1. 14 Nov, 2016 15 commits
  2. 11 Nov, 2016 3 commits
    • git_repository_open_ext: fix handling of $GIT_NAMESPACE · c9e967a1
      The existing code would set a namespace of "" (empty string) with
      GIT_NAMESPACE unset.  In a repository where refs/heads/namespaces/
      exists, that can produce incorrect results.  Detect that case and avoid
      setting the namespace at all.
      
      Since that makes the last assignment to error conditional, and the
      previous assignment can potentially get GIT_ENOTFOUND, set error to 0
      explicitly to prevent the call from incorrectly failing with
      GIT_ENOTFOUND.
      Josh Triplett committed
    • curl_stream: check for -1 after CURLINFO_LASTSOCKET · 5ca75fd5
      We're recently trying to upgrade to the current master of libgit2
      in Cargo but we're unfortunately hitting a segfault in one of our
      tests. This particular test is just a small smoke test that https
      works (e.g. it's configured in libgit2). It attempts to clone
      from a URL which simply immediately drops connections after
      they're accepted (e.g. terminate abnormally). We expect to see a
      standard error from libgit2 but unfortunately we're seeing a
      segfault.
      
      This segfault is happening inside of the `wait_for` function of
      `curl_stream.c` at the line `FD_SET(fd, &errfd)` because `fd` is
      -1. This ends up doing an out-of-bounds array access that faults
      the program. I tracked back to where this -1 came from to the
      line here (returned by `CURLINFO_LASTSOCKET`) and added a check
      to return an error.
      Alex Crichton committed
  3. 04 Nov, 2016 4 commits
  4. 02 Nov, 2016 12 commits
  5. 01 Nov, 2016 3 commits
  6. 31 Oct, 2016 3 commits
    • Merge pull request #3978 from pks-t/pks/doc-improvements · a051ee31
      Small documentation improvements
      Edward Thomson committed
    • travis: do not allow valgrind failures · 0334bf4b
      Our valgrind jobs haven't been failing for several builds by now.
      This indicates that our tests are sufficiently stable when
      running under valgrind. As such, any failures reported by
      valgrind become interesting to us and shouldn't be ignored when
      causing a build to fail.
      
      Remove the valgrind job from the list of allowed failures.
      Patrick Steinhardt committed
    • coverity: check for Coverity token only if necessary · 18c18e3d
      When running a Coverity build, we have to provide an
      authentication token in order to proof that we are actually
      allowed to run analysis in the name of a certain project. As this
      token should be secret, it is only set on the main repository, so
      when we were requested to run the Coverity script on another
      repository we do error out. But in fact we do also error out if
      the Coverity analysis should _not_ be run if there is no
      authentication token provided.
      
      Fix the issue by only checking for the authentication token after
      determining if analysis is indeed requested.
      Patrick Steinhardt committed