| Commit message (Collapse) | Author | Age | Files | Lines |
| ... | |
| | | | |
|
| | | | |
|
| | | | |
|
| | | | |
|
| | | | |
|
| | | |
| | |
| | |
| | |
| | | |
This is much of the plumbing for the object database to support SHA256,
and for objects to be able to parse SHA256 versions of themselves.
|
| | | |
| | |
| | |
| | | |
Teach the packfile machinery to cope with SHA256.
|
| | | |
| | |
| | |
| | |
| | | |
Ensure that we maintain the `core.repositoryFormatVersion` value instead
of always overwriting it with the default.
|
| | | |
| | |
| | |
| | |
| | | |
Provide an internal function to set the repository's `objectformat`,
both in the internal object and in the configuration.
|
| | | |
| | |
| | |
| | |
| | |
| | | |
Teach the repository about the `objectformat` extension, supporting
`sha1` always and `sha256` when the experimental sha256 support is
active.
|
| | | | |
|
| |\ \ \
| | | |
| | | | |
Support the notion of a home directory separately from global configuration directory
|
| | | | | |
|
| | | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | | |
Some callers -- like our test suite and the test suites of our language
bindings -- want to isolate the home directory to avoid accidentally
including the executing user's actual home directory data.
Previously, we combined the notion of a home directory and global
configuration -- now that this is separated, we provide users the
ability to configure both.
|
| | | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | | |
Users can specify a config file to be included in the home directory
using `~/filename` syntax. Instead of looking in the global
configuration location (which may be overridden), use the user's
_actual_ home directory. This allows callers to change the global
configuration location separately from the home directory.
|
| | | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | | |
Users can specify an attribute file to be included in the home
directory using `~/filename` syntax. Instead of looking in the
global configuration location (which may be overridden), use the
user's _actual_ home directory. This allows callers to change the
global configuration location separately from the home directory.
|
| | | | |
| | | |
| | | |
| | | |
| | | | |
I spent an hour banging my head against this, when it was because the
remote didn't trust my key.
|
| | | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | | |
Use `git_sysdir_find_homedir_file` to identify the path to the home
directory's `.ssh/known_hosts`; this takes Windows paths into account by
preferring `HOME`, then falling back to `HOMEPATH` and `USERPROFILE`
directories.
|
| | | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | | |
Provide a mechanism to look up the user's home directory, using the same
mechanism that we use for locating the global configuration path (a
fancy name for saying "the home directory").
SSH known hosts lookups now use this, instead of simply looking at the
HOME environment variable, to support Windows-style home directory
lookups in `HOME`, `HOMEPATH`, or `USERPROFILE`.
|
| | |/ /
| | |
| | |
| | |
| | |
| | | |
The windows sysdir functions are libgit2-specific and for git
compatibility only; remove them from the shared util directory and bring
them into the libgit2 source tree.
|
| |\ \ \
| | | |
| | | | |
#6422: handle dangling symbolic refs gracefully
|
| | | | | |
|
| |\ \ \ \ |
|
| | | | | | |
|
| | | |/ /
| |/| |
| | | |
| | | |
| | | |
| | | | |
Fixes issue #6156.
Signed-off-by: Sven Strickroth <email@cs-ware.de>
|
| |\ \ \ \
| | | | |
| | | | | |
Fix build failure with -DEMBED_SSH_PATH
|
| | | |_|/
| |/| | |
|
| |\ \ \ \
| | | | |
| | | | | |
diff_file: Fix crash when freeing a patch representing an empty untracked file
|
| | | |/ /
| |/| |
| | | |
| | | | |
This prevents GIT_MMAP_VALIDATE from failing.
This also prevents git_diff_file_content__unload from attempting to free git_str__initstr.
|
| | | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | | |
Try to load OpenSSL 3 libraries when compiled with OpenSSL-Dynamic
support.
Handle the deprecated symbol renaming of SSL_get_peer_certificate to
SSL_get1_peer_certificate -- try to load the old name and if it fails,
use the new one.
|
| |/ / /
| | |
| | |
| | |
| | |
| | | |
When we fail to initialize the OpenSSL subsystem, don't assume that
we're "initialized". Subsequent initialization requests -- if there are
any -- should replay initialization and fail again.
|
| |\ \ \ |
|
| | | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | | |
`git_clone` checks for existence of (non-empty) directories that would clash with what is about to be cloned.
This is problematic when cloning submodules since they make sense in the context of a parent module, so they should not use the current working dir.
Since in `git_submodule_update` we clone the submodule only when it is not yet initialized we do not need to perform directory checks.
|
| | | | |
| | | |
| | | |
| | | |
| | | | |
211c97195e2ebcf68e27782715eb756823ad5a91 attempts to use the parsed OID
but inverted the arguments to `git_oid_cpy`.
|
| |\ \ \ \
| | | | |
| | | | | |
push: revparse refspec source, so you can push things that are not refs
|
| | | |/ /
| |/| |
| | | |
| | | | |
I want to push a commit by OID to a remote branch. Currently, push parses the refspecs such that the source must be the name of a ref (it uses git_reference_name_to_id to resolve it). This commit changes it so push uses git_revparse_single to resolve the source of the refspec. This allows for OIDs or other revs (e.g. `HEAD~2`) to be pushed.
|
| |\ \ \ \
| | | | |
| | | | | |
transport: fix capabilities calculation
|
| | | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | | |
This looks like a typo to me, from what i can see these lines were
added at the same time and because of how capabilities are calculated,
it's likely that this code will work in situations where these
capabilities were the last ones.
|
| |\ \ \ \ \
| |_|_|/ /
|/| | | | |
|
| | | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | | |
The server and client negotiate a single hostkey, but the "best" cipher may not
be the one for which we have an entry in `known_hosts`. This can lead to us not
finding the key in known_hosts even though we should be connecting.
Instead here we look up the hostname with a nonsense key to perform a lookup in
the known hosts and set that. This is roughly what the OpenSSH client does as
well.
|
| | | |_|/
| |/| |
| | | |
| | | |
| | | | |
It turns out this has been available in libssh2 for a long time and we should
have been verifying this the whole time.
|
| | |/ /
|/| |
| | |
| | |
| | | |
If a submodule has been configured but not yet added, do not try to update it.
Issue #6433: git_submodule_update fails to update configured but missing submodule
|
| |\ \ \
| | | |
| | | | |
Add support for "safe.directory *"
|
| | | | |
| | | |
| | | |
| | | | |
Signed-off-by: Sven Strickroth <email@cs-ware.de>
|
| |\ \ \ \
| |/ / /
|/| | | |
http: Update httpclient options when reusing an existing connection.
|
| | |/ /
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | | |
Httpclient internally stores a copy of the certificate_check callback and
payload. When connecting via HTTPS, and if the server sends back
"Connection: close" after the first request, the following request would
attempt to re-use the httpclient and call the (now outdated) callback. In
particular for pygit2 this is a problem, since callbacks / payloads are only
valid for the duration of a libgit2 call, leading to a ffi.from_handle()
error and crashing the Python interpreter.
|
| |\ \ \
| | | |
| | | |
| | | |
| | | | |
julianmesa-gitkraken/fix-leak-git_tag_create_from_buffer
Fix leak in git_tag_create_from_buffer
|
| | | | | |
|
| | | | | |
|
| | |/ /
| | |
| | |
| | | |
If the tag already exists and we are not forcing overwrite we need to free ref_name buffer before return the "tag already exists" error.
|