Many hyperlinks are disabled.
Use anonymous login
to enable hyperlinks.
Overview
| Comment: | Fix compiler warnings seen with MSVC. Add comments. |
|---|---|
| Downloads: | Tarball | ZIP archive |
| Timelines: | family | ancestors | descendants | both | trunk |
| Files: | files | file ages | folders |
| SHA1: |
52e3d9d845d1d1ad22f72ece0cf3939d |
| User & Date: | mistachkin 2015-11-24 23:41:03.844 |
Context
|
2015-11-29
| ||
| 03:51 | Fix incorrect form generation for zip pages from redirected anonymous login. This only happens when the zip permission is only allowed after anonymous login is successful. ... (check-in: 167dec48fb user: andybradford tags: trunk) | |
|
2015-11-28
| ||
| 19:59 | Include the filename in the form action when redirected from login required to avoid needing to use Content-Disposition header to hint the client what the filename is. ... (Closed-Leaf check-in: 5f32bf719d user: andybradford tags: pending-review) | |
|
2015-11-24
| ||
| 23:41 | Fix compiler warnings seen with MSVC. Add comments. ... (check-in: 52e3d9d845 user: mistachkin tags: trunk) | |
| 23:38 | Prevent the test command 'test-th-hook' from segfaulting when TH1 hooks are disabled. Also, add and enhance comments. ... (check-in: ddd4cb5254 user: mistachkin tags: trunk) | |
Changes
Changes to src/info.c.
| ︙ | ︙ | |||
2900 2901 2902 2903 2904 2905 2906 |
if( zNewUser && zNewUser[0] && fossil_strcmp(zUser,zNewUser)!=0 ){
add_user(zNewUser);
}
if( pzNewTags!=0 ){
for(i=0; i<nTags; i++){
if( pzNewTags[i] && pzNewTags[i][0] ) add_tag(pzNewTags[i]);
}
| | | | 2900 2901 2902 2903 2904 2905 2906 2907 2908 2909 2910 2911 2912 2913 2914 2915 2916 2917 2918 2919 2920 2921 |
if( zNewUser && zNewUser[0] && fossil_strcmp(zUser,zNewUser)!=0 ){
add_user(zNewUser);
}
if( pzNewTags!=0 ){
for(i=0; i<nTags; i++){
if( pzNewTags[i] && pzNewTags[i][0] ) add_tag(pzNewTags[i]);
}
fossil_free((void *)pzNewTags);
}
if( pzCancelTags!=0 ){
for(i=0; i<nCancels; i++){
if( pzCancelTags[i] && pzCancelTags[i][0] )
cancel_tag(rid,pzCancelTags[i]);
}
fossil_free((void *)pzCancelTags);
}
if( fHide && !fHasHidden ) hide_branch();
if( fClose && !fHasClosed ) close_leaf(rid);
if( zNewBranch && zNewBranch[0] ) change_branch(rid,zNewBranch);
apply_newtags(&ctrl, rid, zUuid);
show_common_info(rid, "uuid:", 1, 0);
}
|
Changes to src/main.c.
| ︙ | ︙ | |||
901 902 903 904 905 906 907 |
while( (zOption = find_option(zLong, zShort, 1))!=0 ){
if( pzArgs==0 && nAllocArgs==0 ){
nAllocArgs = 1;
pzArgs = fossil_malloc( nAllocArgs*sizeof(pzArgs[0]) );
}else if( nAllocArgs<=nUsedArgs ){
nAllocArgs = nAllocArgs*2;
| | | 901 902 903 904 905 906 907 908 909 910 911 912 913 914 915 |
while( (zOption = find_option(zLong, zShort, 1))!=0 ){
if( pzArgs==0 && nAllocArgs==0 ){
nAllocArgs = 1;
pzArgs = fossil_malloc( nAllocArgs*sizeof(pzArgs[0]) );
}else if( nAllocArgs<=nUsedArgs ){
nAllocArgs = nAllocArgs*2;
pzArgs = fossil_realloc( (void *)pzArgs, nAllocArgs*sizeof(pzArgs[0]) );
}
pzArgs[nUsedArgs++] = zOption;
}
*pnUsedArgs = nUsedArgs;
return pzArgs;
}
|
| ︙ | ︙ | |||
2284 2285 2286 2287 2288 2289 2290 2291 2292 2293 2294 2295 2296 2297 2298 2299 |
g.fSshClient & CGI_SSH_COMPAT );
}
/*
** Note that the following command is used by ssh:// processing.
**
** COMMAND: test-http
** Works like the http command but gives setup permission to all users.
**
*/
void cmd_test_http(void){
const char *zIpAddr; /* IP address of remote client */
Th_InitTraceLog();
login_set_capabilities("sx", 0);
g.useLocalauth = 1;
| > > > > | 2284 2285 2286 2287 2288 2289 2290 2291 2292 2293 2294 2295 2296 2297 2298 2299 2300 2301 2302 2303 |
g.fSshClient & CGI_SSH_COMPAT );
}
/*
** Note that the following command is used by ssh:// processing.
**
** COMMAND: test-http
**
** Works like the http command but gives setup permission to all users.
**
** Options:
** --th-trace trace TH1 execution (for debugging purposes)
**
*/
void cmd_test_http(void){
const char *zIpAddr; /* IP address of remote client */
Th_InitTraceLog();
login_set_capabilities("sx", 0);
g.useLocalauth = 1;
|
| ︙ | ︙ |