mirror of
https://github.com/SonarSource/sonarqube-scan-action.git
synced 2025-12-12 17:31:15 +00:00
It is unlikely to be a real concern, since an attacker having the possibility to edit a pipeline can easily execute any command, but at least our step won't be involved
10 lines
No EOL
134 B
Bash
Executable file
10 lines
No EOL
134 B
Bash
Executable file
#!/bin/bash
|
|
|
|
set -eou pipefail
|
|
|
|
error() { echo -e "\\e[31m✗ $*\\e[0m"; }
|
|
|
|
if [ -f "$1" ]; then
|
|
error "File '$1' found"
|
|
exit 1
|
|
fi |