import * as core from '@actions/core' import * as fs from 'fs' import * as gitAuthHelper from '../lib/git-auth-helper' import * as io from '@actions/io' import * as os from 'os' import * as path from 'path' import * as stateHelper from '../lib/state-helper' import {IGitCommandManager} from '../lib/git-command-manager' import {IGitSourceSettings} from '../lib/git-source-settings' const isWindows = process.platform === 'win32' const testWorkspace = path.join(__dirname, '_temp', 'git-auth-helper') const originalRunnerTemp = process.env['RUNNER_TEMP'] const originalHome = process.env['HOME'] let workspace: string let localGitConfigPath: string let globalGitConfigPath: string let runnerTemp: string let tempHomedir: string let git: IGitCommandManager & {env: {[key: string]: string}} let settings: IGitSourceSettings let sshPath: string describe('git-auth-helper tests', () => { beforeAll(async () => { // SSH sshPath = await io.which('ssh') // Clear test workspace await io.rmRF(testWorkspace) }) beforeEach(() => { // Mock setSecret jest.spyOn(core, 'setSecret').mockImplementation((secret: string) => {}) // Mock error/warning/info/debug jest.spyOn(core, 'error').mockImplementation(jest.fn()) jest.spyOn(core, 'warning').mockImplementation(jest.fn()) jest.spyOn(core, 'info').mockImplementation(jest.fn()) jest.spyOn(core, 'debug').mockImplementation(jest.fn()) // Mock state helper jest.spyOn(stateHelper, 'setSshKeyPath').mockImplementation(jest.fn()) jest .spyOn(stateHelper, 'setSshKnownHostsPath') .mockImplementation(jest.fn()) }) afterEach(() => { // Unregister mocks jest.restoreAllMocks() // Restore HOME if (originalHome) { process.env['HOME'] = originalHome } else { delete process.env['HOME'] } }) afterAll(() => { // Restore RUNNER_TEMP delete process.env['RUNNER_TEMP'] if (originalRunnerTemp) { process.env['RUNNER_TEMP'] = originalRunnerTemp } }) const configureAuth_configuresAuthHeader = 'configureAuth configures auth header' it(configureAuth_configuresAuthHeader, async () => { // Arrange await setup(configureAuth_configuresAuthHeader) expect(settings.authToken).toBeTruthy() // sanity check const authHelper = gitAuthHelper.createAuthHelper(git, settings) // Act await authHelper.configureAuth() // Assert config const configContent = ( await fs.promises.readFile(localGitConfigPath) ).toString() const basicCredential = Buffer.from( `x-access-token:${settings.authToken}`, 'utf8' ).toString('base64') expect( configContent.indexOf( `http.https://github.com/.extraheader AUTHORIZATION: basic ${basicCredential}` ) ).toBeGreaterThanOrEqual(0) }) const configureAuth_configuresAuthHeaderEvenWhenPersistCredentialsFalse = 'configureAuth configures auth header even when persist credentials false' it( configureAuth_configuresAuthHeaderEvenWhenPersistCredentialsFalse, async () => { // Arrange await setup( configureAuth_configuresAuthHeaderEvenWhenPersistCredentialsFalse ) expect(settings.authToken).toBeTruthy() // sanity check settings.persistCredentials = false const authHelper = gitAuthHelper.createAuthHelper(git, settings) // Act await authHelper.configureAuth() // Assert config const configContent = ( await fs.promises.readFile(localGitConfigPath) ).toString() expect( configContent.indexOf( `http.https://github.com/.extraheader AUTHORIZATION` ) ).toBeGreaterThanOrEqual(0) } ) const configureAuth_copiesUserKnownHosts = 'configureAuth copies user known hosts' it(configureAuth_copiesUserKnownHosts, async () => { if (!sshPath) { process.stdout.write( `Skipped test "${configureAuth_copiesUserKnownHosts}". Executable 'ssh' not found in the PATH.