In D25850#22726, @valerio.bozzolan wrote:What happens to already-existing URLs? Maybe nice to mention in the test plan
- Queries
- All Stories
- Search
- Advanced Search
- Transactions
- Transaction Logs
Feed All Stories
All Stories
All Stories
Dec 10 2024
Dec 10 2024
valerio.bozzolan added inline comments to D25850: Allow customizing default Phurl view and edit policies.
Dec 9 2024
Dec 9 2024
mturdus closed T15920: Make table of contents visible when using wide screens as Resolved by committing rP9448e815721c: Show table of contents by default on wide screens.
We can also ship this feature in two phases, so, first, adding the option files.maximum-file-size, and then the second one when it's ready or requested lol
Yeah, I agree, though I would then only work on implementing files.maximum-file-size because we don't really care that much about adding exceptions to the rule (as far as I know lol)
valerio.bozzolan updated the diff for D25847: Remarkup: harden how we recognize internal/external URIs (mailto, mobile phones, ...).
last change promise lol
valerio.bozzolan retitled D25847: Remarkup: harden how we recognize internal/external URIs (mailto, mobile phones, ...) from Fix regression in Remarkup unit tests to Fix regression in Remarkup unit tests and harden.
valerio.bozzolan updated the diff for D25847: Remarkup: harden how we recognize internal/external URIs (mailto, mobile phones, ...).
arc unit
valerio.bozzolan updated the diff for D25847: Remarkup: harden how we recognize internal/external URIs (mailto, mobile phones, ...).
harden
valerio.bozzolan updated the diff for D25847: Remarkup: harden how we recognize internal/external URIs (mailto, mobile phones, ...).
\o/
valerio.bozzolan retitled D25847: Remarkup: harden how we recognize internal/external URIs (mailto, mobile phones, ...) from Fix regression in Remarkup unit tests to Fix regression in Remarkup unit tests and harden.
valerio.bozzolan retitled D25847: Remarkup: harden how we recognize internal/external URIs (mailto, mobile phones, ...) from Fix unit test PhutilPygmentizeParserTestCase to Fix regression in Remarkup unit tests.
valerio.bozzolan updated the diff for D25847: Remarkup: harden how we recognize internal/external URIs (mailto, mobile phones, ...).
also tried to fix PhutilRemarkupEngineTestCase
valerio.bozzolan planned changes to D25847: Remarkup: harden how we recognize internal/external URIs (mailto, mobile phones, ...).
but fails in link-edge-cases.txt now (thus it's likely not complete):
valerio.bozzolan accepted D25849: Hovercards: Avoid "Undefined index: objectPHID" when passing bogus data.
Double slam-accept
valerio.bozzolan retitled D25845: Repository Identity "Automatically Detected User": don't trust unverified emails from Repository Identity: don't trust unverified emails
valerio.bozzolan renamed T15965: Repository Identity "Automatically Detected User": it reads unverified emails, with spam concerns from Repository Identity: it reads unverified emails, with spam concerns to Repository Identity "Automatically Detected User": it reads unverified emails, with spam concerns.
Uh, that would be so good. So you can say "When the moon is full".
Sounds reasonable.
valerio.bozzolan added a comment to T15965: Repository Identity "Automatically Detected User": it reads unverified emails, with spam concerns.
Take for example this commit that has a default (empty) identity:
avivey added a comment to T15965: Repository Identity "Automatically Detected User": it reads unverified emails, with spam concerns.
"Steal credit" might actually lead to a real issue: If a new user can get themselves identified as an old, trusted, user based on commit history, their changes might not be checked as rigorously by the rest of the team - similar to the XZ Utils backdoor issue, only faster.
valerio.bozzolan added a comment to T15965: Repository Identity "Automatically Detected User": it reads unverified emails, with spam concerns.
Limitation: to steal a commit identity, it must be the default. Sorry I forgot to say.
Dec 8 2024
Dec 8 2024
valerio.bozzolan added a comment to T15965: Repository Identity "Automatically Detected User": it reads unverified emails, with spam concerns.
