This project is mirrored from https://gitlab.com/gitlab-org/build/omnibus-mirror/curl.git.
Pull mirroring failed .
Repository mirroring has been paused due to too many failed attempts. It can be resumed by a project maintainer or owner.
Last successful update .
Repository mirroring has been paused due to too many failed attempts. It can be resumed by a project maintainer or owner.
Last successful update .
- Jul 29, 2019
-
-
Daniel Stenberg authored
... to avoid integer overflows later when multiplying with 1000 to convert seconds to milliseconds. Added test 1269 to verify. Reported-by: Jason Lee
-
- Jul 15, 2019
-
-
Daniel Stenberg authored
Triggered by PR #4111 Closes #4113
-
- Jul 14, 2019
-
-
Linos Giannopoulos authored
The testcase ensures that redirects to CURLPROTO_GOPHER won't be allowed, by default, in the future. Also, curl is being used for convenience while keeping the testcases DRY. The expected error code is CURLE_UNSUPPORTED_PROTOCOL when the client is redirected to CURLPROTO_GOPHER Signed-off-by:
Linos Giannopoulos <lgian@skroutz.gr>
-
Peter Simonyi authored
With CURLOPT_TIMECONDITION set, a header is automatically added (e.g. If-Modified-Since). Allow this to be replaced or suppressed with CURLOPT_HTTPHEADER. Fixes #4103 Closes #4109
-
- Jun 18, 2019
-
-
Daniel Stenberg authored
-
- Jun 11, 2019
-
-
Daniel Stenberg authored
between configure.ac and source code. They should be possible to switch on/off in configure AND be used in source code.
-
- Jun 02, 2019
-
-
Daniel Stenberg authored
Verifies that a bodyless response don't parse this content-related header.
-
- May 25, 2019
-
-
Jay Satiro authored
- Revert all commits related to the SASL authzid feature since the next release will be a patch release, 7.65.1. Prior to this change CURLOPT_SASL_AUTHZID / --sasl-authzid was destined for the next release, assuming it would be a feature release 7.66.0. However instead the next release will be a patch release, 7.65.1 and will not contain any new features. After the patch release after the reverted commits can be restored by using cherry-pick: git cherry-pick a14d72ca a9499ff1 8c1cc369 c2a8d52a 0edf6907 Details for all reverted commits: Revert "os400: take care of CURLOPT_SASL_AUTHZID in curl_easy_setopt_ccsid()." This reverts commit 0edf6907. Revert "tests: Fix the line endings for the SASL alt-auth tests" This reverts commit c2a8d52a. Revert "examples: Added SASL PLAIN authorisation identity (authzid) examples" This reverts commit 8c1cc369. Revert "curl: --sasl-authzid added to support CURLOPT_SASL_AUTHZID from the tool" This reverts commit a9499ff1. Revert "sasl: Implement SASL authorisation identity via CURLOPT_SASL_AUTHZID" This reverts commit a14d72ca.
-
- May 22, 2019
-
-
Steve Holme authored
-
- May 20, 2019
-
-
Daniel Stenberg authored
Reported-by: Olen Andoni Fixes #3906 Closes #3907
-
Daniel Stenberg authored
-
- Apr 29, 2019
-
-
Daniel Stenberg authored
This limits all accepted input strings passed to libcurl to be less than CURL_MAX_INPUT_LENGTH (8000000) bytes, for these API calls: curl_easy_setopt() and curl_url_set(). The 8000000 number is arbitrary picked and is meant to detect mistakes or abuse, not to limit actual practical use cases. By limiting the acceptable string lengths we also reduce the risk of integer overflows all over. NOTE: This does not apply to `CURLOPT_POSTFIELDS`. Test 1559 verifies. Closes #3805
-
- Apr 20, 2019
-
-
Daniel Stenberg authored
which basically just makes sure LOGOUT is *not* issued on disconnect
-
- Apr 13, 2019
-
-
Daniel Stenberg authored
Make all SOCKS tests use socksd instead of ssh.
