Skip to content

Commit e9b3db8

Browse files
committedOct 21, 2024··
fix: make GIT_WORK_TREE variable work as expected.
Now it's picked up durign initialization.
1 parent 9c619e4 commit e9b3db8

File tree

7 files changed

+43
-14
lines changed

7 files changed

+43
-14
lines changed
 

‎gix/src/clone/fetch/util.rs

+1-1
Original file line numberDiff line numberDiff line change
@@ -50,7 +50,7 @@ fn write_to_local_config(config: &gix_config::File<'static>, mode: WriteMode) ->
5050
.append(matches!(mode, WriteMode::Append))
5151
.open(config.meta().path.as_deref().expect("local config with path set"))?;
5252
local_config.write_all(config.detect_newline_style())?;
53-
config.write_to_filter(&mut local_config, &mut |s| s.meta().source == gix_config::Source::Local)
53+
config.write_to_filter(&mut local_config, |s| s.meta().source == gix_config::Source::Local)
5454
}
5555

5656
pub fn append_config_to_repo_config(repo: &mut Repository, config: gix_config::File<'static>) {

‎gix/src/config/cache/access.rs

+3-3
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
#![allow(clippy::result_large_err)]
2-
use std::{borrow::Cow, path::PathBuf, time::Duration};
3-
2+
use gix_config::file::Metadata;
43
use gix_lock::acquire::Fail;
4+
use std::{borrow::Cow, path::PathBuf, time::Duration};
55

66
use crate::{
77
config,
@@ -510,7 +510,7 @@ impl Cache {
510510
pub(crate) fn trusted_file_path<'config>(
511511
config: &'config gix_config::File<'_>,
512512
key: impl gix_config::AsKey,
513-
filter: &mut gix_config::file::MetadataFilter,
513+
filter: impl FnMut(&Metadata) -> bool,
514514
lenient_config: bool,
515515
environment: crate::open::permissions::Environment,
516516
) -> Option<Result<Cow<'config, std::path::Path>, gix_config::path::interpolate::Error>> {

‎gix/src/config/cache/init.rs

+9
Original file line numberDiff line numberDiff line change
@@ -326,6 +326,15 @@ fn apply_environment_overrides(
326326

327327
let mut env_override = gix_config::File::new(gix_config::file::Metadata::from(gix_config::Source::EnvOverride));
328328
for (section_name, subsection_name, permission, data) in [
329+
(
330+
"core",
331+
None,
332+
git_prefix,
333+
&[{
334+
let key = &Core::WORKTREE;
335+
(env(key), key.name)
336+
}][..],
337+
),
329338
(
330339
"http",
331340
None,

‎gix/src/config/snapshot/credential_helpers.rs

+3-3
Original file line numberDiff line numberDiff line change
@@ -90,7 +90,7 @@ pub(super) mod function {
9090
mut url: gix_url::Url,
9191
config: &gix_config::File<'_>,
9292
is_lenient_config: bool,
93-
filter: &mut gix_config::file::MetadataFilter,
93+
mut filter: impl FnMut(&gix_config::file::Metadata) -> bool,
9494
environment: crate::open::permissions::Environment,
9595
mut use_http_path: bool,
9696
) -> Result<
@@ -105,7 +105,7 @@ pub(super) mod function {
105105
let url_had_user_initially = url.user().is_some();
106106
normalize(&mut url);
107107

108-
if let Some(credential_sections) = config.sections_by_name_and_filter("credential", filter) {
108+
if let Some(credential_sections) = config.sections_by_name_and_filter("credential", &mut filter) {
109109
for section in credential_sections {
110110
let section = match section.header().subsection_name() {
111111
Some(pattern) => gix_url::parse(pattern).ok().and_then(|mut pattern| {
@@ -181,7 +181,7 @@ pub(super) mod function {
181181
askpass: crate::config::cache::access::trusted_file_path(
182182
config,
183183
&Core::ASKPASS,
184-
filter,
184+
&mut filter,
185185
is_lenient_config,
186186
environment,
187187
)

‎gix/src/config/tree/sections/core.rs

+1-1
Original file line numberDiff line numberDiff line change
@@ -58,7 +58,7 @@ impl Core {
5858
/// The `core.worktree` key.
5959
pub const WORKTREE: keys::Any = keys::Any::new("worktree", &config::Tree::CORE)
6060
.with_environment_override("GIT_WORK_TREE")
61-
.with_deviation("Overriding the worktree with environment variables is supported using `ThreadSafeRepository::open_with_environment_overrides()");
61+
.with_deviation("Command-line overrides also work, and they act lie an environment override. If set in the git configuration file, relative paths are relative to it.");
6262
/// The `core.askPass` key.
6363
pub const ASKPASS: keys::Executable = keys::Executable::new_executable("askPass", &config::Tree::CORE)
6464
.with_environment_override("GIT_ASKPASS")

