Skip to content

Commit

Permalink
package: Typescript build
Browse files Browse the repository at this point in the history
  • Loading branch information
John Torakis committed Sep 19, 2022
1 parent 5fc16d4 commit 7bb23c5
Show file tree
Hide file tree
Showing 2 changed files with 5 additions and 5 deletions.
8 changes: 4 additions & 4 deletions dist/index.js
Original file line number Diff line number Diff line change
Expand Up @@ -41889,7 +41889,7 @@ const getPOSIXString = (data) => {
data = '_'.concat(data);
return data.replace(/[^a-zA-Z0-9_]/g, '_').toUpperCase();
};
const injectSecretValueMapToEnvironment = (secretValueMap, secretEnvVarName) => {
const injectSecretValueMapToEnvironment = (secretValueMap, secretPath, secretEnvVarName) => {
const disableWarnings = core.getBooleanInput(Inputs.DISABLE_WARNINGS);
for (const secretName in secretValueMap) {
const secretValue = secretValueMap[secretName];
Expand All @@ -41902,7 +41902,7 @@ const injectSecretValueMapToEnvironment = (secretValueMap, secretEnvVarName) =>
else {
// If an Environment Variable is given by the user with the '|' syntax
// use it directly
secretNamePOSIX = secretEnvVarName;
secretNamePOSIX = getPOSIXString(secretName.replace(secretPath, secretEnvVarName));
}
if (secretEnvVarName === undefined && secretName !== secretNamePOSIX && !disableWarnings) {
core.warning('One of the secrets has a name that is not POSIX compliant and hence cannot directly \
Expand All @@ -41913,7 +41913,7 @@ see the transformed environment variable name.\nPOSIX compliance: environment va
upper case letters, digits and underscores. It cannot begin with a digit.');
core.debug(`Secret name '${secretName}' is not POSIX compliant. It will be transformed to '${secretNamePOSIX}'.`);
}
core.debug(`Injecting environment variable '${secretNamePOSIX}'.`);
core.debug(`Injecting secret: '${secretName}' in Environment Variable: '${secretNamePOSIX}'.`);
core.exportVariable(secretNamePOSIX, secretValue);
}
};
Expand Down Expand Up @@ -42060,7 +42060,7 @@ const fetchAndInject = (secretsManagerClient, secretNamesToFetch, shouldParseJSO
}
getSecretValueMap(secretsManagerClient, secretName, shouldParseJSON)
.then(map => {
injectSecretValueMapToEnvironment(map, secretEnvVarName);
injectSecretValueMapToEnvironment(map, secretName, secretEnvVarName);
})
.catch(err => {
core.setFailed(`Failed to fetch '${secretName}'. Error: ${err}.`);
Expand Down
2 changes: 1 addition & 1 deletion dist/index.js.map

Large diffs are not rendered by default.

0 comments on commit 7bb23c5

Please sign in to comment.