1. 09 Oct, 2016 1 commit
  2. 06 Oct, 2016 1 commit
  3. 02 Jun, 2016 1 commit
  4. 31 Mar, 2016 1 commit
  5. 28 Feb, 2016 1 commit
  6. 17 Feb, 2016 1 commit
    • win32: tests around handling forbidden paths · 4be2aa57
      Introduce a repository that contains some paths that were illegal
      on PC-DOS circa 1981 (like `aux`, `con`, `com1`) and that in a
      bizarre fit of retrocomputing, remain illegal on some "modern"
      computers, despite being "new technology".
      
      Introduce some aspirational tests that suggest that we should be
      able to cope with trees and indexes that contain paths that
      would be illegal on the filesystem, so that we can at least diff
      them.  Further ensure that checkout will not write a repository
      with forbidden paths.
      Edward Thomson committed
  7. 01 Dec, 2015 2 commits
  8. 25 Nov, 2015 7 commits
  9. 04 Nov, 2015 1 commit
  10. 02 Nov, 2015 1 commit
  11. 22 Oct, 2015 1 commit
    • index: test that we round-trip nsecs · 99a09f7f
      Test that nanoseconds are round-tripped correctly when we read
      an index file that contains them.  We should, however, ignore them
      because we don't understand them, and any new entries in the index
      should contain a `0` nsecs field, while existing preserving entries.
      Edward Thomson committed
  12. 18 Sep, 2015 1 commit
  13. 22 Jun, 2015 4 commits
  14. 31 May, 2015 1 commit
  15. 21 Apr, 2015 2 commits
  16. 25 Mar, 2015 1 commit
  17. 16 Mar, 2015 1 commit
  18. 03 Feb, 2015 1 commit
  19. 20 Jan, 2015 2 commits
  20. 08 Jan, 2015 1 commit
  21. 22 Dec, 2014 1 commit
  22. 16 Dec, 2014 2 commits
    • checkout: disallow bad paths on HFS · 11d67b75
      HFS filesystems ignore some characters like U+200C.  When these
      characters are included in a path, they will be ignored for the
      purposes of comparison with other paths.  Thus, if you have a ".git"
      folder, a folder of ".git<U+200C>" will also match.  Protect our
      ".git" folder by ensuring that ".git<U+200C>" and friends do not match it.
      Edward Thomson committed
    • checkout: disallow bad paths on win32 · a64119e3
      Disallow:
       1. paths with trailing dot
       2. paths with trailing space
       3. paths with trailing colon
       4. paths that are 8.3 short names of .git folders ("GIT~1")
       5. paths that are reserved path names (COM1, LPT1, etc).
       6. paths with reserved DOS characters (colons, asterisks, etc)
      
      These paths would (without \\?\ syntax) be elided to other paths - for
      example, ".git." would be written as ".git".  As a result, writing these
      paths literally (using \\?\ syntax) makes them hard to operate with from
      the shell, Windows Explorer or other tools.  Disallow these.
      Edward Thomson committed
  23. 27 Oct, 2014 3 commits
  24. 26 Oct, 2014 1 commit
  25. 13 Oct, 2014 1 commit