diff options
author | Johannes Schindelin <johannes.schindelin@gmx.de> | 2024-04-12 09:45:28 +0200 |
---|---|---|
committer | Johannes Schindelin <johannes.schindelin@gmx.de> | 2024-04-19 12:38:37 +0200 |
commit | 93a88f42db7ed9a975768df0e5f4516317c50dda (patch) | |
tree | 425bd4d9bc74c6a172a6d29e28c468158f094a96 /t/t5606-clone-options.sh | |
parent | repository: avoid leaking `fsmonitor` data (diff) | |
parent | Git 2.39.4 (diff) | |
download | git-93a88f42db7ed9a975768df0e5f4516317c50dda.tar.xz git-93a88f42db7ed9a975768df0e5f4516317c50dda.zip |
Sync with 2.39.4
* maint-2.39: (38 commits)
Git 2.39.4
fsck: warn about symlink pointing inside a gitdir
core.hooksPath: add some protection while cloning
init.templateDir: consider this config setting protected
clone: prevent hooks from running during a clone
Add a helper function to compare file contents
init: refactor the template directory discovery into its own function
find_hook(): refactor the `STRIP_EXTENSION` logic
clone: when symbolic links collide with directories, keep the latter
entry: report more colliding paths
t5510: verify that D/F confusion cannot lead to an RCE
submodule: require the submodule path to contain directories only
clone_submodule: avoid using `access()` on directories
submodules: submodule paths must not contain symlinks
clone: prevent clashing git dirs when cloning submodule in parallel
t7423: add tests for symlinked submodule directories
has_dir_name(): do not get confused by characters < '/'
docs: document security issues around untrusted .git dirs
upload-pack: disable lazy-fetching by default
fetch/clone: detect dubious ownership of local repositories
...
Diffstat (limited to 't/t5606-clone-options.sh')
0 files changed, 0 insertions, 0 deletions