In D25775#21206, @valerio.bozzolan wrote:More understanding on the root cause is needed. Probably the root cause is "just" that getOldValue() returns an empty string. In that case we should probably at least understand what object is that (sub-class of PhabricatorTransactionRemarkupChange?) and we probably we need something like a generateOldValue() or something similar.
- Queries
- All Stories
- Search
- Advanced Search
- Transactions
- Transaction Logs
Feed All Stories
All Stories
All Stories
Tue, Dec 10
Tue, Dec 10
After installing subversion and setting LC_ALL instead of LANG I can finally reproduce on a Fedora 40 system:
Oh true, got it. Have to replace PhabricatorPolicyCapability::POLICY_ADMIN, with 'capability' => PhabricatorPolicies::POLICY_ADMIN, here
valerio.bozzolan added inline comments to D25850: Allow customizing default Phurl view and edit policies.
Mon, Dec 9
Mon, Dec 9
mturdus closed T15920: Make table of contents visible when using wide screens as Resolved by committing rP9448e815721c: Show table of contents by default on wide screens.
Show table of contents by default on wide screens
In D25850#22726, @valerio.bozzolan wrote:What happens to already-existing URLs? Maybe nice to mention in the test plan
We can also ship this feature in two phases, so, first, adding the option files.maximum-file-size, and then the second one when it's ready or requested lol
Yeah, I agree, though I would then only work on implementing files.maximum-file-size because we don't really care that much about adding exceptions to the rule (as far as I know lol)
last change promise lol
valerio.bozzolan retitled D25847: Fix regression in Remarkup unit tests and harden from Fix regression in Remarkup unit tests
arc unit
harden
\o/
valerio.bozzolan retitled D25847: Fix regression in Remarkup unit tests and harden from Fix regression in Remarkup unit tests
aklapper committed rPa5384ca60470: Hovercards: Avoid "Undefined index: objectPHID" when passing bogus data.
Hovercards: Avoid "Undefined index: objectPHID" when passing bogus data
valerio.bozzolan retitled D25847: Fix regression in Remarkup unit tests and harden from Fix unit test PhutilPygmentizeParserTestCase to Fix regression in Remarkup unit tests.
also tried to fix PhutilRemarkupEngineTestCase
but fails in link-edge-cases.txt now (thus it's likely not complete):
valerio.bozzolan accepted D25849: Hovercards: Avoid "Undefined index: objectPHID" when passing bogus data.
Double slam-accept
valerio.bozzolan retitled D25845: Repository Identity "Automatically Detected User": don't trust unverified emails from Repository Identity: don't trust unverified emails
valerio.bozzolan renamed T15965: Repository Identity "Automatically Detected User": it reads unverified emails, with spam concerns from Repository Identity: it reads unverified emails, with spam concerns to Repository Identity "Automatically Detected User": it reads unverified emails, with spam concerns.
Uh, that would be so good. So you can say "When the moon is full".
Sounds reasonable.
valerio.bozzolan added a comment to T15965: Repository Identity "Automatically Detected User": it reads unverified emails, with spam concerns.
Take for example this commit that has a default identity:
avivey added a comment to T15965: Repository Identity "Automatically Detected User": it reads unverified emails, with spam concerns.
"Steal credit" might actually lead to a real issue: If a new user can get themselves identified as an old, trusted, user based on commit history, their changes might not be checked as rigorously by the rest of the team - similar to the XZ Utils backdoor issue, only faster.
valerio.bozzolan added a comment to T15965: Repository Identity "Automatically Detected User": it reads unverified emails, with spam concerns.
Limitation: to steal a commit identity, it must be the default. Sorry I forgot to say.
Sun, Dec 8
Sun, Dec 8
valerio.bozzolan added a comment to T15965: Repository Identity "Automatically Detected User": it reads unverified emails, with spam concerns.
In T15965#20052, @speck wrote:What can a malicious user accomplish by claiming unverified email for commits?
valerio.bozzolan added a project to T15972: Add config option for maximum file size: Discussion Needed.