‎gix/src/open/repository.rs

+25-5
Original file line numberDiff line numberDiff line change
@@ -99,7 +99,7 @@ impl ThreadSafeRepository {
9999
}
100100

101101
/// Try to open a git repository in `fallback_directory` (can be worktree or `.git` directory) only if there is no override
102-
/// from of the `gitdir` using git environment variables.
102+
/// of the `gitdir` using git environment variables.
103103
///
104104
/// Use the `trust_map` to apply options depending in the trust level for `directory` or the directory it's overridden with.
105105
/// The `.git` directory whether given or computed is used for trust checks.
@@ -135,7 +135,7 @@ impl ThreadSafeRepository {
135135
}
136136
};
137137

138-
// The be altered later based on `core.precomposeUnicode`.
138+
// To be altered later based on `core.precomposeUnicode`.
139139
let cwd = gix_fs::current_dir(false)?;
140140
let (git_dir, worktree_dir) = gix_discover::repository::Path::from_dot_git_dir(path, path_kind, &cwd)
141141
.expect("we have sanitized path with is_git()")
@@ -258,15 +258,35 @@ impl ThreadSafeRepository {
258258

259259
// core.worktree might be used to overwrite the worktree directory
260260
if !config.is_bare {
261-
if let Some(wt) = config.resolved.path_filter(Core::WORKTREE, &mut filter_config_section) {
261+
let mut key_source = None;
262+
let worktree_path = config
263+
.resolved
264+
.path_filter(Core::WORKTREE, {
265+
|section| {
266+
let res = filter_config_section(section);
267+
if res {
268+
key_source = Some(section.source);
269+
}
270+
res
271+
}
272+
})
273+
.zip(key_source);
274+
if let Some((wt, key_source)) = worktree_path {
262275
let wt_clone = wt.clone();
263276
let wt_path = wt
264277
.interpolate(interpolate_context(git_install_dir.as_deref(), home.as_deref()))
265278
.map_err(|err| config::Error::PathInterpolation {
266279
path: wt_clone.value.into_owned(),
267280
source: err,
268281
})?;
269-
worktree_dir = gix_path::normalize(git_dir.join(wt_path).into(), current_dir).map(Cow::into_owned);
282+
let wt_path = match key_source {
283+
gix_config::Source::Env
284+
| gix_config::Source::Cli
285+
| gix_config::Source::Api
286+
| gix_config::Source::EnvOverride => wt_path,
287+
_ => git_dir.join(wt_path).into(),
288+
};
289+
worktree_dir = gix_path::normalize(wt_path, current_dir).map(Cow::into_owned);
270290
#[allow(unused_variables)]
271291
if let Some(worktree_path) = worktree_dir.as_deref().filter(|wtd| !wtd.is_dir()) {
272292
gix_trace::warn!("The configured worktree path '{}' is not a directory or doesn't exist - `core.worktree` may be misleading", worktree_path.display());
@@ -284,7 +304,7 @@ impl ThreadSafeRepository {
284304
}
285305

286306
match worktree_dir {
287-
None if !config.is_bare && refs.git_dir().extension() == Some(OsStr::new(gix_discover::DOT_GIT_DIR)) => {
307+
None if !config.is_bare && refs.git_dir().file_name() == Some(OsStr::new(gix_discover::DOT_GIT_DIR)) => {
288308
worktree_dir = Some(git_dir.parent().expect("parent is always available").to_owned());
289309
}
290310
Some(_) => {

‎gix/tests/gix/repository/worktree.rs

+1-1
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,7 @@ mod with_core_worktree_config {
4444
assert_eq!(
4545
repo.work_dir().unwrap(),
4646
repo.git_dir().parent().unwrap().parent().unwrap().join("worktree"),
47-
"work_dir is set to core.worktree config value, relative paths are appended to `git_dir() and made absolute`"
47+
"{name}|{is_relative}: work_dir is set to core.worktree config value, relative paths are appended to `git_dir() and made absolute`"
4848
);
4949
} else {
5050
assert_eq!(

0 commit comments

Comments
 (0)
Please sign in to comment.