2016-11-03 23:16:01 +01:00
|
|
|
// Copyright 2015 The Gogs Authors. All rights reserved.
|
2017-05-30 11:32:01 +02:00
|
|
|
// Copyright 2017 The Gitea Authors. All rights reserved.
|
2022-11-27 19:20:29 +01:00
|
|
|
// SPDX-License-Identifier: MIT
|
2016-11-03 23:16:01 +01:00
|
|
|
|
|
|
|
package git
|
|
|
|
|
|
|
|
import (
|
|
|
|
"bytes"
|
2020-12-02 19:36:06 +01:00
|
|
|
"context"
|
2019-05-05 18:25:25 +02:00
|
|
|
"fmt"
|
2021-08-18 15:10:39 +02:00
|
|
|
"io"
|
|
|
|
"net/url"
|
2016-11-03 23:16:01 +01:00
|
|
|
"os"
|
|
|
|
"path"
|
2021-08-24 18:47:09 +02:00
|
|
|
"path/filepath"
|
2019-05-05 18:25:25 +02:00
|
|
|
"strconv"
|
2017-04-08 04:23:39 +02:00
|
|
|
"strings"
|
2016-11-03 23:16:01 +01:00
|
|
|
"time"
|
2021-08-18 15:10:39 +02:00
|
|
|
|
|
|
|
"code.gitea.io/gitea/modules/proxy"
|
2022-03-27 13:54:09 +02:00
|
|
|
"code.gitea.io/gitea/modules/util"
|
2016-11-03 23:16:01 +01:00
|
|
|
)
|
|
|
|
|
2019-10-16 15:42:42 +02:00
|
|
|
// GPGSettings represents the default GPG settings for this repository
|
|
|
|
type GPGSettings struct {
|
|
|
|
Sign bool
|
|
|
|
KeyID string
|
|
|
|
Email string
|
|
|
|
Name string
|
|
|
|
PublicKeyContent string
|
2016-11-03 23:16:01 +01:00
|
|
|
}
|
|
|
|
|
2016-12-22 10:30:52 +01:00
|
|
|
const prettyLogFormat = `--pretty=format:%H`
|
2016-11-03 23:16:01 +01:00
|
|
|
|
2019-11-07 19:09:51 +01:00
|
|
|
// GetAllCommitsCount returns count of all commits in repository
|
|
|
|
func (repo *Repository) GetAllCommitsCount() (int64, error) {
|
2022-01-20 00:26:57 +01:00
|
|
|
return AllCommitsCount(repo.Ctx, repo.Path, false)
|
2019-11-07 19:09:51 +01:00
|
|
|
}
|
|
|
|
|
2021-08-09 20:08:51 +02:00
|
|
|
func (repo *Repository) parsePrettyFormatLogToList(logs []byte) ([]*Commit, error) {
|
|
|
|
var commits []*Commit
|
2016-11-03 23:16:01 +01:00
|
|
|
if len(logs) == 0 {
|
2021-08-09 20:08:51 +02:00
|
|
|
return commits, nil
|
2016-11-03 23:16:01 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
parts := bytes.Split(logs, []byte{'\n'})
|
|
|
|
|
2016-12-22 10:30:52 +01:00
|
|
|
for _, commitID := range parts {
|
|
|
|
commit, err := repo.GetCommit(string(commitID))
|
2016-11-03 23:16:01 +01:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2021-08-09 20:08:51 +02:00
|
|
|
commits = append(commits, commit)
|
2016-11-03 23:16:01 +01:00
|
|
|
}
|
|
|
|
|
2021-08-09 20:08:51 +02:00
|
|
|
return commits, nil
|
2016-11-03 23:16:01 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
// IsRepoURLAccessible checks if given repository URL is accessible.
|
2022-01-20 00:26:57 +01:00
|
|
|
func IsRepoURLAccessible(ctx context.Context, url string) bool {
|
2022-10-23 16:44:45 +02:00
|
|
|
_, _, err := NewCommand(ctx, "ls-remote", "-q", "-h").AddDynamicArguments(url, "HEAD").RunStdString(nil)
|
2019-06-12 21:41:28 +02:00
|
|
|
return err == nil
|
2016-11-03 23:16:01 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
// InitRepository initializes a new Git repository.
