Page MenuHomePhabricator
Feed Advanced Search

Mar 17 2021

epriestley moved T9590: Subversion directory anchoring rules are unclear and underpowered from Backlog to Subversion on the Differential board.
Mar 17 2021, 7:03 PM · Differential, Subversion
epriestley moved T4305: File state not saved in revision when parsing form svn repo from Backlog to Subversion on the Differential board.
Mar 17 2021, 7:01 PM · Subversion, Differential
epriestley moved T4678: Support changelist-based SVN workflows in Arcanist and Differential from Backlog to Subversion on the Differential board.
Mar 17 2021, 6:55 PM · Differential, Arcanist, Subversion
epriestley moved T4698: Support for SVN patches, created by PhpStorm from Backlog to Subversion on the Differential board.
Mar 17 2021, 6:55 PM · Subversion, Differential
epriestley moved T5999: `arc diff` not uploading file content for svn:executable files under SVN 1.7.4 from Backlog to Subversion on the Differential board.
Mar 17 2021, 6:54 PM · Arcanist, Differential, Subversion
epriestley moved T386: Differential display of revisions with "svn cp x@12345 x" is inaccurate from Backlog to Subversion on the Differential board.
Mar 17 2021, 6:54 PM · Subversion, Differential

May 22 2020

sshannin added a comment to T7469: Handle folder copies/moves more gracefully.

(there's usually no value in reviewing individual file-level changes in a "create a new branch X" commit)

Completely agree that there's no value in reviewing those individually. But to be clear, my point in making this ticket was mostly that you can't discern from the browser that this was a "create a new branch" commit. Right now it just renders the whole file tree saying showing 3000 files individually copied instead of a simpler/single line saying the whole directory was copied.

May 22 2020, 6:10 PM · Diffusion, Subversion

Apr 22 2020

epriestley closed T7469: Handle folder copies/moves more gracefully as Wontfix.

I'm not aware of any current customer interest in improving this behavior, and it's likely a lot of work to improve what is largely a moot case (there's usually no value in reviewing individual file-level changes in a "create a new branch X" commit) that only affects Subversion.

Apr 22 2020, 6:19 PM · Diffusion, Subversion

May 23 2019

asherkin closed T13293: `arc land` using git-svn fails in certain configurations as Resolved by committing rARC7329bc7c32b9: Fix arc land on odd/modern git-svn checkouts.
May 23 2019, 9:58 AM · Subversion, Git, Arcanist

May 22 2019

epriestley triaged T13293: `arc land` using git-svn fails in certain configurations as Low priority.
May 22 2019, 4:30 PM · Subversion, Git, Arcanist
epriestley added projects to T13293: `arc land` using git-svn fails in certain configurations: Arcanist, Git, Subversion.
May 22 2019, 4:30 PM · Subversion, Git, Arcanist

Apr 15 2019

epriestley moved T6537: The "Skip Past This Commit" results in exception (diffusion svn blame view) from Backlog to Subversion on the Diffusion board.
Apr 15 2019, 3:38 PM · Subversion, Diffusion

Oct 2 2018

epriestley lowered the priority of T2465: Context not available for revisions created on Windows from High to Low.
Oct 2 2018, 1:05 PM · Windows, Subversion, Arcanist
epriestley moved T2465: Context not available for revisions created on Windows from Backlog to Diff on the Windows board.
Oct 2 2018, 1:00 PM · Windows, Subversion, Arcanist

Sep 24 2018

epriestley moved T4682: With SVN 1.7, certain property changes won't show properly in Differential from Backlog to Diff Parsing on the Arcanist board.
Sep 24 2018, 3:54 PM · Subversion, Arcanist
epriestley moved T1947: Merged files in SVN don't pull content correctly when diffed from Backlog to Diff Parsing on the Arcanist board.
Sep 24 2018, 3:52 PM · Arcanist, Subversion

May 17 2018

epriestley closed T13140: Phabricator fails to parse unusual protocol requests emitted by Subversion as Resolved by committing rP3544620209cf: Parse unusual Subversion protocol frames which contain extra whitespace.
May 17 2018, 12:12 AM · Subversion

