@@ -87890,6 +87890,9 @@ function mergeConfigs(localConfig, remoteConfig) {
87890
87890
if (remoteConfig.disable_sudo !== undefined) {
87891
87891
localConfig.disable_sudo = remoteConfig.disable_sudo;
87892
87892
}
87893
+ if (remoteConfig.disable_sudo_and_containers !== undefined) {
87894
+ localConfig.disable_sudo_and_containers = remoteConfig.disable_sudo_and_containers;
87895
+ }
87893
87896
if (remoteConfig.disable_file_monitoring !== undefined) {
87894
87897
localConfig.disable_file_monitoring = remoteConfig.disable_file_monitoring;
87895
87898
}
@@ -88004,11 +88007,11 @@ var external_crypto_ = __nccwpck_require__(6417);
88004
88007
88005
88008
const CHECKSUMS = {
88006
88009
tls: {
88007
- amd64: "38e7ed97ced6fe0c1cf0fb5ee3b3d521dfe28d5ddf1cdca72d130c8d1b4a314e ",
88008
- arm64: "f67c80cc578c996d4f882c14fcdb63df57927d907cd22f1ec65f9fa940c08cf3 ",
88010
+ amd64: "e7c0c5f96efbf96806d27dcbf65f71f72ecd34cdd596c556bb2ded0f2037c260 ",
88011
+ arm64: "813a4cd40f6740bd9623a40884a78f14960c6bd3794391693a165f2ca71c90e3 ",
88009
88012
},
88010
88013
non_tls: {
88011
- amd64: "a9f1842e3d7f3d38c143dbe8ffe1948e6c8173cd04da072d9f9d128bb400844a ", // v0.13.7
88014
+ amd64: "f0a8bb49ce5480744f8c836af2abd5f311e918efef5b36b4cce7521d7b9dffe6 ", // v0.14.0
88012
88015
},
88013
88016
};
88014
88017
function verifyChecksum(downloadPath, isTLS, variant) {
@@ -88058,14 +88061,14 @@ function installAgent(isTLS, configStr) {
88058
88061
encoding: "utf8",
88059
88062
});
88060
88063
if (isTLS) {
88061
- downloadPath = yield tool_cache.downloadTool(`https://packages.stepsecurity.io/github-hosted/harden-runner_1.4.2_linux_ ${variant}.tar.gz`);
88064
+ downloadPath = yield tool_cache.downloadTool(`https://packages.stepsecurity.io/github-hosted/harden-runner_1.6.3_linux_ ${variant}.tar.gz`);
88062
88065
}
88063
88066
else {
88064
88067
if (variant === "arm64") {
88065
88068
console.log(ARM64_RUNNER_MESSAGE);
88066
88069
return false;
88067
88070
}
88068
- downloadPath = yield tool_cache.downloadTool("https://github.com/step-security/agent/releases/download/v0.13.7 /agent_0.13.7_linux_amd64 .tar.gz", undefined, auth);
88071
+ downloadPath = yield tool_cache.downloadTool("https://github.com/step-security/agent/releases/download/v0.14.0 /agent_0.14.0_linux_amd64 .tar.gz", undefined, auth);
88069
88072
}
88070
88073
verifyChecksum(downloadPath, isTLS, variant);
88071
88074
const extractPath = yield tool_cache.extractTar(downloadPath);
@@ -88142,6 +88145,7 @@ var setup_awaiter = (undefined && undefined.__awaiter) || function (thisArg, _ar
88142
88145
egress_policy: lib_core.getInput("egress-policy"),
88143
88146
disable_telemetry: lib_core.getBooleanInput("disable-telemetry"),
88144
88147
disable_sudo: lib_core.getBooleanInput("disable-sudo"),
88148
+ disable_sudo_and_containers: lib_core.getBooleanInput("disable-sudo-and-containers"),
88145
88149
disable_file_monitoring: lib_core.getBooleanInput("disable-file-monitoring"),
88146
88150
private: ((_b = (_a = github.context === null || github.context === void 0 ? void 0 : github.context.payload) === null || _a === void 0 ? void 0 : _a.repository) === null || _b === void 0 ? void 0 : _b.private) || false,
88147
88151
is_github_hosted: isGithubHosted(),
@@ -88164,6 +88168,9 @@ var setup_awaiter = (undefined && undefined.__awaiter) || function (thisArg, _ar
88164
88168
external_fs_.appendFileSync(process.env.GITHUB_STATE, `disableSudo=${confg.disable_sudo}${external_os_.EOL}`, {
88165
88169
encoding: "utf8",
88166
88170
});
88171
+ external_fs_.appendFileSync(process.env.GITHUB_STATE, `disableSudoAndContainers=${confg.disable_sudo_and_containers}${external_os_.EOL}`, {
88172
+ encoding: "utf8",
88173
+ });
88167
88174
lib_core.info(`[!] Current Configuration: \n${JSON.stringify(confg)}\n`);
88168
88175
if (confg.egress_policy !== "audit" && confg.egress_policy !== "block") {
88169
88176
lib_core.setFailed("egress-policy must be either audit or block");
0 commit comments