summaryrefslogtreecommitdiff
Commit message (Collapse)AuthorAgeFilesLines
* openssl: don't try to teardown an unconnected SSL contextcmn/ssl-nullCarlos Martín Nieto2015-09-301-1/+6
| | | | | | SSL_shutdown() does not like it when we pass an unitialized ssl context to it. This means that when we fail to connect to a host, we hide the error message saying so with OpenSSL's indecipherable error message.
* Merge pull request #3411 from spraints/custom-push-headersCarlos Martín Nieto2015-09-3016-26/+197
|\ | | | | Include custom HTTP headers
| * Copy custom_headers insteach of referencing the caller's copyMatt Burke2015-09-255-24/+26
| |
| * These can be staticMatt Burke2015-09-242-4/+4
| |
| * Revise custom header error messagesMatt Burke2015-09-241-40/+44
| | | | | | | | | | | | | | | | If the header doesn't look like a header (e.g. if it doesn't have a ":" or if it has newlines), report "custom HTTP header '%s' is malformed". If the header has the same name as a header already set by libgit2 (e.g. "Host"), report "HTTP header '%s' is already set by libgit2".
| * Don't null-checkMatt Burke2015-09-241-3/+0
| |
| * Use an array of forbidden custom headersMatt Burke2015-09-241-9/+12
| |
| * Avoid segfault when opts == NULLMatt Burke2015-09-101-3/+8
| |
| * Add a test for custom header validationMatt Burke2015-09-102-6/+39
| | | | | | | | Also, *some* custom headers actually are valid.
| * More specific namesMatt Burke2015-09-101-4/+4
| |
| * Validate custom http headersMatt Burke2015-09-101-0/+53
| |
| * Ignore NULL headersMatt Burke2015-09-102-11/+14
| |
| * Accept custom headers for fetch tooMatt Burke2015-09-102-2/+11
| |
| * o iMatt Burke2015-09-081-0/+1
| |
| * Update another call to git_remote_connectMatt Burke2015-09-081-1/+1
| |
| * Teach winhttp about the extra headersMatt Burke2015-09-081-0/+17
| |
| * Hook up the custom_headers to the http transportMatt Burke2015-09-083-4/+16
| |
| * Tell the git_transport about the custom_headersMatt Burke2015-09-0810-24/+43
| |
| * Add custom_headers to git_push_optionsMatt Burke2015-09-081-0/+5
| |
| * Drop extra_http_headers from git_remoteMatt Burke2015-09-085-18/+0
| |
| * Allow the world to set HTTP headers for remotesMatt Burke2015-09-044-3/+16
| |
| * Pull extra_http_headers from the git_remoteMatt Burke2015-09-043-0/+4
| |
| * Put the extra headers on the connection_data insteadMatt Burke2015-09-042-4/+4
| |
| * Add more headers to HTTP requestsMatt Burke2015-09-041-0/+9
| |
* | Merge pull request #3443 from libgit2/longpath-printfCarlos Martín Nieto2015-09-291-2/+0
|\ \ | | | | | | win32::longpath: don't print path
| * | win32::longpath: don't print pathlongpath-printfEdward Thomson2015-09-281-2/+0
|/ /
* | Merge pull request #3441 from libgit2/cmn/badsslEdward Thomson2015-09-281-0/+27
|\ \ | | | | | | net: add tests against badssl.com
| * | net: add tests against badssl.comcmn/badsslCarlos Martín Nieto2015-09-271-0/+27
| | | | | | | | | | | | | | | These provide bad X.509 certificates, which we should refuse to connect to by default.