\n` ) return } // Arange await setup(configureAuth_copiesUserKnownHosts) expect(settings.sshKey).toBeTruthy() // sanity check // Mock fs.promises.readFile const realReadFile = fs.promises.readFile jest.spyOn(fs.promises, 'readFile').mockImplementation( async (file: any, options: any): Promise => { const userKnownHostsPath = path.join( os.homedir(), '.ssh', 'known_hosts' ) if (file === userKnownHostsPath) { return Buffer.from('some-domain.com ssh-rsa ABCDEF') } return await realReadFile(file, options) } ) // Act const authHelper = gitAuthHelper.createAuthHelper(git, settings) await authHelper.configureAuth() // Assert known hosts const actualSshKnownHostsPath = await getActualSshKnownHostsPath() const actualSshKnownHostsContent = ( await fs.promises.readFile(actualSshKnownHostsPath) ).toString() expect(actualSshKnownHostsContent).toMatch( /some-domain\.com ssh-rsa ABCDEF/ ) expect(actualSshKnownHostsContent).toMatch(/github\.com ssh-rsa AAAAB3N/) }) const configureAuth_registersBasicCredentialAsSecret = 'configureAuth registers basic credential as secret' it(configureAuth_registersBasicCredentialAsSecret, async () => { // Arrange await setup(configureAuth_registersBasicCredentialAsSecret) expect(settings.authToken).toBeTruthy() // sanity check const authHelper = gitAuthHelper.createAuthHelper(git, settings) // Act await authHelper.configureAuth() // Assert secret const setSecretSpy = core.setSecret as jest.Mock expect(setSecretSpy).toHaveBeenCalledTimes(1) const expectedSecret = Buffer.from( `x-access-token:${settings.authToken}`, 'utf8' ).toString('base64') expect(setSecretSpy).toHaveBeenCalledWith(expectedSecret) }) const setsSshCommandEnvVarWhenPersistCredentialsFalse = 'sets SSH command env var when persist-credentials false' it(setsSshCommandEnvVarWhenPersistCredentialsFalse, async () => { if (!sshPath) { process.stdout.write( `Skipped test "${setsSshCommandEnvVarWhenPersistCredentialsFalse}". Executable 'ssh' not found in the PATH.\n` ) return } // Arrange await setup(setsSshCommandEnvVarWhenPersistCredentialsFalse) settings.persistCredentials = false const authHelper = gitAuthHelper.createAuthHelper(git, settings) // Act await authHelper.configureAuth() // Assert git env var const actualKeyPath = await getActualSshKeyPath() const actualKnownHostsPath = await getActualSshKnownHostsPath() const expectedSshCommand = `"${sshPath}" -i "$RUNNER_TEMP/${path.basename( actualKeyPath )}" -o StrictHostKeyChecking=yes -o CheckHostIP=no -o "UserKnownHostsFile=$RUNNER_TEMP/${path.basename( actualKnownHostsPath )}"` expect(git.setEnvironmentVariable).toHaveBeenCalledWith( 'GIT_SSH_COMMAND', expectedSshCommand ) // Asserty git config const gitConfigLines = (await fs.promises.readFile(localGitConfigPath)) .toString() .split('\n') .filter(x => x) expect(gitConfigLines).toHaveLength(1) expect(gitConfigLines[0]).toMatch(/^http\./) }) const configureAuth_setsSshCommandWhenPersistCredentialsTrue = 'sets SSH command when persist-credentials true' it(configureAuth_setsSshCommandWhenPersistCredentialsTrue, async () => { if (!sshPath) { process.stdout.write( `Skipped test "${configureAuth_setsSshCommandWhenPersistCredentialsTrue}". Executable 'ssh' not found in the PATH.\n` ) return } // Arrange await setup(configureAuth_setsSshCommandWhenPersistCredentialsTrue) const authHelper = gitAuthHelper.createAuthHelper(git, settings) // Act await authHelper.configureAuth() // Assert git env var const actualKeyPath = await getActualSshKeyPath() const actualKnownHostsPath = await getActualSshKnownHostsPath() const expectedSshCommand = `"${sshPath}" -i "$RUNNER_TEMP/${path.basename( actualKeyPath )}" -o StrictHostKeyChecking=yes -o CheckHostIP=no -o "UserKnownHostsFile=$RUNNER_TEMP/${path.basename( actualKnownHostsPath )}"` expect(git.setEnvironmentVariable).toHaveBeenCalledWith( 'GIT_SSH_COMMAND', expectedSshCommand ) // Asserty git config expect(git.config).toHaveBeenCalledWith( 'core.sshCommand', expectedSshCommand ) }) const configureAuth_writesExplicitKnownHosts = 'writes explicit known hosts' it(configureAuth_writesExplicitKnownHosts, async () => { if (!sshPath) { process.stdout.write( `Skipped test "${configureAuth_writesExplicitKnownHosts}". Executable 'ssh' not found in the PATH.