-
Notifications
You must be signed in to change notification settings - Fork 21
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Allow not escaped commands #99
Comments
-
type: exec
executable: git
arguments:
- push
- https://$GH_TOKEN$@github.com/... Shouldn't that work? |
@aequasi no, as said, that'll be converted to:
Anything between single quotes get not parsed, so |
I am taking the risk here for getting involved in @wouterj's affairs but just want to mention this https://github.com/gushphp/gush/blob/master/src/Helper/ProcessHelper.php#L181-L197 not sure if it is related. I will not continue replying any responses for my sake. 😊 |
@wouterj i put in environment variable token support. What i posted will work, but you need the |
I need to use Bash variables in my commands, e.g.:
git push https://${GH_TOKEN}@github.com/...
. The ProcessBuilder escapes each argument, resulting in'git' 'push' 'https://${GH_TOKEN}@gihub.com/'
. This causes my build to fail, since the authentication is no longer correct.I propose to add an option called
raw
. When it's set totrue
, it'll simply executeimplode(' ', $arguments)
instead of using the ProcessBuilder.The text was updated successfully, but these errors were encountered: