- Sort Score
- Result 10 results
- Languages All
Results 1 - 3 of 3 for GIT_ALLOW_PROTOCOL (0.17 sec)
-
src/cmd/go/internal/vcs/vcs_test.go
{vcsHg, "foo://example.com/bar.hg", false}, {vcsSvn, "foo://example.com/svn", false}, {vcsBzr, "foo://example.com/bar.bzr", false}, } defer os.Unsetenv("GIT_ALLOW_PROTOCOL") os.Setenv("GIT_ALLOW_PROTOCOL", "https:foo") for _, test := range tests { secure := test.vcs.IsSecure(test.url) if secure != test.secure { t.Errorf("%s isSecure(%q) = %t; want %t", test.vcs, test.url, secure, test.secure)
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Thu Nov 03 15:33:59 UTC 2022 - 17K bytes - Viewed (0) -
src/cmd/go/internal/help/helpdoc.go
download tries https://, then git+ssh://. By default, downloads are restricted to known secure protocols (e.g. https, ssh). To override this setting for Git downloads, the GIT_ALLOW_PROTOCOL environment variable can be set (For more details see: 'go help environment'). If the import path is not a known code hosting site and also lacks a version control qualifier, the go tool attempts to fetch the import
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Tue Jun 11 16:54:28 UTC 2024 - 36.3K bytes - Viewed (0) -
src/cmd/go/internal/vcs/vcs.go
} func (v *Cmd) isSecureScheme(scheme string) bool { switch v.Cmd { case "git": // GIT_ALLOW_PROTOCOL is an environment variable defined by Git. It is a // colon-separated list of schemes that are allowed to be used with git // fetch/clone. Any scheme not mentioned will be considered insecure. if allow := os.Getenv("GIT_ALLOW_PROTOCOL"); allow != "" { for _, s := range strings.Split(allow, ":") { if s == scheme {
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Mon Mar 04 17:30:18 UTC 2024 - 46.2K bytes - Viewed (0)