-
- Apr 11, 2019
-
-
Daniel Stenberg authored
Based-on-code-by: Poul T Lomholt
-
- Apr 06, 2019
-
-
Daniel Stenberg authored
As previously planned and documented in DEPRECATE.md, all pipelining code is removed. Closes #3651
-
- Mar 18, 2019
-
-
Daniel Stenberg authored
The threaded-shared-conn.c example turned into test case. Only works if pthread was detected. An attempt to detect future regressions such as e3a53e3e Closes #3687
-
- Mar 09, 2019
-
-
Daniel Stenberg authored
Reproduced bug #3649 Closes #3659
-
- Mar 04, 2019
-
-
Daniel Stenberg authored
Test 659 verifies Also fixed the test 658 name Closes #3641
-
- Mar 03, 2019
-
-
Daniel Stenberg authored
-
Daniel Stenberg authored
-
- Feb 27, 2019
-
-
Daniel Stenberg authored
Follow-up to 8eddb8f4. If the cookieinfo pointer is NULL there really is nothing to save. Without this fix, we got a problem when a handle was using shared object with cookies and is told to "FLUSH" it to file (which worked) and then the share object was removed and when the easy handle was closed just afterwards it has no cookieinfo and no cookies so it decided to save an empty jar (overwriting the file just flushed). Test 1905 now verifies that this works. Assisted-by: Michael Wallner Assisted-by: Marcel Raad Closes #3621
-
- Jan 10, 2019
-
-
Daniel Stenberg authored
Attempt to reproduce issue #3444. Closes #3447
-
Daniel Stenberg authored
Both user and password are cleared uncondtitionally. Added unit test 1621 to verify. Fixes #3423 Closes #3433
-
Daniel Stenberg authored
Added test 1562 to verify. Reported-by: Jeroen Ooms Fixes #3445 Closes #3450
-
- Jan 09, 2019
-
-
Katsuhiko YOSHIDA authored
Closes #3417
-
- Jan 07, 2019
-
-
Brad Spencer authored
Added Curl_resolver_kill() for all three resolver modes, which only blocks when necessary, along with test 1592 to confirm curl_multi_remove_handle() doesn't block unless it must. Closes #3428 Fixes #3371
-
- Dec 27, 2018
-
-
Claes Jakobsson authored
This adds support for wildcard hosts in CURLOPT_RESOLVE. These are try-last so any non-wildcard entry is resolved first. If specified, any host not matched by another CURLOPT_RESOLVE config will use this as fallback. Example send a.com to 10.0.0.1 and everything else to 10.0.0.2: curl --resolve *:443:10.0.0.2 --resolve a.com:443:10.0.0.1 \ https://a.com https://b.com This is probably quite similar to using: --connect-to a.com:443:10.0.0.1:443 --connect-to :443:10.0.0.2:443 Closes #3406 Reviewed-by:
Daniel Stenberg <daniel@haxx.se>
-
- Dec 21, 2018
-
-
Daniel Stenberg authored
Added CURLOPT_HTTP09_ALLOWED and --http0.9 for this purpose. For now, both the tool and library allow HTTP/0.9 by default. docs/DEPRECATE.md lays out the plan for when to reverse that default: 6 months after the 7.64.0 release. The options are added already now so that applications/scripts can start using them already now. Fixes #2873 Closes #3383
-
- Dec 14, 2018
-
-
Ayoub Boudhar authored
This adds the CURLOPT_TRAILERDATA and CURLOPT_TRAILERFUNCTION options that allow a callback based approach to sending trailing headers with chunked transfers. The test server (sws) was updated to take into account the detection of the end of transfer in the case of trailing headers presence. Test 1591 checks that trailing headers can be sent using libcurl. Closes #3350
-
- Dec 13, 2018
-
-
Daniel Gustafsson authored
Only allow secure origins to be able to write cookies with the 'secure' flag set. This reduces the risk of non-secure origins to influence the state of secure origins. This implements IETF Internet-Draft draft-ietf-httpbis-cookie-alone-01 which updates RFC6265. Closes #2956 Reviewed-by:
Daniel Stenberg <daniel@haxx.se>
-
- Dec 12, 2018
-
-
Daniel Stenberg authored
-
Daniel Stenberg authored
... when not actually following the redirect. Otherwise we return error for this and an application can't extract the value. Test 1518 added to verify. Reported-by: Pavel Pavlov Fixes #3340 Closes #3364
-
- Dec 11, 2018
-
-
Daniel Gustafsson authored
This adds a new unittest intended to cover the internal functions in the urlapi code, starting with parse_port(). In order to avoid name collisions in debug builds, parse_port() is renamed Curl_parse_port() since it will be exported. Reviewed-by:
Daniel Stenberg <daniel@haxx.se> Reviewed-by:
Marcel Raad <Marcel.Raad@teamviewer.com>
-
Jay Satiro authored
- Include query in the path passed to generate HTTP auth. Recent changes to use the URL API internally (46e16406, 7.62.0) inadvertently broke authentication URIs by omitting the query. Fixes https://github.com/curl/curl/issues/3353 Closes #3356
-
- Dec 09, 2018
-
-
Daniel Stenberg authored
-
- Nov 28, 2018
-
-
Daniel Stenberg authored
Because of issue #3315 Closes #3317
-
- Nov 23, 2018
-
-
Daniel Stenberg authored
Important for when the file is going to be read again and thus must not contain old contents! Adds test 327 to verify. Reported-by: daboul on github Fixes #3299 Closes #3300
-
- Nov 09, 2018
-
-
James Fuller authored
Allows an application to pass in a pre-parsed URL via a URL handle. Closes #3227
-
- Nov 07, 2018
-
-
Frank Gevaerts authored
Closes #3115
-