Re: Sparkle updater check vulnerability script
Re: Sparkle updater check vulnerability script
- Subject: Re: Sparkle updater check vulnerability script
- From: 2551phil <email@hidden>
- Date: Thu, 11 Feb 2016 21:28:48 +0700
> On 11 Feb 2016, at 18:48, Shane Stanley <email@hidden> wrote:
>
> On 11 Feb 2016, at 2:18 PM, Phil Stokes <email@hidden> wrote:
>>
>> Which means it won’t be able to update without dropping support for Snow Leopard users.
>
> Not necessarily. They can probably download the source and apply the patches listed on the Sparkle site: a6e9c8a 70f6929.
>
I’m not sure what that would involve, but I’d guess that they’d still be on a (patched) version of 1.5b and would still show as needing to be updated on any simple version number test.
AFAIK, you can’t use any version of Sparkle that uses the AutoUpdate.app if you want your app to run on 10.6. Since updating the appcast and the release notes feeds to https solves the problem, it seems an easier way to go than messing about trying to patch someone else’s code you’re not familiar with.
Best
Phil
_______________________________________________
Do not post admin requests to the list. They will be ignored.
AppleScript-Users mailing list (email@hidden)
Help/Unsubscribe/Update your Subscription:
Archives: http://lists.apple.com/archives/applescript-users
This email sent to email@hidden