|
2022-01-20 00:26:57 +01:00
|
|
|
func InitRepository(ctx context.Context, repoPath string, bare bool) error {
|
2019-06-12 21:41:28 +02:00
|
|
|
err := os.MkdirAll(repoPath, os.ModePerm)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2016-11-03 23:16:01 +01:00
|
|
|
|
2022-02-06 20:01:47 +01:00
|
|
|
cmd := NewCommand(ctx, "init")
|
2016-11-03 23:16:01 +01:00
|
|
|
if bare {
|
|
|
|
cmd.AddArguments("--bare")
|
|
|
|
}
|
2022-04-01 04:55:30 +02:00
|
|
|
_, _, err = cmd.RunStdString(&RunOpts{Dir: repoPath})
|
2016-11-03 23:16:01 +01:00
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2019-06-26 20:15:26 +02:00
|
|
|
// IsEmpty Check if repository is empty.
|
|
|
|
func (repo *Repository) IsEmpty() (bool, error) {
|
2022-01-28 03:51:16 +01:00
|
|
|
var errbuf, output strings.Builder
|
2022-02-13 17:01:23 +01:00
|
|
|
if err := NewCommand(repo.Ctx, "show-ref", "--head", "^HEAD$").
|
2022-04-01 04:55:30 +02:00
|
|
|
Run(&RunOpts{
|
|
|
|
Dir: repo.Path,
|
|
|
|
Stdout: &output,
|
|
|
|
Stderr: &errbuf,
|
2022-01-28 03:51:16 +01:00
|
|
|
}); err != nil {
|
2022-02-13 17:01:23 +01:00
|
|
|
if err.Error() == "exit status 1" && errbuf.String() == "" {
|
|
|
|
return true, nil
|
|
|
|
}
|
2022-10-24 21:29:17 +02:00
|
|
|
return true, fmt.Errorf("check empty: %w - %s", err, errbuf.String())
|
2019-06-26 20:15:26 +02:00
|
|
|
}
|
|
|
|
|
2022-02-13 17:01:23 +01:00
|
|
|
return strings.TrimSpace(output.String()) == "", nil
|
2019-06-26 20:15:26 +02:00
|
|
|
}
|
|
|
|
|
2016-12-22 10:30:52 +01:00
|
|
|
// CloneRepoOptions options when clone a repository
|
2016-11-03 23:16:01 +01:00
|
|
|
type CloneRepoOptions struct {
|
2022-03-19 15:16:38 +01:00
|
|
|
Timeout time.Duration
|
|
|
|
Mirror bool
|
|
|
|
Bare bool
|
|
|
|
Quiet bool
|
|
|
|
Branch string
|
|
|
|
Shared bool
|
|
|
|
NoCheckout bool
|
|
|
|
Depth int
|
|
|
|
Filter string
|
|
|
|
SkipTLSVerify bool
|
2016-11-03 23:16:01 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
// Clone clones original repository to target path.
|
2022-01-20 00:26:57 +01:00
|
|
|
func Clone(ctx context.Context, from, to string, opts CloneRepoOptions) error {
|
2022-10-23 16:44:45 +02:00
|
|
|
return CloneWithArgs(ctx, globalCommandArgs, from, to, opts)
|
2019-11-27 01:35:52 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
// CloneWithArgs original repository to target path.
|
Refactor git command package to improve security and maintainability (#22678)
This PR follows #21535 (and replace #22592)
## Review without space diff
https://github.com/go-gitea/gitea/pull/22678/files?diff=split&w=1
## Purpose of this PR
1. Make git module command completely safe (risky user inputs won't be
passed as argument option anymore)
2. Avoid low-level mistakes like
https://github.com/go-gitea/gitea/pull/22098#discussion_r1045234918
3. Remove deprecated and dirty `CmdArgCheck` function, hide the `CmdArg`
type
4. Simplify code when using git command
## The main idea of this PR
* Move the `git.CmdArg` to the `internal` package, then no other package
except `git` could use it. Then developers could never do
`AddArguments(git.CmdArg(userInput))` any more.
* Introduce `git.ToTrustedCmdArgs`, it's for user-provided and already
trusted arguments. It's only used in a few cases, for example: use git
arguments from config file, help unit test with some arguments.
