##// END OF EJS Templates
subrepo: add tests for svn rogue ssh urls (SEC)...
subrepo: add tests for svn rogue ssh urls (SEC) 'ssh://' has an exploit that will pass the url blindly to the ssh command, allowing a malicious person to have a subrepo with '-oProxyCommand' which could run arbitrary code on a user's machine. In addition, at least on Windows, a pipe '|' is able to execute arbitrary commands. When this happens, let's throw a big abort into the user's face so that they can inspect what's going on.

File last commit:

r18526:9409aeaa stable
r33730:60ee7af2 stable
Show More
filelog.tmpl
8 lines | 265 B | application/x-cheetah | CheetahLexer
{header}
<id>{urlbase}{url|urlescape}atom-log/tip/{file|escape}</id>
<link rel="self" href="{urlbase}{url|urlescape}atom-log/tip/{file|urlescape}"/>
<title>{repo|escape}: {file|escape} history</title>
{latestentry%feedupdated}
{entries%changelogentry}
</feed>