]> git.ipfire.org Git - thirdparty/git.git/commit
Sync with 2.41.1
authorJohannes Schindelin <johannes.schindelin@gmx.de>
Wed, 17 Apr 2024 09:39:09 +0000 (11:39 +0200)
committerJohannes Schindelin <johannes.schindelin@gmx.de>
Fri, 19 Apr 2024 10:38:46 +0000 (12:38 +0200)
commitbe348e9815285636789dccd4aef85b5bab5f8557
treebd023d59de3cf65a2ab9d5b075859bcce6557d8e
parent61a22ddaf0626111193a17ac12f366bd6d167dff
parent0f158320593bd57fe2c3fe55fbce751e9415ffc2
Sync with 2.41.1

* maint-2.41: (38 commits)
  Git 2.41.1
  Git 2.40.2
  Git 2.39.4
  fsck: warn about symlink pointing inside a gitdir
  core.hooksPath: add some protection while cloning
  init.templateDir: consider this config setting protected
  clone: prevent hooks from running during a clone
  Add a helper function to compare file contents
  init: refactor the template directory discovery into its own function
  find_hook(): refactor the `STRIP_EXTENSION` logic
  clone: when symbolic links collide with directories, keep the latter
  entry: report more colliding paths
  t5510: verify that D/F confusion cannot lead to an RCE
  submodule: require the submodule path to contain directories only
  clone_submodule: avoid using `access()` on directories
  submodules: submodule paths must not contain symlinks
  clone: prevent clashing git dirs when cloning submodule in parallel
  t7423: add tests for symlinked submodule directories
  has_dir_name(): do not get confused by characters < '/'
  docs: document security issues around untrusted .git dirs
  ...
30 files changed:
.github/workflows/main.yml
Documentation/git.txt
builtin/clone.c
builtin/submodule--helper.c
builtin/upload-pack.c
ci/lib.sh
config.c
copy.c
dir.c
dir.h
entry.c
fsck.c
fsck.h
hook.c
http.c
path.c
promisor-remote.c
read-cache.c
remote-curl.c
repository.c
setup.c
setup.h
submodule.c
t/helper/test-path-utils.c
t/t0000-basic.sh
t/t1450-fsck.sh
t/t1800-hook.sh
t/t5510-fetch.sh
t/t7400-submodule-basic.sh
t/t7406-submodule-update.sh