Brescia, 🇮🇹
Account created on 2 April 2006, over 19 years ago
#

Merge Requests

More

Recent comments

🇮🇹Italy apaderno Brescia, 🇮🇹

No post/comment needed to be published.

🇮🇹Italy apaderno Brescia, 🇮🇹

That page is a view which uses view-drupalorg-docs-management and view-id-drupalorg_docs_management as CSS classes. I take it is a view defined in a drupal.org customization module/feature.

🇮🇹Italy apaderno Brescia, 🇮🇹

avpaderno changed the visibility of the branch 8.x-1.x to hidden.

🇮🇹Italy apaderno Brescia, 🇮🇹

I changed ownership as requested. I also confirmed the progressivedigital account, since only confirmed accounts can edit organization nodes.

🇮🇹Italy apaderno Brescia, 🇮🇹

The publication date for the articles is October first, 2024. That does not make the articles appear on Planet Drupal. I would suggest to either change the publication date for those articles or add a new article.

🇮🇹Italy apaderno Brescia, 🇮🇹

Also, this module does not contain PHP code, which means it cannot install any module. It can eventually add a new module to the Composer requirements.

🇮🇹Italy apaderno Brescia, 🇮🇹

A task issue needs to describe what needs to be done and why. A title is not sufficient for an issue.

A module does not usually install another module, except in the case both the modules are part of the same project.
In the case the projects are different, a module should add the other module as dependency, if that module is really required for the first module to run. Otherwise, the first module can implement hook_requirements() to show a suggestion to install the other module.

🇮🇹Italy apaderno Brescia, 🇮🇹

I am closing this issue because there has not been any follow-up action as described in How to become project owner, maintainer, or co-maintainer from the person who opened this offer.

🇮🇹Italy apaderno Brescia, 🇮🇹

I am closing this issue because there has not been any follow-up action as described in How to become project owner, maintainer, or co-maintainer from the person who opened this offer.

🇮🇹Italy apaderno Brescia, 🇮🇹

Since multiple offers have been open, without giving any detail on what the plan is, and no follow-up action has been done, I am going to close this issue.
This project is also covered by the security advisory policy; it means we should be careful in adding co-maintainers who cannot opt projects into security advisory coverage.

🇮🇹Italy apaderno Brescia, 🇮🇹

(I am changing title to better track these issues. I apologize for bumping this issue.)

🇮🇹Italy apaderno Brescia, 🇮🇹

Thank you for applying!

Please read Review process for security advisory coverage: What to expect for more details and Security advisory coverage application checklist to understand what reviewers look for. Tips for ensuring a smooth review gives some hints for a smoother review.

The important notes are the following.

  • If you have not done it yet, enable GitLab CI for the project, and fix what reported from the phpcs job. This help to fix most of what reviewers would report.
  • For the time this application is open, only your commits are allowed. No other people, including other maintainers/co-maintainers can make commits.
  • The purpose of this application is giving you a new drupal.org role that allows you to opt projects into security advisory coverage, either projects you already created, or projects you will create. The project status won't be changed by this application.
  • Nobody else will get the permission to opt projects into security advisory policy. If there are other maintainers/co-maintainers who will to get that permission, they need to apply with a different module.
  • We only accept an application per user. If you change your mind about the project to use for this application, or it is necessary to use a different project for the application, please update the issue summary with the link to the correct project and the issue title with the project name and the branch to review.

To the reviewers

Please read How to review security advisory coverage applications , Application workflow , What to cover in an application review , and Tools to use for reviews .

The important notes are the following.

  • It is preferable to wait for a Code Review Administrator before commenting on newly created applications. Code Review Administrators will do some preliminary checks that are necessary before any change on the project files is suggested.
  • Reviewers should show the output of a CLI tool only once per application. The configuration used for these tools needs to be the same configuration used by GitLab CI, stored in the GitLab Templates repository.
  • It may be best to have the applicant fix things before further review.

For new reviewers, I would also suggest to first read In which way the issue queue for coverage applications is different from other project queues .

🇮🇹Italy apaderno Brescia, 🇮🇹

The feed needs to have at least two articles posted in the past three months and three weeks. Only an article has been published this year; the other ones have been published in 2024, or later.

The feed passes validation.

