summaryrefslogtreecommitdiff
Commit message (Collapse)AuthorAge
* releasing package git-annex version 6.201708186.20170818Gravatar Joey Hess2017-08-18
|
* git-annex.cabal: Deal with breaking changes in Cabal 2.0Gravatar Joey Hess2017-08-18
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | https://github.com/haskell/cabal/issues/4655 This means that when a module is conditionally imported via ifdef depending on the OS or build flags, the cabal file has to mirror the same logic there to only list the module then. Since there are lots of OS's and lots of combinations of build flags here, it's rather difficult to know if the cabal file has been completelty correctly updated to match the source code. So I am very unhappy with needing to update things in two places. I've only tested this on linux with most build flags enables; this will probably need significant time and testing to catch every cabal file tweak that this change to Cabal requires. And it will be a continual source of compile failures going forward when the code is modified and the cabal file not also updated. DRY DRY DRY, I repeat myself, but: DRY! Sigh.. (Also, had to remove all Build.* that are standalone programs from the Other-Modules list, because since cabal passes those modules to ghc when building git-annex, it complains that they use module Main. Those modules are only used when building with the Makefile anyway, so this change shouldn't break anything.) This commit was sponsored by Thomas Hochstein on Patreon.
* Added a commentGravatar olaf2017-08-18
|
* Added a commentGravatar olaf2017-08-18
|
* avoid the dashed ssh hostname class of security holesGravatar Joey Hess2017-08-17
| | | | | | | | | | | | | | | | | | | | | | | | Security fix: Disallow hostname starting with a dash, which would get passed to ssh and be treated an option. This could be used by an attacker who provides a crafted ssh url (for eg a git remote) to execute arbitrary code via ssh -oProxyCommand. No CVE has yet been assigned for this hole. The same class of security hole recently affected git itself, CVE-2017-1000117. Method: Identified all places where ssh is run, by git grep '"ssh"' Converted them all to use a SshHost, if they did not already, for specifying the hostname. SshHost was made a data type with a smart constructor, which rejects hostnames starting with '-'. Note that git-annex already contains extensive use of Utility.SafeCommand, which fixes a similar class of problem where a filename starting with a dash gets passed to a program which treats it as an option. This commit was sponsored by Jochen Bartl on Patreon.
* typoGravatar Joey Hess2017-08-17
|
* devblogGravatar Joey Hess2017-08-17
|
* avoid broken version of xss-sanitizeGravatar Joey Hess2017-08-17
| | | | https://github.com/yesodweb/haskell-xss-sanitize/issues/17
* fix external script for filenames with spaces from protocolGravatar Joey Hess2017-08-17
| | | | | | | | Fix the external special remotes git-annex-remote-ipfs, git-annex-remote-torrent and the example.sh template to correctly support filenames with spaces. This commit was sponsored by John Peloquin on Patreon.
* external: nice error message for keys with spaces in their nameGravatar Joey Hess2017-08-17
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | External special remotes will refuse to operate on keys with spaces in their names. That has never worked correctly due to the design of the external special remote protocol. Display an error message suggesting migration. Not super happy with this, but it's a pragmatic solution. Better than complicating the external special remote interface and all external special remotes. Note that I only made it use SafeKey in Request, not Response. git-annex does not construct a Response, so that would not add any safety. And presumably, if git-annex avoids feeding any such keys to an external special remote, it will never have a reason to make a Response using such a key. If it did, it would result in a protocol error anyway. There's still a Serializeable instance for Key; it's used by P2P.Protocol. There, the Key is always in the final position, so it's ok if it contains spaces. Note that the protocol documentation has been fixed to say that the File may contain spaces. One way that can happen, even though the Key can't, is when using direct mode, and the work tree filename contains spaces. When sending such a file to the external special remote the worktree filename is used. This commit was sponsored by Thom May on Patreon.
