Skip to content
Snippets Groups Projects
This project is mirrored from https://gitlab.com/gitlab-org/build/omnibus-mirror/curl.git. Pull mirroring failed .
Repository mirroring has been paused due to too many failed attempts. It can be resumed by a project maintainer or owner.
Last successful update .
  1. Jul 29, 2019
  2. Jul 15, 2019
  3. Jul 14, 2019
  4. Jun 18, 2019
  5. Jun 11, 2019
  6. Jun 02, 2019
  7. May 25, 2019
    • Jay Satiro's avatar
      Revert all SASL authzid (new feature) commits · db8ec1fa
      Jay Satiro authored
      - Revert all commits related to the SASL authzid feature since the next
        release will be a patch release, 7.65.1.
      
      Prior to this change CURLOPT_SASL_AUTHZID  / --sasl-authzid was destined
      for the next release, assuming it would be a feature release 7.66.0.
      However instead the next release will be a patch release, 7.65.1 and
      will not contain any new features.
      
      After the patch release after the reverted commits can be restored by
      using cherry-pick:
      
      git cherry-pick a14d72ca a9499ff1 8c1cc369 c2a8d52a 0edf6907
      
      Details for all reverted commits:
      
      Revert "os400: take care of CURLOPT_SASL_AUTHZID in curl_easy_setopt_ccsid()."
      
      This reverts commit 0edf6907.
      
      Revert "tests: Fix the line endings for the SASL alt-auth tests"
      
      This reverts commit c2a8d52a.
      
      Revert "examples: Added SASL PLAIN authorisation identity (authzid) examples"
      
      This reverts commit 8c1cc369.
      
      Revert "curl: --sasl-authzid added to support CURLOPT_SASL_AUTHZID from the tool"
      
      This reverts commit a9499ff1.
      
      Revert "sasl: Implement SASL authorisation identity via CURLOPT_SASL_AUTHZID"
      
      This reverts commit a14d72ca.
      db8ec1fa
  8. May 22, 2019
  9. May 20, 2019
  10. Apr 29, 2019
    • Daniel Stenberg's avatar
      CURL_MAX_INPUT_LENGTH: largest acceptable string input size · 5fc28510
      Daniel Stenberg authored
      This limits all accepted input strings passed to libcurl to be less than
      CURL_MAX_INPUT_LENGTH (8000000) bytes, for these API calls:
      curl_easy_setopt() and curl_url_set().
      
      The 8000000 number is arbitrary picked and is meant to detect mistakes
      or abuse, not to limit actual practical use cases. By limiting the
      acceptable string lengths we also reduce the risk of integer overflows
      all over.
      
      NOTE: This does not apply to `CURLOPT_POSTFIELDS`.
      
      Test 1559 verifies.
      
      Closes #3805
      5fc28510
  11. Apr 20, 2019
  12. Apr 13, 2019
  13. Apr 11, 2019
  14. Apr 06, 2019
    • Daniel Stenberg's avatar
      pipelining: removed · 2f44e94e
      Daniel Stenberg authored
      As previously planned and documented in DEPRECATE.md, all pipelining
      code is removed.
      
      Closes #3651
      2f44e94e
  15. Mar 18, 2019
  16. Mar 09, 2019
  17. Mar 04, 2019
  18. Mar 03, 2019
  19. Feb 27, 2019
    • Daniel Stenberg's avatar
      cookies: only save the cookie file if the engine is enabled · eb433389
      Daniel Stenberg authored
      Follow-up to 8eddb8f4.
      
      If the cookieinfo pointer is NULL there really is nothing to save.
      
      Without this fix, we got a problem when a handle was using shared object
      with cookies and is told to "FLUSH" it to file (which worked) and then
      the share object was removed and when the easy handle was closed just
      afterwards it has no cookieinfo and no cookies so it decided to save an
      empty jar (overwriting the file just flushed).
      
      Test 1905 now verifies that this works.
      
      Assisted-by: Michael Wallner
      Assisted-by: Marcel Raad
      
      Closes #3621
      eb433389
  20. Jan 10, 2019
  21. Jan 09, 2019
  22. Jan 07, 2019
  23. Dec 27, 2018
    • Claes Jakobsson's avatar
      hostip: support wildcard hosts · d8cae791
      Claes Jakobsson authored
      This adds support for wildcard hosts in CURLOPT_RESOLVE. These are
      try-last so any non-wildcard entry is resolved first. If specified,
      any host not matched by another CURLOPT_RESOLVE config will use this
      as fallback.
      
      Example send a.com to 10.0.0.1 and everything else to 10.0.0.2:
        curl --resolve *:443:10.0.0.2 --resolve a.com:443:10.0.0.1 \
             https://a.com https://b.com
      
      
      
      This is probably quite similar to using:
        --connect-to a.com:443:10.0.0.1:443 --connect-to :443:10.0.0.2:443
      
      Closes #3406
      Reviewed-by: default avatarDaniel Stenberg <daniel@haxx.se>
      d8cae791
  24. Dec 21, 2018
    • Daniel Stenberg's avatar
      http: added options for allowing HTTP/0.9 responses · 006ff62d
      Daniel Stenberg authored
      Added CURLOPT_HTTP09_ALLOWED and --http0.9 for this purpose.
      
      For now, both the tool and library allow HTTP/0.9 by default.
      docs/DEPRECATE.md lays out the plan for when to reverse that default: 6
      months after the 7.64.0 release. The options are added already now so
      that applications/scripts can start using them already now.
      
      Fixes #2873
      Closes #3383
      006ff62d
  25. Dec 14, 2018
    • Ayoub Boudhar's avatar
      http: Implement trailing headers for chunked transfers · f464535b
      Ayoub Boudhar authored
      This adds the CURLOPT_TRAILERDATA and CURLOPT_TRAILERFUNCTION
      options that allow a callback based approach to sending trailing headers
      with chunked transfers.
      
      The test server (sws) was updated to take into account the detection of the
      end of transfer in the case of trailing headers presence.
      
      Test 1591 checks that trailing headers can be sent using libcurl.
      
      Closes #3350
      f464535b
  26. Dec 13, 2018
    • Daniel Gustafsson's avatar
      cookies: leave secure cookies alone · 7a09b52c
      Daniel Gustafsson authored
      
      Only allow secure origins to be able to write cookies with the
      'secure' flag set. This reduces the risk of non-secure origins
      to influence the state of secure origins. This implements IETF
      Internet-Draft draft-ietf-httpbis-cookie-alone-01 which updates
      RFC6265.
      
      Closes #2956
      Reviewed-by: default avatarDaniel Stenberg <daniel@haxx.se>
      7a09b52c
  27. Dec 12, 2018
  28. Dec 11, 2018
  29. Dec 09, 2018
  30. Nov 28, 2018
  31. Nov 23, 2018
  32. Nov 09, 2018
  33. Nov 07, 2018