[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[tor-commits] [gitian-builder/tor-browser-builder-2] Don't sanitize git commit names. They are authenticated for us.



commit e8ce3082e47ef30f7a195aa7f1ddf04d195188bb
Author: Mike Perry <mikeperry-git@xxxxxxxxxxxxxx>
Date:   Tue Jul 16 15:58:23 2013 -0700

    Don't sanitize git commit names. They are authenticated for us.
    
    Also, we need to specify absolute paths like refs/tags/tagname, to avoid
    ambiguity between actual tags and other refs.
---
 bin/gbuild |    2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/bin/gbuild b/bin/gbuild
index 9c13704..e78e8a2 100755
--- a/bin/gbuild
+++ b/bin/gbuild
@@ -204,7 +204,7 @@ build_desc["remotes"].each do |remote|
       system!("git init inputs/#{dir}")
   end
   system!("cd inputs/#{dir} && git fetch --update-head-ok #{sanitize_path(remote["url"], remote["url"])} +refs/tags/*:refs/tags/* +refs/heads/*:refs/heads/*")
-  commit = sanitize(remote["commit"], remote["commit"])
+  commit = remote["commit"] #sanitize(remote["commit"], remote["commit"])
   commit = `cd inputs/#{dir} && git log --format=%H -1 #{commit}`.strip
   raise "error looking up commit for tag #{remote["commit"]}" unless $?.exitstatus == 0
   system!("cd inputs/#{dir} && git checkout -q #{commit}")

_______________________________________________
tor-commits mailing list
tor-commits@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits