A Go library for parsing and applying patches generated by git diff
, git show
, and git format-patch
. It can also parse and apply unified diffs
generated by the standard diff
tool.
It supports standard line-oriented text patches and Git binary patches, and
aims to parse anything accepted by the git apply
command.
patch, err := os.Open("changes.patch")
if err != nil {
log.Fatal(err)
}
// files is a slice of *gitdiff.File describing the files changed in the patch
// preamble is a string of the content of the patch before the first file
files, preamble, err := gitdiff.Parse(patch)
if err != nil {
log.Fatal(err)
}
code, err := os.Open("code.go")
if err != nil {
log.Fatal(err)
}
// apply the changes in the patch to a source file
var output bytes.Buffer
if err := gitdiff.NewApplier(code).ApplyFile(&output, files[0]); err != nil {
log.Fatal(err)
}
Mostly complete, but API changes are possible. Patch parsing and strict application works and is well-covered by unit tests, but has not been validated extensively against real-world patches.
Several packages with similar functionality exist, so why did I write another?
-
No other packages I found support binary diffs, as generated with the
--binary
flag. This is the main reason for writing a new package, as the format is pretty different from line-oriented diffs and is unique to Git. -
Most other packages only parse patches, so you need additional code to apply them (and if applies are supported, it is only for text files.)
-
This package aims to accept anything that
git apply
accepts, and closely follows the logic inapply.c
. -
It seemed like a fun project and a way to learn more about Git.
-
Certain types of invalid input that are accepted by
git apply
generate errors. These include:- Numbers immediately followed by non-numeric characters
- Trailing characters on a line after valid or expected content
-
Errors for invalid input are generally more verbose and specific than those from
git apply
. -
The translation from C to Go may have introduced inconsistencies in the way Unicode file names are handled; these are bugs, so please report any issues of this type.
-
When reading headers, there is no validation that OIDs present on an
index
line are shorter than or equal to the maximum hash length, as this requires knowing if the repository used SHA1 or SHA256 hashes. -
When reading "traditional" patches (those not produced by
git
), prefixes are not stripped from file names;git apply
attempts to remove prefixes that match the current repository directory/prefix. -
Patches can only be applied in "strict" mode, where the line numbers and context of each fragment must exactly match the source file;
git apply
implements a search algorithm that tries different lines and amounts of context, with further options to normalize or ignore whitespace changes.