* | | Plug some leaksCarlos Martín Nieto2015-09-273-0/+10
|/ /
* | Merge pull request #3439 from bisho/masterEdward Thomson2015-09-252-8/+15
|\ \ | | | | | | Fix binary diffs
| * | Fix binary diffsGuille -bisho-2015-09-252-8/+15
|/ / | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | git expects an empty line after the binary data: literal X ...binary data... <empty_line> The last literal block of the generated patches were not containing the required empty line. Example: diff --git a/binary_file b/binary_file index 3f1b3f9098131cfecea4a50ff8afab349ea66d22..86e5c1008b5ce635d3e3fffa4434c5eccd8f00b6 100644 GIT binary patch literal 8 Pc${NM&PdElPvrst3ey5{ literal 6 Nc${NM%g@i}0ssZ|0lokL diff --git a/binary_file2 b/binary_file2 index 31be99be19470da4af5b28b21e27896a2f2f9ee2..86e5c1008b5ce635d3e3fffa4434c5eccd8f00b6 100644 GIT binary patch literal 8 Pc${NM&PdElPvrst3ey5{ literal 13 Sc${NMEKbZyOexL+Qd|HZV+4u- git apply of that diff results in: error: corrupt binary patch at line 9: diff --git a/binary_file2 b/binary_file2 fatal: patch with only garbage at line 10 The proper formating is: diff --git a/binary_file b/binary_file index 3f1b3f9098131cfecea4a50ff8afab349ea66d22..86e5c1008b5ce635d3e3fffa4434c5eccd8f00b6 100644 GIT binary patch literal 8 Pc${NM&PdElPvrst3ey5{ literal 6 Nc${NM%g@i}0ssZ|0lokL diff --git a/binary_file2 b/binary_file2 index 31be99be19470da4af5b28b21e27896a2f2f9ee2..86e5c1008b5ce635d3e3fffa4434c5eccd8f00b6 100644 GIT binary patch literal 8 Pc${NM&PdElPvrst3ey5{ literal 13 Sc${NMEKbZyOexL+Qd|HZV+4u-
* | Merge pull request #3437 from libgit2/cmn/plug-smCarlos Martín Nieto2015-09-241-13/+21
|\ \ | | | | | | submodule: plug a few leaks
| * | submodule: plug a few leakscmn/plug-smCarlos Martín Nieto2015-09-241-13/+21
| | |
* | | Merge pull request #3435 from ethomson/nametoolongCarlos Martín Nieto2015-09-232-8/+77
|\ \ \ | |/ / |/| | win32: give better error message on long paths
| * | win32: test checkout msg on long path errEdward Thomson2015-09-231-0/+62
| | |
| * | win32: propogate filename too long errorsEdward Thomson2015-09-221-8/+15
|/ /
* | Merge pull request #3434 from ethomson/reservednamesCarlos Martín Nieto2015-09-2124-4/+89
|\ \ | | | | | | Win32 Reserved names: don't reserve names outside the working directory
| * | repository: only reserve repo dirs in the workdirEdward Thomson2015-09-181-4/+20
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Check that the repository directory is beneath the workdir before adding it to the list of reserved paths. If it is not, then there is no possibility of checking out files into it, and it should not be a reserved word. This is a particular problem with submodules where the repo directory may be in the super's .git directory.
| * | repo::reservedname: test a submodule updateEdward Thomson2015-09-1823-0/+69
| | | | | | | | | | | | | | | | | | | | | Test an initial submodule update, where we are trying to checkout the submodule for the first time, and placing a file within the submodule working directory with the same name as the submodule (and consequently, the same name as the repository itself).
* | | Merge pull request #3433 from libgit2/cmn/config-commentEdward Thomson2015-09-182-7/+43
|\ \ \ | | | | | | | | Keep config comments in the same place as git
| * | | config: buffer comments to match git's variable-addingcmn/config-commentCarlos Martín Nieto2015-09-181-4/+35
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | When there is a comment at the end of a section, git keeps it there, while we write the new variable right at the end. Keep comments buffered and dump them when we're going to output a variable or section, or reach EOF. This puts us in line with the config files which git produces.
| * | | config: test that comments are left as with gitLinquize2015-09-181-3/+8
|/ / /
* | | Fix a couple of warningsCarlos Martín Nieto2015-09-182-2/+1
| | |
* | | Merge pull request #3418 from DimStar77/masterCarlos Martín Nieto2015-09-182-2/+20
|\ \ \ | | | | | | | | pkg-config: fix directory references in libgit2.pc
| * | | pkg-config: fix directory references in libgit2.pcDominique Leuenberger2015-09-182-2/+20
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Before: libdir=/usr//usr/lib64 includedir=/usr//usr/include After: libdir=/usr/lib64 includedir=/usr/include (note the duplication of /usr in the before case)
* | | | Merge pull request #3432 from ethomson/mkdirCarlos Martín Nieto2015-09-1725-172/+365
|\ \ \ \ | |_|/ / |/| | | `mkdir`: split into `mkdir` and `mkdir_relative`
| * | | `mkdir`: cope with root path on win32Edward Thomson2015-09-172-4/+5
| | | |
| * | | win32: return EACCES in `p_lstat`Edward Thomson2015-09-171-2/+9
| | | | | | | | | | | | | | | | | | | | | | | | Don't coalesce all errors into ENOENT. At least identify EACCES. All callers should be handling this case already, as the POSIX `lstat` will return this.
| * | | mkdir: chmod existing paths with `GIT_MKDIR_CHMOD`Edward Thomson2015-09-171-42/+49
| | | |
| * | | mkdir: find component paths for mkdir_relativeEdward Thomson2015-09-172-51/+142
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | `git_futils_mkdir` does not blindly call `git_futils_mkdir_relative`. `git_futils_mkdir_relative` is used when you have some base directory and want to create some path inside of it, potentially removing blocking symlinks and files in the process. This is not suitable for a general recursive mkdir within the filesystem. Instead, when `mkdir` is being recursive, locate the first existent parent directory and use that as the base for `mkdir_relative`.