Fossil SCM

Update changes.wiki. Some eol-spacing

jan.nijtmans 2017-07-03 09:31 trunk
Commit 86d4754a7ad48f291d9dc1699f2dd8f62771007584b0d0e07272942b8e10d557
+1 -1
--- src/diffcmd.c
+++ src/diffcmd.c
@@ -320,11 +320,11 @@
320320
fossil_print("%s %s\n", blob_str(&out), zName);
321321
}else{
322322
diff_print_filenames(zName, zName, diffFlags);
323323
fossil_print("%s\n", blob_str(&out));
324324
}
325
-
325
+
326326
/* Release memory resources */
327327
blob_reset(&out);
328328
}else{
329329
Blob cmd;
330330
Blob temp1;
331331
--- src/diffcmd.c
+++ src/diffcmd.c
@@ -320,11 +320,11 @@
320 fossil_print("%s %s\n", blob_str(&out), zName);
321 }else{
322 diff_print_filenames(zName, zName, diffFlags);
323 fossil_print("%s\n", blob_str(&out));
324 }
325
326 /* Release memory resources */
327 blob_reset(&out);
328 }else{
329 Blob cmd;
330 Blob temp1;
331
--- src/diffcmd.c
+++ src/diffcmd.c
@@ -320,11 +320,11 @@
320 fossil_print("%s %s\n", blob_str(&out), zName);
321 }else{
322 diff_print_filenames(zName, zName, diffFlags);
323 fossil_print("%s\n", blob_str(&out));
324 }
325
326 /* Release memory resources */
327 blob_reset(&out);
328 }else{
329 Blob cmd;
330 Blob temp1;
331
+1 -1
--- src/doc.c
+++ src/doc.c
@@ -637,11 +637,11 @@
637637
goto doc_not_found;
638638
}
639639
}
640640
if( isUV ){
641641
if( db_table_exists("repository","unversioned")
642
- && unversioned_content(zName, &filebody)==0
642
+ && unversioned_content(zName, &filebody)==0
643643
){
644644
rid = 1;
645645
zDfltTitle = zName;
646646
}
647647
}else if( fossil_strcmp(zCheckin,"ckout")==0 ){
648648
--- src/doc.c
+++ src/doc.c
@@ -637,11 +637,11 @@
637 goto doc_not_found;
638 }
639 }
640 if( isUV ){
641 if( db_table_exists("repository","unversioned")
642 && unversioned_content(zName, &filebody)==0
643 ){
644 rid = 1;
645 zDfltTitle = zName;
646 }
647 }else if( fossil_strcmp(zCheckin,"ckout")==0 ){
648
--- src/doc.c
+++ src/doc.c
@@ -637,11 +637,11 @@
637 goto doc_not_found;
638 }
639 }
640 if( isUV ){
641 if( db_table_exists("repository","unversioned")
642 && unversioned_content(zName, &filebody)==0
643 ){
644 rid = 1;
645 zDfltTitle = zName;
646 }
647 }else if( fossil_strcmp(zCheckin,"ckout")==0 ){
648
--- src/security_audit.c
+++ src/security_audit.c
@@ -120,19 +120,19 @@
120120
@ Login passwords can be sent over an unencrypted connection.
121121
@ <p>Fix this by activating the "Redirect to HTTPS on the Login page"
122122
@ setting on the <a href="setup_access">Access Control</a> page.
123123
}
124124
125
- /* Anonymous users should not be able to harvest email addresses
125
+ /* Anonymous users should not be able to harvest email addresses
126126
** from tickets.
127127
*/
128128
if( hasAnyCap(zAnonCap, "e") ){
129129
@ <li><p><b>WARNING:</b>
130130
@ Anonymous users can view email addresses and other personally
131131
@ identifiable information on tickets.
132132
@ <p>Fix this by removing the "Email" privilege from users
133
- @ "anonymous" and "nobody" on the
133
+ @ "anonymous" and "nobody" on the
134134
@ <a href="setup_ulist">User Configuration</a> page.
135135
}
136136
137137
/* Anonymous users probably should not be allowed to push content
138138
** to the repository.
@@ -139,11 +139,11 @@
139139
*/
140140
if( hasAnyCap(zAnonCap, "i") ){
141141
@ <li><p><b>WARNING:</b>
142142
@ Anonymous users can push new check-ins into the repository.
