Movatterモバイル変換


[0]ホーム

URL:


Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
Appearance settings

Prevent early variable expansion in header command#364

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to ourterms of service andprivacy statement. We’ll occasionally send you account related emails.

Already on GitHub?Sign in to your account

Merged
code-asher merged 1 commit intomainfromasher/escape-subcommand
Feb 21, 2024

Conversation

code-asher
Copy link
Member

@code-ashercode-asher commentedFeb 20, 2024
edited
Loading

Fixes#338.

The problem was that if your header command was something likeauth --url=$CODER_URL, it would get expanded as part of executing the proxy command and you end up withauth --url= sinceCODER_URL is not set.

We want to pass it literally to the binary so that it can then be expanded in the binary when it executes the header command, since the binary will setCODER_URL when spawning.

An alternative would be to setCODER_URL when the proxy command is spawned, but I am not sure we can as I think it would be using the current process environment (via that SSHJ library I think). Maybe there is a way to mutate the current environment, but a quick look says no.

github-actions[bot] reacted with thumbs up emoji
@code-ashercode-asherforce-pushed theasher/escape-subcommand branch 2 times, most recently from8fbef28 to1dd7d2cCompareFebruary 20, 2024 21:24
@github-actionsGitHub Actions
Copy link
Contributor

Qodana Community for JVM

48 new problems were found

Inspection nameSeverityProblems
Unused symbol🔶 Warning26
Unstable API Usage🔶 Warning8
Incorrect string capitalization🔶 Warning7
Redundant qualifier name🔶 Warning2
Call to 'equals()' or 'hashCode()' on 'URL' object🔶 Warning2
Redundant semicolon🔶 Warning1
Redundant curly braces in string template◽️ Notice1
Redundant empty primary constructor◽️ Notice1

💡 Qodana analysis was run in the pull request mode: only the changed files were checked

View the detailed Qodana report

To be able to view the detailed Qodana report, you can either:

  1. Register atQodana Cloud andconfigure the action
  2. UseGitHub Code Scanning with Qodana
  3. HostQodana report at GitHub Pages
  4. Inspect and useqodana.sarif.json (seethe Qodana SARIF format for details)

To get*.log files or any other Qodana artifacts, run the action withupload-result option set totrue,
so that the action will upload the files as the job artifacts:

      -name:'Qodana Scan'uses:JetBrains/qodana-action@v2023.3.0with:upload-result:true
Contact Qodana team

Contact us atqodana-support@jetbrains.com

@code-ashercode-asher merged commit1da515e intomainFeb 21, 2024
@code-ashercode-asher deleted the asher/escape-subcommand branchFebruary 21, 2024 17:45
Sign up for freeto join this conversation on GitHub. Already have an account?Sign in to comment

Reviewers

@johnstcnjohnstcnjohnstcn approved these changes

Assignees

No one assigned

Labels

None yet

Projects

None yet

Milestone

No milestone

Development

Successfully merging this pull request may close these issues.

Prevent variable expansion in header command

2 participants

@code-asher@johnstcn

[8]ページ先頭

©2009-2025 Movatter.jp