[tor-commits] [gitian-builder/tor-browser-builder-2] Don't sanitize git commit names. They are authenticated for us.

mikeperry at torproject.org mikeperry at torproject.org
Tue Jul 16 23:10:21 UTC 2013


commit e8ce3082e47ef30f7a195aa7f1ddf04d195188bb
Author: Mike Perry <mikeperry-git at torproject.org>
Date:   Tue Jul 16 15:58:23 2013 -0700

    Don't sanitize git commit names. They are authenticated for us.
    
    Also, we need to specify absolute paths like refs/tags/tagname, to avoid
    ambiguity between actual tags and other refs.
---
 bin/gbuild |    2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/bin/gbuild b/bin/gbuild
index 9c13704..e78e8a2 100755
--- a/bin/gbuild
+++ b/bin/gbuild
@@ -204,7 +204,7 @@ build_desc["remotes"].each do |remote|
       system!("git init inputs/#{dir}")
   end
   system!("cd inputs/#{dir} && git fetch --update-head-ok #{sanitize_path(remote["url"], remote["url"])} +refs/tags/*:refs/tags/* +refs/heads/*:refs/heads/*")
-  commit = sanitize(remote["commit"], remote["commit"])
+  commit = remote["commit"] #sanitize(remote["commit"], remote["commit"])
   commit = `cd inputs/#{dir} && git log --format=%H -1 #{commit}`.strip
   raise "error looking up commit for tag #{remote["commit"]}" unless $?.exitstatus == 0
   system!("cd inputs/#{dir} && git checkout -q #{commit}")



More information about the tor-commits mailing list