Skip to content

Commit 58f1d95

Browse files
committed
Sync with v2.0.5
* maint-2.0: Git 2.0.5 Git 1.9.5 Git 1.8.5.6 fsck: complain about NTFS ".git" aliases in trees read-cache: optionally disallow NTFS .git variants path: add is_ntfs_dotgit() helper fsck: complain about HFS+ ".git" aliases in trees read-cache: optionally disallow HFS+ .git variants utf8: add is_hfs_dotgit() helper fsck: notice .git case-insensitively t1450: refactor ".", "..", and ".git" fsck tests verify_dotfile(): reject .git case-insensitively read-tree: add tests for confusing paths like ".." and ".git" unpack-trees: propagate errors adding entries to the index
2 parents 7fa1365 + 9a8c2b6 commit 58f1d95

18 files changed

+370
-41
lines changed

Documentation/RelNotes/1.8.5.6.txt

Lines changed: 34 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,34 @@
1+
Git v1.8.5.6 Release Notes
2+
==========================
3+
4+
Fixes since v1.8.5.5
5+
--------------------
6+
7+
* We used to allow committing a path ".Git/config" with Git that is
8+
running on a case sensitive filesystem, but an attempt to check out
9+
such a path with Git that runs on a case insensitive filesystem
10+
would have clobbered ".git/config", which is definitely not what
11+
the user would have expected. Git now prevents you from tracking
12+
a path with ".Git" (in any case combination) as a path component.
13+
14+
* On Windows, certain path components that are different from ".git"
15+
are mapped to ".git", e.g. "git~1/config" is treated as if it were
16+
".git/config". HFS+ has a similar issue, where certain unicode
17+
codepoints are ignored, e.g. ".g\u200cit/config" is treated as if
18+
it were ".git/config". Pathnames with these potential issues are
19+
rejected on the affected systems. Git on systems that are not
20+
affected by this issue (e.g. Linux) can also be configured to
21+
reject them to ensure cross platform interoperability of the hosted
22+
projects.
23+
24+
* "git fsck" notices a tree object that records such a path that can
25+
be confused with ".git", and with receive.fsckObjects configuration
26+
set to true, an attempt to "git push" such a tree object will be
27+
rejected. Such a path may not be a problem on a well behaving
28+
filesystem but in order to protect those on HFS+ and on case
29+
insensitive filesystems, this check is enabled on all platforms.
30+
31+
A big "thanks!" for bringing this issue to us goes to our friends in
32+
the Mercurial land, namely, Matt Mackall and Augie Fackler.
33+
34+
Also contains typofixes, documentation updates and trivial code clean-ups.

Documentation/RelNotes/1.9.5.txt

Lines changed: 34 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,34 @@
1+
Git v1.9.5 Release Notes
2+
========================
3+
4+
Fixes since v1.9.4
5+
------------------
6+
7+
* We used to allow committing a path ".Git/config" with Git that is
8+
running on a case sensitive filesystem, but an attempt to check out
9+
such a path with Git that runs on a case insensitive filesystem
10+
would have clobbered ".git/config", which is definitely not what
11+
the user would have expected. Git now prevents you from tracking
12+
a path with ".Git" (in any case combination) as a path component.
13+
14+
* On Windows, certain path components that are different from ".git"
15+
are mapped to ".git", e.g. "git~1/config" is treated as if it were
16+
".git/config". HFS+ has a similar issue, where certain unicode
17+
codepoints are ignored, e.g. ".g\u200cit/config" is treated as if
18+
it were ".git/config". Pathnames with these potential issues are
19+
rejected on the affected systems. Git on systems that are not
20+
affected by this issue (e.g. Linux) can also be configured to
21+
reject them to ensure cross platform interoperability of the hosted
22+
projects.
23+
24+
* "git fsck" notices a tree object that records such a path that can
25+
be confused with ".git", and with receive.fsckObjects configuration
26+
set to true, an attempt to "git push" such a tree object will be
27+
rejected. Such a path may not be a problem on a well behaving
28+
filesystem but in order to protect those on HFS+ and on case
29+
insensitive filesystems, this check is enabled on all platforms.
30+
31+
A big "thanks!" for bringing this issue to us goes to our friends in
32+
the Mercurial land, namely, Matt Mackall and Augie Fackler.
33+
34+
Also contains typofixes, documentation updates and trivial code clean-ups.