* Introduce `AddOptionValues` and `AddOptionFormat`, they make code more
clear and simple:
* Before: `AddArguments("-m").AddDynamicArguments(message)`
* After: `AddOptionValues("-m", message)`
* -
* Before: `AddArguments(git.CmdArg(fmt.Sprintf("--author='%s <%s>'",
sig.Name, sig.Email)))`
* After: `AddOptionFormat("--author='%s <%s>'", sig.Name, sig.Email)`
## FAQ
### Why these changes were not done in #21535 ?
#21535 is mainly a search&replace, it did its best to not change too
much logic.
Making the framework better needs a lot of changes, so this separate PR
is needed as the second step.
### The naming of `AddOptionXxx`
According to git's manual, the `--xxx` part is called `option`.
### How can it guarantee that `internal.CmdArg` won't be not misused?
Go's specification guarantees that. Trying to access other package's
internal package causes compilation error.
And, `golangci-lint` also denies the git/internal package. Only the
`git/command.go` can use it carefully.
### There is still a `ToTrustedCmdArgs`, will it still allow developers
to make mistakes and pass untrusted arguments?
Generally speaking, no. Because when using `ToTrustedCmdArgs`, the code
will be very complex (see the changes for examples). Then developers and
reviewers can know that something might be unreasonable.
### Why there was a `CmdArgCheck` and why it's removed?
At the moment of #21535, to reduce unnecessary changes, `CmdArgCheck`
was introduced as a hacky patch. Now, almost all code could be written
as `cmd := NewCommand(); cmd.AddXxx(...)`, then there is no need for
`CmdArgCheck` anymore.
### Why many codes for `signArg == ""` is deleted?
Because in the old code, `signArg` could never be empty string, it's
either `-S[key-id]` or `--no-gpg-sign`. So the `signArg == ""` is just
dead code.
---------
Co-authored-by: Lunny Xiao <xiaolunwen@gmail.com>
2023-02-04 03:30:43 +01:00
|
|
|
func CloneWithArgs(ctx context.Context, args TrustedCmdArgs, from, to string, opts CloneRepoOptions) (err error) {
|
2016-11-03 23:16:01 +01:00
|
|
|
toDir := path.Dir(to)
|
|
|
|
if err = os.MkdirAll(toDir, os.ModePerm); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2020-12-02 19:36:06 +01:00
|
|
|
cmd := NewCommandContextNoGlobals(ctx, args...).AddArguments("clone")
|
2022-03-19 15:16:38 +01:00
|
|
|
if opts.SkipTLSVerify {
|
|
|
|
cmd.AddArguments("-c", "http.sslVerify=false")
|
|
|
|
}
|
2016-11-03 23:16:01 +01:00
|
|
|
if opts.Mirror {
|
|
|
|
cmd.AddArguments("--mirror")
|
|
|
|
}
|
|
|
|
if opts.Bare {
|
|
|
|
cmd.AddArguments("--bare")
|
|
|
|
}
|
|
|
|
if opts.Quiet {
|
|
|
|
cmd.AddArguments("--quiet")
|
|
|
|
}
|
2019-05-11 17:29:17 +02:00
|
|
|
if opts.Shared {
|
|
|
|
cmd.AddArguments("-s")
|
|
|
|
}
|
|
|
|
if opts.NoCheckout {
|
|
|
|
cmd.AddArguments("--no-checkout")
|
|
|
|
}
|
2019-11-30 07:54:47 +01:00
|
|
|
if opts.Depth > 0 {
|
2022-10-23 16:44:45 +02:00
|
|
|
cmd.AddArguments("--depth").AddDynamicArguments(strconv.Itoa(opts.Depth))