143143
@ <p>Fix this by removing the "Check-in" privilege from users
144
- @ "anonymous" and "nobody" on the
144
+ @ "anonymous" and "nobody" on the
145145
@ <a href="setup_ulist">User Configuration</a> page.
146146
}
147147
148148
/* Anonymous users probably should not be allowed act as moderators
149149
** for wiki or tickets.
@@ -151,11 +151,11 @@
151151
if( hasAnyCap(zAnonCap, "lq") ){
152152
@ <li><p><b>WARNING:</b>
153153
@ Anonymous users can act as moderators for wiki and/or tickets.
154154
@ This defeats the whole purpose of moderation.
155155
@ <p>Fix this by removing the "Mod-Wiki" and "Mod-Tkt"
156
- @ privilege from users "anonymous" and "nobody" on the
156
+ @ privilege from users "anonymous" and "nobody" on the
157157
@ <a href="setup_ulist">User Configuration</a> page.
158158
}
159159
160160
/* Anonymous users probably should not be allowed to delete
161161
** wiki or tickets.
@@ -162,11 +162,11 @@
162162
*/
163163
if( hasAnyCap(zAnonCap, "d") ){
164164
@ <li><p><b>WARNING:</b>
165165
@ Anonymous users can delete wiki and tickets.
166166
@ <p>Fix this by removing the "Delete"
167
- @ privilege from users "anonymous" and "nobody" on the
167
+ @ privilege from users "anonymous" and "nobody" on the
168168
@ <a href="setup_ulist">User Configuration</a> page.
169169
}
170170
171171
/* If anonymous users are allowed to create new Wiki, then
172172
** wiki moderation should be activated to pervent spam.
@@ -176,11 +176,11 @@
176176
@ <li><p><b>WARNING:</b>
177177
@ Anonymous users can create or edit wiki without moderation.
178178
@ This can result in robots inserting lots of wiki spam into
179179
@ repository.
180180
@ <p>Fix this by removing the "New-Wiki" and "Write-Wiki"
181
- @ privileges from users "anonymous" and "nobody" on the
181
+ @ privileges from users "anonymous" and "nobody" on the
182182
@ <a href="setup_ulist">User Configuration</a> page or
183183
@ by enabling wiki moderation on the
184184
@ <a href="setup_modreq">Moderation Setup</a> page.
185185
}else{
186186
@ <li><p>
@@ -187,11 +187,11 @@
187187
@ Anonymous users can create or edit wiki, but moderator
188188
@ approval is required before the edits become permanent.
189189
}
190190
}
191191
192
- /* Administrative privilege should only be provided to
192
+ /* Administrative privilege should only be provided to
193193
** specific individuals, not to entire classes of people.
194194
** And not too many people should have administrator privilege.
195195
*/
196196
z = db_text(0, "SELECT group_concat(login,' AND ') FROM user"
197197
" WHERE cap GLOB '*[as]*'"
@@ -224,15 +224,15 @@
224224
@ Ideally, administator privilege ('s' or 'a') should only
225225
@ be granted to one or two users.
226226
}
227227
}
228228
229
- /* The push-unversioned privilege should only be provided to
229
+ /* The push-unversioned privilege should only be provided to
230230
** specific individuals, not to entire classes of people.
231231
** And no too many people should have this privilege.
232232
*/
233
- z = db_text(0,
233
+ z = db_text(0,
234234
"SELECT group_concat("
235235
"printf('<a href=''setup_uedit?id=%%d''>%%s</a>',uid,login),"
236236
"' and ')"
237237
" FROM user"
238238
" WHERE cap GLOB '*y*'"
@@ -292,11 +292,11 @@
292292
@ keeps a record of successful and unsucessful login attempts and is
293293
@ useful for security monitoring.
294294
}
295295
if( db_get_boolean("admin-log",0)==0 ){
296296
@ <li><p>
297
- @ The <a href="admin_log">Administrative Log</a> is disabled.
297
+ @ The <a href="admin_log">Administrative Log</a> is disabled.
298298
@ The administrative log provides a record of configuration changes
299299
@ and is useful for security monitoring.
300300
}
301301
302302
#if !defined(_WIN32) && !defined(FOSSIL_OMIT_LOAD_AVERAGE)
@@ -303,11 +303,11 @@
303303
/* Make sure that the load-average limiter is armed and working */
304304
if( load_average()==0.0 ){
305305
@ <li><p>
306306
@ Unable to get the system load average. This can prevent Fossil
307307
@ from throttling expensive operations during peak demand.