May 15 2018

epriestley added a revision to T13140: Phabricator fails to parse unusual protocol requests emitted by Subversion: D19451: Parse unusual Subversion protocol frames which contain extra whitespace.
May 15 2018, 10:58 PM · Subversion
epriestley triaged T13140: Phabricator fails to parse unusual protocol requests emitted by Subversion as Normal priority.
May 15 2018, 10:24 PM · Subversion

Feb 10 2018

epriestley added a parent task for T4698: Support for SVN patches, created by PhpStorm: T12664: Update diff/patch parsing to extract more metadata and parse a wider range of formats.
Feb 10 2018, 7:43 PM · Subversion, Differential

Aug 14 2017

epriestley closed T12961: [CVE-2017-1000117, et al] Git, Mercurial and Subversion could all execute arbitrary commands when interacting with malicious SSH URIs (`ssh://-...`) as Resolved.

There doesn't seem to be anything actionable remaining on our end.

Aug 14 2017, 8:07 PM · Subversion, Mercurial, Git, Security

Aug 11 2017

epriestley added a comment to T12961: [CVE-2017-1000117, et al] Git, Mercurial and Subversion could all execute arbitrary commands when interacting with malicious SSH URIs (`ssh://-...`).

This cropped up in the HN thread -- works in my browsers (although Phabricator does not recognize it as a valid link):

Aug 11 2017, 8:07 PM · Subversion, Mercurial, Git, Security
avivey added a comment to T12961: [CVE-2017-1000117, et al] Git, Mercurial and Subversion could all execute arbitrary commands when interacting with malicious SSH URIs (`ssh://-...`).

Thanks for the writeup :)

Aug 11 2017, 7:04 PM · Subversion, Mercurial, Git, Security
indygreg added a comment to T12961: [CVE-2017-1000117, et al] Git, Mercurial and Subversion could all execute arbitrary commands when interacting with malicious SSH URIs (`ssh://-...`).

The reason the upstream projects aren't using -- is that it isn't portable. For example, Putty's ssh doesn't support it.

Aug 11 2017, 3:45 PM · Subversion, Mercurial, Git, Security
epriestley updated the task description for T12961: [CVE-2017-1000117, et al] Git, Mercurial and Subversion could all execute arbitrary commands when interacting with malicious SSH URIs (`ssh://-...`).
Aug 11 2017, 1:41 PM · Subversion, Mercurial, Git, Security
epriestley added a comment to T12961: [CVE-2017-1000117, et al] Git, Mercurial and Subversion could all execute arbitrary commands when interacting with malicious SSH URIs (`ssh://-...`).

The full set of mitigations is now available in stable, and I've promoted 2017 Week 32 (Mid August).

Aug 11 2017, 1:36 PM · Subversion, Mercurial, Git, Security
epriestley renamed T12961: [CVE-2017-1000117, et al] Git, Mercurial and Subversion could all execute arbitrary commands when interacting with malicious SSH URIs (`ssh://-...`) from Assess Impact of CVE-2017-1000117 et al (`ssh://-...` executing code) to [CVE-2017-1000117, et al] Git, Mercurial and Subversion could all execute arbitrary commands when interacting with malicious SSH URIs (`ssh://-...`).
Aug 11 2017, 1:31 PM · Subversion, Mercurial, Git, Security
epriestley added a comment to T12961: [CVE-2017-1000117, et al] Git, Mercurial and Subversion could all execute arbitrary commands when interacting with malicious SSH URIs (`ssh://-...`).

See also this enormously valuable contribution I made to the Git LFS upstream in connection with T7789 some time ago:

Aug 11 2017, 1:19 PM · Subversion, Mercurial, Git, Security
epriestley updated the task description for T12961: [CVE-2017-1000117, et al] Git, Mercurial and Subversion could all execute arbitrary commands when interacting with malicious SSH URIs (`ssh://-...`).
Aug 11 2017, 1:14 PM · Subversion, Mercurial, Git, Security
epriestley added a comment to T12961: [CVE-2017-1000117, et al] Git, Mercurial and Subversion could all execute arbitrary commands when interacting with malicious SSH URIs (`ssh://-...`).

So, all three major VCS had the exact same CVE, which was "we invoke ssh command line, don't sanitize input, and don't specify -- anywhere"?

