User Details
- User Since
- Oct 12 2016, 10:13 AM (424 w, 6 d)
- Availability
- Available
May 29 2021
May 15 2021
Jan 14 2020
It's possible (and common) to write code that is both valid Python 2 and 3, like in this case.
Nov 4 2019
Isn't this working as designed? A user (or the public) needing access to the diffusion application in order to access repositories is exactly the behavior I would expect.
Oct 29 2019
Oct 28 2019
Agreed that supporting YubiKey OTP is pointless - it's impractical and basically a dead legacy feature at this point. WebAuthn has emerged as the de-facto standard for hardware tokens.
Oct 25 2019
Sep 12 2019
Sep 8 2019
Sep 6 2019
Sep 1 2019
May 8 2019
Typo in commit message
Apr 18 2019
Apr 15 2019
Apr 11 2019
Apr 6 2019
Mar 30 2019
Mar 29 2019
Mar 17 2019
Mar 15 2019
Mar 11 2019
Mar 7 2019
Feb 25 2019
This has been implemented in the meantime:
Feb 21 2019
Feb 20 2019
Feb 5 2019
Thanks, greatly appreciated.
Thanks, worked perfectly!
It's just a minor thing I was briefly confused about when I used the "Create Diff" for the first time.
Jun 24 2018
Oct 12 2016
Specific attack scenario: Phabricator is used to host proprietary code. Someone logs into Phabricator on a shared computer and forgets to log out. That shared computer is now forever logged into his account, allowing anyone using it to access said proprietary code. If the cookie would expire or at least be session-only, the risk would be significantly lower.