Problem/Motivation
As of #3524087, the use of the terms "whitelist" and "whitelisted" is flagged by cspell in contributed modules.
This impacts the GitLab CI pipeline for flood_control, since it is enforced in .gitlab-ci.yml:
21 │ # Require tests to pass.
22 │ cspell:
23 │ allow_failure: false
Steps to reproduce
From the pipeline job 5785666
$ $CI_PROJECT_DIR/$_WEB_ROOT/core/node_modules/.bin/cspell -c .cspell.json --show-suggestions --show-context --no-progress $_CSPELL_EXTRA $CSPELL_SEARCH || EXIT_CODE=$?
config/schema/flood_control.schema.yml:7:23 - Forbidden word (whitelisted) -- label: 'List of whitelisted IP addresses and ranges
Suggestions: [allowlisted*, whitefishes, whitewashed, whitelisting]
flood_control.install:51:37 - Forbidden word (Whitelist) -- default value for the IP Whitelist to the settings config
Suggestions: [Allowlist*, Whitest, Whitefish, Whiteouts, Whitebaits]
flood_control.module:67:21 - Forbidden word (whitelist) -- * Parse and return whitelist IPs from config value
Suggestions: [allowlist*, whitest, whitefish, whiteouts, whitebaits]
flood_control.module:69:19 - Forbidden word (whitelist) -- * @param string $whitelistIpsValue
Suggestions: [allowlist*, whitest, whitefish, whiteouts, whitebaits]
flood_control.module:70:35 - Forbidden word (whitelisted) -- IP addresses to be whitelisted (string value from config
Suggestions: [allowlisted*, whitefishes, whitewashed, whitelisting]
flood_control.module:73:18 - Forbidden word (whitelist) -- * An array of whitelist of IPs addresses and
Suggestions: [allowlist*, whitest, whitefish, whiteouts, whitebaits]
flood_control.module:75:28 - Forbidden word (whitelist) -- function flood_control_get_whitelist_ips(string $whitelistIpsValue
Suggestions: [allowlist*, whitest, whitefish, whiteouts, whitebaits]
flood_control.module:75:50 - Forbidden word (whitelist) -- whitelist_ips(string $whitelistIpsValue = '') {
Suggestions: [allowlist*, whitest, whitefish, whiteouts, whitebaits]
flood_control.services.yml:6:23 - Forbidden word (whitelist) -- flood_control.flood_whitelist:
Suggestions: [allowlist*, whitest, whitefish, whiteouts, whitebaits]
flood_control.services.yml:12:31 - Forbidden word (whitelist) -- flood_control.flood_whitelist.inner'
Suggestions: [allowlist*, whitest, whitefish, whiteouts, whitebaits]
src/FloodWhiteList.php:44:20 - Forbidden word (Whitelisted) -- if ($this->isIpWhitelisted()) {
Suggestions: [Allowlisted*, Whitefishes, Whitewashed, Whitelisting]
src/FloodWhiteList.php:73:30 - Forbidden word (whitelisted) -- Checks if ip address is whitelisted.
Suggestions: [allowlisted*, whitefishes, whitewashed, whitelisting]
src/FloodWhiteList.php:76:55 - Forbidden word (whitelist) -- checked if it is in whitelist. If no ip value
Suggestions: [allowlist*, whitest, whitefish, whiteouts, whitebaits]
src/FloodWhiteList.php:80:40 - Forbidden word (whitelisted) -- requested IP address is whitelisted, FALSE if it is not
Suggestions: [allowlisted*, whitefishes, whitewashed, whitelisting]
src/FloodWhiteList.php:82:26 - Forbidden word (Whitelisted) -- protected function isIpWhitelisted(string $ipAddress =
Suggestions: [Allowlisted*, Whitefishes, Whitewashed, Whitelisting]
src/FloodWhiteList.php:90:39 - Forbidden word (whitelist) -- = flood_control_get_whitelist_ips();
Suggestions: [allowlist*, whitest, whitefish, whiteouts, whitebaits]
src/Form/FloodControlSettingsForm.php:138:32 - Forbidden word (whitelist) -- title' => $this->t('IP whitelist'),
Suggestions: [allowlist*, whitest, whitefish, whiteouts, whitebaits]
src/Form/FloodControlSettingsForm.php:180:19 - Forbidden word (whitelisted) -- // Validating whitelisted ip addresses.
Suggestions: [allowlisted*, whitefishes, whitewashed, whitelisting]
src/Form/FloodControlSettingsForm.php:181:6 - Forbidden word (whitelist) -- $whitelistIps = flood_control_get
Suggestions: [allowlist*, whitest, whitefish, whiteouts, whitebaits]
src/Form/FloodControlSettingsForm.php:181:39 - Forbidden word (whitelist) -- = flood_control_get_whitelist_ips($form_state->getValue
Suggestions: [allowlist*, whitest, whitefish, whiteouts, whitebaits]
src/Form/FloodControlSettingsForm.php:184:17 - Forbidden word (whitelist) -- if (!empty($whitelistIps['addresses'])) {
Suggestions: [allowlist*, whitest, whitefish, whiteouts, whitebaits]
src/Form/FloodControlSettingsForm.php:185:17 - Forbidden word (whitelist) -- foreach ($whitelistIps['addresses'] as
Suggestions: [allowlist*, whitest, whitefish, whiteouts, whitebaits]
CSpell: Files checked: 32, Issues found: 22 in 6 files.