Aug 11 2017, 12:50 PM · Subversion, Mercurial, Git, Security
quark.zju added a comment to T12961: [CVE-2017-1000117, et al] Git, Mercurial and Subversion could all execute arbitrary commands when interacting with malicious SSH URIs (`ssh://-...`).

Thanks for the detailed explanations! I should have thought more carefully. Note old Mercurial also fails to do correct shell quoting on Windows (It uses ' where Windows needs "). But Phabricator does not run on Windows, it shouldn't be an issue.

Aug 11 2017, 3:22 AM · Subversion, Mercurial, Git, Security
avivey added a comment to T12961: [CVE-2017-1000117, et al] Git, Mercurial and Subversion could all execute arbitrary commands when interacting with malicious SSH URIs (`ssh://-...`).

So, all three major VCS had the exact same CVE, which was "we invoke ssh command line, don't sanitize input, and don't specify -- anywhere"?

Aug 11 2017, 2:53 AM · Subversion, Mercurial, Git, Security
epriestley added a comment to T12961: [CVE-2017-1000117, et al] Git, Mercurial and Subversion could all execute arbitrary commands when interacting with malicious SSH URIs (`ssh://-...`).

@indygreg Thanks for the heads up about subrepos -- I would not have otherwise guessed that hg pull might run git.

Aug 11 2017, 2:40 AM · Subversion, Mercurial, Git, Security
epriestley updated the task description for T12961: [CVE-2017-1000117, et al] Git, Mercurial and Subversion could all execute arbitrary commands when interacting with malicious SSH URIs (`ssh://-...`).
Aug 11 2017, 2:24 AM · Subversion, Mercurial, Git, Security
epriestley added a comment to T12961: [CVE-2017-1000117, et al] Git, Mercurial and Subversion could all execute arbitrary commands when interacting with malicious SSH URIs (`ssh://-...`).

From this writeup:

Aug 11 2017, 2:21 AM · Subversion, Mercurial, Git, Security
epriestley added a comment to T12961: [CVE-2017-1000117, et al] Git, Mercurial and Subversion could all execute arbitrary commands when interacting with malicious SSH URIs (`ssh://-...`).

The magic incantation I arrived at was slightly modified from one of the hg test cases:

Aug 11 2017, 2:14 AM · Subversion, Mercurial, Git, Security
epriestley added a comment to T12961: [CVE-2017-1000117, et al] Git, Mercurial and Subversion could all execute arbitrary commands when interacting with malicious SSH URIs (`ssh://-...`).

Never mind, I was able to get hg pull -u to interact. I'm going to land, cherry-pick, and hotfix D18390.

Aug 11 2017, 2:12 AM · Subversion, Mercurial, Git, Security
cspeckmim added a comment to T12961: [CVE-2017-1000117, et al] Git, Mercurial and Subversion could all execute arbitrary commands when interacting with malicious SSH URIs (`ssh://-...`).

I think this is related:
https://www.mercurial-scm.org/wiki/Subrepository#Synchronizing_in_subrepositories

Aug 11 2017, 2:10 AM · Subversion, Mercurial, Git, Security
epriestley added a comment to T12961: [CVE-2017-1000117, et al] Git, Mercurial and Subversion could all execute arbitrary commands when interacting with malicious SSH URIs (`ssh://-...`).

And here's an extension which appears to be aimed at solving this problem, by adding a new command to execute hg pull -u in subrepositories:

Aug 11 2017, 2:04 AM · Subversion, Mercurial, Git, Security
epriestley added a comment to T12961: [CVE-2017-1000117, et al] Git, Mercurial and Subversion could all execute arbitrary commands when interacting with malicious SSH URIs (`ssh://-...`).

Also, although ui.ssh appears inneffective against the [git] and [svn] variants of subrepos (Mercurial does not appear to populate GIT_SSH or SVN_SSH based on the ui.ssh setting), I can't get hg to actually interact with remotes using hg clone --noupdate ... or hg pull -u -- <uri>, which are the only relevant commands we run. I can get it to interact with remotes with hg up or hg clone (without --noupdate).

Aug 11 2017, 1:56 AM · Subversion, Mercurial, Git, Security
epriestley added a comment to T12961: [CVE-2017-1000117, et al] Git, Mercurial and Subversion could all execute arbitrary commands when interacting with malicious SSH URIs (`ssh://-...`).

