From 981ff03fb9bd229406c49f2c2f9837298f8fd878 Mon Sep 17 00:00:00 2001 From: Paul Cristian Sarbu Date: Wed, 11 Sep 2024 16:56:11 +0200 Subject: remote execution: Check validity of symlinks Invalid entries, currently all upwards symlinks (pending implementation of a better way of handling them), are now identified and handled properly: in compatible mode on the client side, during handling of remote response, and in native mode on the server side during the population of the action result. --- src/buildtool/execution_api/execution_service/TARGETS | 1 + 1 file changed, 1 insertion(+) (limited to 'src/buildtool/execution_api/execution_service/TARGETS') diff --git a/src/buildtool/execution_api/execution_service/TARGETS b/src/buildtool/execution_api/execution_service/TARGETS index d8108279..7f8e0e0d 100644 --- a/src/buildtool/execution_api/execution_service/TARGETS +++ b/src/buildtool/execution_api/execution_service/TARGETS @@ -22,6 +22,7 @@ , ["src/buildtool/logging", "log_level"] , "operation_cache" , ["src/utils/cpp", "hex_string"] + , ["src/utils/cpp", "path"] , ["src/buildtool/execution_api/local", "local"] , ["src/buildtool/common", "common"] , ["src/buildtool/common", "artifact_digest_factory"] -- cgit v1.2.3