|
2019-11-30 07:54:47 +01:00
|
|
|
}
|
2022-01-23 22:19:32 +01:00
|
|
|
if opts.Filter != "" {
|
2022-10-23 16:44:45 +02:00
|
|
|
cmd.AddArguments("--filter").AddDynamicArguments(opts.Filter)
|
2022-01-23 22:19:32 +01:00
|
|
|
}
|
2016-11-03 23:16:01 +01:00
|
|
|
if len(opts.Branch) > 0 {
|
2022-10-23 16:44:45 +02:00
|
|
|
cmd.AddArguments("-b").AddDynamicArguments(opts.Branch)
|
2016-11-03 23:16:01 +01:00
|
|
|
}
|
2022-10-23 16:44:45 +02:00
|
|
|
cmd.AddDashesAndList(from, to)
|
2016-11-03 23:16:01 +01:00
|
|
|
|
2022-03-27 13:54:09 +02:00
|
|
|
if strings.Contains(from, "://") && strings.Contains(from, "@") {
|
2022-03-31 04:25:40 +02:00
|
|
|
cmd.SetDescription(fmt.Sprintf("clone branch %s from %s to %s (shared: %t, mirror: %t, depth: %d)", opts.Branch, util.SanitizeCredentialURLs(from), to, opts.Shared, opts.Mirror, opts.Depth))
|
2022-03-27 13:54:09 +02:00
|
|
|
} else {
|
|
|
|
cmd.SetDescription(fmt.Sprintf("clone branch %s from %s to %s (shared: %t, mirror: %t, depth: %d)", opts.Branch, from, to, opts.Shared, opts.Mirror, opts.Depth))
|
|
|
|
}
|
|
|
|
|
2016-11-03 23:16:01 +01:00
|
|
|
if opts.Timeout <= 0 {
|
|
|
|
opts.Timeout = -1
|
|
|
|
}
|
|
|
|
|
2022-01-20 18:46:10 +01:00
|
|
|
envs := os.Environ()
|
2021-08-18 15:10:39 +02:00
|
|
|
u, err := url.Parse(from)
|
2023-02-11 01:39:50 +01:00
|
|
|
if err == nil {
|
|
|
|
envs = proxy.EnvWithProxy(u)
|
2021-08-18 15:10:39 +02:00
|
|
|
}
|
|
|
|
|
2022-01-20 18:46:10 +01:00
|
|
|
stderr := new(bytes.Buffer)
|
2022-04-01 04:55:30 +02:00
|
|
|
if err = cmd.Run(&RunOpts{
|
2021-08-18 15:10:39 +02:00
|
|
|
Timeout: opts.Timeout,
|
|
|
|
Env: envs,
|
|
|
|
Stdout: io.Discard,
|
|
|
|
Stderr: stderr,
|
|
|
|
}); err != nil {
|
|
|
|
return ConcatenateError(err, stderr.String())
|
|
|
|
}
|
|
|
|
return nil
|
2016-11-03 23:16:01 +01:00
|
|
|
}
|
|
|
|
|
2017-05-30 11:32:01 +02:00
|
|
|
// PushOptions options when push to remote
|
|
|
|
type PushOptions struct {
|
2021-06-14 19:20:43 +02:00
|
|
|
Remote string
|
|
|
|
Branch string
|
|
|
|
Force bool
|
|
|
|
Mirror bool
|
|
|
|
Env []string
|
|
|
|
Timeout time.Duration
|
2017-05-30 11:32:01 +02:00
|
|
|
}
|
|
|
|
|
2016-11-03 23:16:01 +01:00
|
|
|
// Push pushs local commits to given remote branch.
|
2021-11-30 21:06:32 +01:00
|
|
|
func Push(ctx context.Context, repoPath string, opts PushOptions) error {
|
2022-02-06 20:01:47 +01:00
|
|
|
cmd := NewCommand(ctx, "push")
|
2017-05-30 11:32:01 +02:00
|
|
|
if opts.Force {
|
|
|
|
cmd.AddArguments("-f")
|
|
|
|
}
|
2021-06-14 19:20:43 +02:00
|
|
|
if opts.Mirror {
|
|
|
|
cmd.AddArguments("--mirror")
|
|
|
|
}
|
2022-10-23 16:44:45 +02:00
|
|
|
remoteBranchArgs := []string{opts.Remote}
|
2021-06-14 19:20:43 +02:00
|
|
|
if len(opts.Branch) > 0 {
|
2022-10-23 16:44:45 +02:00
|
|
|
remoteBranchArgs = append(remoteBranchArgs, opts.Branch)
|
2021-06-14 19:20:43 +02:00
|
|
|
}
|
2022-10-23 16:44:45 +02:00
|
|
|
cmd.AddDashesAndList(remoteBranchArgs...)
