- 18 Jul, 2023 1 commit
-
-
We are allowed to call `git_repository__cleanup` multiple times, and this happens e.g. in rugged if we want to free up resources before GC gets around to them. This means that we cannot leave dangling pointers in it, which we were doing with the grafts. Fix this by setting the pointers to NULL after freeing the resources.
Carlos Martín Nieto committed
-
- 13 May, 2023 1 commit
-
-
git_oid_tostr_s could fail if thread-local state initialization fails. In that case, it will now return `NULL`. Callers should check for `NULL` and propagate the failure.
Edward Thomson committed
-
- 09 May, 2023 1 commit
-
-
Users should provide us an array of object ids; we don't need a separate type. And especially, we should not be mutating user-providing values. Instead, use `git_oid *` in the shallow code.
Edward Thomson committed
-
- 08 May, 2023 2 commits
-
-
The semantics of `from_file` are weird - it looks like a function that just opens a file, but it actually inspects the pointer, which is unexpected and could make things very crashy. Make an `open` function that just does an open, and move the magic to `open_or_refresh` whose name better indicates that it may do weird stuff.
Edward Thomson committed -
Edward Thomson committed
-
- 06 May, 2023 1 commit
-
-
Edward Thomson committed
-
- 03 May, 2023 1 commit
-
-
... otherwise git_tree__parse_raw() will fail to obtain the correct oid size, which causes the entire parse to fail.
Oliver Reiche committed
-
- 25 Apr, 2023 1 commit
-
-
Edward Thomson committed
-
- 24 Apr, 2023 2 commits
-
-
Edward Thomson committed
-
The opt mechanism isn't _really_ meant to be for feature flags, and it's weird to feature flag shallow / unshallow at all.
Edward Thomson committed
-
- 10 Apr, 2023 2 commits
-
-
Edward Thomson committed
-
Edward Thomson committed
-
- 04 Apr, 2023 5 commits
-
-
When the repository is opened with `GIT_REPOSITORY_OPEN_FROM_ENV`, honor the `GIT_CONFIG_GLOBAL`, `GIT_CONFIG_SYSTEM` and `GIT_CONFIG_NOSYSTEM` environment variables.
Edward Thomson committed -
When the repository is opened with `GIT_REPOSITORY_OPEN_FROM_ENV`, honor the `GIT_COMMON_DIR` environment variable.
Edward Thomson committed -
When the repository is opened with `GIT_REPOSITORY_OPEN_FROM_ENV`, honor the `GIT_WORK_TREE` environment variable.
Edward Thomson committed -
Remove the `_git_repository_open_ext_from_env` and make it part of the general repository opening code path. This removes the re-entrancy, and standardizes things like index and config opening to a single place again so that we have predictable ordering of the opening procedure.
Edward Thomson committed -
"Could not find repository from ..." doesn't make sense. "Could not find repository _at_ ..." does not indicate that we walked down the path hierarchy, but at least it's more correct.
Edward Thomson committed
-
- 25 Feb, 2023 1 commit
-
-
If a user attempts to add a custom extension that the system already supports, or that is already in their list of custom extensions, de-dup it.
Edward Thomson committed
-
- 20 Feb, 2023 1 commit
-
-
Git for Windows does some truly bizarre things with paths that start with a forward slash; and expects you to escape that with `%(prefix)`. This syntax generally means to add the prefix that Git was installed to -- eg `/usr/local` -- unless it's an absolute path, in which case the leading `%(prefix)/` is just removed. And Git for Windows expects you to use this syntax for absolute Unix-style paths (in "Git Bash" or Windows Subsystem for Linux). Worse, the behavior used to be that a leading `/` was not absolute. It would indicate that Git for Windows should add the prefix. So `//` is required for absolute Unix-style paths. Yes, this is truly horrifying. Emulate that behavior, I guess, but only for absolute paths. We won't deal with the Git install prefix. Also, give WSL users an escape hatch where they don't have to think about this and can use the literal path that the filesystem APIs provide (`//wsl.localhost/...`).
Edward Thomson committed
-
- 18 Feb, 2023 1 commit
-
-
With some paths on Win32, we cannot identify the owner because it's on a file share (WSL2 or UNC). In that case, don't fail, but identify that the current user does not own the path. This matches Git for Windows behavior.
Edward Thomson committed
-
- 17 Feb, 2023 2 commits
-
-
Miguel Arroz committed
-
Miguel Arroz committed
-
- 12 Feb, 2023 6 commits
-
-
Edward Thomson committed
-
Edward Thomson committed
-
This is much of the plumbing for the object database to support SHA256, and for objects to be able to parse SHA256 versions of themselves.
Edward Thomson committed -
Ensure that we maintain the `core.repositoryFormatVersion` value instead of always overwriting it with the default.
Edward Thomson committed -
Provide an internal function to set the repository's `objectformat`, both in the internal object and in the configuration.
Edward Thomson committed -
Teach the repository about the `objectformat` extension, supporting `sha1` always and `sha256` when the experimental sha256 support is active.
Edward Thomson committed
-
- 19 Nov, 2022 1 commit
-
-
Signed-off-by: Sven Strickroth <email@cs-ware.de>
Sven Strickroth committed
-
- 01 Oct, 2022 1 commit
-
-
Kevin Saul committed
-
- 31 Aug, 2022 1 commit
-
-
Yuang Li committed
-
- 11 Aug, 2022 1 commit
-
-
yuangli committed
-
- 09 Aug, 2022 1 commit
-
-
yuangli committed
-
- 02 Aug, 2022 2 commits
- 29 Jul, 2022 2 commits
- 28 Jul, 2022 2 commits
- 27 Jul, 2022 1 commit
-
-
yuangli committed
-