View Issue Details
| ID | Project | Category | View Status | Date Submitted | Last Update |
|---|---|---|---|---|---|
| YS-0170 | Shelly | Powershell | public | 2023-05-18 12:00 | 2023-05-19 06:09 |
| Reporter | JΛΠIMUZΞ ヤニムズ | Assigned To | JΛΠIMUZΞ ヤニムズ | ||
| Priority | normal | Severity | minor | Reproducibility | have not tried |
| Status | resolved | Resolution | fixed | ||
| Summary | YS-0170: Better detection of repository sources | ||||
| Description | Currently the check is only that the origin contains the name of the service. It's quite possible to get false positives here (for example, a repository with github in the name but is actually hosted on keybase). | ||||
| Additional Information | - From the remote -v output: check for the beginning "origin" text and strip it out, then trim the string. - For protocol based repos, make sure we check the start of string for correct type (i.e. "keybase:", "http:", "https"). - Figure out best way to identify OneDrive and other cloud repos where the source directory might be a synced folder on the local file system. | ||||
| Tags | No tags attached. | ||||
|
For OneDrive: - Check if origin path is underneath the %OneDrive%, %OneDriveConsumer% or %OneDriveCommercial% directories. https://stackoverflow.com/questions/26771265/get-onedrive-path-in-windows |
|
| Date Modified | Username | Field | Change |
|---|---|---|---|
| 2023-05-18 12:00 | JΛΠIMUZΞ ヤニムズ | New Issue | |
| 2023-05-18 12:00 | JΛΠIMUZΞ ヤニムズ | Status | new => assigned |
| 2023-05-18 12:00 | JΛΠIMUZΞ ヤニムズ | Assigned To | => JΛΠIMUZΞ ヤニムズ |
| 2023-05-18 12:32 | JΛΠIMUZΞ ヤニムズ | Note Added: 0000119 | |
| 2023-05-18 12:40 | JΛΠIMUZΞ ヤニムズ | Note Edited: 0000119 | |
| 2023-05-19 06:09 | JΛΠIMUZΞ ヤニムズ | Status | assigned => resolved |
| 2023-05-19 06:09 | JΛΠIMUZΞ ヤニムズ | Resolution | open => fixed |