308
- @ <p>If running in a chroot jail on Linux, verify that the /proc
308
+ @ <p>If running in a chroot jail on Linux, verify that the /proc
309309
@ filesystem is mounted within the jail, so that the load average
310310
@ can be obtained from the /proc/loadavg file.
311311
}else {
312312
double r = atof(db_get("max-loadavg", "0"));
313313
if( r<=0.0 ){
@@ -319,19 +319,19 @@
319319
@ <a href="setup_access">Access Control</a> page to approximately
320320
@ the number of available cores on your server, or maybe just a little
321321
@ less.
322322
}else if( r>=8.0 ){
323323
@ <li><p>
324
- @ The "Server Load Average Limit" on the
324
+ @ The "Server Load Average Limit" on the
325325
@ <a href="setup_access">Access Control</a> page is set to %g(r),
326326
@ which seems high. Is this server really a %d((int)r)-core machine?
327327
}
328328
}
329329
#endif
330330
331331
332
- @ </ol>
332
+ @ </ol>
333333
style_footer();
334334
}
335335
336336
/*
337337
** WEBPAGE: takeitprivate
338338
--- src/security_audit.c
+++ src/security_audit.c
@@ -120,19 +120,19 @@
120 @ Login passwords can be sent over an unencrypted connection.
121 @ <p>Fix this by activating the "Redirect to HTTPS on the Login page"
122 @ setting on the <a href="setup_access">Access Control</a> page.
123 }
124
125 /* Anonymous users should not be able to harvest email addresses
126 ** from tickets.
127 */
128 if( hasAnyCap(zAnonCap, "e") ){
129 @ <li><p><b>WARNING:</b>
130 @ Anonymous users can view email addresses and other personally
131 @ identifiable information on tickets.
132 @ <p>Fix this by removing the "Email" privilege from users
133 @ "anonymous" and "nobody" on the
134 @ <a href="setup_ulist">User Configuration</a> page.
135 }
136
137 /* Anonymous users probably should not be allowed to push content
138 ** to the repository.
@@ -139,11 +139,11 @@
139 */
140 if( hasAnyCap(zAnonCap, "i") ){
141 @ <li><p><b>WARNING:</b>
142 @ Anonymous users can push new check-ins into the repository.
143 @ <p>Fix this by removing the "Check-in" privilege from users
144 @ "anonymous" and "nobody" on the
145 @ <a href="setup_ulist">User Configuration</a> page.
146 }
147
148 /* Anonymous users probably should not be allowed act as moderators
149 ** for wiki or tickets.
@@ -151,11 +151,11 @@
151 if( hasAnyCap(zAnonCap, "lq") ){
152 @ <li><p><b>WARNING:</b>
153 @ Anonymous users can act as moderators for wiki and/or tickets.
154 @ This defeats the whole purpose of moderation.
155 @ <p>Fix this by removing the "Mod-Wiki" and "Mod-Tkt"
156 @ privilege from users "anonymous" and "nobody" on the
157 @ <a href="setup_ulist">User Configuration</a> page.
158 }
159
160 /* Anonymous users probably should not be allowed to delete
161 ** wiki or tickets.
@@ -162,11 +162,11 @@
162 */
163 if( hasAnyCap(zAnonCap, "d") ){
164 @ <li><p><b>WARNING:</b>
165 @ Anonymous users can delete wiki and tickets.
166 @ <p>Fix this by removing the "Delete"
167 @ privilege from users "anonymous" and "nobody" on the
168 @ <a href="setup_ulist">User Configuration</a> page.
169 }
170
171 /* If anonymous users are allowed to create new Wiki, then
172 ** wiki moderation should be activated to pervent spam.
@@ -176,11 +176,11 @@
176 @ <li><p><b>WARNING:</b>
177 @ Anonymous users can create or edit wiki without moderation.
178 @ This can result in robots inserting lots of wiki spam into
179 @ repository.
180 @ <p>Fix this by removing the "New-Wiki" and "Write-Wiki"
181 @ privileges from users "anonymous" and "nobody" on the
182 @ <a href="setup_ulist">User Configuration</a> page or
183 @ by enabling wiki moderation on the
184 @ <a href="setup_modreq">Moderation Setup</a> page.
