mirror of
https://github.com/git/git.git
synced 2026-03-02 03:26:24 +00:00
Sync with 'master'
* master: i18n: fix mismatched camelCase config variables Another batch of fixes before -rc1
This commit is contained in:
@@ -54,7 +54,7 @@ UI, Workflows & Features
|
||||
|
||||
* Update the doctype written in gitweb output to xhtml5.
|
||||
|
||||
* The "transfer.credentialsInUrl" configuration variable controls what
|
||||
* The "transfer.credentialsInURL" configuration variable controls what
|
||||
happens when a URL with embedded login credential is used on either
|
||||
"fetch" or "push". Credentials are currently only detected in
|
||||
`remote.<name>.url` config, not `remote.<name>.pushurl`.
|
||||
@@ -309,6 +309,9 @@ Fixes since v2.36
|
||||
* Use-after-free (with another forget-to-free) fix.
|
||||
(merge 323822c72b ab/remote-free-fix later to maint).
|
||||
|
||||
* Remove a coccinelle rule that is no longer relevant.
|
||||
(merge b1299de4a1 jc/cocci-cleanup later to maint).
|
||||
|
||||
* Other code cleanup, docfix, build fix, etc.
|
||||
(merge e6b2582da3 cm/reftable-0-length-memset later to maint).
|
||||
(merge 0b75e5bf22 ab/misc-cleanup later to maint).
|
||||
|
||||
@@ -203,7 +203,7 @@ http.schannelUseSSLCAInfo::
|
||||
when the `schannel` backend was configured via `http.sslBackend`,
|
||||
unless `http.schannelUseSSLCAInfo` overrides this behavior.
|
||||
|
||||
http.pinnedpubkey::
|
||||
http.pinnedPubkey::
|
||||
Public key of the https service. It may either be the filename of
|
||||
a PEM or DER encoded public key file or a string starting with
|
||||
'sha256//' followed by the base64 encoded sha256 hash of the
|
||||
|
||||
@@ -1,7 +1,7 @@
|
||||
#!/bin/sh
|
||||
|
||||
GVF=GIT-VERSION-FILE
|
||||
DEF_VER=v2.36.GIT
|
||||
DEF_VER=v2.37.0-rc1 ;# not quite
|
||||
|
||||
LF='
|
||||
'
|
||||
|
||||
@@ -3465,7 +3465,7 @@ static void git_pack_config(void)
|
||||
pack_idx_opts.version = indexversion_value;
|
||||
if (pack_idx_opts.version > 2)
|
||||
git_die_config("pack.indexversion",
|
||||
"bad pack.indexversion=%"PRIu32, pack_idx_opts.version);
|
||||
"bad pack.indexVersion=%"PRIu32, pack_idx_opts.version);
|
||||
}
|
||||
if (!git_config_get_ulong("pack.packsizelimit", &packsizelimit_value))
|
||||
max_packsize = packsizelimit_value;
|
||||
|
||||
@@ -581,7 +581,7 @@ int cmd_gc(int argc, const char **argv, const char *prefix)
|
||||
/* default expiry time, overwritten in gc_config */
|
||||
gc_config();
|
||||
if (parse_expiry_date(gc_log_expire, &gc_log_expire_time))
|
||||
die(_("failed to parse gc.logexpiry value %s"), gc_log_expire);
|
||||
die(_("failed to parse gc.logExpiry value %s"), gc_log_expire);
|
||||
|
||||
if (pack_refs < 0)
|
||||
pack_refs = !is_bare_repository();
|
||||
|
||||
@@ -1575,7 +1575,7 @@ static int git_index_pack_config(const char *k, const char *v, void *cb)
|
||||
if (!strcmp(k, "pack.indexversion")) {
|
||||
opts->version = git_config_int(k, v);
|
||||
if (opts->version > 2)
|
||||
die(_("bad pack.indexversion=%"PRIu32), opts->version);
|
||||
die(_("bad pack.indexVersion=%"PRIu32), opts->version);
|
||||
return 0;
|
||||
}
|
||||
if (!strcmp(k, "pack.threads")) {
|
||||
|
||||
@@ -3170,7 +3170,7 @@ static int git_pack_config(const char *k, const char *v, void *cb)
|
||||
if (!strcmp(k, "pack.indexversion")) {
|
||||
pack_idx_opts.version = git_config_int(k, v);
|
||||
if (pack_idx_opts.version > 2)
|
||||
die(_("bad pack.indexversion=%"PRIu32),
|
||||
die(_("bad pack.indexVersion=%"PRIu32),
|
||||
pack_idx_opts.version);
|
||||
return 0;
|
||||
}
|
||||
|
||||
@@ -41,7 +41,7 @@ static const char *const git_repack_usage[] = {
|
||||
|
||||
static const char incremental_bitmap_conflict_error[] = N_(
|
||||
"Incremental repacks are incompatible with bitmap indexes. Use\n"
|
||||
"--no-write-bitmap-index or disable the pack.writebitmaps configuration."