\n` ) return } // Arrange await setup(configureAuth_writesExplicitKnownHosts) expect(settings.sshKey).toBeTruthy() // sanity check settings.sshKnownHosts = 'my-custom-host.com ssh-rsa ABC123' const authHelper = gitAuthHelper.createAuthHelper(git, settings) // Act await authHelper.configureAuth() // Assert known hosts const actualSshKnownHostsPath = await getActualSshKnownHostsPath() const actualSshKnownHostsContent = ( await fs.promises.readFile(actualSshKnownHostsPath) ).toString() expect(actualSshKnownHostsContent).toMatch( /my-custom-host\.com ssh-rsa ABC123/ ) expect(actualSshKnownHostsContent).toMatch(/github\.com ssh-rsa AAAAB3N/) }) const configureAuth_writesSshKeyAndImplicitKnownHosts = 'writes SSH key and implicit known hosts' it(configureAuth_writesSshKeyAndImplicitKnownHosts, async () => { if (!sshPath) { process.stdout.write( `Skipped test "${configureAuth_writesSshKeyAndImplicitKnownHosts}". Executable 'ssh' not found in the PATH.\n` ) return } // Arrange await setup(configureAuth_writesSshKeyAndImplicitKnownHosts) expect(settings.sshKey).toBeTruthy() // sanity check const authHelper = gitAuthHelper.createAuthHelper(git, settings) // Act await authHelper.configureAuth() // Assert SSH key const actualSshKeyPath = await getActualSshKeyPath() expect(actualSshKeyPath).toBeTruthy() const actualSshKeyContent = ( await fs.promises.readFile(actualSshKeyPath) ).toString() expect(actualSshKeyContent).toBe(settings.sshKey + '\n') if (!isWindows) { // Assert read/write for user, not group or others. // Otherwise SSH client will error. expect((await fs.promises.stat(actualSshKeyPath)).mode & 0o777).toBe( 0o600 ) } // Assert known hosts const actualSshKnownHostsPath = await getActualSshKnownHostsPath() const actualSshKnownHostsContent = ( await fs.promises.readFile(actualSshKnownHostsPath) ).toString() expect(actualSshKnownHostsContent).toMatch(/github\.com ssh-rsa AAAAB3N/) }) const configureGlobalAuth_configuresUrlInsteadOfWhenSshKeyNotSet = 'configureGlobalAuth configures URL insteadOf when SSH key not set' it(configureGlobalAuth_configuresUrlInsteadOfWhenSshKeyNotSet, async () => { // Arrange await setup(configureGlobalAuth_configuresUrlInsteadOfWhenSshKeyNotSet) settings.sshKey = '' const authHelper = gitAuthHelper.createAuthHelper(git, settings) // Act await authHelper.configureAuth() await authHelper.configureGlobalAuth() // Assert temporary global config expect(git.env['HOME']).toBeTruthy() const configContent = ( await fs.promises.readFile(path.join(git.env['HOME'], '.gitconfig')) ).toString() expect( configContent.indexOf(`url.https://github.com/.insteadOf git@github.com`) ).toBeGreaterThanOrEqual(0) }) const configureGlobalAuth_copiesGlobalGitConfig = 'configureGlobalAuth copies global git config' it(configureGlobalAuth_copiesGlobalGitConfig, async () => { // Arrange await setup(configureGlobalAuth_copiesGlobalGitConfig) await fs.promises.writeFile(globalGitConfigPath, 'value-from-global-config') const authHelper = gitAuthHelper.createAuthHelper(git, settings) // Act await authHelper.configureAuth() await authHelper.configureGlobalAuth() // Assert original global config not altered let configContent = ( await fs.promises.readFile(globalGitConfigPath) ).toString() expect(configContent).toBe('value-from-global-config') // Assert temporary global config expect(git.env['HOME']).toBeTruthy() const basicCredential = Buffer.from( `x-access-token:${settings.authToken}`, 'utf8' ).toString('base64') configContent = ( await fs.promises.readFile(path.join(git.env['HOME'], '.gitconfig')) ).toString() expect( configContent.indexOf('value-from-global-config') ).toBeGreaterThanOrEqual(0) expect( configContent.indexOf( `http.https://github.com/.extraheader AUTHORIZATION: basic ${basicCredential}` ) ).toBeGreaterThanOrEqual(0) }) const configureGlobalAuth_createsNewGlobalGitConfigWhenGlobalDoesNotExist = 'configureGlobalAuth