185 }else{
186 @ <li><p>
@@ -187,11 +187,11 @@
187 @ Anonymous users can create or edit wiki, but moderator
188 @ approval is required before the edits become permanent.
189 }
190 }
191
192 /* Administrative privilege should only be provided to
193 ** specific individuals, not to entire classes of people.
194 ** And not too many people should have administrator privilege.
195 */
196 z = db_text(0, "SELECT group_concat(login,' AND ') FROM user"
197 " WHERE cap GLOB '*[as]*'"
@@ -224,15 +224,15 @@
224 @ Ideally, administator privilege ('s' or 'a') should only
225 @ be granted to one or two users.
226 }
227 }
228
229 /* The push-unversioned privilege should only be provided to
230 ** specific individuals, not to entire classes of people.
231 ** And no too many people should have this privilege.
232 */
233 z = db_text(0,
234 "SELECT group_concat("
235 "printf('<a href=''setup_uedit?id=%%d''>%%s</a>',uid,login),"
236 "' and ')"
237 " FROM user"
238 " WHERE cap GLOB '*y*'"
@@ -292,11 +292,11 @@
292 @ keeps a record of successful and unsucessful login attempts and is
293 @ useful for security monitoring.
294 }
295 if( db_get_boolean("admin-log",0)==0 ){
296 @ <li><p>
297 @ The <a href="admin_log">Administrative Log</a> is disabled.
298 @ The administrative log provides a record of configuration changes
299 @ and is useful for security monitoring.
300 }
301
302 #if !defined(_WIN32) && !defined(FOSSIL_OMIT_LOAD_AVERAGE)
@@ -303,11 +303,11 @@
303 /* Make sure that the load-average limiter is armed and working */
304 if( load_average()==0.0 ){
305 @ <li><p>
306 @ Unable to get the system load average. This can prevent Fossil
307 @ from throttling expensive operations during peak demand.
308 @ <p>If running in a chroot jail on Linux, verify that the /proc
309 @ filesystem is mounted within the jail, so that the load average
310 @ can be obtained from the /proc/loadavg file.
311 }else {
312 double r = atof(db_get("max-loadavg", "0"));
313 if( r<=0.0 ){
@@ -319,19 +319,19 @@
319 @ <a href="setup_access">Access Control</a> page to approximately
320 @ the number of available cores on your server, or maybe just a little
321 @ less.
322 }else if( r>=8.0 ){
323 @ <li><p>
324 @ The "Server Load Average Limit" on the
325 @ <a href="setup_access">Access Control</a> page is set to %g(r),
326 @ which seems high. Is this server really a %d((int)r)-core machine?
327 }
328 }
329 #endif
330
331
332 @ </ol>
333 style_footer();
334 }
335
336 /*
337 ** WEBPAGE: takeitprivate
338
--- src/security_audit.c
+++ src/security_audit.c
@@ -120,19 +120,19 @@
120 @ Login passwords can be sent over an unencrypted connection.
121 @ <p>Fix this by activating the "Redirect to HTTPS on the Login page"
122 @ setting on the <a href="setup_access">Access Control</a> page.
123 }
124
125 /* Anonymous users should not be able to harvest email addresses
126 ** from tickets.
127 */
128 if( hasAnyCap(zAnonCap, "e") ){
129 @ <li><p><b>WARNING:</b>
130 @ Anonymous users can view email addresses and other personally
131 @ identifiable information on tickets.
132 @ <p>Fix this by removing the "Email" privilege from users
133 @ "anonymous" and "nobody" on the
134 @ <a href="setup_ulist">User Configuration</a> page.
135 }
136
137 /* Anonymous users probably should not be allowed to push content
138 ** to the repository.
@@ -139,11 +139,11 @@
139 */
140 if( hasAnyCap(zAnonCap, "i") ){
141 @ <li><p><b>WARNING:</b>
142 @ Anonymous users can push new check-ins into the repository.
143 @ <p>Fix this by removing the "Check-in" privilege from users
144 @ "anonymous" and "nobody" on the
145 @ <a href="setup_ulist">User Configuration</a> page.
146 }
147
148 /* Anonymous users probably should not be allowed act as moderators
149 ** for wiki or tickets.
@@ -151,11 +151,11 @@
151 if( hasAnyCap(zAnonCap, "lq") ){
152 @ <li><p><b>WARNING:</b>
153 @ Anonymous users can act as moderators for wiki and/or tickets.