In the example above, I put malicious content in .hgsub, like this:

Aug 11 2017, 1:32 AM · Subversion, Mercurial, Git, Security
quark.zju added a comment to T12961: [CVE-2017-1000117, et al] Git, Mercurial and Subversion could all execute arbitrary commands when interacting with malicious SSH URIs (`ssh://-...`).

The subrepo issue is when .hgsub has malicious content (ex. foo = ssh://-oProxyCommand=touch%20BAR/). It's not related to command line or config files.

Aug 11 2017, 1:25 AM · Subversion, Mercurial, Git, Security
epriestley added a comment to T12961: [CVE-2017-1000117, et al] Git, Mercurial and Subversion could all execute arbitrary commands when interacting with malicious SSH URIs (`ssh://-...`).

I'm going to cherry-pick rP794e185bf90e (the SSH wrapper stuff) to stable and hotfix production, although I'm not entirely certain hg pull -u -- <uri> is vulnerable.

Aug 11 2017, 12:54 AM · Subversion, Mercurial, Git, Security
epriestley added a revision to T12961: [CVE-2017-1000117, et al] Git, Mercurial and Subversion could all execute arbitrary commands when interacting with malicious SSH URIs (`ssh://-...`): D18390: Stop populating or updating working copies in observed Mercurial repositories.
Aug 11 2017, 12:49 AM · Subversion, Mercurial, Git, Security
epriestley added a revision to T12961: [CVE-2017-1000117, et al] Git, Mercurial and Subversion could all execute arbitrary commands when interacting with malicious SSH URIs (`ssh://-...`): D18389: Pass SSH wrappers to VCS commands unconditonally, not just if there's an SSH remote.
Aug 11 2017, 12:16 AM · Subversion, Mercurial, Git, Security
epriestley added a comment to T12961: [CVE-2017-1000117, et al] Git, Mercurial and Subversion could all execute arbitrary commands when interacting with malicious SSH URIs (`ssh://-...`).

I also can't get hg pull -u -- <uri> to fetch subrepos, am I just not setting things up correctly? In my current working state, hg up tries to interact with the subrepo remote but hg pull -u -- <uri> (which is what we actually execute) does not.

Aug 11 2017, 12:14 AM · Subversion, Mercurial, Git, Security
epriestley added a comment to T12961: [CVE-2017-1000117, et al] Git, Mercurial and Subversion could all execute arbitrary commands when interacting with malicious SSH URIs (`ssh://-...`).

See also T4416. Removing -u hasn't been a priority because no actual install has expressed interest in it.

Aug 11 2017, 12:02 AM · Subversion, Mercurial, Git, Security

Aug 10 2017

indygreg added a comment to T12961: [CVE-2017-1000117, et al] Git, Mercurial and Subversion could all execute arbitrary commands when interacting with malicious SSH URIs (`ssh://-...`).

That same code I pointed to for Mercurial also seems to perform Git working copy checkouts. Although I can't recall Git's semantics for automatically updating submodules (because I don't use them). It is worth auditing.

Aug 10 2017, 11:03 PM · Subversion, Mercurial, Git, Security
indygreg added a comment to T12961: [CVE-2017-1000117, et al] Git, Mercurial and Subversion could all execute arbitrary commands when interacting with malicious SSH URIs (`ssh://-...`).

Note that Phabricator can manifest Mercurial working directories. See executeMercurialUpdate() in src/applications/repository/engine/PhabricatorRepositoryPullEngine.php. It does this when pulling non-hosted repos. I know this occurs when observing repos. Not sure where else this code is used.

Aug 10 2017, 10:59 PM · Subversion, Mercurial, Git, Security
epriestley updated the task description for T12961: [CVE-2017-1000117, et al] Git, Mercurial and Subversion could all execute arbitrary commands when interacting with malicious SSH URIs (`ssh://-...`).
Aug 10 2017, 10:48 PM · Subversion, Mercurial, Git, Security
epriestley added a comment to T12961: [CVE-2017-1000117, et al] Git, Mercurial and Subversion could all execute arbitrary commands when interacting with malicious SSH URIs (`ssh://-...`).

I'll leave this open until I write up the release notes since it deserves a mention (users are still vulnerable if an attacker tricks them into running a suspicious git clone command), but I think we're otherwise unscathed by this.

