arc unit
- Queries
- All Stories
- Search
- Advanced Search
- Transactions
- Transaction Logs
All Stories
Mon, Dec 9
harden
\o/
also tried to fix PhutilRemarkupEngineTestCase
but fails in link-edge-cases.txt now (thus it's likely not complete):
Double slam-accept
Uh, that would be so good. So you can say "When the moon is full".
Sounds reasonable.
Take for example this commit that has a default identity:
"Steal credit" might actually lead to a real issue: If a new user can get themselves identified as an old, trusted, user based on commit history, their changes might not be checked as rigorously by the rest of the team - similar to the XZ Utils backdoor issue, only faster.
Limitation: to steal a commit identity, it must be the default. Sorry I forgot to say.
Dec 8 2024
In T15965#20052, @speck wrote:What can a malicious user accomplish by claiming unverified email for commits?
I like your option names. I like to specify PHIDs and not numeric IDs so it's more portable against import/exports 👍 Let's add Discussion Needed to attract some +1 or nice suggestions.
What happens to already-existing URLs? Maybe nice to mention in the test plan
Fix my local unit test config
Thanks. I see, from this page is not possible:
Dec 7 2024
What can a malicious user accomplish by claiming unverified email for commits? The idea outlined here sounds right but I’d like to understand what potential harm could be done on its current state, and also whether there’s any legitimate use case for the current behavior.
Dec 6 2024
Double slam-accept
Right... one day I may get used to all those Phorge shortcuts, thanks
Oops, no for real
Uhm, right, heh
Dec 5 2024
...like line 105 :)
Thaaanks - If I'm not wrong we can = idx($card, 'objectPHID');
Rebase
I applied this patch locally on top of git master and output does not complain anymore about 'link-brackets.txt' (thus it's correct) but fails in link-edge-cases.txt now (thus it's likely not complete):
run unit test
Adding @aklapper as subscriber in this security issue since I trust this user (unclear if this should be flagged as security thought, feel free to open)
Dec 4 2024
This seems to impact mail deliverability to @icloud.com addresses too.
Please "remind" me about this ticket as often as possible, so I will fix it. I have everything I need to actually fix this, except the willpower.
We should maybe rewrite a bit the proposed solution, since ideally it's possible to use upstream.phorge.dev but it should be at least reachable to pass some anti-spam checkers I guess. At the moment it isn't:
Dec 3 2024
@mturdus: Thanks! LGTM
@valerio.bozzolan: Feel free to give this revised version another review :)
Big thanks for digging deep into that regex (on which I gave up).