Skip to content

Conversation

ethantkoenig
Copy link

@ethantkoenig ethantkoenig commented Jul 10, 2017

Suggestion for how to use POST instead of GET. Let me know what you think.

I don't care if you actually merge this or not, this was just the most convenient way to show you what I was thinking

@ethantkoenig ethantkoenig force-pushed the snoop/create_new_branch branch from a3ac5ba to 6731841 Compare July 10, 2017 01:53
@lafriks lafriks force-pushed the feature/create_new_branch branch 3 times, most recently from f29ceae to 29997f0 Compare July 12, 2017 21:28
@lafriks
Copy link
Collaborator

lafriks commented Jul 12, 2017

Took ideas from your code and fixed on my own :) Thanks!

@lafriks lafriks closed this Jul 12, 2017
@ethantkoenig ethantkoenig deleted the snoop/create_new_branch branch September 18, 2017 03:24
lafriks pushed a commit that referenced this pull request Apr 19, 2019
* Improve issue autolinks

Update autolinks to match what github does here:

Issue in same repo: #1
Issue in different repo: org/repo#1

Fixes go-gitea#6264

* Use setting.AppURL when parsing URL

Using setting.AppURL here is a more reliable way of parsing the current
URL and what other functions in this file seem to use.

* Make ComposeMetas always return a valid context

* Add per repository markdown renderers for better context

* Update for use of context metas

Now that we include the user and repo name inside context metas, update
various code and tests for this new logic
lafriks pushed a commit that referenced this pull request Jul 2, 2024
Result of `go get -u golang.org/x/net; make tidy`.

This is related to the following vulncheck warning:
```
There are 2 vulnerabilities in modules that you require that are
neither imported nor called. You may not need to take any action.
See https://pkg.go.dev/golang.org/x/vuln/cmd/govulncheck for details.

Vulnerability #1: GO-2024-2687
    HTTP/2 CONTINUATION flood in net/http
  More info: https://pkg.go.dev/vuln/GO-2024-2687
  Module: golang.org/x/net
    Found in: golang.org/x/[email protected]
    Fixed in: golang.org/x/[email protected]

Vulnerability #2: GO-2022-0470
    No access control in github.com/blevesearch/bleve and bleve/v2
  More info: https://pkg.go.dev/vuln/GO-2022-0470
  Module: github.com/blevesearch/bleve/v2
    Found in: github.com/blevesearch/bleve/[email protected]
    Fixed in: N/A
```
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants