Skip to content
Snippets Groups Projects
  1. May 30, 2023
  2. May 27, 2023
  3. May 26, 2023
  4. May 25, 2023
  5. May 24, 2023
    • Rob Swindell's avatar
      Moar new stuff · aac1f350
      Rob Swindell authored
      aac1f350
    • Rob Swindell's avatar
      Resolve failure to touch files when non-owner on *nix · 91b005e5
      Rob Swindell authored
      ftouch(), semfile_signal(), and JS file_utime() would fail to update a file's access/mod times with errno=EPERM if not run as the file's owner. From "man utime":
      
      EPERM times is not NULL, the caller's effective UID does not match the owner of the file, and the caller is not privileged (Linux: does not have the CAP_FOWNER capability).
      
      So use a NULL times parameter value when updating to a file's time stamp(s) to the current time.
      91b005e5
    • Rob Swindell's avatar
      Comment header block update (only) · f52b97f7
      Rob Swindell authored
      f52b97f7
    • Deucе's avatar
      A few scaling fixes for X11 mode... · 3833c243
      Deucе authored
      - getscaling() incorrectly used an int intermediate variable
        This would force scaling to an integer value when read.
      - Only parse ConfigureNotify events describing a change to the SyncTERM window
        It appears that XWayland on ChromeOS was occasionally sending a
        ConfigureNotify event describing some other window to SyncTERM,
        and that window had a 1x1 size, which would cause SyncTERM to
        assert minimum size again (usually 640x480), which would set
        scaling to 1.0.
      3833c243
    • Rob Swindell's avatar
      Increase maximum path and command-line lengths from 63 to 100 characters · a3467d87
      Rob Swindell authored
      One of the benefits of the new .ini format config files. :-)
      
      This increase introduced a few potential buffer overrun warnings (all writes
      to smb_t.file ?)
      a3467d87
    • Rob Swindell's avatar
      Second part of the bounds-checking of opt[] writes (prevent heap corruption) · 31780be9
      Rob Swindell authored
      ... using snprintf() instead of sprintf()
      31780be9
    • Rob Swindell's avatar
      Prevent heap corruption by bounds-checking writes to opt[] · 3fb95759
      Rob Swindell authored
      Since we are now free()ing the opt[] items in bail(), I've seen heap
      corruption core dumps after navigating the SCFG menus with some long
      configuration items (e.g. timed events with max-length command-lines).
      This heap corruption has been present for a long, long time, but not
      detected since we weren't free()ing these heap-allocated items.
      Increasing MAX_OPLN would have been a mitigation for this issue, but
      using snprintf(opt[n],MAX_OPLN,...) is the better fix.
      3fb95759
    • Rob Swindell's avatar
      Add options: -utf8, -strip, -user=<name> · 51df8563
      Rob Swindell authored
      The -strip option requires the (new to v3.20) strip_ctrl_a() method
      
      Previously, when using the -all or -lib options, all directories would be
      included in the filelist, but with the -user option, a valid user (e.g.
      -user=guest, or -user=sysop) can be specfied to limit the scope of the list
      to only directories accessible to the specified user (and downloads allowed
      to the user as well).
      
      The -utf8 option encodes all output in UTF-8 (instead of CP437) while the
      -strip option strips any Ctrl-A (attribute) sequences from the output.
      51df8563
Loading