<feed xmlns='http://www.w3.org/2005/Atom'>
<title>jcarr/git2go, branch v0.1.1</title>
<subtitle>Unnamed repository; edit this file 'description' to name the repository.
</subtitle>
<id>http://cgit.wit.com/jcarr/git2go/atom?h=v0.1.1</id>
<link rel='self' href='http://cgit.wit.com/jcarr/git2go/atom?h=v0.1.1'/>
<link rel='alternate' type='text/html' href='http://cgit.wit.com/jcarr/git2go/'/>
<updated>2024-12-18T04:04:22Z</updated>
<entry>
<title>lame</title>
<updated>2024-12-18T04:04:22Z</updated>
<author>
<name>Jeff Carr</name>
<email>jcarr@wit.com</email>
</author>
<published>2024-12-18T04:04:22Z</published>
<link rel='alternate' type='text/html' href='http://cgit.wit.com/jcarr/git2go/commit/?id=a4ee4aafbc897621e4fc20c53ac9ba3017b1c2fe'/>
<id>urn:sha1:a4ee4aafbc897621e4fc20c53ac9ba3017b1c2fe</id>
<content type='text'>
Signed-off-by: Jeff Carr &lt;jcarr@wit.com&gt;
</content>
</entry>
<entry>
<title>Merge branch 'devel'</title>
<updated>2024-12-17T21:02:44Z</updated>
<author>
<name>Jeff Carr</name>
<email>jcarr@wit.com</email>
</author>
<published>2024-12-17T21:02:44Z</published>
<link rel='alternate' type='text/html' href='http://cgit.wit.com/jcarr/git2go/commit/?id=cf84056045bde16df39a3218baf8aa46be290554'/>
<id>urn:sha1:cf84056045bde16df39a3218baf8aa46be290554</id>
<content type='text'>
</content>
</entry>
<entry>
<title>rename as libgit2</title>
<updated>2024-12-17T21:01:59Z</updated>
<author>
<name>Jeff Carr</name>
<email>jcarr@wit.com</email>
</author>
<published>2024-12-17T21:01:59Z</published>
<link rel='alternate' type='text/html' href='http://cgit.wit.com/jcarr/git2go/commit/?id=585a8dbbe57e3538ad2acaef58c3bf8bb238e000'/>
<id>urn:sha1:585a8dbbe57e3538ad2acaef58c3bf8bb238e000</id>
<content type='text'>
</content>
</entry>
<entry>
<title>better gitpb</title>
<updated>2024-12-17T19:19:35Z</updated>
<author>
<name>Jeff Carr</name>
<email>jcarr@wit.com</email>
</author>
<published>2024-12-17T19:19:35Z</published>
<link rel='alternate' type='text/html' href='http://cgit.wit.com/jcarr/git2go/commit/?id=d5a0e0056f7c73290bd75e214886c9b57cbd021f'/>
<id>urn:sha1:d5a0e0056f7c73290bd75e214886c9b57cbd021f</id>
<content type='text'>
</content>
</entry>
<entry>
<title>update to libgit2 version 1.8.4. dump old github and vendor stuff</title>
<updated>2024-12-16T23:50:57Z</updated>
<author>
<name>Jeff Carr</name>
<email>jcarr@wit.com</email>
</author>
<published>2024-12-16T23:50:57Z</published>
<link rel='alternate' type='text/html' href='http://cgit.wit.com/jcarr/git2go/commit/?id=530f3618a8f4c7d9c8d3981548112439b22e09e7'/>
<id>urn:sha1:530f3618a8f4c7d9c8d3981548112439b22e09e7</id>
<content type='text'>
	go install go.wit.com/apps/go-clone@latest
	go install go.wit.com/apps/go-mod-clean@latest
	go-clone --recusive go.wit.com/lib/git2go

Signed-off-by: Jeff Carr &lt;jcarr@wit.com&gt;
</content>
</entry>
<entry>
<title>Replace golang.org/x/crypto/openpgp with github.com/ProtonMail/go-crypto</title>
<updated>2022-12-09T20:43:11Z</updated>
<author>
<name>Roland Shoemaker</name>
<email>roland@golang.org</email>
</author>
<published>2022-12-09T20:43:11Z</published>
<link rel='alternate' type='text/html' href='http://cgit.wit.com/jcarr/git2go/commit/?id=e65b1c188ccb9b4aa4863ec702c3985c382f53db'/>
<id>urn:sha1:e65b1c188ccb9b4aa4863ec702c3985c382f53db</id>
<content type='text'>
The golang.org/x/crypto/openpgp library has been deprecated for over a
year now (see golang.org/issue/44226, and the deprecation notice in the
package documentation). The library is unmaintained and has a number of
API and usability issues. ProtonMail maintains a community fork which
is actively maintained, and for most cases is a drop-in replacement.

