This project is mirrored from https://gitlab.com/gitlab-org/build/omnibus-mirror/curl.git.
Pull mirroring failed .
Repository mirroring has been paused due to too many failed attempts. It can be resumed by a project maintainer or owner.
Last successful update .
Repository mirroring has been paused due to too many failed attempts. It can be resumed by a project maintainer or owner.
Last successful update .
- Dec 14, 2018
-
-
Ayoub Boudhar authored
This adds the CURLOPT_TRAILERDATA and CURLOPT_TRAILERFUNCTION options that allow a callback based approach to sending trailing headers with chunked transfers. The test server (sws) was updated to take into account the detection of the end of transfer in the case of trailing headers presence. Test 1591 checks that trailing headers can be sent using libcurl. Closes #3350
-
- Dec 13, 2018
-
-
Daniel Gustafsson authored
Only allow secure origins to be able to write cookies with the 'secure' flag set. This reduces the risk of non-secure origins to influence the state of secure origins. This implements IETF Internet-Draft draft-ietf-httpbis-cookie-alone-01 which updates RFC6265. Closes #2956 Reviewed-by:
Daniel Stenberg <daniel@haxx.se>
-
- Dec 12, 2018
-
-
Daniel Stenberg authored
-
Daniel Stenberg authored
... when not actually following the redirect. Otherwise we return error for this and an application can't extract the value. Test 1518 added to verify. Reported-by: Pavel Pavlov Fixes #3340 Closes #3364
-
- Dec 11, 2018
-
-
Daniel Gustafsson authored
This adds a new unittest intended to cover the internal functions in the urlapi code, starting with parse_port(). In order to avoid name collisions in debug builds, parse_port() is renamed Curl_parse_port() since it will be exported. Reviewed-by:
Daniel Stenberg <daniel@haxx.se> Reviewed-by:
Marcel Raad <Marcel.Raad@teamviewer.com>
-
Jay Satiro authored
- Include query in the path passed to generate HTTP auth. Recent changes to use the URL API internally (46e16406, 7.62.0) inadvertently broke authentication URIs by omitting the query. Fixes https://github.com/curl/curl/issues/3353 Closes #3356
-
- Dec 09, 2018
-
-
Daniel Stenberg authored
-
- Nov 28, 2018
-
-
Daniel Stenberg authored
Because of issue #3315 Closes #3317
-
- Nov 23, 2018
-
-
Daniel Stenberg authored
Important for when the file is going to be read again and thus must not contain old contents! Adds test 327 to verify. Reported-by: daboul on github Fixes #3299 Closes #3300
-
- Nov 09, 2018
-
-
James Fuller authored
Allows an application to pass in a pre-parsed URL via a URL handle. Closes #3227
-
- Nov 07, 2018
-
-
Frank Gevaerts authored
Closes #3115
-
- Nov 06, 2018
-
-
Daniel Stenberg authored
The function identifying a leading "scheme" part of the URL considered a few letters ending with a colon to be a scheme, making something like "short:80" to become an unknown scheme instead of a short host name and a port number. Extended test 1560 to verify. Also fixed test203 to use file_pwd to make it get the correct path on windows. Removed test 2070 since it was a duplicate of 203. Assisted-by: Marcel Raad Reported-by: Hagai Auro Fixes #3220 Fixes #3233 Closes #3223 Closes #3235
-
- Nov 03, 2018
-
-
Daniel Gustafsson authored
The internal buffer in infof() is limited to 2048 bytes of payload plus an additional byte for NULL termination. Servers with very long error messages can however cause truncation of the string, which currently isn't very clear, and leads to badly formatted output. This appends a "...\n" (or just "..." in case the format didn't with a newline char) marker to the end of the string to clearly show that it has been truncated. Also include a unittest covering infof() to try and catch any bugs introduced in this quite important function. Closes #3216 Reviewed-by:
Daniel Stenberg <daniel@haxx.se> Reviewed-by:
Marcel Raad <Marcel.Raad@teamviewer.com>
-
- Nov 02, 2018
-
-
Daniel Stenberg authored
When not actually following the redirect and the target URL is only stored for later retrieval, curl always accepted "non-supported" schemes. This was a regression from 46e16406. Reported-by: Brad King Fixes #3210 Closes #3215
-
- Oct 30, 2018
-
-
Daniel Stenberg authored
-
- Oct 27, 2018
-
-
Daniel Stenberg authored
The version used for Gskit, NSS, GnuTLS, WolfSSL and schannel.