|
|
|
|
|
2022-03-27 13:54:09 +02:00
|
|
|
if strings.Contains(opts.Remote, "://") && strings.Contains(opts.Remote, "@") {
|
2022-03-31 04:25:40 +02:00
|
|
|
cmd.SetDescription(fmt.Sprintf("push branch %s to %s (force: %t, mirror: %t)", opts.Branch, util.SanitizeCredentialURLs(opts.Remote), opts.Force, opts.Mirror))
|
2022-03-27 13:54:09 +02:00
|
|
|
} else {
|
|
|
|
cmd.SetDescription(fmt.Sprintf("push branch %s to %s (force: %t, mirror: %t)", opts.Branch, opts.Remote, opts.Force, opts.Mirror))
|
|
|
|
}
|
2020-03-28 05:13:18 +01:00
|
|
|
var outbuf, errbuf strings.Builder
|
|
|
|
|
2021-06-14 19:20:43 +02:00
|
|
|
if opts.Timeout == 0 {
|
|
|
|
opts.Timeout = -1
|
|
|
|
}
|
|
|
|
|
2022-04-01 04:55:30 +02:00
|
|
|
err := cmd.Run(&RunOpts{
|
2022-02-11 13:47:22 +01:00
|
|
|
Env: opts.Env,
|
|
|
|
Timeout: opts.Timeout,
|
|
|
|
Dir: repoPath,
|
|
|
|
Stdout: &outbuf,
|
|
|
|
Stderr: &errbuf,
|
|
|
|
})
|
2020-03-28 05:13:18 +01:00
|
|
|
if err != nil {
|
|
|
|
if strings.Contains(errbuf.String(), "non-fast-forward") {
|
|
|
|
return &ErrPushOutOfDate{
|
|
|
|
StdOut: outbuf.String(),
|
|
|
|
StdErr: errbuf.String(),
|
|
|
|
Err: err,
|
|
|
|
}
|
|
|
|
} else if strings.Contains(errbuf.String(), "! [remote rejected]") {
|
|
|
|
err := &ErrPushRejected{
|
|
|
|
StdOut: outbuf.String(),
|
|
|
|
StdErr: errbuf.String(),
|
|
|
|
Err: err,
|
|
|
|
}
|
|
|
|
err.GenerateMessage()
|
|
|
|
return err
|
2021-06-23 23:08:26 +02:00
|
|
|
} else if strings.Contains(errbuf.String(), "matches more than one") {
|
|
|
|
err := &ErrMoreThanOne{
|
|
|
|
StdOut: outbuf.String(),
|
|
|
|
StdErr: errbuf.String(),
|
|
|
|
Err: err,
|
|
|
|
}
|
|
|
|
return err
|
2020-03-28 05:13:18 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if errbuf.Len() > 0 && err != nil {
|
2022-10-24 21:29:17 +02:00
|
|
|
return fmt.Errorf("%w - %s", err, errbuf.String())
|
2020-03-28 05:13:18 +01:00
|
|
|
}
|
|
|
|
|
2016-11-03 23:16:01 +01:00
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2017-05-30 11:32:01 +02:00
|
|
|
// GetLatestCommitTime returns time for latest commit in repository (across all branches)
|
2022-01-20 00:26:57 +01:00
|
|
|
func GetLatestCommitTime(ctx context.Context, repoPath string) (time.Time, error) {
|
2022-02-06 20:01:47 +01:00
|
|
|
cmd := NewCommand(ctx, "for-each-ref", "--sort=-committerdate", BranchPrefix, "--count", "1", "--format=%(committerdate)")
|
2022-04-01 04:55:30 +02:00
|
|
|
stdout, _, err := cmd.RunStdString(&RunOpts{Dir: repoPath})
|
2017-05-30 11:32:01 +02:00
|
|
|
if err != nil {
|
|
|
|
return time.Time{}, err
|
|
|
|
}
|
|
|
|
commitTime := strings.TrimSpace(stdout)
|
2017-12-11 03:23:34 +01:00
|
|
|
return time.Parse(GitTimeLayout, commitTime)
|
2017-05-30 11:32:01 +02:00
|
|
|
}
|
2019-05-05 18:25:25 +02:00
|
|
|
|
|
|
|
// DivergeObject represents commit count diverging commits
|
|
|
|
type DivergeObject struct {
|
|
|
|
Ahead int
|
|
|
|
Behind int
|
|
|
|
}
|
|
|
|
|
2022-01-20 00:26:57 +01:00
|
|
|
func checkDivergence(ctx context.Context, repoPath, baseBranch, targetBranch string) (int, error) {
|
2019-05-05 18:25:25 +02:00
|
|
|
branches := fmt.Sprintf("%s..%s", baseBranch, targetBranch)
