- 19 Sep, 2022 3 commits
-
-
Test that we can successfully clone a repository that is namespace scoped to a bare repository locally. We need not specify a checkout branch in this case (obviously, since we do not check anything out in a bare clone).
Edward Thomson committed -
Only allow the remote default branch checking to fail when the remote default branch doesn't exist (`git_remote__default_branch` returns `GIT_ENOTFOUND`). If there was any other type of error - for example, an allocation failure - we should not swallow that and continue to fail. This allows us to support the case when a remote has not advertised a HEAD -- this is possible, for example, when the remote has constrained the caller to a particular namespace. But other remote failures remain as failures.
Edward Thomson committed -
Edward Thomson committed
-
- 16 Sep, 2022 3 commits
-
-
CI Improvements
Edward Thomson committed -
We previously (correctly) cleaned up the git daemon and SSH server, but failed to clean up our bespoke HTTP server and HTTP proxies. Capture their PIDs on process creation and kill them when we shut down.
Edward Thomson committed -
GitHub has deprecated macOS 10.15; move to their new macOS 11 build servers.
Edward Thomson committed
-
- 30 Jul, 2022 1 commit
-
-
In commit 6bb35878 ("clone: set refs/remotes/origin/HEAD to default branch when branch is specified, attempt 2") libgit2 was changed to set the default remote branch when one was copied. But it makes update_head_to_branch() return an error if the origin doesn't even *have* a HEAD in the first place, since git_remote_default_branch() will fail. That's entirely wrong, and means that you cannot do "git_clone()" of a particular branch on a remote repository when that remote doesn't have a default branch at all. So don't set the error code. Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
Linus Torvalds committed
-
- 19 Jul, 2022 1 commit
-
-
clar: remove ftrunacte from libgit2 tests
Edward Thomson committed
-
- 15 Jul, 2022 1 commit
-
-
Peter Pettersson committed
-
- 14 Jul, 2022 8 commits
-
-
tests: skip flaky-ass googlesource tests
Edward Thomson committed -
sha256: indirection for experimental functions
Edward Thomson committed -
The experimental function signature is only available when `GIT_EXPERIMENTAL_SHA256` is enabled.
Edward Thomson committed -
RFC: SHA256 proof of concept
Edward Thomson committed -
Edward Thomson committed
-
meta: update version number to v1.6.0-alpha
Edward Thomson committed -
Edward Thomson committed
-
v1.5.0
Edward Thomson committed
-
- 13 Jul, 2022 7 commits
-
-
Edward Thomson committed
-
Edward Thomson committed
-
Edward Thomson committed
-
Fix creation of branches and tags with invalid names
Edward Thomson committed -
Edward Thomson committed
-
pack: don't pretend we support pack files v3
Edward Thomson committed -
Edward Thomson committed
-
- 12 Jul, 2022 10 commits
-
-
zlib: update bundled zlib to v1.2.12
Edward Thomson committed -
Fixes for CVE 2022-29187
Edward Thomson committed -
Mark Adler committed
-
slide_hash knowingly reads (possibly) uninitialised memory, see comment lower down about prev[n] potentially being garbage. In this case, the result is never used - so we don't care about MSAN complaining about this read. By adding the no_sanitize("memory") attribute, clients of zlib won't see this (unnecessary) error when building and running with MemorySanitizer. An alternative approach is for clients to build zlib with -fsanitize-ignorelist=... where the ignorelist contains something like 'fun:slide_hash'. But that's more work and needs to be redone for any and all CI systems running a given project with MSAN. Adding this annotation to zlib's sources is overall more convenient - but also won't affect non-MSAN builds. This specific issue was found while running git's test suite, but has also been reported by other clients, see e.g. #518.
Andrzej Hunt committed -
The `crc32_combine_gen64` missed a prototype in our define path. Add one.
Edward Thomson committed -
Edward Thomson committed
-
In the ownership checks implemented for CVE-2022-24765, we disallowed users to access their own repositories when running with `sudo`. Examine the `SUDO_UID` environment variable and allow users running with `sudo`. This matches git's behavior.
Edward Thomson committed -
To match git's behavior with CVE 2022-29187, validate not only the working directory, but also the gitdir and gitlink (if it exists). This a follow up to CVE-2022-24765 that was fixed earlier.
Edward Thomson committed -
Fix erroneously lax configuration ownership checks
Edward Thomson committed -
yuangli committed
-
- 11 Jul, 2022 6 commits