-
Notifications
You must be signed in to change notification settings - Fork 884
chore: replace todos with issues #1066
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Changes from all commits
7f885c7
ef45b8e
9089bb9
b81448b
68aedf7
305b97b
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -3,8 +3,6 @@ package usershell | |
import "os" | ||
|
||
// Get returns the $SHELL environment variable. | ||
// TODO: This should use "dscl" to fetch the proper value. See: | ||
// https://stackoverflow.com/questions/16375519/how-to-get-the-default-shell | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. |
||
func Get(username string) (string, error) { | ||
return os.Getenv("SHELL"), nil | ||
} |
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -22,7 +22,7 @@ func workspaceAutostart() *cobra.Command { | |
Short: "schedule a workspace to automatically start at a regular time", | ||
Long: autostartDescriptionLong, | ||
Example: "coder workspaces autostart enable my-workspace --minute 30 --hour 9 --days 1-5 --tz Europe/Dublin", | ||
Hidden: true, // TODO(cian): un-hide when autostart scheduling implemented | ||
Hidden: true, | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. |
||
} | ||
|
||
autostartCmd.AddCommand(workspaceAutostartEnable()) | ||
|
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -22,7 +22,7 @@ func workspaceAutostop() *cobra.Command { | |
Short: "schedule a workspace to automatically stop at a regular time", | ||
Long: autostopDescriptionLong, | ||
Example: "coder workspaces autostop enable my-workspace --minute 0 --hour 18 --days 1-5 -tz Europe/Dublin", | ||
Hidden: true, // TODO(cian): un-hide when autostop scheduling implemented | ||
Hidden: true, | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. |
||
} | ||
|
||
autostopCmd.AddCommand(workspaceAutostopEnable()) | ||
|
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -20,8 +20,6 @@ type Role struct { | |
Name string `json:"name"` | ||
Site []Permission `json:"site"` | ||
// Org is a map of orgid to permissions. We represent orgid as a string. | ||
// TODO: Maybe switch to uuid, but tokens might need to support a "wildcard" org | ||
// which could be a special uuid (like all 0s?) | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. |
||
Org map[string][]Permission `json:"org"` | ||
User []Permission `json:"user"` | ||
} | ||
|
@@ -49,7 +47,6 @@ var ( | |
RoleAuditor = Role{ | ||
Name: "auditor", | ||
Site: permissions(map[Object][]Action{ | ||
// TODO: @emyrk when audit logs are added, add back a read perm | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. |
||
//ResourceAuditLogs: {ActionRead}, | ||
// Should be able to read user details to associate with logs. | ||
// Without this the user-id in logs is not very helpful | ||
|
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -245,9 +245,9 @@ func (c *Channel) Write(bytes []byte) (n int, err error) { | |
if c.dc.BufferedAmount()+uint64(len(bytes)) >= maxBufferedAmount { | ||
<-c.sendMore | ||
} | ||
// TODO (@kyle): There's an obvious race-condition here. | ||
// This is an edge-case, as most-frequently data won't | ||
// be pooled so synchronously, but is definitely possible. | ||
// REMARK: There's an obvious race-condition here. This is an edge-case, as | ||
// most-frequently data won't be pooled so synchronously, but is | ||
// definitely possible. | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. |
||
// | ||
// See: https://github.com/pion/sctp/issues/181 | ||
time.Sleep(time.Microsecond) | ||
|
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -270,8 +270,6 @@ func secureHeaders(next http.Handler) http.Handler { | |
|
||
// Only scripts can manipulate the dom. This prevents someone from | ||
// naming themselves something like '<svg onload="alert(/cross-site-scripting/)" />'. | ||
// TODO: @emyrk we need to make FE changes to enable this. We get 'TrustedHTML' and 'TrustedURL' errors | ||
// that require FE changes to work. | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. |
||
// "require-trusted-types-for" : []string{"'script'"}, | ||
} | ||
|
||
|
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -25,9 +25,8 @@ export const TemplatePage: React.FC = () => { | |
() => `/api/v2/organizations/${unsafeSWRArgument(organizationInfo).id}/templates/${templateName}`, | ||
) | ||
|
||
// TODO: The workspaces endpoint was recently changed, so that we can't get | ||
// workspaces per-template. This just grabs all workspaces... and then | ||
// later filters them to match the current template. | ||
// This just grabs all workspaces... and then later filters them to match the | ||
// current template. | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. |
||
const { data: workspaces, error: workspacesError } = useSWR<Workspace[], Error>(() => `/api/v2/users/me/workspaces`) | ||
|
||
if (organizationError) { | ||
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
#1067