Page Menu
Home
Phabricator
Search
Configure Global Search
Log In
Files
F14013876
D7665.id17309.diff
No One
Temporary
Actions
View File
Edit File
Delete File
View Transforms
Subscribe
Mute Notifications
Award Token
Flag For Later
Size
1 KB
Referenced Files
None
Subscribers
None
D7665.id17309.diff
View Options
Index: resources/sql/patches/20131121.repocredentials.2.mig.php
===================================================================
--- resources/sql/patches/20131121.repocredentials.2.mig.php
+++ resources/sql/patches/20131121.repocredentials.2.mig.php
@@ -14,13 +14,13 @@
continue;
}
- $uri = $repository->getRemoteURI();
- if (!$uri) {
+ $raw_uri = $repository->getRemoteURI();
+ if (!$raw_uri) {
echo "...no remote URI.\n";
continue;
}
- $uri = new PhutilURI($uri);
+ $uri = new PhutilURI($raw_uri);
$proto = strtolower($uri->getProtocol());
if ($proto == 'http' || $proto == 'https' || $proto == 'svn') {
@@ -29,6 +29,16 @@
$type = PassphraseCredentialTypePassword::CREDENTIAL_TYPE;
} else {
$username = $repository->getDetail('ssh-login');
+ if (!$username) {
+ // If there's no explicit username, check for one in the URI. This is
+ // possible with older repositories.
+ $username = $uri->getUser();
+ if (!$username) {
+ // Also check for a Git/SCP-style URI.
+ $git_uri = new PhutilGitURI($raw_uri);
+ $username = $git_uri->getUser();
+ }
+ }
$file = $repository->getDetail('ssh-keyfile');
if ($file) {
$secret = $file;
File Metadata
Details
Attached
Mime Type
text/plain
Expires
Sun, Nov 3, 5:56 PM (2 w, 21 h ago)
Storage Engine
blob
Storage Format
Encrypted (AES-256-CBC)
Storage Handle
6729664
Default Alt Text
D7665.id17309.diff (1 KB)
Attached To
Mode
D7665: Fix an issue with repository credential migration for older repositories
Attached
Detach File
Event Timeline
Log In to Comment