)]}'
{
  "commit": "07259e74ec1237c836874342c65650bdee8a3993",
  "tree": "5cc2be3aa1dd29e8bee5c2625026b91f2a91555e",
  "parents": [
    "c716fe4bd917e013bf376a678b3a924447777b2d"
  ],
  "author": {
    "name": "Jeff King",
    "email": "peff@peff.net",
    "time": "Wed Mar 11 18:48:24 2020 -0400"
  },
  "committer": {
    "name": "Jeff King",
    "email": "peff@peff.net",
    "time": "Thu Mar 12 02:56:50 2020 -0400"
  },
  "message": "fsck: detect gitmodules URLs with embedded newlines\n\nThe credential protocol can\u0027t handle values with newlines. We already\ndetect and block any such URLs from being used with credential helpers,\nbut let\u0027s also add an fsck check to detect and block gitmodules files\nwith such URLs. That will let us notice the problem earlier when\ntransfer.fsckObjects is turned on. And in particular it will prevent bad\nobjects from spreading, which may protect downstream users running older\nversions of Git.\n\nWe\u0027ll file this under the existing gitmodulesUrl flag, which covers URLs\nwith option injection. There\u0027s really no need to distinguish the exact\nflaw in the URL in this context. Likewise, I\u0027ve expanded the description\nof t7416 to cover all types of bogus URLs.\n",
  "tree_diff": [
    {
      "type": "modify",
      "old_id": "0741e625860e38c15b2cd5c55e598f687511ca92",
      "old_mode": 33188,
      "old_path": "fsck.c",
      "new_id": "5b437c260cd10a4f4e3f19849945435e9e78692e",
      "new_mode": 33188,
      "new_path": "fsck.c"
    },
    {
      "type": "modify",
      "old_id": "5ba041f537067dd9d16047a3569bb2b5fb3a4d51",
      "old_mode": 33261,
      "old_path": "t/t7416-submodule-dash-url.sh",
      "new_id": "41431b1ac38e5c749d5bb6338e2c221298bc3023",
      "new_mode": 33261,
      "new_path": "t/t7416-submodule-dash-url.sh"
    }
  ]
}
