toolkit icon indicating copy to clipboard operation
toolkit copied to clipboard

The GitHub ToolKit for developing GitHub Actions.

Results 328 toolkit issues
Sort by recently updated
recently updated
newest added

**Describe the bug** All my actions are running, but are refusing to cache with the same error: ``` Post job cleanup. Unable to reserve cache with key Linux-modules-0c1e633988f0463573ae79cec4e4e741153037a6a270a901c8bf040b3d674a4f, another job...

bug
cache

Copy-pasting official docs into my code and getting this blob of text is not ideal: ``` TypeError: globber.globGenerator(...) is not a function or its return value is not async iterable...

A helper that adds a thin wrapper around toolkit cache methods `extractZip`, `extractTar`, `extract7z`, `extractXar` and `downloadTool`. Allows to download archive from remote source, automatically detect its type and apply...

**Describe the enhancement** For complex setup with self-hosted Github Action runners were all requests toward Github hosted servers needs to go thru an intercepting webproxy please introduce support for aenvironment...

enhancement

[**Glob actions**](https://github.com/actions/toolkit/tree/main/packages/glob) are referenced for pattern matching throughout the actions (like https://github.com/marketplace/actions/upload-a-build-artifact) but the docs don't explain how the pattern engine works. There's no guidance on how it should work...

enhancement
documentation

{ "Modules": { "DemoModulePython": { "Name": "My module name", "Version": "2.0.0", "PublishingInfo" : { ... }, "LaunchSettings": { ... }, "EnvironmentVariables": { ... }, "GpuOptions" : { ... }, "InstallOptions"...

We were seeing other Github Actions well downstream from here being reported by Dependabot with this vulnerability: https://nvd.nist.gov/vuln/detail/CVE-2022-25883

Support max attempts as an input for download artifacts. This would help with problems like https://github.com/actions/download-artifact/issues/276

**Describe the enhancement** I could not find a way at the moment. Maybe I am blind, but I would like to kill the child process spawned in actions/exec. As far...

enhancement

**Describe the bug** When mounting docker to `$(pwd)` with `exec`, the action failed and I got: ``` /usr/bin/docker: Error response from daemon: create $(pwd): "$(pwd)" includes invalid characters for a...

bug
exec