ *
+ * @param token OAuth token or JSON Web Token
+ */
+function withAuthorizationPrefix(token) {
+ if (token.split(/\./).length === 3) {
+ return `bearer ${token}`;
+ }
+ return `token ${token}`;
+}
+
+async function hook(token, request, route, parameters) {
+ const endpoint = request.endpoint.merge(route, parameters);
+ endpoint.headers.authorization = withAuthorizationPrefix(token);
+ return request(endpoint);
+}
+
+const createTokenAuth = function createTokenAuth(token) {
+ if (!token) {
+ throw new Error("[@octokit/auth-token] No token passed to createTokenAuth");
+ }
+ if (typeof token !== "string") {
+ throw new Error("[@octokit/auth-token] Token passed to createTokenAuth is not a string");
+ }
+ token = token.replace(/^(token|bearer) +/i, "");
+ return Object.assign(auth.bind(null, token), {
+ hook: hook.bind(null, token),
+ });
+};
+
+export { createTokenAuth };
+//# sourceMappingURL=index.js.map
diff --git a/pkg/runner/testdata/actions/node12/node_modules/@octokit/auth-token/dist-web/index.js.map b/pkg/runner/testdata/actions/node12/node_modules/@octokit/auth-token/dist-web/index.js.map
new file mode 100644
index 0000000..1d6197b
--- /dev/null
+++ b/pkg/runner/testdata/actions/node12/node_modules/@octokit/auth-token/dist-web/index.js.map
@@ -0,0 +1 @@
+{"version":3,"file":"index.js","sources":["../dist-src/auth.js","../dist-src/with-authorization-prefix.js","../dist-src/hook.js","../dist-src/index.js"],"sourcesContent":["const REGEX_IS_INSTALLATION_LEGACY = /^v1\\./;\nconst REGEX_IS_INSTALLATION = /^ghs_/;\nconst REGEX_IS_USER_TO_SERVER = /^ghu_/;\nexport async function auth(token) {\n const isApp = token.split(/\\./).length === 3;\n const isInstallation = REGEX_IS_INSTALLATION_LEGACY.test(token) ||\n REGEX_IS_INSTALLATION.test(token);\n const isUserToServer = REGEX_IS_USER_TO_SERVER.test(token);\n const tokenType = isApp\n ? \"app\"\n : isInstallation\n ? \"installation\"\n : isUserToServer\n ? \"user-to-server\"\n : \"oauth\";\n return {\n type: \"token\",\n token: token,\n tokenType,\n };\n}\n","/**\n * Prefix token for usage in the Authorization header\n *\n * @param token OAuth token or JSON Web Token\n */\nexport function withAuthorizationPrefix(token) {\n if (token.split(/\\./).length === 3) {\n return `bearer ${token}`;\n }\n return `token ${token}`;\n}\n","import { withAuthorizationPrefix } from \"./with-authorization-prefix\";\nexport async function hook(token, request, route, parameters) {\n const endpoint = request.endpoint.merge(route, parameters);\n endpoint.headers.authorization = withAuthorizationPrefix(token);\n return request(endpoint);\n}\n","import { auth } from \"./auth\";\nimport { hook } from \"./hook\";\nexport const createTokenAuth = function createTokenAuth(token) {\n if (!token) {\n throw new Error(\"[@octokit/auth-token] No token passed to createTokenAuth\");\n }\n if (typeof token !