Aug 10 2017, 10:40 PM · Subversion, Mercurial, Git, Security
epriestley added a revision to T12961: [CVE-2017-1000117, et al] Git, Mercurial and Subversion could all execute arbitrary commands when interacting with malicious SSH URIs (`ssh://-...`): D18388: Increase strictness of URI parsing, rejecting URIs in the form "ssh://-flag".
Aug 10 2017, 10:23 PM · Subversion, Mercurial, Git, Security
epriestley lowered the priority of T12961: [CVE-2017-1000117, et al] Git, Mercurial and Subversion could all execute arbitrary commands when interacting with malicious SSH URIs (`ssh://-...`) from Unbreak Now! to Normal.
Aug 10 2017, 10:15 PM · Subversion, Mercurial, Git, Security
epriestley added a comment to T12961: [CVE-2017-1000117, et al] Git, Mercurial and Subversion could all execute arbitrary commands when interacting with malicious SSH URIs (`ssh://-...`).

We also used to have a separate PhutilGitURI which had looser rules, but I removed this in D16100 (June 13, 2016) and all URI parsing now goes through PhutilURI which has the stricter rules.

Aug 10 2017, 10:14 PM · Subversion, Mercurial, Git, Security
epriestley added a comment to T12961: [CVE-2017-1000117, et al] Git, Mercurial and Subversion could all execute arbitrary commands when interacting with malicious SSH URIs (`ssh://-...`).

The theoretical attack here is:

Aug 10 2017, 9:56 PM · Subversion, Mercurial, Git, Security
epriestley added a comment to T12961: [CVE-2017-1000117, et al] Git, Mercurial and Subversion could all execute arbitrary commands when interacting with malicious SSH URIs (`ssh://-...`).

These are slightly more fleshed-out versions of the attack in Mercurial:

Aug 10 2017, 9:48 PM · Subversion, Mercurial, Git, Security
chad added a comment to T12961: [CVE-2017-1000117, et al] Git, Mercurial and Subversion could all execute arbitrary commands when interacting with malicious SSH URIs (`ssh://-...`).

git, svn, and hg... wow

Aug 10 2017, 9:47 PM · Subversion, Mercurial, Git, Security
epriestley added a comment to T12961: [CVE-2017-1000117, et al] Git, Mercurial and Subversion could all execute arbitrary commands when interacting with malicious SSH URIs (`ssh://-...`).

The attack is basically:

Aug 10 2017, 9:45 PM · Subversion, Mercurial, Git, Security
epriestley raised the priority of T12961: [CVE-2017-1000117, et al] Git, Mercurial and Subversion could all execute arbitrary commands when interacting with malicious SSH URIs (`ssh://-...`) from Normal to Unbreak Now!.

oh wow

Aug 10 2017, 9:40 PM · Subversion, Mercurial, Git, Security
epriestley created T12961: [CVE-2017-1000117, et al] Git, Mercurial and Subversion could all execute arbitrary commands when interacting with malicious SSH URIs (`ssh://-...`).
Aug 10 2017, 9:38 PM · Subversion, Mercurial, Git, Security

Jul 12 2017

chad closed T12915: SVN repositories give `Unhandled Exception ("RuntimeException")` in Diffusion as Resolved by committing rP0c4cff28df73: Clean up NUX a bit on Diffusion.
Jul 12 2017, 2:05 PM · Subversion, Diffusion, Bug Report
keithzg added a comment to T12915: SVN repositories give `Unhandled Exception ("RuntimeException")` in Diffusion.

Solves things for my instances, cheers!

Jul 12 2017, 9:25 AM · Subversion, Diffusion, Bug Report
chad added a revision to T12915: SVN repositories give `Unhandled Exception ("RuntimeException")` in Diffusion: D18208: Clean up NUX a bit on Diffusion.
Jul 12 2017, 3:38 AM · Subversion, Diffusion, Bug Report
chad reopened T12915: SVN repositories give `Unhandled Exception ("RuntimeException")` in Diffusion as "Open".

Going to keep this Open and build out some proper blank states. This feel pretty janky.

Jul 12 2017, 3:00 AM · Subversion, Diffusion, Bug Report
chad added a comment to T12915: SVN repositories give `Unhandled Exception ("RuntimeException")` in Diffusion.