creates new git config when global does not exist' it( configureGlobalAuth_createsNewGlobalGitConfigWhenGlobalDoesNotExist, async () => { // Arrange await setup( configureGlobalAuth_createsNewGlobalGitConfigWhenGlobalDoesNotExist ) await io.rmRF(globalGitConfigPath) const authHelper = gitAuthHelper.createAuthHelper(git, settings) // Act await authHelper.configureAuth() await authHelper.configureGlobalAuth() // Assert original global config not recreated try { await fs.promises.stat(globalGitConfigPath) throw new Error( `Did not expect file to exist: '${globalGitConfigPath}'` ) } catch (err) { if (err.code !== 'ENOENT') { throw err } } // Assert temporary global config expect(git.env['HOME']).toBeTruthy() const basicCredential = Buffer.from( `x-access-token:${settings.authToken}`, 'utf8' ).toString('base64') const configContent = ( await fs.promises.readFile(path.join(git.env['HOME'], '.gitconfig')) ).toString() expect( configContent.indexOf( `http.https://github.com/.extraheader AUTHORIZATION: basic ${basicCredential}` ) ).toBeGreaterThanOrEqual(0) } ) const configureSubmoduleAuth_configuresSubmodulesWhenPersistCredentialsFalseAndSshKeyNotSet = 'configureSubmoduleAuth configures submodules when persist credentials false and SSH key not set' it( configureSubmoduleAuth_configuresSubmodulesWhenPersistCredentialsFalseAndSshKeyNotSet, async () => { // Arrange await setup( configureSubmoduleAuth_configuresSubmodulesWhenPersistCredentialsFalseAndSshKeyNotSet ) settings.persistCredentials = false settings.sshKey = '' const authHelper = gitAuthHelper.createAuthHelper(git, settings) await authHelper.configureAuth() const mockSubmoduleForeach = git.submoduleForeach as jest.Mock mockSubmoduleForeach.mockClear() // reset calls // Act await authHelper.configureSubmoduleAuth() // Assert expect(mockSubmoduleForeach).toBeCalledTimes(1) expect(mockSubmoduleForeach.mock.calls[0][0] as string).toMatch( /unset-all.*insteadOf/ ) } ) const configureSubmoduleAuth_configuresSubmodulesWhenPersistCredentialsFalseAndSshKeySet = 'configureSubmoduleAuth configures submodules when persist credentials false and SSH key set' it( configureSubmoduleAuth_configuresSubmodulesWhenPersistCredentialsFalseAndSshKeySet, async () => { if (!sshPath) { process.stdout.write( `Skipped test "${configureSubmoduleAuth_configuresSubmodulesWhenPersistCredentialsFalseAndSshKeySet}". Executable 'ssh' not found in the PATH.\n` ) return } // Arrange await setup( configureSubmoduleAuth_configuresSubmodulesWhenPersistCredentialsFalseAndSshKeySet ) settings.persistCredentials = false const authHelper = gitAuthHelper.createAuthHelper(git, settings) await authHelper.configureAuth() const mockSubmoduleForeach = git.submoduleForeach as jest.Mock mockSubmoduleForeach.mockClear() // reset calls // Act await authHelper.configureSubmoduleAuth() // Assert expect(mockSubmoduleForeach).toHaveBeenCalledTimes(1) expect(mockSubmoduleForeach.mock.calls[0][0]).toMatch( /unset-all.*insteadOf/ ) } ) const configureSubmoduleAuth_configuresSubmodulesWhenPersistCredentialsTrueAndSshKeyNotSet = 'configureSubmoduleAuth configures submodules when persist credentials true and SSH key not set' it( configureSubmoduleAuth_configuresSubmodulesWhenPersistCredentialsTrueAndSshKeyNotSet, async () => { // Arrange await setup( configureSubmoduleAuth_configuresSubmodulesWhenPersistCredentialsTrueAndSshKeyNotSet ) settings.sshKey = '' const authHelper = gitAuthHelper.createAuthHelper(git, settings) await authHelper.configureAuth() const mockSubmoduleForeach = git.submoduleForeach as jest.Mock mockSubmoduleForeach.mockClear() // reset calls // Act await authHelper.configureSubmoduleAuth() // Assert expect(mockSubmoduleForeach).toHaveBeenCalledTimes(3) expect(mockSubmoduleForeach.mock.calls[0][0]).toMatch( /unset-all.*insteadOf/ ) expect(mockSubmoduleForeach.mock.calls[1][0]).toMatch(/http.