🇮🇹Italy apaderno Brescia, 🇮🇹

Since patches are no longer tested, the issue needs to provide a merge request. The description of the issue needs to go in the issue summary, which must be updated.

I am not sure that removing the rules for the .form-item--error-message::before selector is the right way to fix the issue: Inline errors need to be styled; if a selector is still used in absence of errors, that could be a problem with the code that adds that selector.

🇮🇹Italy apaderno Brescia, 🇮🇹

📌 TestDiscovery expects @group annotations, fails with #[Group()] attributes Active has been marked as duplicate of 📌 Deprecate TestDiscovery test file scanning, use PHPUnit API instead Active , which has been fixed. I guess this issue should be no longer postponed.

🇮🇹Italy apaderno Brescia, 🇮🇹

Expanded the text to at least say which tools should be used for automatic reviews; made clear why using the same configuration files for PHP_CodeSniffer and PHPStan GitLAb CI use is better.

🇮🇹Italy apaderno Brescia, 🇮🇹

https://api.drupal.org/api/drupal/core%21lib%21Drupal%21Core%21Config%21... redirects to https://api.drupal.org/api/drupal/11.x/search, with a Sorry, the path api/drupal/core%21lib%21Drupal%21Core%21Config%21Entity%21ConfigDependencyManager.php/class/ConfigDependencyManager/11.x cannot be matched against any page in this branch. Try searching by one of the components of the path. message.

🇮🇹Italy apaderno Brescia, 🇮🇹

I added smustgrave as co-maintainer.

🇮🇹Italy apaderno Brescia, 🇮🇹

These offers need to be created in the project issue queue, even when the person asking for more permissions is already co-maintainer or maintainer. As per Offering to become a project owner, maintainer, or co-maintainer , they can be moved in the Drupal.org project ownership queue , 14 days after the offer was posted/moved in the project queue, if the offer has not been declined by maintainers (including the project owner).
Remember to give the project link, when the issue is moved.

🇮🇹Italy apaderno Brescia, 🇮🇹

The time for adding a co-maintainer is the same for unsupported project and supported projects.
Projects are marked unsupported to let people know they should consider another project, not to make the time to add a new maintainer shorter.

🇮🇹Italy apaderno Brescia, 🇮🇹

This is the message I sent.

Hello Dave,

I am contacting you because Andrey ( https://www.drupal.org/u/andypost ) offered to become maintainer for #project (#link), a project you created for which you are project owner and sole maintainer, to host the Drupal core module with the same name. (The Drupal core module will be deprecated and removed from Drupal core.)

May you post a comment on https://www.drupal.org/project/projectownership/issues/3521198 📌 Create 3.x branch to import core module Active about accepting or declining the offer? Please do not reply via email; we need a reply on the offer issue.
Without a comment posted on that issue in the next 14 days, Andrey will be probably made maintainer.

Project moderators will not remove the existing maintainers/co-maintainers; the project owner will not be replaced either. Maintainers cannot change the project owner; co-maintainers/maintainers can only be removed/added by people who have the permission to administer co-maintainers/maintainers.

As last note: This offer is about being maintainer, which is different from being co-maintainer. A maintainer is a person who has all the drupal.org permissions on a project: Write to VCS, Edit project, Administer maintainers, Maintain issues, Administer releases. A person who does not have all those permissions is a co-maintainer.
If there is any reason for not giving all those permissions, please explain that on https://www.drupal.org/project/projectownership/issues/3521198 📌 Create 3.x branch to import core module Active . We need this to know it was intentional and not a misunderstanding on what the offer required.

Best regards,
Alberto Paderno
-- Drupal.org project moderator
-- Drupal.org site moderator

The status is Postponed because we are waiting for a reply.

Please post a comment after 14 days, if your offer has not been declined. It will show you are still interested in maintaining this project and it will serve as reminder an action is required for this offer.

🇮🇹Italy apaderno Brescia, 🇮🇹

I apologize: I will handle this after my lunch.

🇮🇹Italy apaderno Brescia, 🇮🇹

Also ddev composer create drupal/recommended-project:^10 needs to be changed.

I am not sure the shown commands need to be updated; Drupal 10 is still supported.
I would rather make explicit the shown commands are for Drupal 10; in this way, a beginner person would not use them to install Drupal 11.

🇮🇹Italy apaderno Brescia, 🇮🇹

The issue summary does not contain the project link. Which one is it?