154 @ This defeats the whole purpose of moderation.
155 @ <p>Fix this by removing the "Mod-Wiki" and "Mod-Tkt"
156 @ privilege from users "anonymous" and "nobody" on the
157 @ <a href="setup_ulist">User Configuration</a> page.
158 }
159
160 /* Anonymous users probably should not be allowed to delete
161 ** wiki or tickets.
@@ -162,11 +162,11 @@
162 */
163 if( hasAnyCap(zAnonCap, "d") ){
164 @ <li><p><b>WARNING:</b>
165 @ Anonymous users can delete wiki and tickets.
166 @ <p>Fix this by removing the "Delete"
167 @ privilege from users "anonymous" and "nobody" on the
168 @ <a href="setup_ulist">User Configuration</a> page.
169 }
170
171 /* If anonymous users are allowed to create new Wiki, then
172 ** wiki moderation should be activated to pervent spam.
@@ -176,11 +176,11 @@
176 @ <li><p><b>WARNING:</b>
177 @ Anonymous users can create or edit wiki without moderation.
178 @ This can result in robots inserting lots of wiki spam into
179 @ repository.
180 @ <p>Fix this by removing the "New-Wiki" and "Write-Wiki"
181 @ privileges from users "anonymous" and "nobody" on the
182 @ <a href="setup_ulist">User Configuration</a> page or
183 @ by enabling wiki moderation on the
184 @ <a href="setup_modreq">Moderation Setup</a> page.
185 }else{
186 @ <li><p>
@@ -187,11 +187,11 @@
187 @ Anonymous users can create or edit wiki, but moderator
188 @ approval is required before the edits become permanent.
189 }
190 }
191
192 /* Administrative privilege should only be provided to
193 ** specific individuals, not to entire classes of people.
194 ** And not too many people should have administrator privilege.
195 */
196 z = db_text(0, "SELECT group_concat(login,' AND ') FROM user"
197 " WHERE cap GLOB '*[as]*'"
@@ -224,15 +224,15 @@
224 @ Ideally, administator privilege ('s' or 'a') should only
225 @ be granted to one or two users.
226 }
227 }
228
229 /* The push-unversioned privilege should only be provided to
230 ** specific individuals, not to entire classes of people.
231 ** And no too many people should have this privilege.
232 */
233 z = db_text(0,
234 "SELECT group_concat("
235 "printf('<a href=''setup_uedit?id=%%d''>%%s</a>',uid,login),"
236 "' and ')"
237 " FROM user"
238 " WHERE cap GLOB '*y*'"
@@ -292,11 +292,11 @@
292 @ keeps a record of successful and unsucessful login attempts and is
293 @ useful for security monitoring.
294 }
295 if( db_get_boolean("admin-log",0)==0 ){
296 @ <li><p>
297 @ The <a href="admin_log">Administrative Log</a> is disabled.
298 @ The administrative log provides a record of configuration changes
299 @ and is useful for security monitoring.
300 }
301
302 #if !defined(_WIN32) && !defined(FOSSIL_OMIT_LOAD_AVERAGE)
@@ -303,11 +303,11 @@
303 /* Make sure that the load-average limiter is armed and working */
304 if( load_average()==0.0 ){
305 @ <li><p>
306 @ Unable to get the system load average. This can prevent Fossil
307 @ from throttling expensive operations during peak demand.
308 @ <p>If running in a chroot jail on Linux, verify that the /proc
309 @ filesystem is mounted within the jail, so that the load average
310 @ can be obtained from the /proc/loadavg file.
311 }else {
312 double r = atof(db_get("max-loadavg", "0"));
313 if( r<=0.0 ){
@@ -319,19 +319,19 @@
319 @ <a href="setup_access">Access Control</a> page to approximately
320 @ the number of available cores on your server, or maybe just a little
321 @ less.
322 }else if( r>=8.0 ){
323 @ <li><p>
324 @ The "Server Load Average Limit" on the
325 @ <a href="setup_access">Access Control</a> page is set to %g(r),
326 @ which seems high. Is this server really a %d((int)r)-core machine?