|
2022-10-23 16:44:45 +02:00
|
|
|
cmd := NewCommand(ctx, "rev-list", "--count").AddDynamicArguments(branches)
|
2022-04-01 04:55:30 +02:00
|
|
|
stdout, _, err := cmd.RunStdString(&RunOpts{Dir: repoPath})
|
2019-05-05 18:25:25 +02:00
|
|
|
if err != nil {
|
|
|
|
return -1, err
|
|
|
|
}
|
|
|
|
outInteger, errInteger := strconv.Atoi(strings.Trim(stdout, "\n"))
|
|
|
|
if errInteger != nil {
|
|
|
|
return -1, errInteger
|
|
|
|
}
|
|
|
|
return outInteger, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// GetDivergingCommits returns the number of commits a targetBranch is ahead or behind a baseBranch
|
2022-01-20 00:26:57 +01:00
|
|
|
func GetDivergingCommits(ctx context.Context, repoPath, baseBranch, targetBranch string) (DivergeObject, error) {
|
2019-05-05 18:25:25 +02:00
|
|
|
// $(git rev-list --count master..feature) commits ahead of master
|
2022-01-20 00:26:57 +01:00
|
|
|
ahead, errorAhead := checkDivergence(ctx, repoPath, baseBranch, targetBranch)
|
2019-05-05 18:25:25 +02:00
|
|
|
if errorAhead != nil {
|
|
|
|
return DivergeObject{}, errorAhead
|
|
|
|
}
|
|
|
|
|
|
|
|
// $(git rev-list --count feature..master) commits behind master
|
2022-01-20 00:26:57 +01:00
|
|
|
behind, errorBehind := checkDivergence(ctx, repoPath, targetBranch, baseBranch)
|
2019-05-05 18:25:25 +02:00
|
|
|
if errorBehind != nil {
|
|
|
|
return DivergeObject{}, errorBehind
|
|
|
|
}
|
|
|
|
|
|
|
|
return DivergeObject{ahead, behind}, nil
|
|
|
|
}
|
2021-08-24 18:47:09 +02:00
|
|
|
|
|
|
|
// CreateBundle create bundle content to the target path
|
|
|
|
func (repo *Repository) CreateBundle(ctx context.Context, commit string, out io.Writer) error {
|
|
|
|
tmp, err := os.MkdirTemp(os.TempDir(), "gitea-bundle")
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
defer os.RemoveAll(tmp)
|
|
|
|
|
2021-09-25 23:29:25 +02:00
|
|
|
env := append(os.Environ(), "GIT_OBJECT_DIRECTORY="+filepath.Join(repo.Path, "objects"))
|
2022-04-01 04:55:30 +02:00
|
|
|
_, _, err = NewCommand(ctx, "init", "--bare").RunStdString(&RunOpts{Dir: tmp, Env: env})
|
2021-09-25 23:29:25 +02:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2022-10-23 16:44:45 +02:00
|
|
|
_, _, err = NewCommand(ctx, "reset", "--soft").AddDynamicArguments(commit).RunStdString(&RunOpts{Dir: tmp, Env: env})
|
2021-09-25 23:29:25 +02:00
|
|
|
if err != nil {
|
|
|
|
return err
|
2021-08-24 18:47:09 +02:00
|
|
|
}
|
2021-09-25 23:29:25 +02:00
|
|
|
|
2022-04-01 04:55:30 +02:00
|
|
|
_, _, err = NewCommand(ctx, "branch", "-m", "bundle").RunStdString(&RunOpts{Dir: tmp, Env: env})
|
2021-09-25 23:29:25 +02:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
tmpFile := filepath.Join(tmp, "bundle")
|
2022-10-23 16:44:45 +02:00
|
|
|
_, _, err = NewCommand(ctx, "bundle", "create").AddDynamicArguments(tmpFile, "bundle", "HEAD").RunStdString(&RunOpts{Dir: tmp, Env: env})
|
2021-08-24 18:47:09 +02:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
fi, err := os.Open(tmpFile)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
defer fi.Close()
|
|
|
|
|
|
|
|
_, err = io.Copy(out, fi)
|
|
|
|
return err
|
|
|
|
}
|