1. 23 Feb, 2016 6 commits
  2. 22 Feb, 2016 2 commits
  3. 19 Feb, 2016 6 commits
  4. 18 Feb, 2016 13 commits
  5. 17 Feb, 2016 4 commits
    • index: allow read of index w/ illegal entries · 318b825e
      Allow `git_index_read` to handle reading existing indexes with
      illegal entries.  Allow the low-level `git_index_add` to add
      properly formed `git_index_entry`s even if they contain paths
      that would be illegal for the current filesystem (eg, `AUX`).
      Continue to disallow `git_index_add_bypath` from adding entries
      that are illegal universally illegal (eg, `.git`, `foo/../bar`).
      Edward Thomson committed
    • iterator: assert tree_iterator has a frame · 4fea9cff
      Although a `tree_iterator` that failed to be properly created
      does not have a frame, all other `tree_iterator`s should.  Do not
      call `pop` in the failure case, but assert that in all other
      cases there is a frame.
      Edward Thomson committed
    • Validate pointer before access the member. · a218b2f6
      When Git repository at network locations, sometimes git_iterator_for_tree
      fails at iterator__update_ignore_case so it goes to git_iterator_free.
      Null pointer will crash the process if not check.
      
      Signed-off-by: Colin Xu <colin.xu@gmail.com>
      Colin Xu committed
    • win32: tests around handling forbidden paths · 4be2aa57
      Introduce a repository that contains some paths that were illegal
      on PC-DOS circa 1981 (like `aux`, `con`, `com1`) and that in a
      bizarre fit of retrocomputing, remain illegal on some "modern"
      computers, despite being "new technology".
      
      Introduce some aspirational tests that suggest that we should be
      able to cope with trees and indexes that contain paths that
      would be illegal on the filesystem, so that we can at least diff
      them.  Further ensure that checkout will not write a repository
      with forbidden paths.
      Edward Thomson committed
  6. 16 Feb, 2016 9 commits