- User Since
- Oct 27 2021, 11:50 (67 w, 6 h)
Fri, Feb 3
Dec 17 2022
When I said inconsistencies, I was talking specifically issues where certain UI elements have the original English version of the text, while others have the "translated" Pirate English version of the text.
Oct 28 2022
Oct 12 2022
Working around this right now by setting up a Relayed Domain on my mail server and pointing it to the server that my Phorge instance is running on. Obviously only an option if you are running your mailserver, and your configuration isn't too complex to support it.
Oct 11 2022
Another example of broken dark theme
There's a difference between deleting data as a Phab/Phorge admin (which is done via the bin/delete script, and prints out a massive warning about it potentially breaking stuff and generally being a bad idea), and schema migrations done as part of an upgrade, which would happily delete data without a second thought.
Oct 9 2022
Also, this is fairly similar to T15082. Having Epics would probably also resolve that.
I feel like the idea behind milestones being strictly ordered is from the viewpoint that milestones are sequential "events" that happen in development one after another in a given order.
Oct 6 2022
I setup a cron that makes a bunch of DNS queries for different records within the phorge.it zone from all the authoritative nameservers for the zone (see T15080#1985).
Oct 4 2022
Just resurfaced today (now).
Sep 21 2022
I'm actually gonna close this as Resolved - we can always reopen, or refer back to this, if the issue resurfaces.
Nothing new since last time I commented here.
Sep 1 2022
I mean, that's not a particularly good solution to the problem. It just makes the time for which it appears to be fixed longer (even though nothing has changed)
May 28 2022
To be fair, I wouldn't discount already needing access as a viable attack vector, even on private installations.
The disclosed issue is that someone can gain access to Files objects they don't have access to by, for example, getting someone with permissions to edit a task they wrote (by including a reference to that file which gets "activated" when the person with permissions to view it saves the edit), which makes the file accessible via the task description.
IMPORTANT: This release mitigates a severe security issue which allows attackers with few permission to gain access to files they can not otherwise see. All installs are strongly advised to upgrade.
May 21 2022
May 12 2022
If we merge, a force-push should not be required - unless you mean something other than standard git merge here. (Force-push is required when rewriting already pushed history - git merge simply adds a new commit that applies the changes on top of the branch)
Apr 16 2022
Apr 15 2022
ahh, I was wondering why my Phorge install suddenly broke - seems to be the case here too
Apr 4 2022
Alright, I've just went through a similar process - they apparently have changed their process a little but there still is a form to fill out: https://support.microsoft.com/en-us/getsupport?oaspworkflow=start_22.214.171.124&wfname=capsub&productkey=edfsmsbl3 (you need a Microsoft Account to fill it out, but they'll contact you on the contact email you give in the form)
Apr 3 2022
Apr 1 2022
Reordering milestones is convenient when you want to treat milestones as workflow steps rather than sequential numerical versions.
Mar 29 2022
Since all changes are going to be submitted to the upstream prior to landing here in Phorge it would be easiest if changes were made to a clone of Phabricator and not a clone of Phorge.
epriestley was very much against this idea but wikimedia's users loved it.
Mar 25 2022
What you're talking about is more like mTLS (mutual TLS), that's not actually how WebAuthn works. (Though supporting mTLS for sign-ins might also be something worth looking into)
Mar 24 2022
We should definitely focus on implementing WebAuthn, as that allows us to support almost every standard hardware key solution out there.
Mar 23 2022
Mar 22 2022
Mar 21 2022
Another one popped up: https://we.phorge.it/p/seo-auckland/
Mar 17 2022
Mar 16 2022
I had experience with emails from my self-hosted mailserver not reaching Microsoft-hosted mailboxes. As far as I remember, their SMTP replies to "suspicious" mail servers with a message that includes a link to some sort of a form which the mail admin should fill out. That worked for me - might need to dig through the server logs to see the link though.
Might be worth it having the linter classes inherit from a language-specific class that would handle things like environment initialization and dependency installation.
Mar 15 2022
Checking the source in Arcanist repo, it seems like none of the python linters are actually configured to use an interpreter. (If I attempt to specify one for Pylint anyway, it fails with Got unexpected parameters: interpreter)
Mar 13 2022
Right now,arc lint doesn't really allow for the activation of a virtual env. That's okay when I'm just running arc lint locally, because I can just activate the environment myself and run it in that environment.
Mar 12 2022
Dec 9 2021
Hmm, yeah, looks to be something with how Firefox renders sites... Can confirm that reload fixes the layout.
Well, there are inconsistencies. For example, subscribers are called "spies" in the task overview, but "subscribers" in the task history, and "spies" again in task actions.
Dec 5 2021
It's a 720x1440 device, which is on the low end of screen resolutions nowadays.
Nov 1 2021
Oct 29 2021
I18n is also fairly important from the point of view that citizens in certain jurisdictions are basically legally immune against documents written in a language different from the official language of their jurisdiction, so, +1 on that.
Yes, that's why I'm saying "yeah, great idea, let's do this, but let's also create a config toggle so that it can be disabled for people and orgs who don't need it".
Oct 28 2021
Yes, the GDPR notice must inform about each and every purpose specifically. But it must do so only once - that can be at sign up.
Oct 27 2021
It's not just visual - I'm actually unable to open the individual tasks.
+1 to removing default.pem
/shrug on keeping custom.pem
What was the original rationale behind shipping a certificate bundle with Arcanist? It may be better to rely on the system certificate bundle instead (that also tends to have certificates from, for example, internal company issuers as well).
A perfect example of "hard to see" things in dark mode
Definitely a good idea for anyone who wants to run Phorge in EU/UK or work with EU/UK contributors. Though it really is only necessary for the signup page - individual repositories really only have to worry about CLAs (if relevant).