- 25 Feb, 2016 2 commits
-
-
CONVENTIONS: update to include general public API principles
Edward Thomson committed -
Carlos Martín Nieto committed
-
- 24 Feb, 2016 2 commits
-
-
Carlos Martín Nieto committed
-
This got lost duing the move and it lets the users call this function just in case.
Carlos Martín Nieto committed
-
- 23 Feb, 2016 6 commits
-
-
Minor `giterr` fixups
Carlos Martín Nieto committed -
The `giterr_set_str` does not actually honor `GITERR_OS`. Remove the documentation that claims that we do.
Edward Thomson committed -
Use the `giterr_set` function, which actually supports `GITERR_OS`. The `giterr_set_str` function is exposed for external users and will not append the operating system's error message.
Edward Thomson committed -
git_libgit2_opts: minor documentation & usage fixes
Vicent Marti committed -
Edward Thomson committed
-
Edward Thomson committed
-
- 22 Feb, 2016 2 commits
-
-
Fix a few checkout -> rebase typos
Edward Thomson committed -
Carlos Martín Nieto committed
-
- 19 Feb, 2016 6 commits
-
-
We need to include the header where we define the function. Otherwise it won't be available on the DLL.
Carlos Martín Nieto committed -
Carlos Martín Nieto committed
-
Carlos Martín Nieto committed
-
Carlos Martín Nieto committed
-
Filter registration
Carlos Martín Nieto committed -
Coverity fixes
Carlos Martín Nieto committed
-
- 18 Feb, 2016 13 commits
-
-
Patrick Steinhardt committed
-
Patrick Steinhardt committed
-
Patrick Steinhardt committed
-
When checking for out of memory situations we usually use the GITERR_CHECK_ALLOC macro. Besides conforming to our current code base it adds the benefit of silencing errors in Coverity due to Coverity handling the macro's error path as abort.
Patrick Steinhardt committed -
When checking if a string is prefixed by a drive letter (e.g. "C:") we verify this by inspecting the first and second character of the string. Coverity thinks this is a defect as we do not check the string's length first, but in fact we only check the second character if the first character is part of the alphabet, that is it cannot be '\0'. Fix this by overriding the macro and explicitly checking the string's length.
Patrick Steinhardt committed -
Add nodefs for macros that abort the current flow due to errors. This includes macros that trigger on integer overflows and for the version check macro. This aids Coverity as we point out that these paths will cause a fatal error.
Patrick Steinhardt committed -
Handle `USE_NSECS`
Carlos Martín Nieto committed -
win32: drop xp support in WideCharToMultiByte
Carlos Martín Nieto committed -
Remove most of the silly warnings
Carlos Martín Nieto committed -
win32: allow us to read indexes with forbidden paths on win32
Carlos Martín Nieto committed -
Fix a typo
Carlos Martín Nieto committed -
Carlos Martín Nieto committed
-
`compatability` → `compatibility`
Prayag Verma committed
-
- 17 Feb, 2016 4 commits
-
-
Allow `git_index_read` to handle reading existing indexes with illegal entries. Allow the low-level `git_index_add` to add properly formed `git_index_entry`s even if they contain paths that would be illegal for the current filesystem (eg, `AUX`). Continue to disallow `git_index_add_bypath` from adding entries that are illegal universally illegal (eg, `.git`, `foo/../bar`).
Edward Thomson committed -
Although a `tree_iterator` that failed to be properly created does not have a frame, all other `tree_iterator`s should. Do not call `pop` in the failure case, but assert that in all other cases there is a frame.
Edward Thomson committed -
When Git repository at network locations, sometimes git_iterator_for_tree fails at iterator__update_ignore_case so it goes to git_iterator_free. Null pointer will crash the process if not check. Signed-off-by: Colin Xu <colin.xu@gmail.com>
Colin Xu committed -
Introduce a repository that contains some paths that were illegal on PC-DOS circa 1981 (like `aux`, `con`, `com1`) and that in a bizarre fit of retrocomputing, remain illegal on some "modern" computers, despite being "new technology". Introduce some aspirational tests that suggest that we should be able to cope with trees and indexes that contain paths that would be illegal on the filesystem, so that we can at least diff them. Further ensure that checkout will not write a repository with forbidden paths.
Edward Thomson committed
-
- 16 Feb, 2016 5 commits
-
-
commit: expose the different kinds of errors
Carlos Martín Nieto committed -
We should be checking whether the object we're looking up is a commit, and we should let the caller know whether the not-found return code comes from a bad object type or just a missing signature.
Carlos Martín Nieto committed -
Edward Thomson committed
-
Edward Thomson committed
-
Edward Thomson committed
-