Documentation/RelNotes/2.0.5.txt

Lines changed: 34 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,34 @@
1+
Git v2.0.5 Release Notes
2+
========================
3+
4+
Fixes since v2.0.4
5+
------------------
6+
7+
* We used to allow committing a path ".Git/config" with Git that is
8+
running on a case sensitive filesystem, but an attempt to check out
9+
such a path with Git that runs on a case insensitive filesystem
10+
would have clobbered ".git/config", which is definitely not what
11+
the user would have expected. Git now prevents you from tracking
12+
a path with ".Git" (in any case combination) as a path component.
13+
14+
* On Windows, certain path components that are different from ".git"
15+
are mapped to ".git", e.g. "git~1/config" is treated as if it were
16+
".git/config". HFS+ has a similar issue, where certain unicode
17+
codepoints are ignored, e.g. ".g\u200cit/config" is treated as if
18+
it were ".git/config". Pathnames with these potential issues are
19+
rejected on the affected systems. Git on systems that are not
20+
affected by this issue (e.g. Linux) can also be configured to
21+
reject them to ensure cross platform interoperability of the hosted
22+
projects.
23+
24+
* "git fsck" notices a tree object that records such a path that can
25+
be confused with ".git", and with receive.fsckObjects configuration
26+
set to true, an attempt to "git push" such a tree object will be
27+
rejected. Such a path may not be a problem on a well behaving
28+
filesystem but in order to protect those on HFS+ and on case
29+
insensitive filesystems, this check is enabled on all platforms.
30+
31+
A big "thanks!" for bringing this issue to us goes to our friends in
32+
the Mercurial land, namely, Matt Mackall and Augie Fackler.
33+
34+
Also contains typofixes, documentation updates and trivial code clean-ups.

Documentation/config.txt

Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -233,6 +233,17 @@ core.precomposeunicode::
233233
When false, file names are handled fully transparent by Git,
234234
which is backward compatible with older versions of Git.
235235

236+
core.protectHFS::
237+
If set to true, do not allow checkout of paths that would
238+
be considered equivalent to `.git` on an HFS+ filesystem.
239+
Defaults to `true` on Mac OS, and `false` elsewhere.
240+
241+
core.protectNTFS::
242+
If set to true, do not allow checkout of paths that would
243+
cause problems with the NTFS filesystem, e.g. conflict with
244+
8.3 "short" names.
245+
Defaults to `true` on Windows, and `false` elsewhere.
246+
236247
core.trustctime::
237248
If false, the ctime differences between the index and the
238249
working tree are ignored; useful when the inode change time

Documentation/git.txt

Lines changed: 6 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -51,27 +51,30 @@ Documentation for older releases are available here:
5151
link:RelNotes/2.1.1.txt[2.1.1],
5252
link:RelNotes/2.1.0.txt[2.1].
5353

54-
* link:v2.0.4/git.html[documentation for release 2.0.4]
54+
* link:v2.0.5/git.html[documentation for release 2.0.5]
5555

5656
* release notes for
57+
link:RelNotes/2.0.5.txt[2.0.5],
5758
link:RelNotes/2.0.4.txt[2.0.4],
5859
link:RelNotes/2.0.3.txt[2.0.3],
5960
link:RelNotes/2.0.2.txt[2.0.2],
6061
link:RelNotes/2.0.1.txt[2.0.1],
6162
link:RelNotes/2.0.0.txt[2.0.0].
6263

63-
* link:v1.9.4/git.html[documentation for release 1.9.4]
64+
* link:v1.9.5/git.html[documentation for release 1.9.5]
6465

6566
* release notes for
67+
link:RelNotes/1.9.5.txt[1.9.5],
6668
link:RelNotes/1.9.4.txt[1.9.4],
6769
link:RelNotes/1.9.3.txt[1.9.3],
6870
link:RelNotes/1.9.2.txt[1.9.2],
6971
link:RelNotes/1.9.1.txt[1.9.1],
7072
link:RelNotes/1.9.0.txt[1.9.0].
7173

72-
* link:v1.8.5.5/git.html[documentation for release 1.8.5.5]
74+
* link:v1.8.5.6/git.html[documentation for release 1.8.5.6]
7375

7476
* release notes for
77+
link:RelNotes/1.8.5.6.txt[1.8.5.6],
7578
link:RelNotes/1.8.5.5.txt[1.8.5.5],
7679
link:RelNotes/1.8.5.4.txt[1.8.5.4],
7780
link:RelNotes/1.8.5.3.txt[1.8.5.3],

cache.h

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -633,6 +633,8 @@ extern int fsync_object_files;
633633
extern int core_preload_index;
634634
extern int core_apply_sparse_checkout;
635635
extern int precomposed_unicode;
636+
extern int protect_hfs;
637+
extern int protect_ntfs;
636638