This change switches usages of golang.org/x/crypto/openpgp/... with
github.com/ProtonMail/go-crypto/openpgp/..., the only other code changes
are adding a nil packet.Config to a openpgp.CheckArmoredDetachedSignature
call.

(This change is part of a wider effort by the Go Security team to remove
usages of golang.org/x/crypto/openpgp from the Go ecosystem.)
</content>
</entry>
<entry>
<title>Fix the `github-tag-action` workflow (#932)</title>
<updated>2022-10-05T01:12:23Z</updated>
<author>
<name>lhchavez</name>
<email>lhchavez@lhchavez.com</email>
</author>
<published>2022-10-05T01:12:23Z</published>
<link rel='alternate' type='text/html' href='http://cgit.wit.com/jcarr/git2go/commit/?id=4b14d29c207e9969ea62a7fe07d490b036c14722'/>
<id>urn:sha1:4b14d29c207e9969ea62a7fe07d490b036c14722</id>
<content type='text'>
This has been failing for a while because of some changes in `git`.</content>
</entry>
<entry>
<title>libgit2 v1.5.0 #major (#929)</title>
<updated>2022-10-04T14:50:57Z</updated>
<author>
<name>Sanskar Jaiswal</name>
<email>hey@aryan.lol</email>
</author>
<published>2022-10-04T14:50:57Z</published>
<link rel='alternate' type='text/html' href='http://cgit.wit.com/jcarr/git2go/commit/?id=c1ec21d89caa0cdb0aefd6f6b8f95648418a3543'/>
<id>urn:sha1:c1ec21d89caa0cdb0aefd6f6b8f95648418a3543</id>
<content type='text'>
Update libgit2 to v1.5.0. Replace `SmartProxyOptions()` with `SmartRemoteConnectOptions()`.

Fixes: https://github.com/libgit2/git2go/issues/899

Signed-off-by: Sanskar Jaiswal &lt;jaiswalsanskar078@gmail.com&gt;
Co-authored-by: lhchavez &lt;lhchavez@lhchavez.com&gt;</content>
</entry>
<entry>
<title>Set BasicAuth in http.go only if username and password are not empty (#914)</title>
<updated>2022-07-13T11:50:31Z</updated>
<author>
<name>Calin</name>
<email>clns@users.noreply.github.com</email>
</author>
<published>2022-07-13T11:50:31Z</published>
<link rel='alternate' type='text/html' href='http://cgit.wit.com/jcarr/git2go/commit/?id=9db5de109c166aa802b85cfae2dced3c4728a00d'/>
<id>urn:sha1:9db5de109c166aa802b85cfae2dced3c4728a00d</id>
<content type='text'>
This prevents error "read/write on closed pipe".

Go's http.client::send() always closes req.Body, so if the first request attempt
is unsuccessful, any subsequent requests after calling the `CredentialsCallback`
will attempt to read/write on a closed pipe.</content>
</entry>
<entry>
<title>Uprev libgit to v1.3.1 (#911)</title>
<updated>2022-04-14T14:09:59Z</updated>
<author>
<name>lhchavez</name>
<email>lhchavez@lhchavez.com</email>
</author>
<published>2022-04-14T14:09:59Z</published>
<link rel='alternate' type='text/html' href='http://cgit.wit.com/jcarr/git2go/commit/?id=7bff4ca7addde8cc54c38f5db1e50fa420189a20'/>
<id>urn:sha1:7bff4ca7addde8cc54c38f5db1e50fa420189a20</id>
<content type='text'>
🔒 This is a security release to provide compatibility with git's
changes to address [CVE
2022-24765](https://github.blog/2022-04-12-git-security-vulnerability-announced/).

libgit2 (and by extension git2go) are not directly affected by this
vulnerability, because libgit2 does not directly invoke any executable.
But we are providing these changes as a security release for any users
that use libgit2 for repository discovery and then also use git on that
repository. In this release, we will now validate that the user opening
the repository is the same user that owns the on-disk repository. This
is to match git's behavior.

In addition, we are providing several correctness fixes where invalid
input can lead to a crash. These may prevent possible denial of service
attacks. At this time there are not known exploits to these issues.</content>
</entry>
</feed>
