Skip to content

Commit

Permalink
Update release notes and bump version
Browse files Browse the repository at this point in the history
I forgot to commit these, so we are skipping 0.4.6.
  • Loading branch information
AustinWise committed Apr 6, 2024
1 parent 3793561 commit 274d686
Show file tree
Hide file tree
Showing 4 changed files with 19 additions and 3 deletions.
7 changes: 6 additions & 1 deletion CHANGELOG.md
Original file line number Diff line number Diff line change
@@ -1,6 +1,11 @@
WIP
0.4.7 (2024-04-05)
=====

* Implement support for transclusion (Thanks @therealbstern!) [#61](https://github.com/AustinWise/smeagol/issues/61)
* Use `/DEPENDENTLOADFLAG` to mitigate hypothetical DLL injection attacks on Windows. [#61](https://github.com/AustinWise/smeagol/issues/61)
* Update some dependencies based on CVEs that Dependabot flagged. These CVEs are unlikely to pose
a risk to typical uses of Smeagol.

0.4.5 (2023-12-21)
=====
Update dependencies. Not functional changes intended.
Expand Down
2 changes: 1 addition & 1 deletion Cargo.lock

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

2 changes: 1 addition & 1 deletion Cargo.toml
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
[package]
name = "smeagol-wiki"
version = "0.4.6"
version = "0.4.7"
edition = "2021"
description = "A personal wiki webserver. Work in progress."
license = "MIT"
Expand Down
11 changes: 11 additions & 0 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -73,6 +73,17 @@ root directory of the wiki:
* `index-page` on Gollum defaults to `Home`. Smeagol defaults to `README` to be
compatible with online code hosting systems such as GitHub and Azure Devops.
* The default port is `8000` rather than `4567`.
* Support for transclusion. If a line contains `{{file-name.md}}`, the contents of `file-name.md`
will replace that line.

## Security

Smeagol is intended to be run on your local computer to read your own private data. It is not
designed to be exposed to the public internet: there is no authentication.

That said, there is one class of security problem I would be interested in hearing about: opening
a maliciously designed Wiki with Smeagol either causing code execution or writing to files outside
the wiki directory. Please file an issue if you encounter such a problem.

## Why Rust, please tell me more about why you love Rust

Expand Down

0 comments on commit 274d686

Please sign in to comment.