- 09 Jan, 2017 2 commits
-
-
None of our crypto backends actually reject RC4 as a cipher so don't test for it and instead keep it as something we'd like to do.
Carlos Martín Nieto committed -
We must make sure that we're getting a certificate error from the library so we know that we're testing the right thing.
Carlos Martín Nieto committed
-
- 06 Jan, 2017 7 commits
-
-
Edward Thomson committed
-
Edward Thomson committed
-
The Git protocol does not specify what should happen in the case of an empty packet line (that is a packet line "0004"). We currently indicate success, but do not return a packet in the case where we hit an empty line. The smart protocol was not prepared to handle such packets in all cases, though, resulting in a `NULL` pointer dereference. Fix the issue by returning an error instead. As such kind of packets is not even specified by upstream, this is the right thing to do.
Patrick Steinhardt committed -
Each packet line in the Git protocol is prefixed by a four-byte length of how much data will follow, which we parse in `git_pkt_parse_line`. The transmitted length can either be equal to zero in case of a flush packet or has to be at least of length four, as it also includes the encoded length itself. Not checking this may result in a buffer overflow as we directly pass the length to functions which accept a `size_t` length as parameter. Fix the issue by verifying that non-flush packets have at least a length of `PKT_LEN_SIZE`.
Patrick Steinhardt committed -
Edward Thomson committed
-
Make sure that the callbacks do also get a 'valid' value of zero when the certificate we're looking at is in valid and assert that within the test.
Carlos Martín Nieto committed -
Etienne Samson committed
-
- 20 Dec, 2016 6 commits
-
-
Documentation fixes
Carlos Martín Nieto committed -
http: bump the pretend git version in the User-Agent
Edward Thomson committed -
We want to keep the git UA in order for services to recognise that we're a Git client and not a browser. But in order to stop dumb HTTP some services have blocked UAs that claim to be pre-1.6.6 git. Thread these needles by using the "git/2.0" prefix which is still close enough to git's yet distinct enough that you can tell it's us.
Carlos Martín Nieto committed -
sysdir: don't re-guess when using variable substitution
Edward Thomson committed -
Don't hard-code HTTPS cap & clarify the meanings of the features enum
Edward Thomson committed -
README: be more explicit in the goals and scope
Carlos Martín Nieto committed
-
- 19 Dec, 2016 6 commits
-
-
Gift deprecated in favor of SwiftGit2
Carlos Martín Nieto committed -
refdb: bubble up recursive rm when locking a ref
Carlos Martín Nieto committed -
pack: dereference cached pack entry on error
Carlos Martín Nieto committed -
Lucas Derraugh committed
-
Fix off-by-one problems in git_signature__parse
Carlos Martín Nieto committed -
Make it clearer from the get-go that we do not aim to implement user-facing commands from the git tool.
Carlos Martín Nieto committed
-
- 18 Dec, 2016 2 commits
-
-
We should replace it with whatever the user set, not start again.
Carlos Martín Nieto committed -
When given $PATH as part of a search path, we guess again instead of substituting what the user already set.
Carlos Martín Nieto committed
-
- 17 Dec, 2016 5 commits
-
-
Etc/GMT-14 aka UTC+14:00 is a thing.... https://en.wikipedia.org/wiki/UTC%2B14:00 Also allow offsets on the last minute (59). Addresses: https://bugs.debian.org/841532 Fixes: #3970
Andreas Henriksson committed -
Most importantly, clarify what it means for HTTPS and SSH to be supported.
Carlos Martín Nieto committed -
This partially reverts bdec62dc which activates the transport code-paths which allow you to use a custom TLS implementation without having to have one at build-time. However the capabilities describe how libgit2 was built, not what it could potentially support, bring back the ifdefs so we only say we support HTTPS if libgit2 was itself built with a TLS implementation.
Carlos Martín Nieto committed -
rebase: plug a leak in the tests
Carlos Martín Nieto committed -
Carlos Martín Nieto committed
-
- 16 Dec, 2016 2 commits
-
-
Failure to bubble up this error means some locking errors do not get reported as such on Windows.
Carlos Martín Nieto committed -
refdb: disable concurrent compress in the threading tests on Windows
Edward Thomson committed
-
- 12 Dec, 2016 10 commits
-
-
Various fixes
Carlos Martín Nieto committed -
This is far from an ideal situation, but this causes issues on Windows which make it harder to develop anything, as these tests hit issues which relate specifically to the Windows filesystem like permission errors for files we should be able to access. There is an issue likely related to the ordering of the repack, but there's enough noise that it does not currently help us to run this aspect of the test in CI.
Carlos Martín Nieto committed -
When trying to uncompress deltas in a packfile's delta chain, we try to add object bases to the packfile cache, subsequently decrementing its reference count if it has been added successfully. This may lead to a mismatched reference count in the case where we exit the loop early due to an encountered error. Fix the issue by decrementing the reference count in error cleanup.
Patrick Steinhardt committed -
Patrick Steinhardt committed
-
Patrick Steinhardt committed
-
Patrick Steinhardt committed
-
Patrick Steinhardt committed
-
Patrick Steinhardt committed
-
Patrick Steinhardt committed
-
The function `cl_git_thread_check()` is defined as static. As the function is defined in a header file which is included by our tests, this can result in warnings for every test file where `cl_git_thread_check` is never used. Fix the issue by marking it as inline instead.
Patrick Steinhardt committed
-