I pushed a hotfix up at HEAD of master, let us know if you're still having problems. Thanks for the report!

Jul 12 2017, 2:52 AM · Subversion, Diffusion, Bug Report
chad closed T12915: SVN repositories give `Unhandled Exception ("RuntimeException")` in Diffusion as Resolved by committing rPdb57da0f7472: Fix SVN form_box error.
Jul 12 2017, 2:51 AM · Subversion, Diffusion, Bug Report
chad added a revision to T12915: SVN repositories give `Unhandled Exception ("RuntimeException")` in Diffusion: D18207: Fix SVN form_box error.
Jul 12 2017, 2:50 AM · Subversion, Diffusion, Bug Report
keithzg created T12915: SVN repositories give `Unhandled Exception ("RuntimeException")` in Diffusion.
Jul 12 2017, 1:31 AM · Subversion, Diffusion, Bug Report

Jul 9 2017

chad removed the image for Subversion.
Jul 9 2017, 7:42 PM

May 2 2017

epriestley added a parent task for T9784: `arc patch`: Directory move in SVN patch workflow is implemented erroneously: T12664: Update diff/patch parsing to extract more metadata and parse a wider range of formats.
May 2 2017, 5:00 PM · Subversion, Arcanist
epriestley added a parent task for T1947: Merged files in SVN don't pull content correctly when diffed: T12664: Update diff/patch parsing to extract more metadata and parse a wider range of formats.
May 2 2017, 4:57 PM · Arcanist, Subversion
epriestley added a parent task for T2480: getRepositoryVersion() tries to call Filesystem::pathExists() on "svn+ssh://" paths: T12664: Update diff/patch parsing to extract more metadata and parse a wider range of formats.
May 2 2017, 4:56 PM · Subversion, Arcanist
epriestley added a parent task for T3981: arcanist needs to be savvier about svn externals in patch workflow: T12664: Update diff/patch parsing to extract more metadata and parse a wider range of formats.
May 2 2017, 4:55 PM · Subversion, Arcanist
epriestley added a parent task for T4682: With SVN 1.7, certain property changes won't show properly in Differential: T12664: Update diff/patch parsing to extract more metadata and parse a wider range of formats.
May 2 2017, 4:54 PM · Subversion, Arcanist
epriestley added a parent task for T6447: SVN file externals aren't properly detected: T12664: Update diff/patch parsing to extract more metadata and parse a wider range of formats.
May 2 2017, 4:53 PM · Subversion, Arcanist
epriestley added a parent task for T5999: `arc diff` not uploading file content for svn:executable files under SVN 1.7.4: T12664: Update diff/patch parsing to extract more metadata and parse a wider range of formats.
May 2 2017, 4:53 PM · Arcanist, Differential, Subversion
epriestley added a parent task for T7158: arc commit for subversion fails with untracked files where a directory has a property change: T12664: Update diff/patch parsing to extract more metadata and parse a wider range of formats.
May 2 2017, 4:50 PM · Subversion, Arcanist
epriestley added a parent task for T7581: arc diff errors out when a directory is removed between diffs: T12664: Update diff/patch parsing to extract more metadata and parse a wider range of formats.
May 2 2017, 4:50 PM · Subversion, Arcanist

May 1 2017

chad added a comment to T12660: Require Commandeering for `arc commit`.

Doesn't sound like there is anything the upstream can do here.

May 1 2017, 9:30 PM · Subversion, Arcanist, Feature Request
chad closed T12660: Require Commandeering for `arc commit` as Invalid.
May 1 2017, 9:29 PM · Subversion, Arcanist, Feature Request
sirbrillig added a comment to T12660: Require Commandeering for `arc commit`.

Hm... the way we our systems folks have it installed it's apparently not a git repository. However, I was able to look in the src directory and found those lines in workflow/ArcanistCommitWorkflow.php. I'm checking with the person who ran the command that prompted me to make this feature request.

May 1 2017, 9:27 PM · Subversion, Arcanist, Feature Request
chad added a comment to T12660: Require Commandeering for `arc commit`.

itsamystery

May 1 2017, 9:27 PM · Subversion, Arcanist, Feature Request
epriestley added a comment to T12660: Require Commandeering for `arc commit`.

