[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[tor-commits] [gitian-builder/tor-browser-builder-2] Don't sanitize git commit names. They are authenticated for us.
commit e8ce3082e47ef30f7a195aa7f1ddf04d195188bb
Author: Mike Perry <mikeperry-git@xxxxxxxxxxxxxx>
Date: Tue Jul 16 15:58:23 2013 -0700
Don't sanitize git commit names. They are authenticated for us.
Also, we need to specify absolute paths like refs/tags/tagname, to avoid
ambiguity between actual tags and other refs.
---
bin/gbuild | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/bin/gbuild b/bin/gbuild
index 9c13704..e78e8a2 100755
--- a/bin/gbuild
+++ b/bin/gbuild
@@ -204,7 +204,7 @@ build_desc["remotes"].each do |remote|
system!("git init inputs/#{dir}")
end
system!("cd inputs/#{dir} && git fetch --update-head-ok #{sanitize_path(remote["url"], remote["url"])} +refs/tags/*:refs/tags/* +refs/heads/*:refs/heads/*")
- commit = sanitize(remote["commit"], remote["commit"])
+ commit = remote["commit"] #sanitize(remote["commit"], remote["commit"])
commit = `cd inputs/#{dir} && git log --format=%H -1 #{commit}`.strip
raise "error looking up commit for tag #{remote["commit"]}" unless $?.exitstatus == 0
system!("cd inputs/#{dir} && git checkout -q #{commit}")
_______________________________________________
tor-commits mailing list
tor-commits@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits