<feed xmlns='http://www.w3.org/2005/Atom'>
<title>delta/libgit2.git/tests/resources/nasty, branch cmn/https-cap-no-hardcode</title>
<subtitle>github.com: libgit2/libgit2.git
</subtitle>
<link rel='alternate' type='text/html' href='http://git.baserock.org/cgit/delta/libgit2.git/'/>
<entry>
<title>checkout tests: nasty symlinks</title>
<updated>2015-01-20T23:13:09+00:00</updated>
<author>
<name>Edward Thomson</name>
<email>ethomson@edwardthomson.com</email>
</author>
<published>2015-01-14T18:15:34+00:00</published>
<link rel='alternate' type='text/html' href='http://git.baserock.org/cgit/delta/libgit2.git/commit/?id=232bc89598947823e57431df63a5d6d41ad218c3'/>
<id>232bc89598947823e57431df63a5d6d41ad218c3</id>
<content type='text'>
Symbolic links that abuse case insensitivity to write into .git.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Symbolic links that abuse case insensitivity to write into .git.
</pre>
</div>
</content>
</entry>
<entry>
<title>checkout: disallow bad paths on HFS</title>
<updated>2014-12-16T16:08:59+00:00</updated>
<author>
<name>Edward Thomson</name>
<email>ethomson@microsoft.com</email>
</author>
<published>2014-12-11T00:12:16+00:00</published>
<link rel='alternate' type='text/html' href='http://git.baserock.org/cgit/delta/libgit2.git/commit/?id=11d67b754d47967642570f796601e8850f001d73'/>
<id>11d67b754d47967642570f796601e8850f001d73</id>
<content type='text'>
HFS filesystems ignore some characters like U+200C.  When these
characters are included in a path, they will be ignored for the
purposes of comparison with other paths.  Thus, if you have a ".git"
folder, a folder of ".git&lt;U+200C&gt;" will also match.  Protect our
".git" folder by ensuring that ".git&lt;U+200C&gt;" and friends do not match it.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
HFS filesystems ignore some characters like U+200C.  When these
characters are included in a path, they will be ignored for the
purposes of comparison with other paths.  Thus, if you have a ".git"
folder, a folder of ".git&lt;U+200C&gt;" will also match.  Protect our
".git" folder by ensuring that ".git&lt;U+200C&gt;" and friends do not match it.
</pre>
</div>
</content>
</entry>
<entry>
<title>checkout: disallow bad paths on win32</title>
<updated>2014-12-16T16:08:53+00:00</updated>
<author>
<name>Edward Thomson</name>
<email>ethomson@microsoft.com</email>
</author>
<published>2014-11-25T23:13:00+00:00</published>
<link rel='alternate' type='text/html' href='http://git.baserock.org/cgit/delta/libgit2.git/commit/?id=a64119e3963fcd358ba914c9e1a81a890666d15a'/>
<id>a64119e3963fcd358ba914c9e1a81a890666d15a</id>
<content type='text'>
Disallow:
 1. paths with trailing dot
 2. paths with trailing space
 3. paths with trailing colon
 4. paths that are 8.3 short names of .git folders ("GIT~1")
 5. paths that are reserved path names (COM1, LPT1, etc).
 6. paths with reserved DOS characters (colons, asterisks, etc)

These paths would (without \\?\ syntax) be elided to other paths - for
example, ".git." would be written as ".git".  As a result, writing these
paths literally (using \\?\ syntax) makes them hard to operate with from
the shell, Windows Explorer or other tools.  Disallow these.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Disallow:
 1. paths with trailing dot
 2. paths with trailing space
 3. paths with trailing colon
 4. paths that are 8.3 short names of .git folders ("GIT~1")
 5. paths that are reserved path names (COM1, LPT1, etc).
 6. paths with reserved DOS characters (colons, asterisks, etc)

These paths would (without \\?\ syntax) be elided to other paths - for
example, ".git." would be written as ".git".  As a result, writing these
paths literally (using \\?\ syntax) makes them hard to operate with from
the shell, Windows Explorer or other tools.  Disallow these.
</pre>
</div>
</content>
</entry>
</feed>