In T15965#20052, @speck wrote:What can a malicious user accomplish by claiming unverified email for commits?
valerio.bozzolan added a project to T15972: Add config option for maximum file size: Discussion Needed.
I like your option names. I like to specify PHIDs and not numeric IDs so it's more portable against import/exports 👍 Let's add Discussion Needed to attract some +1 or nice suggestions.
What happens to already-existing URLs? Maybe nice to mention in the test plan
Fix my local unit test config
valerio.bozzolan added a project to T15970: phurl: Allow setting default edit policy for URLs: Policy.
Thanks. I see, from this page is not possible:
Dec 7 2024
Dec 7 2024
speck added a comment to T15965: Repository Identity "Automatically Detected User": it reads unverified emails, with spam concerns.
What can a malicious user accomplish by claiming unverified email for commits? The idea outlined here sounds right but I’d like to understand what potential harm could be done on its current state, and also whether there’s any legitimate use case for the current behavior.
Dec 6 2024
Dec 6 2024
aklapper closed T15968: Unit test PhabricatorAuthInviteTestCase::testDuplicateInvite fails, a subtask of T15064: Make Phorge compatible with PHP 8.1/8.2/8.3/8.4, as Resolved.
Double slam-accept
aklapper updated the diff for D25849: Hovercards: Avoid "Undefined index: objectPHID" when passing bogus data.
Right... one day I may get used to all those Phorge shortcuts, thanks
aklapper updated the diff for D25848: Fix PhabricatorAuthInviteTestCase::testDuplicateInvite unit test.
Oops, no for real
aklapper updated the diff for D25848: Fix PhabricatorAuthInviteTestCase::testDuplicateInvite unit test.
Uhm, right, heh
Dec 5 2024
Dec 5 2024
valerio.bozzolan accepted D25849: Hovercards: Avoid "Undefined index: objectPHID" when passing bogus data.
...like line 105 :)
valerio.bozzolan added a comment to D25849: Hovercards: Avoid "Undefined index: objectPHID" when passing bogus data.
Thaaanks - If I'm not wrong we can = idx($card, 'objectPHID');
aklapper requested review of D25849: Hovercards: Avoid "Undefined index: objectPHID" when passing bogus data.
aklapper requested review of D25848: Fix PhabricatorAuthInviteTestCase::testDuplicateInvite unit test.
pppery updated the diff for D25838: Rewrite regex for project names to be not prone to catastrophic backtracking.
Rebase
aklapper accepted D25847: Remarkup: harden how we recognize internal/external URIs (mailto, mobile phones, ...).
I applied this patch locally on top of git master and output does not complain anymore about 'link-brackets.txt' (thus it's correct) but fails in link-edge-cases.txt now (thus it's likely not complete):
valerio.bozzolan updated the task description for T15967: Fix unit test PhutilPygmentizeParserTestCase.
valerio.bozzolan updated the diff for D25845: Repository Identity "Automatically Detected User": don't trust unverified emails.
run unit test
valerio.bozzolan changed the visibility for D25845: Repository Identity "Automatically Detected User": don't trust unverified emails.
valerio.bozzolan updated subscribers of T15965: Repository Identity "Automatically Detected User": it reads unverified emails, with spam concerns.
Adding @aklapper as subscriber in this security issue since I trust this user (unclear if this should be flagged as security thought, feel free to open)
valerio.bozzolan changed the edit policy for D25845: Repository Identity "Automatically Detected User": don't trust unverified emails.
valerio.bozzolan raised the priority of T15556: Improve Diffusion identity reassignment propagation from Low to Normal.
Dec 4 2024
Dec 4 2024
This seems to impact mail deliverability to @icloud.com addresses too.
Thanks a lot @valerio.bozzolan for addressing this so quickly!
Content licensed under Creative Commons Attribution-ShareAlike 4.0 (CC-BY-SA) unless otherwise noted; code licensed under Apache 2.0 or other open source licenses. · CC BY-SA 4.0 · Apache 2.0