From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (qmail 27986 invoked by alias); 13 Oct 2014 12:54:44 -0000 Mailing-List: contact overseers-help@sourceware.org; run by ezmlm Precedence: bulk List-Id: List-Archive: List-Post: List-Help: , Sender: overseers-owner@sourceware.org Received: (qmail 27977 invoked by uid 89); 13 Oct 2014 12:54:43 -0000 Authentication-Results: sourceware.org; auth=none X-Virus-Found: No X-Spam-SWARE-Status: No, score=-1.7 required=5.0 tests=AWL,BAYES_00 autolearn=ham version=3.3.2 X-HELO: calimero.vinschen.de Received: from aquarius.hirmke.de (HELO calimero.vinschen.de) (217.91.18.234) by sourceware.org (qpsmtpd/0.93/v0.84-503-g423c35a) with ESMTP; Mon, 13 Oct 2014 12:54:42 +0000 Received: by calimero.vinschen.de (Postfix, from userid 500) id DC3778E1516; Mon, 13 Oct 2014 14:54:39 +0200 (CEST) Date: Mon, 13 Oct 2014 12:54:00 -0000 From: Corinna Vinschen To: overseers@sourceware.org Subject: Re: src/winsup/cygwin common.din syscalls.cc inclu ... Message-ID: <20141013125439.GA29824@calimero.vinschen.de> Mail-Followup-To: overseers@sourceware.org References: <20141008210341.20952.qmail@sourceware.org> <5435B42C.8080303@redhat.com> <20141009100924.GB24525@elastic.org> <20141009115017.GA20741@calimero.vinschen.de> MIME-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha1; protocol="application/pgp-signature"; boundary="J/dobhs11T7y2rNN" Content-Disposition: inline In-Reply-To: <20141009115017.GA20741@calimero.vinschen.de> User-Agent: Mutt/1.5.23 (2014-03-12) X-SW-Source: 2014-q4/txt/msg00017.txt.bz2 --J/dobhs11T7y2rNN Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: quoted-printable Content-length: 1120 On Oct 9 13:50, Corinna Vinschen wrote: > Hi, >=20 > On Oct 9 06:09, Frank Ch. Eigler wrote: > > Hi - > >=20 > > > It looks like things recently changed on sourceware so that the links= in > > > these emails no longer work. > > > [...] > > > > Patches: > > > > http://sourceware.org/cgi-bin/cvsweb.cgi/src/winsup/cygwin/common.d= in.diff?cvsroot=3Dsrc&r1=3D1.9&r2=3D1.10 > >=20 > > Sorry about that; a while ago when a yet another security > > vulnerability in cvsweb.cgi came by, it seemed harmless to switch it > > out for (redirect to) the other cvs-viewer platform already installed > > on sourceware. I did not know about this usage, so the redirection > > part wasn't sophisticated enough. > >=20 > > I'll tweak the forwarding regex widget to make those URLs work, if > > possible. >=20 > Seems to work fine now, thanks! >=20 > > It'd be nice to change the cvs hooks (?) to generate direct > > viewvc URLs too sometime. >=20 > How can we do that? Where is this configured? Is that something we can do at all without overseers intervention? Thanks, Corinna --=20 Corinna Vinschen Cygwin Maintainer Red Hat --J/dobhs11T7y2rNN Content-Type: application/pgp-signature Content-length: 819 -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAEBAgAGBQJUO8uPAAoJEPU2Bp2uRE+gy1QP/R9J7e2zoHj2X9YQbuuw9V1E OWYduPhrUiwujA/9nUb8jdipa69bppsBcdFlJSGlp/xY0gBLwzchC7IYX+6eQNJU mT9dxdZBZTt2cR1p1SBS8jhmrUp6mw3T/sus1h560Cr/cfyHAO7ATgZA4jWSQmY9 uXVm8bEp8vXo52JSEGVIFTzrQlajf0qWljNCvc+PuFG2/Ybv3O10nkIZJU68K2AA GflX7GLkJNITRaK14oiJ2u8rCi2t9FtYfuvjztKZRVQHd6jjqNurd6uq13JhVNUs T3FAGi9lFeAXROlpGS/+guZXtmgcMRje330F2rBi8ZYwCB3IXroj/TEQggdQtOW/ mraPnQgEZ4L1SLgSvjgXGiSE/3uatRFsKiYuajXOZNrbROWsxX+IF1TSq6BTuOc1 UjxDuPEK352WJ/v1GsBUDqrxa1oYMnz5VeNHLUfnnIHwcNunyJ5L8DCSYpOU2nBf grzyAlPjqHxdLRGjt0+eUJaVvuemEUgvfOJ8nbyJg2h7vLg5p71WnoO56ESpEEP3 NrKRy9MbFqzp4v/qWlkSAj82R2eMKL+yzAz9hWCrm/MKz6EHeAX1deh/WTr62nM3 7y6ccIn1kVztGT6Yk/JMS7gf0DekifBqo2MkEY8U7Lp+nGFUNFVvhIwEe2yBOUOz IjKnKtsEJUWdTWpt4XFf =Rv85 -----END PGP SIGNATURE----- --J/dobhs11T7y2rNN--