mirror of
https://github.com/SonarSource/sonarqube-scan-action.git
synced 2026-01-27 15:13:16 +03:00
It is unlikely to be a real concern, since an attacker having the possibility to edit a pipeline can easily execute any command, but at least our step won't be involved
10 lines
134 B
Bash
Executable File
10 lines
134 B
Bash
Executable File
#!/bin/bash
|
|
|
|
set -eou pipefail
|
|
|
|
error() { echo -e "\\e[31m✗ $*\\e[0m"; }
|
|
|
|
if [ -f "$1" ]; then
|
|
error "File '$1' found"
|
|
exit 1
|
|
fi |