Expand description
The tree of supported configuration values for use in config_overrides
or for validating and transforming well-known configuration values.
It can also be used to traverse all implemented keys and to validate values before usage as configuration overrides.
§Leniency
When validating values, we don’t apply leniency here which is left to the caller. Leniency is an application defined configuration to ignore errors on non-security related values, which might make applications more resilient towards misconfiguration.
Modules§
- branch
- checkout
- core
- credential
- diff
blob-diff - extensions
- fetch
- gitoxide
- http
- index
- key
- keys
- Generic value implementations for static instantiation.
- protocol
- push
- remote
- ssh
- status
status
Structs§
- Author
- The
authortop-level section. - Branch
- The
branchtop-level section. - Checkout
- The
checkouttop-level section. - Clone
- The
clonetop-level section. - Committer
- The
committertop-level section. - Core
- The
coretop-level section. - Credential
- The
credentialtop-level section. - Diff
blob-diff - The
difftop-level section. - Extensions
- The
extensiontop-level section. - Fetch
- The
fetchtop-level section. - Gitoxide
- The
gitoxidetop-level section. - Http
- The
httptop-level section. - Index
- The
indextop-level section. - Init
- The
inittop-level section. - Mailmap
- Merge
- Pack
- The
packtop-level section. - Protocol
- The
protocoltop-level section. - Push
- The
pushtop-level section. - Remote
- The
remotetop-level section. - Safe
- The
safetop-level section. - Ssh
- The
sshtop-level section. - Status
status - The
statustop-level section. - Url
- The
urltop-level section. - User
- The
usertop-level section.
Enums§
- Link
- A way to link a key with other resources.
- Note
- A note attached to a key.
- SubSection
Requirement - Determine how subsections may be used with a given key, suitable for obtaining the full name for use in assignments.