@capgo/cli 4.10.35 → 4.10.37

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -18,7 +18,7 @@ jobs:
18
18
  with:
19
19
  fetch-depth: 0
20
20
  - name: Setup bun
21
- uses: oven-sh/setup-bun@v1.1.1
21
+ uses: oven-sh/setup-bun@v1.2.2
22
22
  with:
23
23
  bun-version: latest
24
24
  - name: Install dependencies
@@ -18,7 +18,7 @@ jobs:
18
18
  fetch-depth: 0
19
19
  token: "${{ secrets.PERSONAL_ACCESS_TOKEN }}"
20
20
  - name: Setup bun
21
- uses: oven-sh/setup-bun@v1.1.1
21
+ uses: oven-sh/setup-bun@v1.2.2
22
22
  with:
23
23
  bun-version: latest
24
24
  - name: Install dependencies
@@ -48,7 +48,7 @@ jobs:
48
48
  - name: Checkout
49
49
  uses: actions/checkout@v4
50
50
  - name: Setup bun
51
- uses: oven-sh/setup-bun@v1.1.1
51
+ uses: oven-sh/setup-bun@v1.2.2
52
52
  with:
53
53
  bun-version: latest
54
54
  - name: Install dependencies
@@ -21,7 +21,7 @@ jobs:
21
21
  uses: actions/checkout@v3
22
22
 
23
23
  - name: Setup bun
24
- uses: oven-sh/setup-bun@v1.1.1
24
+ uses: oven-sh/setup-bun@v1.2.2
25
25
  with:
26
26
  bun-version: latest
27
27
 
@@ -68,17 +68,13 @@ jobs:
68
68
 
69
69
  - name: Verify ZIP file integrity for Windows 2019 build
70
70
  run: |
71
- if ! unzip -tq /home/runner/work/CLI/CLI/build-windows-2019.zip; then
72
- echo "ZIP file is corrupted: build-windows-2019.zip"
73
- exit 1
74
- fi
71
+ echo "Verifying ZIP file integrity for Windows 2019 build..."
72
+ zipinfo /home/runner/work/CLI/CLI/build-windows-2019.zip || (echo "ZIP file is corrupted: build-windows-2019.zip" && exit 1)
75
73
 
76
74
  - name: Verify ZIP file integrity for Windows 2022 build
77
75
  run: |
78
- if ! unzip -tq /home/runner/work/CLI/CLI/build-windows-2022.zip; then
79
- echo "ZIP file is corrupted: build-windows-2022.zip"
80
- exit 1
81
- fi
76
+ echo "Verifying ZIP file integrity for Windows 2022 build..."
77
+ zipinfo /home/runner/work/CLI/CLI/build-windows-2022.zip || (echo "ZIP file is corrupted: build-windows-2022.zip" && exit 1)
82
78
 
83
79
  - name: Verify POSIX paths for Windows 2019 build
84
80
  run: |
@@ -13,7 +13,7 @@ jobs:
13
13
  - name: Check out
14
14
  uses: actions/checkout@v4
15
15
  - name: Setup bun
16
- uses: oven-sh/setup-bun@v1.1.1
16
+ uses: oven-sh/setup-bun@v1.2.2
17
17
  with:
18
18
  bun-version: latest
19
19
  - name: Install dependencies
package/CHANGELOG.md CHANGED
@@ -2,6 +2,16 @@
2
2
 
3
3
  All notable changes to this project will be documented in this file. See [standard-version](https://github.com/conventional-changelog/standard-version) for commit guidelines.
4
4
 
5
+ ### [4.10.37](https://github.com/Cap-go/CLI/compare/v4.10.36...v4.10.37) (2024-06-21)
6
+
7
+ ### [4.10.36](https://github.com/Cap-go/CLI/compare/v4.10.35...v4.10.36) (2024-06-21)
8
+
9
+
10
+ ### Bug Fixes
11
+
12
+ * add other file for better test ([9757a93](https://github.com/Cap-go/CLI/commit/9757a9375cc754556b4384e30cb95faee9ab23e1))
13
+ * get info with zipinfo ([5d7ecdc](https://github.com/Cap-go/CLI/commit/5d7ecdcd94bb7489c01e53ce9927b05185165f37))
14
+
5
15
  ### [4.10.35](https://github.com/Cap-go/CLI/compare/v4.10.34...v4.10.35) (2024-06-21)
6
16
 
7
17
 
package/dist/index.js CHANGED
@@ -112906,7 +112906,7 @@ var {
112906
112906
  // package.json
112907
112907
  var package_default = {
112908
112908
  name: "@capgo/cli",
112909
- version: "4.10.35",
112909
+ version: "4.10.37",
112910
112910
  description: "A CLI to upload to capgo servers",
112911
112911
  author: "github.com/riderx",
112912
112912
  license: "Apache 2.0",
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@capgo/cli",
3
- "version": "4.10.35",
3
+ "version": "4.10.37",
4
4
  "description": "A CLI to upload to capgo servers",
5
5
  "author": "github.com/riderx",
6
6
  "license": "Apache 2.0",
@@ -0,0 +1,21 @@
1
+ const AdmZip = require('adm-zip');
2
+
3
+ const zip = new AdmZip('build.zip');
4
+ const zipEntries = zip.getEntries(); // an array of ZipEntry records
5
+
6
+ let errorFound = false;
7
+
8
+ zipEntries.forEach((zipEntry) => {
9
+ const entryName = zipEntry.entryName;
10
+ if (entryName.includes('\\')) {
11
+ console.error(`Non-POSIX path detected: ${entryName}`);
12
+ errorFound = true;
13
+ }
14
+ });
15
+
16
+ if (errorFound) {
17
+ console.error('Non-POSIX paths detected in the zip file');
18
+ process.exit(1);
19
+ } else {
20
+ console.log('All paths are POSIX compliant.');
21
+ }