1. 10 Jun, 2019 7 commits
    • winhttp: support default credentials for proxies · 3d11b6c5
      We did not properly support default credentials for proxies, only for
      destination servers.  Refactor the credential handling to support sending
      either username/password _or_ default credentials to either the proxy or
      the destination server.
      
      This actually shares the authentication logic between proxy servers and
      destination servers.  Due to copy/pasta drift over time, they had
      diverged.  Now they share a common logic which is: first, use
      credentials specified in the URL (if there were any), treating empty
      username and password (ie, "http://:@foo.com/") as default credentials,
      for compatibility with git.  Next, call the credential callbacks.
      Finally, fallback to WinHTTP compatibility layers using built-in
      authentication like we always have.
      
      Allowing default credentials for proxies requires moving the security
      level downgrade into the credential setting routines themselves.
      We will update our security level to "high" by default which means that
      we will never send default credentials without prompting.  (A lower
      setting, like the WinHTTP default of "medium" would allow WinHTTP to
      handle credentials for us, despite what a user may have requested with
      their structures.)  Now we start with "high" and downgrade to "low" only
      after a user has explicitly requested default credentials.
      Edward Thomson committed
    • network: don't add arbitrary url rules · 757411a0
      There's no reason a git repository couldn't be at the root of a server,
      and URLs should have an implicit path of '/' when one is not specified.
      Edward Thomson committed
    • net: rename gitno_connection_data to git_net_url · c6ab183e
      "Connection data" is an imprecise and largely incorrect name; these
      structures are actually parsed URLs.  Provide a parser that takes a URL
      string and produces a URL structure (if it is valid).
      
      Separate the HTTP redirect handling logic from URL parsing, keeping a
      `gitno_connection_data_handle_redirect` whose only job is redirect
      handling logic and does not parse URLs itself.
      Edward Thomson committed
    • Merge pull request #5102 from libgit2/ethomson/callback_names · f4584a1e
      Callback type names should be suffixed with `_cb`
      Edward Thomson committed
    • Merge pull request #5099 from pks-t/pks/tests-fix-symlink-outside-sandbox · dd47a3ef
      tests: checkout: fix symlink.git being created outside of sandbox
      Edward Thomson committed
    • trace: suffix the callbacks with `_cb` · 178df697
      The trace logging callbacks should match the other callback naming
      conventions, using the `_cb` suffix instead of a `_callback` suffix.
      Edward Thomson committed
    • credentials: suffix the callbacks with `_cb` · 810cefd9
      The credential callbacks should match the other callback naming
      conventions, using the `_cb` suffix instead of a `_callback` suffix.
      Edward Thomson committed
  2. 07 Jun, 2019 1 commit
  3. 06 Jun, 2019 4 commits
  4. 05 Jun, 2019 3 commits
  5. 24 May, 2019 11 commits
  6. 23 May, 2019 1 commit
  7. 22 May, 2019 8 commits
  8. 21 May, 2019 5 commits