mirror of
https://github.com/janet-lang/janet
synced 2024-11-28 19:19:53 +00:00
Update changelist.
This commit is contained in:
parent
b032d94877
commit
37b7e170fa
10
CHANGELOG.md
10
CHANGELOG.md
@ -2,7 +2,15 @@
|
|||||||
All notable changes to this project will be documented in this file.
|
All notable changes to this project will be documented in this file.
|
||||||
|
|
||||||
## ??? - Unreleased
|
## ??? - Unreleased
|
||||||
- Add build-time detection for cygwin.
|
- Calling `ev/cancel` on a fiber waiting on `ev/gather` will correctly
|
||||||
|
cancel the child fibers.
|
||||||
|
- Add `(sandbox ...)` function to core for permission based security. Also add `janet_sandbox` to C API.
|
||||||
|
The sandbox allows limiting access to the file system, network, ffi, and OS resources at runtime.
|
||||||
|
- Add `(.locals)` function to debugger to see currently bound local symbols.
|
||||||
|
- Track symbol -> slot mapping so debugger can get symbolic information. This exposes local bindings
|
||||||
|
in `debug/stack` and `disasm`.
|
||||||
|
- Add `os/compiler` to detect what host compiler was used to compile the interpreter
|
||||||
|
- Add support for mingw and cygwin builds (mingw support also added in jpm).
|
||||||
|
|
||||||
## 1.26.0 - 2023-01-07
|
## 1.26.0 - 2023-01-07
|
||||||
- Add `ffi/malloc` and `ffi/free`. Useful as tools of last resort.
|
- Add `ffi/malloc` and `ffi/free`. Useful as tools of last resort.
|
||||||
|
@ -691,7 +691,7 @@ static const SandboxOption sandbox_options[] = {
|
|||||||
JANET_CORE_FN(janet_core_sandbox,
|
JANET_CORE_FN(janet_core_sandbox,
|
||||||
"(sandbox & forbidden-capabilities)",
|
"(sandbox & forbidden-capabilities)",
|
||||||
"Disable feature sets to prevent the interpreter from using certain system resources. "
|
"Disable feature sets to prevent the interpreter from using certain system resources. "
|
||||||
"Once a feature is disabled, there is no way to re-enable it. Cabapiblities can be:\n\n"
|
"Once a feature is disabled, there is no way to re-enable it. Capabilities can be:\n\n"
|
||||||
"* :sandbox - disallow calling this function\n"
|
"* :sandbox - disallow calling this function\n"
|
||||||
"* :fs - disallow access to the file system\n"
|
"* :fs - disallow access to the file system\n"
|
||||||
"* :fs-read - disallow read access to the file system\n"
|
"* :fs-read - disallow read access to the file system\n"
|
||||||
|
Loading…
Reference in New Issue
Block a user