Expected output is similar to this:

May 1 2017, 5:43 PM · Subversion, Arcanist, Feature Request
epriestley added a comment to T12660: Require Commandeering for `arc commit`.

What does git show show in arcanist/?

May 1 2017, 5:42 PM · Subversion, Arcanist, Feature Request
sirbrillig added a comment to T12660: Require Commandeering for `arc commit`.

Oh! So it already has this feature! I wonder if perhaps we are on an old version. I tried arc version as specified here, but I just get an error:

May 1 2017, 5:40 PM · Subversion, Arcanist, Feature Request
epriestley added a comment to T12660: Require Commandeering for `arc commit`.

The warning seems to be working properly for me locally, so I can't reproduce the issue if the claim is that it doesn't work:

May 1 2017, 5:22 PM · Subversion, Arcanist, Feature Request
chad added a comment to T12660: Require Commandeering for `arc commit`.

Oh I was thrown off by the quotes and not a var.

May 1 2017, 5:17 PM · Subversion, Arcanist, Feature Request
epriestley added a comment to T12660: Require Commandeering for `arc commit`.

I think it's right:

May 1 2017, 5:16 PM · Subversion, Arcanist, Feature Request
chad added a comment to T12660: Require Commandeering for `arc commit`.

That pht seems to have too many %s ?

May 1 2017, 5:14 PM · Subversion, Arcanist, Feature Request
epriestley added a comment to T12660: Require Commandeering for `arc commit`.

The expectation is that you should get this prompt when trying to arc commit a change you did not author:

May 1 2017, 5:12 PM · Subversion, Arcanist, Feature Request
chad added a comment to T12660: Require Commandeering for `arc commit`.

It's very common to land other people's diffs (who do not have access to the repository) and comandeering changes the commit author.

May 1 2017, 4:46 PM · Subversion, Arcanist, Feature Request
sirbrillig created T12660: Require Commandeering for `arc commit`.
May 1 2017, 4:32 PM · Subversion, Arcanist, Feature Request

Apr 27 2017

danijepg added a comment to T7471: Unable to connect to SVN repo with invalid SSL cert.

Any idea of how to do this on CentOs?

Apr 27 2017, 5:07 PM · Subversion, Diffusion

Apr 25 2017

epriestley merged task T12638: Arcanist (svn): add ability to output diff against last differential update into T1084: Preview what's new in a diff when attaching it to an existing revision .
Apr 25 2017, 12:34 AM · Arcanist, Subversion, Feature Request

Apr 24 2017

sirbrillig created T12638: Arcanist (svn): add ability to output diff against last differential update.
Apr 24 2017, 11:20 PM · Arcanist, Subversion, Feature Request

Apr 12 2017

epriestley edited projects for T12483: SAAS install reporting that they are unable to clone with "git svn", added: Customer Impact; removed Phacility.
Apr 12 2017, 3:13 PM · Customer Impact, Git, Subversion, Diffusion

Mar 30 2017

epriestley created T12483: SAAS install reporting that they are unable to clone with "git svn".
Mar 30 2017, 8:44 PM · Customer Impact, Git, Subversion, Diffusion

Mar 14 2017

kfsone added a comment to T4678: Support changelist-based SVN workflows in Arcanist and Differential.

@epriestley I'm in the process of setting up phabricator to help mature the development workflow based on svn here, and make future transitions to git/perforce easier. Changelists would be a natural path here but the workaround for our use case is to just manually specify paths, but it's annoying if you have a locally modified file that you accidentally include in a diff, since you *have* to revert it to remove it from the diff. Using a changelist would let you avoid making the mistake in the first place.

Mar 14 2017, 6:47 PM · Differential, Arcanist, Subversion

Mar 8 2017

sshannin renamed T7022: diffusion - doesn't understand svn Replace operation from Differential looking at wrong revision #'s to diffusion - doesn't understand svn Replace operation.
Mar 8 2017, 12:40 AM · Bug Report, Diffusion, Subversion

Feb 2 2017

epriestley moved T10754: Remove Subversion daemon working copy operations from Backlog to Subversion on the Diffusion board.
Feb 2 2017, 4:10 PM · Subversion, Diffusion, Daemons, Infrastructure