* commentGravatar Joey Hess2017-08-17
|
* Merge branch 'master' of ssh://git-annex.branchable.comGravatar Joey Hess2017-08-17
|\
| * Added a commentGravatar https://launchpad.net/~felixonmars2017-08-17
| |
* | migrate: WORM keys containing spaces will be migrated to not contain spaces ↵Gravatar Joey Hess2017-08-17
| | | | | | | | | | | | | | | | | | anymore To work around the problem that the external special remote protocol does not support keys containing spaces. This commit was sponsored by Denis Dzyubenko on Patreon.
* | Prevent spaces from being embedded in the name of new WORM keys, as that ↵Gravatar Joey Hess2017-08-17
|/ | | | handing spaces in keys would complicate things like the external special remote protocol.
* planGravatar Joey Hess2017-08-17
|
* use DynamicConfig to handle cost-commandGravatar Joey Hess2017-08-17
| | | | This commit was sponsored by Jake Vosloo on Patreon.
* Merge branch 'master' of ssh://git-annex.branchable.comGravatar Joey Hess2017-08-17
|\
* | temporarily --force-reinstallsGravatar Joey Hess2017-08-17
| |
* | add annex-ignore-command and annex-sync-command configsGravatar Joey Hess2017-08-17
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Added remote configuration settings annex-ignore-command and annex-sync-command, which are dynamic equivilants of the annex-ignore and annex-sync configurations. For this I needed a new DynamicConfig infrastructure. Its implementation should be as fast as before when there is no dynamic config, and it caches so shell commands are only run once. Note that annex-ignore-command exits nonzero when the remote should be ignored. While that may seem backwards, it allows using the same command for it as for annex-sync-command when you want to disable both. This commit was sponsored by Trenton Cronholm on Patreon.
| * Added a commentGravatar michalrus2017-08-17
| |
| * Added a comment: ThanksGravatar pitsa@5f5d24a1fb7ba0d050ae7cf95b4c3032002e8e382017-08-17
|/
* commentGravatar Joey Hess2017-08-17
|
* commentGravatar Joey Hess2017-08-17
|
* commentGravatar Joey Hess2017-08-17
|
* responseGravatar Joey Hess2017-08-17
|
* closeGravatar Joey Hess2017-08-17
|
* Merge branch 'master' of ssh://git-annex.branchable.comGravatar Joey Hess2017-08-17
|\
* | fix build with old http-client versionsGravatar Joey Hess2017-08-17
| |
* | force update of cabal libsGravatar Joey Hess2017-08-17
| |
| * Added a commentGravatar CandyAngel2017-08-17
| |
| * Added a comment: manual mode?Gravatar olaf2017-08-17
|/
* make import work with Win32 instead of Win32-extrasGravatar Joey Hess2017-08-16
|
* Merge branch 'master' of ssh://git-annex.branchable.comGravatar Joey Hess2017-08-16
|\
* | Windows: Win32 package has subsumed Win32-extras; update dependency.Gravatar Joey Hess2017-08-16
| |
| * Added a commentGravatar https://openid.stackexchange.com/user/8a69a637-97cb-41e6-8f45-00f08ba54d6e2017-08-16
| |
| * Added a commentGravatar https://openid.stackexchange.com/user/8a69a637-97cb-41e6-8f45-00f08ba54d6e2017-08-16
| |
| * Added a commentGravatar https://openid.stackexchange.com/user/8a69a637-97cb-41e6-8f45-00f08ba54d6e2017-08-16
| |
| * (no commit message)Gravatar https://openid.stackexchange.com/user/8a69a637-97cb-41e6-8f45-00f08ba54d6e2017-08-16
|/
* Added a commentGravatar woffs2017-08-16
|
* Added a commentGravatar michalrus2017-08-16
|
* Added a commentGravatar michalrus2017-08-16
|
* Added a commentGravatar michalrus2017-08-16
|
* (no commit message)Gravatar michalrus2017-08-16
|
* Added a commentGravatar olaf2017-08-16
|
* (no commit message)Gravatar olaf2017-08-15
|
* Added a commentGravatar olaf2017-08-15
|
* ideaGravatar Joey Hess2017-08-15
|
* hmmGravatar Joey Hess2017-08-15
|
* responses, bug I noticedGravatar Joey Hess2017-08-15
|