*extraheader/) expect(mockSubmoduleForeach.mock.calls[2][0]).toMatch(/url.*insteadOf/) } ) const configureSubmoduleAuth_configuresSubmodulesWhenPersistCredentialsTrueAndSshKeySet = 'configureSubmoduleAuth configures submodules when persist credentials true and SSH key set' it( configureSubmoduleAuth_configuresSubmodulesWhenPersistCredentialsTrueAndSshKeySet, async () => { if (!sshPath) { process.stdout.write( `Skipped test "${configureSubmoduleAuth_configuresSubmodulesWhenPersistCredentialsTrueAndSshKeySet}". Executable 'ssh' not found in the PATH.\n` ) return } // Arrange await setup( configureSubmoduleAuth_configuresSubmodulesWhenPersistCredentialsTrueAndSshKeySet ) const authHelper = gitAuthHelper.createAuthHelper(git, settings) await authHelper.configureAuth() const mockSubmoduleForeach = git.submoduleForeach as jest.Mock mockSubmoduleForeach.mockClear() // reset calls // Act await authHelper.configureSubmoduleAuth() // Assert expect(mockSubmoduleForeach).toHaveBeenCalledTimes(3) expect(mockSubmoduleForeach.mock.calls[0][0]).toMatch( /unset-all.*insteadOf/ ) expect(mockSubmoduleForeach.mock.calls[1][0]).toMatch(/http.*extraheader/) expect(mockSubmoduleForeach.mock.calls[2][0]).toMatch(/core\.sshCommand/) } ) const removeAuth_removesSshCommand = 'removeAuth removes SSH command' it(removeAuth_removesSshCommand, async () => { if (!sshPath) { process.stdout.write( `Skipped test "${removeAuth_removesSshCommand}". Executable 'ssh' not found in the PATH.\n` ) return } // Arrange await setup(removeAuth_removesSshCommand) const authHelper = gitAuthHelper.createAuthHelper(git, settings) await authHelper.configureAuth() let gitConfigContent = ( await fs.promises.readFile(localGitConfigPath) ).toString() expect(gitConfigContent.indexOf('core.sshCommand')).toBeGreaterThanOrEqual( 0 ) // sanity check const actualKeyPath = await getActualSshKeyPath() expect(actualKeyPath).toBeTruthy() await fs.promises.stat(actualKeyPath) const actualKnownHostsPath = await getActualSshKnownHostsPath() expect(actualKnownHostsPath).toBeTruthy() await fs.promises.stat(actualKnownHostsPath) // Act await authHelper.removeAuth() // Assert git config gitConfigContent = ( await fs.promises.readFile(localGitConfigPath) ).toString() expect(gitConfigContent.indexOf('core.sshCommand')).toBeLessThan(0) // Assert SSH key file try { await fs.promises.stat(actualKeyPath) throw new Error('SSH key should have been deleted') } catch (err) { if (err.code !== 'ENOENT') { throw err } } // Assert known hosts file try { await fs.promises.stat(actualKnownHostsPath) throw new Error('SSH known hosts should have been deleted') } catch (err) { if (err.code !== 'ENOENT') { throw err } } }) const removeAuth_removesToken = 'removeAuth removes token' it(removeAuth_removesToken, async () => { // Arrange await setup(removeAuth_removesToken) const authHelper = gitAuthHelper.createAuthHelper(git, settings) await authHelper.configureAuth() let gitConfigContent = ( await fs.promises.readFile(localGitConfigPath) ).toString() expect(gitConfigContent.indexOf('http.')).toBeGreaterThanOrEqual(0) // sanity check // Act await authHelper.removeAuth() // Assert git config gitConfigContent = ( await fs.promises.readFile(localGitConfigPath) ).toString() expect(gitConfigContent.indexOf('http.')).toBeLessThan(0) }) const removeGlobalAuth_removesOverride = 'removeGlobalAuth removes override' it(removeGlobalAuth_removesOverride, async () => { // Arrange await setup(removeGlobalAuth_removesOverride) const authHelper = gitAuthHelper.createAuthHelper(git, settings) await authHelper.configureAuth() await authHelper.configureGlobalAuth() const homeOverride = git.env['HOME'] // Sanity check expect(homeOverride).toBeTruthy() await fs.promises.stat(path.join(git.env['HOME'], '.gitconfig')) // Act await authHelper.removeGlobalAuth() // Assert expect(git.env['HOME']).toBeUndefined() try { await fs.promises.stat(homeOverride) throw new Error(`Should have been deleted '${homeOverride}'`) } catch (err) { if (err.code !