1. 24 6月, 2017 5 次提交
  2. 16 6月, 2017 1 次提交
  3. 11 6月, 2017 1 次提交
  4. 30 5月, 2017 5 次提交
    • B
      Merge branch 'sticky-bits' · 110613bf
      Benjamin Sago 提交于
      This adds support for the setuid, setgid, and sticky bits like how ls does it: by replacing the user/group/execute bits with different flags depending on their presence. At least we do it with flair, and by flair, I mean purple.
      
      Fixes #142
      110613bf
    • B
      xtests for higher order bits · c4447e35
      Benjamin Sago 提交于
      Finally, re-do the permissions extended tests to include the setuid, setgid, and sticky bits, and rename the last two existing ones to match the others (files with the same names as their permissions).
      c4447e35
    • B
      Render higher permission bits · a2901c63
      Benjamin Sago 提交于
      Unlike the others, setuid/setgid/sticky get merged with user/group/other execute in the rendered Permissions cell. So there had to be a bit of code change done to make sure that none of the bits clashed.
      a2901c63
    • B
      Read setuid/setgid/sticky bits · f9f7ad22
      Benjamin Sago 提交于
      The problem here was that we were using `metadata.permissions().mode()`, which is capped at 0o777, rather than `metadata.mode()`, which exposes every bit. With this change, we can access the higher-order permission bits, and put them in the Permissions struct.
      f9f7ad22
    • B
      Merge branch 'split-details' · bd860b8f
      Benjamin Sago 提交于
      bd860b8f
  5. 22 5月, 2017 5 次提交
  6. 21 5月, 2017 15 次提交
  7. 19 5月, 2017 5 次提交
  8. 18 5月, 2017 3 次提交