- 13 Dec, 2021 11 commits
- 
- 
fengkx authoredBREAKING CHANGE: the `DEFAULT_PROXY` setting has been renamed to `SHELLPROXY_URL`, and `CONFIG_PROXY` has been renamed to `SHELLPROXY_CONFIG`. See the plugin README for more information. Co-authored-by: Marc Cornellà <hello@mcornella.com> Marc Cornellà <hello@mcornella.com>
- 
Frank Van Damme authoredCloses #5992 
- 
Marc Cornellà authored
- 
Marc Cornellà authored
- 
David Sutherland authoredCloses #2177 Closes #6197 Co-authored-by: Henrik Ravn <hravnx@gmail.com> Henrik Ravn <hravnx@gmail.com>
- 
Marc Cornellà authored
- 
Pandu POLUAN authoredCloses #8912 
- 
Romain Failliot authoredAdded the red dot (instead of the default `*`) if the branch is dirty. The bira theme only supported git, now it supports mercurial as well. It needed ito call `hg_prompt_info` and the `ZSH_THEME_HG_PROMPT_` variables. Closes #6631 
- 
Romain Failliot authoredBREAKING CHANGE: the `hg_prompt_info` function now uses `ZSH_THEME_HG_PROMPT_PREFIX` and `ZSH_THEME_HG_PROMPT_SUFFIX` variables when displaying branch information, similar to the `git_prompt_info` function. Closes #6631 
- 
anatolyrr authoredReplaced two different calls of hg with one `hg --id --branch` for retrieving information whether we're in a repo (will be empty if not), whether the repo is dirty (revision id will contain "+" if there are uncommitted changed), and the branch name. Closes #6197 Closes #7929 
- 
Nicolas Cavigneaux authoredCloses #3500 
 
- 
- 07 Dec, 2021 4 commits
- 
- 
Marc Cornellà authored
- 
Marc Cornellà authored
- 
Josh Soref authoredCo-authored-by: Josh Soref <jsoref@users.noreply.github.com> Josh Soref <jsoref@users.noreply.github.com>
- 
Marc Cornellà authored
 
- 
- 02 Dec, 2021 1 commit
- 
- 
Josh Soref authoredCo-authored-by: Josh Soref <jsoref@users.noreply.github.com> Josh Soref <jsoref@users.noreply.github.com>
 
- 
- 01 Dec, 2021 5 commits
- 
- 
whoami authoredCo-authored-by: Marc Cornellà <hello@mcornella.com> Marc Cornellà <hello@mcornella.com>
- 
Nick Aldwin authored
- 
Marc Cornellà authoredThis reverts commit aef393bd. 
- 
Marc Cornellà authored
- 
Josh Soref authoredCo-authored-by: Josh Soref <jsoref@users.noreply.github.com> Josh Soref <jsoref@users.noreply.github.com>
 
- 
- 30 Nov, 2021 2 commits
- 
- 
Marc Cornellà authored
- 
Marc Cornellà authored
 
- 
- 27 Nov, 2021 3 commits
- 
- 
Nicholas Hawkes authored
- 
Markus Hofbauer authored
- 
Adam Cwyk authoredCo-authored-by: Adam Cwyk <git@adamcwyk.dev> Adam Cwyk <git@adamcwyk.dev>
 
- 
- 25 Nov, 2021 3 commits
- 
- 
Kyle authored
- 
Paul Scott authored
- 
Marc Cornellà authoredFixes #10448 
 
- 
- 17 Nov, 2021 7 commits
- 
- 
Marc Cornellà authored
- 
Marc Cornellà authoredWhen calling `bundle install` with `--jobs=<n>`, bundle persists this argument in `.bundle/config`. If we run `BUNDLE_JOBS=<n> bundle install` instead, this is not persisted. Fixes #10425 
- 
Aurora authoredCo-authored-by: Marc Cornellà <hello@mcornella.com> Marc Cornellà <hello@mcornella.com>
- 
Marc Cornellà authoredBREAKING CHANGE: the plugin now checks for the `docker-compose` command instead of trying whether `docker compose` is a valid command. This means that if the old command is still installed it will be used instead. To use `docker compose`, uninstall any old copies of `docker-compose`. Fixes #10409 
- 
Marc Cornellà authoredFixes #10428 
- 
Brian Tannous authored
- 
Marc Cornellà authoredCloses #9659 Co-authored-by: Jeff Warner <jeff@develops.software> Jeff Warner <jeff@develops.software>
 
- 
- 16 Nov, 2021 2 commits
- 
- 
Marc Cornellà authoredFixes #10422 
- 
Marc Cornellà authored
 
- 
- 11 Nov, 2021 2 commits
- 
- 
Marc Cornellà authoredThe pygmalion and pygmalion-virtualenv themes unsafely handle git prompt information which results in a double evaluation of this information, so a malicious git repository could trigger a command injection if the user cloned and entered the repository. A similar method could be used in the refined theme. All themes have been patched against this vulnerability. 
- 
Marc Cornellà authoredThe `rand-quote` plugin uses quotationspage.com and prints part of its content to the shell without sanitization, which could trigger command injection. There is no evidence that this has been exploited, but this commit removes all possibility for exploit. Similarly, the `hitokoto` plugin uses the hitokoto.cn website to print quotes to the shell, also without sanitization. Furthermore, there is also no evidence that this has been exploited, but with this change it is now impossible. 
 
- 
