kaniko/hack
wwade 82fc94d930
git: accept explicit commit hash for git context (#1765)
* git: accept explicit commit hash for git context

When checking out code from non-github repositories, the typical
assumptions may not be valid, e.g. that the only interesting
non-branch commits have ref names starting with refs/pull. A specific
example is fetching an un-merged commit from a gerrit repository by
commit hash.

This change just looks at the second part of the git context path and
checks if it's a SHA commit hash, and if so, will fetch and check out
this commit after cloning the repository.

Sample context argument:

    https://github.repo/project#e1772f228e06d15facdf175e5385e265b57068c0

* ci: fix test script to recognize any non-zero exit as an error

hack/linter.sh didn't properly install golangci-lint in hack/bin as I
already have another version of golangci-lint on my PATH, but then it
failed to execute because it was looking for it specifically in
hack/bin.

When the executable is not found, the exit code is 127 instead of 1,
and so test.sh ignored the error.

Two fixes:

1. `test.sh`:
  - Use `if (script) ...` instead of assigning / checking a result
    variable to determine if each validation script passed or failed.

2. `hack/linter.sh`:
  - Instead of checking for golangci-lint on the path, just
    specifically check for an executable file (`test -x`) in the
    expected location.

Co-authored-by: Wade Carpenter <wwade@users.noreply.github.com>
2021-10-19 19:27:15 -07:00
..
boilerplate Run docker_credentials_gcr in warmer (#1780) 2021-10-19 12:25:42 -07:00
release_notes Release v0.4.0 2018-10-01 14:52:16 -07:00
boilerplate.sh Initial skeleton for executor (#22) 2018-02-20 19:05:54 -08:00
gofmt.sh Initial skeleton for executor (#22) 2018-02-20 19:05:54 -08:00
install_golint.sh Add s390x support to docker images (#1769) 2021-10-19 00:01:47 -07:00
linter.sh git: accept explicit commit hash for git context (#1765) 2021-10-19 19:27:15 -07:00
release.sh Release v0.4.0 2018-10-01 14:52:16 -07:00