== 'ENOENT') { throw err } } }) }) async function setup(testName: string): Promise { testName = testName.replace(/[^a-zA-Z0-9_]+/g, '-') // Directories workspace = path.join(testWorkspace, testName, 'workspace') runnerTemp = path.join(testWorkspace, testName, 'runner-temp') tempHomedir = path.join(testWorkspace, testName, 'home-dir') await fs.promises.mkdir(workspace, {recursive: true}) await fs.promises.mkdir(runnerTemp, {recursive: true}) await fs.promises.mkdir(tempHomedir, {recursive: true}) process.env['RUNNER_TEMP'] = runnerTemp process.env['HOME'] = tempHomedir // Create git config globalGitConfigPath = path.join(tempHomedir, '.gitconfig') await fs.promises.writeFile(globalGitConfigPath, '') localGitConfigPath = path.join(workspace, '.git', 'config') await fs.promises.mkdir(path.dirname(localGitConfigPath), {recursive: true}) await fs.promises.writeFile(localGitConfigPath, '') git = { branchDelete: jest.fn(), branchExists: jest.fn(), branchList: jest.fn(), checkout: jest.fn(), checkoutDetach: jest.fn(), config: jest.fn( async (key: string, value: string, globalConfig?: boolean) => { const configPath = globalConfig ? path.join(git.env['HOME'] || tempHomedir, '.gitconfig') : localGitConfigPath await fs.promises.appendFile(configPath, `\n${key} ${value}`) } ), configExists: jest.fn( async (key: string, globalConfig?: boolean): Promise => { const configPath = globalConfig ? path.join(git.env['HOME'] || tempHomedir, '.gitconfig') : localGitConfigPath const content = await fs.promises.readFile(configPath) const lines = content .toString() .split('\n') .filter(x => x) return lines.some(x => x.startsWith(key)) } ), env: {}, fetch: jest.fn(), getDefaultBranch: jest.fn(), getWorkingDirectory: jest.fn(() => workspace), init: jest.fn(), isDetached: jest.fn(), lfsFetch: jest.fn(), lfsInstall: jest.fn(), log1: jest.fn(), remoteAdd: jest.fn(), removeEnvironmentVariable: jest.fn((name: string) => delete git.env[name]), revParse: jest.fn(), setEnvironmentVariable: jest.fn((name: string, value: string) => { git.env[name] = value }), shaExists: jest.fn(), submoduleForeach: jest.fn(async () => { return '' }), submoduleSync: jest.fn(), submoduleUpdate: jest.fn(), tagExists: jest.fn(), tryClean: jest.fn(), tryConfigUnset: jest.fn( async (key: string, globalConfig?: boolean): Promise => { const configPath = globalConfig ? path.join(git.env['HOME'] || tempHomedir, '.gitconfig') : localGitConfigPath let content = await fs.promises.readFile(configPath) let lines = content .toString() .split('\n') .filter(x => x) .filter(x => !x.startsWith(key)) await fs.promises.writeFile(configPath, lines.join('\n')) return true } ), tryDisableAutomaticGarbageCollection: jest.fn(), tryGetFetchUrl: jest.fn(), tryReset: jest.fn() } settings = { authToken: 'some auth token', clean: true, commit: '', fetchDepth: 1, lfs: false, submodules: false, nestedSubmodules: false, persistCredentials: true, ref: 'refs/heads/main', repositoryName: 'my-repo', repositoryOwner: 'my-org', repositoryPath: '', sshKey: sshPath ? 'some ssh private key' : '', sshKnownHosts: '', sshStrict: true } } async function getActualSshKeyPath(): Promise { let actualTempFiles = (await fs.promises.readdir(runnerTemp)) .sort() .map(x => path.join(runnerTemp, x)) if (actualTempFiles.length === 0) { return '' } expect(actualTempFiles).toHaveLength(2) expect(actualTempFiles[0].endsWith('_known_hosts')).toBeFalsy() return actualTempFiles[0] } async function getActualSshKnownHostsPath(): Promise { let actualTempFiles = (await fs.promises.readdir(runnerTemp)) .sort() .map(x => path.join(runnerTemp, x)) if (actualTempFiles.length === 0) { return '' } expect(actualTempFiles).toHaveLength(2) expect(actualTempFiles[1].endsWith('_known_hosts')).toBeTruthy() expect(actualTempFiles[1].startsWith(actualTempFiles[0])).toBeTruthy() return actualTempFiles[1] }