-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
cli: git push: convert local Git remote path to slash-separated path
Since we can't use source.contains(':') to detect non-local path on Windows, we now use gix::url for parsing. It might be stricter, but I assume it would be more reliable. Closes jj-vcs#4188
- Loading branch information
Showing
5 changed files
with
101 additions
and
23 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -15,6 +15,7 @@ | |
use std::fs; | ||
use std::io; | ||
use std::io::Write; | ||
use std::mem; | ||
use std::num::NonZeroU32; | ||
use std::path::Path; | ||
|
||
|
@@ -64,21 +65,20 @@ pub struct GitCloneArgs { | |
depth: Option<NonZeroU32>, | ||
} | ||
|
||
fn absolute_git_source(cwd: &Path, source: &str) -> String { | ||
fn absolute_git_source(cwd: &Path, source: &str) -> Result<String, CommandError> { | ||
// Git appears to turn URL-like source to absolute path if local git directory | ||
// exits, and fails because '$PWD/https' is unsupported protocol. Since it would | ||
// be tedious to copy the exact git (or libgit2) behavior, we simply assume a | ||
// source containing ':' is a URL, SSH remote, or absolute path with Windows | ||
// drive letter. | ||
if !source.contains(':') && Path::new(source).exists() { | ||
// It's less likely that cwd isn't utf-8, so just fall back to original source. | ||
cwd.join(source) | ||
.into_os_string() | ||
.into_string() | ||
.unwrap_or_else(|_| source.to_owned()) | ||
} else { | ||
source.to_owned() | ||
// be tedious to copy the exact git (or libgit2) behavior, we simply let gix | ||
// parse the input as URL, rcp-like, or local path. | ||
let mut url = gix::url::parse(source.as_ref()).map_err(cli_error)?; | ||
url.canonicalize(cwd).map_err(user_error)?; | ||
// As of gix 0.68.0, the canonicalized path uses platform-native directory | ||
// separator, which isn't compatible with libgit2 on Windows. | ||
if url.scheme == gix::url::Scheme::File { | ||
url.path = gix::path::to_unix_separators_on_windows(mem::take(&mut url.path)).into_owned(); | ||
} | ||
// It's less likely that cwd isn't utf-8, so just fall back to original source. | ||
Ok(String::from_utf8(url.to_bstring().into()).unwrap_or_else(|_| source.to_owned())) | ||
} | ||
|
||
fn clone_destination_for_source(source: &str) -> Option<&str> { | ||
|
@@ -106,7 +106,7 @@ pub fn cmd_git_clone( | |
if command.global_args().at_operation.is_some() { | ||
return Err(cli_error("--at-op is not respected")); | ||
} | ||
let source = absolute_git_source(command.cwd(), &args.source); | ||
let source = absolute_git_source(command.cwd(), &args.source)?; | ||
let wc_path_str = args | ||
.destination | ||
.as_deref() | ||
|
@@ -239,3 +239,58 @@ fn do_git_clone( | |
fetch_tx.finish(ui, "fetch from git remote into empty repo")?; | ||
Ok((workspace_command, stats)) | ||
} | ||
|
||
#[cfg(test)] | ||
mod tests { | ||
use std::path::MAIN_SEPARATOR; | ||
|
||
use super::*; | ||
|
||
#[test] | ||
fn test_absolute_git_source() { | ||
// gix::Url::canonicalize() works even if the path doesn't exist. | ||
// However, we need to ensure that no symlinks exist at the test paths. | ||
let temp_dir = testutils::new_temp_dir(); | ||
let cwd = dunce::canonicalize(temp_dir.path()).unwrap(); | ||
let cwd_slash = cwd.to_str().unwrap().replace(MAIN_SEPARATOR, "/"); | ||
|
||
// Local path | ||
assert_eq!( | ||
absolute_git_source(&cwd, "foo").unwrap(), | ||
format!("{cwd_slash}/foo") | ||
); | ||
assert_eq!( | ||
absolute_git_source(&cwd, r"foo\bar").unwrap(), | ||
if cfg!(windows) { | ||
format!("{cwd_slash}/foo/bar") | ||
} else { | ||
format!(r"{cwd_slash}/foo\bar") | ||
} | ||
); | ||
assert_eq!( | ||
absolute_git_source(&cwd.join("bar"), &format!("{cwd_slash}/foo")).unwrap(), | ||
format!("{cwd_slash}/foo") | ||
); | ||
|
||
// rcp-like | ||
assert_eq!( | ||
absolute_git_source(&cwd, "[email protected]:foo/bar.git").unwrap(), | ||
"[email protected]:foo/bar.git" | ||
); | ||
// URL | ||
assert_eq!( | ||
absolute_git_source(&cwd, "https://example.org/foo.git").unwrap(), | ||
"https://example.org/foo.git" | ||
); | ||
// Custom scheme isn't an error | ||
assert_eq!( | ||
absolute_git_source(&cwd, "custom://example.org/foo.git").unwrap(), | ||
"custom://example.org/foo.git" | ||
); | ||
// Password shouldn't be redacted (gix::Url::to_string() would do) | ||
assert_eq!( | ||
absolute_git_source(&cwd, "https://user:[email protected]/").unwrap(), | ||
"https://user:[email protected]/" | ||
); | ||
} | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters