Find this useful? Enter your email to receive occasional updates for securing PHP code.

Signing you up...

Thank you for signing up!

PHP Decode

<?php final class DiffusionGitCommandEngine extends DiffusionCommandEngine { protect..

Decoded Output download

<?php

final class DiffusionGitCommandEngine
  extends DiffusionCommandEngine {

  protected function canBuildForRepository(
    PhabricatorRepository $repository) {
    return $repository->isGit();
  }

  protected function newFormattedCommand($pattern, array $argv) {
    $pattern = "git {$pattern}";
    return array($pattern, $argv);
  }

  protected function shouldAlwaysSudo() {

    // See T13673. In Git, always try to use "sudo" to execute commands as the
    // daemon user (if such a user is configured), because Git 2.35.2 and newer
    // (and some older versions of Git with backported security patches) refuse
    // to execute if the top level repository directory is not owned by the
    // current user.

    // Previously, we used "sudo" only when performing writes to the
    // repository directory.

    return true;
  }

  protected function newCustomEnvironment() {
    $env = array();

    // NOTE: See T2965. Some time after Git 1.7.5.4, Git started fataling if
    // it can not read $HOME. For many users, $HOME points at /root (this
    // seems to be a default result of Apache setup). Instead, explicitly
    // point $HOME at a readable, empty directory so that Git looks for the
    // config file it's after, fails to locate it, and moves on. This is
    // really silly, but seems like the least damaging approach to
    // mitigating the issue.

    $env['HOME'] = PhabricatorEnv::getEmptyCWD();

    $env['GIT_SSH'] = $this->getSSHWrapper();
    $env['GIT_SSH_VARIANT'] = 'ssh';

    if ($this->isAnyHTTPProtocol()) {
      $uri = $this->getURI();
      if ($uri) {
        $proxy = PhutilHTTPEngineExtension::buildHTTPProxyURI($uri);
        if ($proxy) {
          if ($this->isHTTPSProtocol()) {
            $env_key = 'https_proxy';
          } else {
            $env_key = 'http_proxy';
          }
          $env[$env_key] = (string)$proxy;
        }
      }
    }

    return $env;
  }

}
 ?>

Did this file decode correctly?

Original Code

<?php

final class DiffusionGitCommandEngine
  extends DiffusionCommandEngine {

  protected function canBuildForRepository(
    PhabricatorRepository $repository) {
    return $repository->isGit();
  }

  protected function newFormattedCommand($pattern, array $argv) {
    $pattern = "git {$pattern}";
    return array($pattern, $argv);
  }

  protected function shouldAlwaysSudo() {

    // See T13673. In Git, always try to use "sudo" to execute commands as the
    // daemon user (if such a user is configured), because Git 2.35.2 and newer
    // (and some older versions of Git with backported security patches) refuse
    // to execute if the top level repository directory is not owned by the
    // current user.

    // Previously, we used "sudo" only when performing writes to the
    // repository directory.

    return true;
  }

  protected function newCustomEnvironment() {
    $env = array();

    // NOTE: See T2965. Some time after Git 1.7.5.4, Git started fataling if
    // it can not read $HOME. For many users, $HOME points at /root (this
    // seems to be a default result of Apache setup). Instead, explicitly
    // point $HOME at a readable, empty directory so that Git looks for the
    // config file it's after, fails to locate it, and moves on. This is
    // really silly, but seems like the least damaging approach to
    // mitigating the issue.

    $env['HOME'] = PhabricatorEnv::getEmptyCWD();

    $env['GIT_SSH'] = $this->getSSHWrapper();
    $env['GIT_SSH_VARIANT'] = 'ssh';

    if ($this->isAnyHTTPProtocol()) {
      $uri = $this->getURI();
      if ($uri) {
        $proxy = PhutilHTTPEngineExtension::buildHTTPProxyURI($uri);
        if ($proxy) {
          if ($this->isHTTPSProtocol()) {
            $env_key = 'https_proxy';
          } else {
            $env_key = 'http_proxy';
          }
          $env[$env_key] = (string)$proxy;
        }
      }
    }

    return $env;
  }

}

Function Calls

None

Variables

None

Stats

MD5 2bd1352ba6d153bd025b0e6aaacf42e1
Eval Count 0
Decode Time 70 ms