-
- Sep 08, 2018
-
-
Daniel Stenberg authored
See header file and man pages for API. All documented API details work and are tested in the 1560 test case. Closes #2842
-
- Sep 06, 2018
-
-
Nicklas Avén authored
... and add "MAILINDEX". As described in #2789, this is a suggested solution. Changing UID=xx to actually get mail with UID xx and add "MAILINDEX" to get a mail with a special index in the mail box (old behavior). So MAILINDEX=1 gives the first non deleted mail in the mail box. Fixes #2789 Closes #2815
-
Daniel Stenberg authored
-
- Sep 05, 2018
-
-
James Fuller authored
Approved-by: Daniel Gustafsson Closes #2937
-
- Aug 15, 2018
-
-
Daniel Stenberg authored
... simply because this is usually a sign of the user having omitted the file name and the next option is instead "eaten" by the parser as a file name. Add test1268 to verify Closes #2885
-
- Aug 14, 2018
-
-
Kamil Dudka authored
Added test 656 (based on test 604) to verify the fix. Bug: https://bugzilla.redhat.com/1595135 Closes #2879
-
- Aug 13, 2018
-
-
Daniel Stenberg authored
Deal with tiny "HTTP/0.9" (header-less) responses by checking the status-line early, even before a full "HTTP/" is received to allow detecting 0.9 properly. Test 1266 and 1267 added to verify. Fixes #2420 Closes #2872
-
- Aug 11, 2018
-
-
Marcel Raad authored
Split off testing file names with double quotes into new test 1158. Disable it for MSYS using a precheck as it doesn't support file names with double quotes (but Cygwin does, for example). Fixes https://github.com/curl/curl/issues/2796 Closes https://github.com/curl/curl/pull/2854
-
Daniel Stenberg authored
Adds test 1522 for verification. Reported-by: cjmsoregan Fixes #2847 Closes #2864
-
- Jul 28, 2018
-
-
Daniel Stenberg authored
Verifies bugfix #2797
-
- Jun 23, 2018
-
-
Javier Blazquez authored
Fixes #2677 Closes #2679
-
- Jun 16, 2018
-
-
Daniel Stenberg authored
When the application just started the transfer and then stops it while the name resolve in the background thread hasn't completed, we need to wait for the resolve to complete and then cleanup data accordingly. Enabled test 1553 again and added test 1590 to also check when the host name resolves successfully. Detected by OSS-fuzz. Closes #1968
-
- Jun 01, 2018
-
-
Alibek.Jorajev authored
If there's an existing entry using the selected name. Closes #2622
-
- May 31, 2018
-
-
Björn Stenberg authored
Adds CURLOPT_DISALLOW_USERNAME_IN_URL and --disallow-username-in-url. Makes libcurl reject URLs with a username in them. Closes #2340
-
- May 24, 2018
-
-
Linus Lewandowski authored
Closes #2102
-
- May 22, 2018
-
-
Patrick Monnerat authored
This avoids appending error data to already existing good data. Test 92 is updated to match this change. New test 1156 checks all combinations of --range/--resume, --fail, Content-Range header and http status code 200/416. Fixes #1163 Reported-By: Ithubg on github Closes #2578
-
- May 12, 2018
-
-
Patrick Monnerat authored
RFC 6265 section 4.2.1 does not set restrictions on cookie names. This is a follow-up to commit 7f7fcd0d. Also explicitly check proper syntax of cookie name/value pair. New test 1155 checks that cookie names are not reserved words. Reported-By: anshnd at github Fixes #2564 Closes #2566
-
- Apr 18, 2018
-
-
Dan McNulty authored
- Move verify_certificate functionality in schannel.c into a new file called schannel_verify.c. Additionally, some structure defintions from schannel.c have been moved to schannel.h to allow them to be used in schannel_verify.c. - Make verify_certificate functionality for Schannel available on all versions of Windows instead of just Windows CE. verify_certificate will be invoked on Windows CE or when the user specifies CURLOPT_CAINFO and CURLOPT_SSL_VERIFYPEER. - In verify_certificate, create a custom certificate chain engine that exclusively trusts the certificate store backed by the CURLOPT_CAINFO file. - doc updates of --cacert/CAINFO support for schannel - Use CERT_NAME_SEARCH_ALL_NAMES_FLAG when invoking CertGetNameString when available. This implements a TODO in schannel.c to improve handling of multiple SANs in a certificate. In particular, all SANs will now be searched instead of just the first name. - Update tool_operate.c to not search for the curl-ca-bundle.crt file when using Schannel to maintain backward compatibility. Previously, any curl-ca-bundle.crt file found in that search would have been ignored by Schannel. But, with CAINFO support, the file found by that search would have been used as the certificate store and could cause issues for any users that have curl-ca-bundle.crt in the search path. - Update url.c to not set the build time CURL_CA_BUNDLE if the selected SSL backend is Schannel. We allow setting CA location for schannel only when explicitly specified by the user via CURLOPT_CAINFO / --cacert. - Add new test cases 3000 and 3001. These test cases check that the first and last SAN, respectively, matches the connection hostname. New test certificates have been added for these cases. For 3000, the certificate prefix is Server-localhost-firstSAN and for 3001, the certificate prefix is Server-localhost-secondSAN. - Remove TODO 15.2 (Add support for custom server certificate validation), this commit addresses it. Closes https://github.com/curl/curl/pull/1325
-
- Mar 17, 2018
-
-
Rick Deist authored
This patch adds CURLOPT_DNS_SHUFFLE_ADDRESSES to explicitly request shuffling of IP addresses returned for a hostname when there is more than one. This is useful when the application knows that a round robin approach is appropriate and is willing to accept the consequences of potentially discarding some preference order returned by the system's implementation. Closes #1694
-
Lawrence Matthews authored
Add --haproxy-protocol for the command line tool Closes #2162
-
- Mar 15, 2018
-
-
Daniel Stenberg authored
This is what "HTTP/0.9" basically looks like. Reported on IRC Closes #2382
-
- Mar 12, 2018
-
-
Daniel Stenberg authored
Refuse to operate when given path components featuring byte values lower than 32. Previously, inserting a %00 sequence early in the directory part when using the 'singlecwd' ftp method could make curl write a zero byte outside of the allocated buffer. Test case 340 verifies. CVE-2018-1000120 Reported-by: Duy Phan Thanh Bug: https://curl.haxx.se/docs/adv_2018-9cd6.html
-
- Mar 11, 2018
-
-
Daniel Stenberg authored
Reported-by: Michael Kaufmann Fixes #2357 Closes #2362
-
- Mar 04, 2018
-
-
Daniel Stenberg authored
Added test 1265 that verifies. Reported-by: steelman on github Fixes #2353 Closes #2355
-