Fossil

Timeline
Login

Many hyperlinks are disabled.
Use anonymous login to enable hyperlinks.

13 events for the month beginning 2017-08-01 by user jan.nijtmans

Following month ↑
2017-08-31
02:00
Merge trunk ... (check-in: d15c1ba0f9 user: jan.nijtmans tags: multi-thread)
2017-08-30
13:29
Merge cleanX ... (Closed-Leaf check-in: fd47eae7da user: jan.nijtmans tags: cleanX-no-clean-glob)
13:17
Don't prompt before removing empty directories ... (check-in: 81d72e7257 user: jan.nijtmans tags: cleanX)
13:07
Merge cleanX ... (check-in: 9297610047 user: jan.nijtmans tags: cleanX-no-clean-glob)
13:02
Merge trunk ... (check-in: d4f98e25c1 user: jan.nijtmans tags: cleanX)
2017-08-29
07:58
(cherry-pick): SQLite version 3.20.1 (cherry-pick): Remove an unused global variable from the path_shortest() logic ... (check-in: ae8709e2fc user: jan.nijtmans tags: branch-2.3)
07:50
SQLite version 3.20.1 ... (check-in: ffc252a663 user: jan.nijtmans tags: trunk)
2017-08-28
14:04
Update dirent to version 1.23. See [https://github.com/tronkko/dirent/releases] ... (check-in: ade4a657dc user: jan.nijtmans tags: trunk)
2017-08-23
18:53
(cherry-pick): Remove a redundant directory separator character from the temporary filenames generated on windows. (cherry-pick): Change the file_mkfolder() implementation to assume that the folder already exists and only go about creating it and its path if it does not previously exit. ... (check-in: adacbfbcfb user: jan.nijtmans tags: branch-2.3)
17:28
Fix build (previous cherry-pick was not complete) (cherry-pick): For temporary filename paths on Windows, changes all backslash characters into forward slashes, so that the new enhanced-security shell escape mechanism from check-in [3b191c98] can use those temporary filenames. ... (check-in: dbda6e2a5d user: jan.nijtmans tags: branch-2.3)
2017-08-22
09:46
(cherry-pick): Use SQLite 3.20.0 final ... (check-in: 7eebec15bd user: jan.nijtmans tags: branch-2.3)
09:44
(cherry-pick): Fix the SSH sync protocol to avoid "ssh" command-line option injection attacks such as those fixed in Git 2.14.1, Mercurial 4.2.3, and Subversion 1.9.7. As "ssh://" URLs cannot be buried out of sight in Fossil, the vulnerability does not appear to be as severe as in those other systems. (cherry-pick): Enhance the ssh:// URL to be cautious about the fossil= query parameter. Only commands "fossil" and "echo" (with an optional path) are accepted. ... (check-in: 1f18d23d76 user: jan.nijtmans tags: branch-2.3)
2017-08-21
12:18
Use SQLite 3.20.0 final (source_id change only) ... (check-in: 810dd031ec user: jan.nijtmans tags: trunk)
Previous month ↓