|
||||
"--no-write-bitmap-index or disable the pack.writeBitmaps configuration."
|
||||
);
|
||||
|
||||
struct pack_objects_args {
|
||||
|
||||
2
commit.c
2
commit.c
@@ -1526,7 +1526,7 @@ static int verify_utf8(struct strbuf *buf)
|
||||
static const char commit_utf8_warn[] =
|
||||
N_("Warning: commit message did not conform to UTF-8.\n"
|
||||
"You may want to amend it after fixing the message, or set the config\n"
|
||||
"variable i18n.commitencoding to the encoding your project uses.\n");
|
||||
"variable i18n.commitEncoding to the encoding your project uses.\n");
|
||||
|
||||
int commit_tree_extended(const char *msg, size_t msg_len,
|
||||
const struct object_id *tree,
|
||||
|
||||
@@ -985,7 +985,7 @@ static int sign_buffer_ssh(struct strbuf *buffer, struct strbuf *signature,
|
||||
|
||||
if (!signing_key || signing_key[0] == '\0')
|
||||
return error(
|
||||
_("user.signingkey needs to be set for ssh signing"));
|
||||
_("user.signingKey needs to be set for ssh signing"));
|
||||
|
||||
if (is_literal_ssh_key(signing_key, &literal_key)) {
|
||||
/* A literal ssh key */
|
||||
|
||||
2
http.c
2
http.c
@@ -349,7 +349,7 @@ static int http_options(const char *var, const char *value, void *cb)
|
||||
if (!strcmp("http.postbuffer", var)) {
|
||||
http_post_buffer = git_config_ssize_t(var, value);
|
||||
if (http_post_buffer < 0)
|
||||
warning(_("negative value for http.postbuffer; defaulting to %d"), LARGE_PACKET_MAX);
|
||||
warning(_("negative value for http.postBuffer; defaulting to %d"), LARGE_PACKET_MAX);
|
||||
if (http_post_buffer < LARGE_PACKET_MAX)
|
||||
http_post_buffer = LARGE_PACKET_MAX;
|
||||
return 0;
|
||||
|
||||
2
remote.c
2
remote.c
@@ -633,7 +633,7 @@ static void validate_remote_url(struct remote *remote)
|
||||
else if (!strcmp("allow", value))
|
||||
return;
|
||||
else
|
||||
die(_("unrecognized value transfer.credentialsInURL: '%s'"), value);
|
||||
die(_("unrecognized value transfer.credentialsInUrl: '%s'"), value);
|
||||
|
||||
for (i = 0; i < remote->url_nr; i++) {
|
||||
struct url_info url_info = { 0 };
|
||||
|
||||
@@ -302,7 +302,7 @@ int parse_submodule_fetchjobs(const char *var, const char *value)
|
||||
{
|
||||
int fetchjobs = git_config_int(var, value);
|
||||
if (fetchjobs < 0)
|
||||
die(_("negative values not allowed for submodule.fetchjobs"));
|
||||
die(_("negative values not allowed for submodule.fetchJobs"));
|
||||
return fetchjobs;
|
||||
}
|
||||
|
||||
|
||||
Reference in New Issue
Block a user