1. 14 Nov, 2016 1 commit
  2. 26 May, 2016 1 commit
  3. 24 Mar, 2016 1 commit
  4. 23 Feb, 2016 1 commit
  5. 17 Feb, 2016 1 commit
    • index: allow read of index w/ illegal entries · 318b825e
      Allow `git_index_read` to handle reading existing indexes with
      illegal entries.  Allow the low-level `git_index_add` to add
      properly formed `git_index_entry`s even if they contain paths
      that would be illegal for the current filesystem (eg, `AUX`).
      Continue to disallow `git_index_add_bypath` from adding entries
      that are illegal universally illegal (eg, `.git`, `foo/../bar`).
      Edward Thomson committed
  6. 15 Dec, 2015 1 commit
  7. 17 Sep, 2015 1 commit
  8. 13 Sep, 2015 2 commits
  9. 05 Aug, 2015 1 commit
  10. 22 Jul, 2015 1 commit
  11. 13 Jul, 2015 1 commit
  12. 24 Jun, 2015 1 commit
    • buffer: don't allow growing borrowed buffers · caab22c0
      When we don't own a buffer (asize=0) we currently allow the usage of
      grow to copy the memory into a buffer we do own. This muddles the
      meaning of grow, and lets us be a bit cavalier with ownership semantics.
      
      Don't allow this any more. Usage of grow should be restricted to buffers
      which we know own their own memory. If unsure, we must not attempt to
      modify it.
      Carlos Martín Nieto committed
  13. 17 Jun, 2015 1 commit
  14. 15 Jun, 2015 2 commits
  15. 12 Jun, 2015 1 commit
  16. 06 Jun, 2015 1 commit
  17. 29 May, 2015 1 commit
    • git__tolower: a tolower() that isn't dumb · 75a4636f
      Some brain damaged tolower() implementations appear to want to
      take the locale into account, and this may require taking some
      insanely aggressive lock on the locale and slowing down what should
      be the most trivial of trivial calls for people who just want to
      downcase ASCII.
      Edward Thomson committed
  18. 15 May, 2015 1 commit
  19. 01 May, 2015 8 commits
  20. 08 Apr, 2015 1 commit
  21. 27 Feb, 2015 1 commit
  22. 13 Feb, 2015 2 commits
  23. 20 Jan, 2015 1 commit
  24. 19 Dec, 2014 1 commit
  25. 17 Dec, 2014 1 commit
  26. 16 Dec, 2014 3 commits
    • checkout: disallow bad paths on HFS · 11d67b75
      HFS filesystems ignore some characters like U+200C.  When these
      characters are included in a path, they will be ignored for the
      purposes of comparison with other paths.  Thus, if you have a ".git"
      folder, a folder of ".git<U+200C>" will also match.  Protect our
      ".git" folder by ensuring that ".git<U+200C>" and friends do not match it.
      Edward Thomson committed
    • checkout: disallow bad paths on win32 · a64119e3
      Disallow:
       1. paths with trailing dot
       2. paths with trailing space
       3. paths with trailing colon
       4. paths that are 8.3 short names of .git folders ("GIT~1")
       5. paths that are reserved path names (COM1, LPT1, etc).
       6. paths with reserved DOS characters (colons, asterisks, etc)
      
      These paths would (without \\?\ syntax) be elided to other paths - for
      example, ".git." would be written as ".git".  As a result, writing these
      paths literally (using \\?\ syntax) makes them hard to operate with from
      the shell, Windows Explorer or other tools.  Disallow these.
      Edward Thomson committed
  27. 27 Oct, 2014 1 commit
  28. 13 Oct, 2014 1 commit
    • is_empty_dir (wi32): cope with empty mount points · 969b6a47
      FindFirstFile will fail with INVALID_HANDLE_VALUE if there are no
      children to the given path, which can happen if the given path is a
      file (and obviously has no children) or if the given path is an empty
      mount point.  (Most directories have at least directory entries '.'
      and '..', but ridiculously another volume mounted in another drive
      letter's path space do not, and thus have nothing to enumerate.)
      
      If FindFirstFile fails, check if this is a directory-like thing
      (a mount point).
      Edward Thomson committed