637639
/*
638640
* The character that begins a commented line in user-editable file
@@ -847,6 +849,7 @@ int normalize_path_copy(char *dst, const char *src);
847849
int longest_ancestor_length(const char *path, struct string_list *prefixes);
848850
char *strip_path_suffix(const char *path, const char *suffix);
849851
int daemon_avoid_alias(const char *path);
852+
extern int is_ntfs_dotgit(const char *name);
850853

851854
/* object replacement */
852855
#define LOOKUP_REPLACE_OBJECT 1

config.c

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -880,6 +880,16 @@ static int git_default_core_config(const char *var, const char *value)
880880
return 0;
881881
}
882882

883+
if (!strcmp(var, "core.protecthfs")) {
884+
protect_hfs = git_config_bool(var, value);
885+
return 0;
886+
}
887+
888+
if (!strcmp(var, "core.protectntfs")) {
889+
protect_ntfs = git_config_bool(var, value);
890+
return 0;
891+
}
892+
883893
/* Add other config variables here and to Documentation/config.txt. */
884894
return 0;
885895
}

config.mak.uname

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -100,6 +100,7 @@ ifeq ($(uname_S),Darwin)
100100
HAVE_DEV_TTY = YesPlease
101101
COMPAT_OBJS += compat/precompose_utf8.o
102102
BASIC_CFLAGS += -DPRECOMPOSE_UNICODE
103+
BASIC_CFLAGS += -DPROTECT_HFS_DEFAULT=1
103104
endif
104105
ifeq ($(uname_S),SunOS)
105106
NEEDS_SOCKET = YesPlease
@@ -368,6 +369,7 @@ ifeq ($(uname_S),Windows)
368369
EXTLIBS = user32.lib advapi32.lib shell32.lib wininet.lib ws2_32.lib invalidcontinue.obj
369370
PTHREAD_LIBS =
370371
lib =
372+
BASIC_CFLAGS += -DPROTECT_NTFS_DEFAULT=1
371373
ifndef DEBUG
372374
BASIC_CFLAGS += -GL -Os -MD
373375
BASIC_LDFLAGS += -LTCG
@@ -509,6 +511,7 @@ ifneq (,$(findstring MINGW,$(uname_S)))
509511
COMPAT_OBJS += compat/mingw.o compat/winansi.o \
510512
compat/win32/pthread.o compat/win32/syslog.o \
511513
compat/win32/dirent.o
514+
BASIC_CFLAGS += -DPROTECT_NTFS_DEFAULT=1
512515
BASIC_LDFLAGS += -Wl,--large-address-aware
513516
EXTLIBS += -lws2_32
514517
GITLIBS += git.res

environment.c

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -64,6 +64,16 @@ int precomposed_unicode = -1; /* see probe_utf8_pathname_composition() */
6464
struct startup_info *startup_info;
6565
unsigned long pack_size_limit_cfg;
6666

67+
#ifndef PROTECT_HFS_DEFAULT
68+
#define PROTECT_HFS_DEFAULT 0
69+
#endif
70+
int protect_hfs = PROTECT_HFS_DEFAULT;
71+
72+
#ifndef PROTECT_NTFS_DEFAULT
73+
#define PROTECT_NTFS_DEFAULT 0
74+
#endif
75+
int protect_ntfs = PROTECT_NTFS_DEFAULT;
76+
6777
/*
6878
* The character that begins a commented line in user-editable file
6979
* that is subject to stripspace.

fsck.c

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,6 +6,7 @@
66
#include "commit.h"
77
#include "tag.h"
88
#include "fsck.h"
9+
#include "utf8.h"
910

1011
static int fsck_walk_tree(struct tree *tree, fsck_walk_func walk, void *data)
1112
{
@@ -170,7 +171,9 @@ static int fsck_tree(struct tree *item, int strict, fsck_error error_func)
170171
has_empty_name |= !*name;
171172
has_dot |= !strcmp(name, ".");
172173
has_dotdot |= !strcmp(name, "..");
173-
has_dotgit |= !strcmp(name, ".git");
174+
has_dotgit |= (!strcmp(name, ".git") ||
175+
is_hfs_dotgit(name) ||
176+
is_ntfs_dotgit(name));
174177
has_zero_pad |= *(char *)desc.buffer == '0';
175178
update_tree_entry(&desc);
176179

0 commit comments

Comments
 (0)