I like your option names. I like to specify PHIDs and not numeric IDs so it's more portable against import/exports 👍 Let's add Discussion Needed to attract some +1 or nice suggestions.
What happens to already-existing URLs? Maybe nice to mention in the test plan
docs: Remove extra 'B' from PHP config value
Fix my local unit test config
valerio.bozzolan added a project to T15970: phurl: Allow setting default edit policy for URLs: Policy.
Thanks. I see, from this page is not possible:
Sat, Dec 7
Sat, Dec 7
speck added a comment to T15965: Repository Identity "Automatically Detected User": it reads unverified emails, with spam concerns.
What can a malicious user accomplish by claiming unverified email for commits? The idea outlined here sounds right but I’d like to understand what potential harm could be done on its current state, and also whether there’s any legitimate use case for the current behavior.
Fri, Dec 6
Fri, Dec 6
aklapper closed T15968: Unit test PhabricatorAuthInviteTestCase::testDuplicateInvite fails, a subtask of T15064: Make Phorge compatible with PHP 8.1/8.2/8.3/8.4, as Resolved.
aklapper committed rARCabda70208340: Fix PhabricatorAuthInviteTestCase::testDuplicateInvite unit test.
Fix PhabricatorAuthInviteTestCase::testDuplicateInvite unit test
Add first unit test for mimemailparser headers
Double slam-accept
aklapper updated the diff for D25849: Hovercards: Avoid "Undefined index: objectPHID" when passing bogus data.
Right... one day I may get used to all those Phorge shortcuts, thanks
aklapper updated the diff for D25848: Fix PhabricatorAuthInviteTestCase::testDuplicateInvite unit test.
Oops, no for real
aklapper updated the diff for D25848: Fix PhabricatorAuthInviteTestCase::testDuplicateInvite unit test.
Uhm, right, heh
Thu, Dec 5
Thu, Dec 5
valerio.bozzolan accepted D25849: Hovercards: Avoid "Undefined index: objectPHID" when passing bogus data.
...like line 105 :)
valerio.bozzolan added a comment to D25849: Hovercards: Avoid "Undefined index: objectPHID" when passing bogus data.
Thaaanks - If I'm not wrong we can = idx($card, 'objectPHID');
aklapper requested review of D25849: Hovercards: Avoid "Undefined index: objectPHID" when passing bogus data.
aklapper requested review of D25848: Fix PhabricatorAuthInviteTestCase::testDuplicateInvite unit test.
pppery committed rP9c73d62c4466: Rewrite regex for project names to be not prone to catastrophic backtracking.
Rewrite regex for project names to be not prone to catastrophic backtracking
pppery updated the diff for D25838: Rewrite regex for project names to be not prone to catastrophic backtracking.
Rebase
I applied this patch locally on top of git master and output does not complain anymore about 'link-brackets.txt' (thus it's correct) but fails in link-edge-cases.txt now (thus it's likely not complete):
valerio.bozzolan updated the task description for T15967: Fix unit test PhutilPygmentizeParserTestCase.
valerio.bozzolan updated the diff for D25845: Repository Identity "Automatically Detected User": don't trust unverified emails.
run unit test
valerio.bozzolan changed the visibility for D25845: Repository Identity "Automatically Detected User": don't trust unverified emails.
valerio.bozzolan updated subscribers of T15965: Repository Identity "Automatically Detected User": it reads unverified emails, with spam concerns.
Adding @aklapper as subscriber in this security issue since I trust this user (unclear if this should be flagged as security thought, feel free to open)
valerio.bozzolan changed the edit policy for D25845: Repository Identity "Automatically Detected User": don't trust unverified emails.
Content licensed under Creative Commons Attribution-ShareAlike 4.0 (CC-BY-SA) unless otherwise noted; code licensed under Apache 2.0 or other open source licenses. · CC BY-SA 4.0 · Apache 2.0