smart_proxy_remote_execution_ssh 0.11.1 → 0.11.2
Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 60012040641dcb49fd0a84e89649bd082b48950d66bf3e95fcef5eab12ba4f04
|
4
|
+
data.tar.gz: 24fd5cd0f461862f86c9980ff8485d079c6ad3de9f108c3653f53b47fc395165
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 7f5a120c5e81bdbf574e4e5890f9c91d231a4841dc224819baffa75d448f8aa258de7bc197daf7a218bc89c2052de265a2b1efc91d5a50438b73187658aa3ee9
|
7
|
+
data.tar.gz: 3ecd97414130156d8fef05a98e639bf3ab6a1b91a02741c34e58d72c344efa5099222415b7a904d1529087bc51533ee95c353995394ce1ddebd05db9e6b4a43a
|
@@ -185,7 +185,7 @@ module Proxy::RemoteExecution::Ssh::Runners
|
|
185
185
|
@pid_path = File.join(File.dirname(@remote_script), 'pid')
|
186
186
|
su_method = @user_method.instance_of?(SuUserMethod)
|
187
187
|
wrapper = <<~SCRIPT
|
188
|
-
if [ "$1"
|
188
|
+
if [ "$1" = "inner" ]; then
|
189
189
|
echo \$$ > #{@pid_path}
|
190
190
|
(
|
191
191
|
#{@user_method.cli_command_prefix}#{su_method ? "'exec #{@remote_script} < /dev/null '" : "#{@remote_script} < /dev/null"}
|
metadata
CHANGED
@@ -1,14 +1,14 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: smart_proxy_remote_execution_ssh
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 0.11.
|
4
|
+
version: 0.11.2
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Ivan Nečas
|
8
8
|
autorequire:
|
9
9
|
bindir: bin
|
10
10
|
cert_chain: []
|
11
|
-
date: 2024-
|
11
|
+
date: 2024-09-04 00:00:00.000000000 Z
|
12
12
|
dependencies:
|
13
13
|
- !ruby/object:Gem::Dependency
|
14
14
|
name: bundler
|