327 }
328 }
329 #endif
330
331
332 @ </ol>
333 style_footer();
334 }
335
336 /*
337 ** WEBPAGE: takeitprivate
338
+1 -1
--- src/setup.c
+++ src/setup.c
@@ -181,11 +181,11 @@
181181
const char *zDate = db_column_text(&s, 4);
182182
@ <tr>
183183
@ <td><a href='setup_uedit?id=%d(uid)'>%d(uid)</a>
184184
@ <td><a href='setup_uedit?id=%d(uid)'>%h(zLogin)</a>
185185
@ <td>%h(zCap)
186
-
186
+
187187
if( fossil_strcmp(zLogin,"anonymous")==0 ){
188188
@ <td>All logged-in users
189189
}else if( fossil_strcmp(zLogin,"developer")==0 ){
190190
@ <td>Users with '<b>v</b>' capability
191191
}else if( fossil_strcmp(zLogin,"nobody")==0 ){
192192
--- src/setup.c
+++ src/setup.c
@@ -181,11 +181,11 @@
181 const char *zDate = db_column_text(&s, 4);
182 @ <tr>
183 @ <td><a href='setup_uedit?id=%d(uid)'>%d(uid)</a>
184 @ <td><a href='setup_uedit?id=%d(uid)'>%h(zLogin)</a>
185 @ <td>%h(zCap)
186
187 if( fossil_strcmp(zLogin,"anonymous")==0 ){
188 @ <td>All logged-in users
189 }else if( fossil_strcmp(zLogin,"developer")==0 ){
190 @ <td>Users with '<b>v</b>' capability
191 }else if( fossil_strcmp(zLogin,"nobody")==0 ){
192
--- src/setup.c
+++ src/setup.c
@@ -181,11 +181,11 @@
181 const char *zDate = db_column_text(&s, 4);
182 @ <tr>
183 @ <td><a href='setup_uedit?id=%d(uid)'>%d(uid)</a>
184 @ <td><a href='setup_uedit?id=%d(uid)'>%h(zLogin)</a>
185 @ <td>%h(zCap)
186
187 if( fossil_strcmp(zLogin,"anonymous")==0 ){
188 @ <td>All logged-in users
189 }else if( fossil_strcmp(zLogin,"developer")==0 ){
190 @ <td>Users with '<b>v</b>' capability
191 }else if( fossil_strcmp(zLogin,"nobody")==0 ){
192
--- www/changes.wiki
+++ www/changes.wiki
@@ -1,11 +1,11 @@
11
<title>Change Log</title>
22
33
<a name='v2_3'></a>
4
-<h2>Changes for Version 2.3 (2017-??-??)</h2>
4
+<h2>Changes for Version 2.3 (2017-07-21)</h2>
55
6
- * Update the built-in SQLite to version 3.20.0.
6
+ * Update the built-in SQLite to version 3.20.0 (beta).
77
* Update internal Unicode character tables, used in regular expression
88
handling, from version 9.0 to 10.0.
99
* Show the last-sync-URL on the [/help?cmd=/urllist|/urllist] page.
1010
* Added the "Event Summary" activity report.
1111
[/reports?type=ci&view=lastchng|example]
1212
--- www/changes.wiki
+++ www/changes.wiki
@@ -1,11 +1,11 @@
1 <title>Change Log</title>
2
3 <a name='v2_3'></a>
4 <h2>Changes for Version 2.3 (2017-??-??)</h2>
5
6 * Update the built-in SQLite to version 3.20.0.
7 * Update internal Unicode character tables, used in regular expression
8 handling, from version 9.0 to 10.0.
9 * Show the last-sync-URL on the [/help?cmd=/urllist|/urllist] page.
10 * Added the "Event Summary" activity report.
11 [/reports?type=ci&view=lastchng|example]
12
--- www/changes.wiki
+++ www/changes.wiki
@@ -1,11 +1,11 @@
1 <title>Change Log</title>
2
3 <a name='v2_3'></a>
4 <h2>Changes for Version 2.3 (2017-07-21)</h2>
5
6 * Update the built-in SQLite to version 3.20.0 (beta).
7 * Update internal Unicode character tables, used in regular expression
8 handling, from version 9.0 to 10.0.
9 * Show the last-sync-URL on the [/help?cmd=/urllist|/urllist] page.
10 * Added the "Event Summary" activity report.
11 [/reports?type=ci&view=lastchng|example]
12

Keyboard Shortcuts

Open search /
Next entry (timeline) j
Previous entry (timeline) k
Open focused entry Enter
Show this help ?
Toggle theme Top nav button