== \"string\") {\n throw new Error(\"[@octokit/auth-token] Token passed to createTokenAuth is not a string\");\n }\n token = token.replace(/^(token|bearer) +/i, \"\");\n return Object.assign(auth.bind(null, token), {\n hook: hook.bind(null, token),\n });\n};\n"],"names":[],"mappings":"AAAA,MAAM,4BAA4B,GAAG,OAAO,CAAC;AAC7C,MAAM,qBAAqB,GAAG,OAAO,CAAC;AACtC,MAAM,uBAAuB,GAAG,OAAO,CAAC;AACjC,eAAe,IAAI,CAAC,KAAK,EAAE;AAClC,IAAI,MAAM,KAAK,GAAG,KAAK,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,MAAM,KAAK,CAAC,CAAC;AACjD,IAAI,MAAM,cAAc,GAAG,4BAA4B,CAAC,IAAI,CAAC,KAAK,CAAC;AACnE,QAAQ,qBAAqB,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC;AAC1C,IAAI,MAAM,cAAc,GAAG,uBAAuB,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC;AAC/D,IAAI,MAAM,SAAS,GAAG,KAAK;AAC3B,UAAU,KAAK;AACf,UAAU,cAAc;AACxB,cAAc,cAAc;AAC5B,cAAc,cAAc;AAC5B,kBAAkB,gBAAgB;AAClC,kBAAkB,OAAO,CAAC;AAC1B,IAAI,OAAO;AACX,QAAQ,IAAI,EAAE,OAAO;AACrB,QAAQ,KAAK,EAAE,KAAK;AACpB,QAAQ,SAAS;AACjB,KAAK,CAAC;AACN;;ACpBA;AACA;AACA;AACA;AACA;AACA,AAAO,SAAS,uBAAuB,CAAC,KAAK,EAAE;AAC/C,IAAI,IAAI,KAAK,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,MAAM,KAAK,CAAC,EAAE;AACxC,QAAQ,OAAO,CAAC,OAAO,EAAE,KAAK,CAAC,CAAC,CAAC;AACjC,KAAK;AACL,IAAI,OAAO,CAAC,MAAM,EAAE,KAAK,CAAC,CAAC,CAAC;AAC5B,CAAC;;ACTM,eAAe,IAAI,CAAC,KAAK,EAAE,OAAO,EAAE,KAAK,EAAE,UAAU,EAAE;AAC9D,IAAI,MAAM,QAAQ,GAAG,OAAO,CAAC,QAAQ,CAAC,KAAK,CAAC,KAAK,EAAE,UAAU,CAAC,CAAC;AAC/D,IAAI,QAAQ,CAAC,OAAO,CAAC,aAAa,GAAG,uBAAuB,CAAC,KAAK,CAAC,CAAC;AACpE,IAAI,OAAO,OAAO,CAAC,QAAQ,CAAC,CAAC;AAC7B,CAAC;;ACHW,MAAC,eAAe,GAAG,SAAS,eAAe,CAAC,KAAK,EAAE;AAC/D,IAAI,IAAI,CAAC,KAAK,EAAE;AAChB,QAAQ,MAAM,IAAI,KAAK,CAAC,0DAA0D,CAAC,CAAC;AACpF,KAAK;AACL,IAAI,IAAI,OAAO,KAAK,KAAK,QAAQ,EAAE;AACnC,QAAQ,MAAM,IAAI,KAAK,CAAC,uEAAuE,CAAC,CAAC;AACjG,KAAK;AACL,IAAI,KAAK,GAAG,KAAK,CAAC,OAAO,CAAC,oBAAoB,EAAE,EAAE,CAAC,CAAC;AACpD,IAAI,OAAO,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,IAAI,CAAC,IAAI,EAAE,KAAK,CAAC,EAAE;AACjD,QAAQ,IAAI,EAAE,IAAI,CAAC,IAAI,CAAC,IAAI,EAAE,KAAK,CAAC;AACpC,KAAK,CAAC,CAAC;AACP,CAAC;;;;"} \ No newline at end of file
diff --git a/pkg/runner/testdata/actions/node12/node_modules/@octokit/auth-token/package.json b/pkg/runner/testdata/actions/node12/node_modules/@octokit/auth-token/package.json
new file mode 100644
index 0000000..1b0df71
--- /dev/null
+++ b/pkg/runner/testdata/actions/node12/node_modules/@octokit/auth-token/package.json
@@ -0,0 +1,45 @@
+{
+ "name": "@octokit/auth-token",
+ "description": "GitHub API token authentication for browsers and Node.js",
+ "version": "2.5.0",
+ "license": "MIT",
+ "files": [
+ "dist-*/",
+ "bin/"
+ ],
+ "pika": true,
+ "sideEffects": false,
+ "keywords": [
+ "github",
+ "octokit",
+ "authentication",
+ "api"
+ ],
+ "repository": "github:octokit/auth-token.js",
+ "dependencies": {
+ "@octokit/types": "^6.0.3"
+ },
+ "devDependencies": {
+ "@octokit/core": "^3.0.0",
+ "@octokit/request": "^5.3.0",
+ "@pika/pack": "^0.5.0",
+ "@pika/plugin-build-node": "^0.9.0",
+ "@pika/plugin-build-web": "^0.9.0",
+ "@pika/plugin-ts-standard-pkg": "^0.9.0",
+ "@types/fetch-mock": "^7.3.1",
+ "@types/jest": "^27.0.0",
+ "fetch-mock": "^9.0.0",
+ "jest": "^27.0.0",
+ "prettier": "2.4.1",
+ "semantic-release": "^17.0.0",
+ "ts-jest": "^27.0.0-next.12",
+ "typescript": "^4.0.0"
+ },
+ "publishConfig": {
+ "access": "public"
+ },
+ "source": "dist-src/index.js",
+ "types": "dist-types/index.d.ts",
+ "main": "dist-node/index.js",
+ "module": "dist-web/index.js"
+}