Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

fix: Correctly parsing %-encoded URLs from .git/config file #331

Merged

Conversation

tdurk93
Copy link
Contributor

@tdurk93 tdurk93 commented Nov 6, 2023

Resolves #261

The configparser module by default assumes that '%' characters indicate the presence of a variable and will try to parse a config value accordingly. Switching to "raw" mode prevents this behavior.

Testing

Manually tested by changing my .git/config file to set the origin URL to include %20, and was able to replicate the failure detailed in the ticket.

The configparser module by default assumes that '%' characters
indicate the presence of a variable and will try to parse a config value
accordingly. Switching to "raw" mode prevents this behavior.
Copy link

@github-actions github-actions bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

PR title failed to match (chore|style|test|feat|fix|docs): .+

@tdurk93 tdurk93 changed the title Fix: Correctly parsing %-encoded URLs from .git/config file fix: Correctly parsing %-encoded URLs from .git/config file Nov 6, 2023
@github-actions github-actions bot dismissed their stale review November 6, 2023 22:51

All good!

@tdurk93 tdurk93 marked this pull request as ready for review November 9, 2023 17:16
Co-authored-by: kevin-orlando <[email protected]>
@tdurk93 tdurk93 merged commit af842fb into main Nov 10, 2023
5 checks passed
@tdurk93 tdurk93 deleted the feature/secureli-261-fix-config-parsing-with-url-encoded-strings branch November 10, 2023 17:57
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
Status: Done
Development

Successfully merging this pull request may close these issues.

Secureli cannot initialize if there is a space in the repository path
2 participants