Skip to content
Snippets Groups Projects
  1. Feb 28, 2010
  2. Feb 14, 2010
  3. Feb 08, 2010
  4. Jan 20, 2010
  5. Jan 17, 2010
  6. Jan 13, 2010
  7. Dec 25, 2009
  8. Dec 24, 2009
  9. Dec 02, 2009
  10. Nov 24, 2009
  11. Oct 16, 2009
    • furun's avatar
      Whitespace cleanup FS#1709 · 47583ff0
      furun authored
      Ignore-this: 27ea52110bce929b2c61ed8faba67cfc
      
      darcs-hash:20091016205526-c0bf4-35eba4e65d37980a667ba982f7f1ea5b7b07f01c.gz
      47583ff0
  12. Oct 04, 2009
  13. May 26, 2009
    • Andreas Gohr's avatar
      increased message id · a3a8a029
      Andreas Gohr authored
      Ignore-this: 9b004a1bec25263f57e5de96b65cd545
      
      darcs-hash:20090526145512-7ad00-5700760363b6f029bbf6269937a83d6445a9175a.gz
      a3a8a029
    • Andreas Gohr's avatar
      extended interwiki links FS#1612 · 129a62b8
      Andreas Gohr authored
      Ignore-this: 944df9f3682bb7ac8a2d7d4c94455ba
      
      darcs-hash:20090526090130-7ad00-1e38d784623ddf4449e067e9d18ed248e1b4d29b.gz
      129a62b8
  14. May 25, 2009
  15. May 16, 2009
    • Andreas Gohr's avatar
      restrict XMLRPC to configurable groups and users · 3ee5b583
      Andreas Gohr authored
      Ignore-this: 1370cee84d44bb35ae7c0c988ed8f1ff
      
      This patch adds a config option to define users or groups that may access
      the XMLRPC API. ACLs are still checked on top of this intial access control.
      
      darcs-hash:20090516114351-7ad00-155fb6c74c29f5f84e79544a534369eec0403ff0.gz
      3ee5b583
  16. May 04, 2009
  17. Feb 14, 2009
    • Andreas Gohr's avatar
      release preparations · b4353e51
      Andreas Gohr authored
      Ignore-this: 93da548cc8b7ac9371d391b9a78005a8
      
      darcs-hash:20090214120815-7ad00-a1245eb095dccb16a69c8928e22b6ae04cd80a5f.gz
      b4353e51
  18. Feb 06, 2009
  19. Jan 30, 2009
  20. Jan 26, 2009
  21. Jan 16, 2009
  22. Dec 02, 2008
    • Andreas Gohr's avatar
      Make content-disposition configurable in mime.conf FS#1541 · ecebf3a8
      Andreas Gohr authored
      With this patch it is possible to define if a file should be served as download
      or be displayed inside the browser (if supported) by configuring it in
      conf/mime.conf
      
      Mimetypes that should be served with a "Content-Disposition: attachment" header
      need to be prefixed with a exclamation mark. All others will be served inline.
      
      This will also fix a Problem with Flash 10.
      
      darcs-hash:20081202210322-7ad00-6e7ef30aff9322cd135311be77809187da121f3b.gz
      ecebf3a8
  23. Oct 12, 2008
  24. Oct 11, 2008
    • Michael Klier's avatar
      fix for FS#1305 · a7b96b2a
      Michael Klier authored
      darcs-hash:20081011190300-23886-3d5d5e2d1774a802ce9da841812a8838b2945d86.gz
      a7b96b2a
  25. Oct 10, 2008
    • Andreas Gohr's avatar
      removed xref interwiki link · 3adb3450
      Andreas Gohr authored
      We now handle this through our own plugin
      
      darcs-hash:20081010200648-7ad00-f7c94c2d4e7f099c5a9d7e5381423c67e306d73a.gz
      3adb3450
  26. Oct 01, 2008
    • Andy Webber's avatar
      editor_info_patch · dc58b6f4
      Andy Webber authored
      At present, DW shows the username on the bottom left under "logged in as", and the login name for "last modified", "locked by" and under
      revisions/recent changes. In a corporate environment, particularly when integrated with a Single Sign-On system, the login name may be somewhat
      unfriendly. This patch makes the "logged in as" the same as the value used elsewhere and also allows an admin to decide whether it should be the
      login name, username or e-mail address that is displayed. The e-mail address may also, optionally, be a mailto: link. E-mail addresses are
      obfuscated according to the 'mailguard' setting. The default behaviour is to show the login name which is no change from previous behaviour for the
      "last modified"/"locked by"/revisions/"recent changes", but is a change for the "logged in as".
      
      darcs-hash:20081001152914-6ad63-9cd7174068ac55de381f1318a4401f8c51de5b0c.gz
      dc58b6f4
  27. Sep 12, 2008
    • Andreas Gohr's avatar
      more cookie security FS#1490 · f5c6743c
      Andreas Gohr authored
      This patch adds the httponly option to the PHP session cookies and DokuWiki's
      auth cookie when supported by the PHP version.
      
      It also adds a new config option 'securecookie' which is enabled by default.
      It makes sure the browser will not sent a cookie set via HTTPS over a
      non-secured connection. This option has to be disabled for wikis that only
      protect the login with SSL but not the whole wiki.
      
      darcs-hash:20080912224922-7ad00-d5275147ba9d17a9f6defa8a51ca720da74ba8a0.gz
      f5c6743c
  28. Aug 15, 2008
  29. Aug 10, 2008
  30. Jul 27, 2008
  31. May 05, 2008
  32. May 04, 2008
  33. Apr 11, 2008
Loading