🇮🇹Italy apaderno Brescia, 🇮🇹

An issue asking whether a project is still maintained cannot be changed to an offer to become co-maintainer once it is moved to the Drupal.org project ownership queue.

If nagy.balint wants to be co-maintainer, he needs to create a new issue in the project queue. I am not going to mark the project abandoned, if nagy.balint's intention is offering to be co-maintainer.

🇮🇹Italy apaderno Brescia, 🇮🇹

This issue has been closed as duplicate but no link to the duplicated issue has been provided. Is the correct status, or should the issue be closed as Closed (won't fix), which should be done by maintainers?

🇮🇹Italy apaderno Brescia, 🇮🇹

Since patches are no longer tested, a merge request needs to be provided.

🇮🇹Italy apaderno Brescia, 🇮🇹

composer create-project drupal/cms is the correct command. Why do you propose to change it?

🇮🇹Italy apaderno Brescia, 🇮🇹

Let's see if other reviewers report other changes.

🇮🇹Italy apaderno Brescia, 🇮🇹

IMHO a hash calculated from user input should be treated as user input here but I could be wrong.

The example given in the PHP documentation is clear about what they call "user input": It is a value completely provided by the user. They also make clear that a value given in the HTTP request is considered "user input." $computed_hash is not provided in the HTTP request, so it is not "user input."
$known_string is not a value stored in a database, though; it is the value I get from the function to calculate the "hash." To make a different example, if I store in a database the largest integer supported by PHP, what I should I consider the known value when checking the value stored in the database? PHP_INT_MAX, not the value stored in the database.

I'm not fluent in C but my understanding is that it matters in algorithms that can handle hashes with a different length (which hash_equals() does not support currently but could add in the future) because it could stop the comparison early if the user string and known string are inverted.

Two strings are equal if they have the same length and all their bytes are equal. With a four-byte string and a five-byte string, only four bytes can be compared, but the strings are still different because they have different lengths.

Since the code cannot be optimized, C code is not much different from PHP code. In both the cases, two bytes can be compared in constant-time by XORing their value. (A XOR B is 0 when A and B have the same value, and it is different from 0 when A and B have different values.) Eventually, since constant-time code avoids if statements, the code could use $result = $known_string_length - $user_string_length; instead of if ($known_string_length !== $user_string_length) { return; }, but the code woud still be XORing the bytes.
Eventually, the C code could be different if it is rewritten to in Assembly and all the CPUs would have instructions to compare two strings in constant-time. The alghoritm would not change, though.

🇮🇹Italy apaderno Brescia, 🇮🇹

I do not have time for a complete review, but the following code needs to be changed.

  /**
   * DynamicReferenceSelectionUtil constructor.
   *
   * @param \Symfony\Component\DependencyInjection\ContainerInterface $container
   *   The container service.
   */
  public function __construct(ContainerInterface $container) {

    $this->container              = $container;
    $this->entityFieldManager     = $container->get('entity_field.manager');
    $this->fieldTypePluginManager = $container->get('plugin.manager.field.field_type');
    $this->request                = $container->get('request_stack')
      ->getCurrentRequest();
  }

Services define their dependencies in the .services.yml file, and those are directly passed to the class constructor.

🇮🇹Italy apaderno Brescia, 🇮🇹

Thank you for applying!

Please read Review process for security advisory coverage: What to expect for more details and Security advisory coverage application checklist to understand what reviewers look for. Tips for ensuring a smooth review gives some hints for a smoother review.

The important notes are the following.

  • If you have not done it yet, enable GitLab CI for the project, and fix what reported from the phpcs job. This help to fix most of what reviewers would report.
  • For the time this application is open, only your commits are allowed. No other people, including other maintainers/co-maintainers can make commits.
  • The purpose of this application is giving you a new drupal.org role that allows you to opt projects into security advisory coverage, either projects you already created, or projects you will create. The project status won't be changed by this application.
  • Nobody else will get the permission to opt projects into security advisory policy. If there are other maintainers/co-maintainers who will to get that permission, they need to apply with a different module.
  • We only accept an application per user. If you change your mind about the project to use for this application, or it is necessary to use a different project for the application, please update the issue summary with the link to the correct project and the issue title with the project name and the branch to review.

To the reviewers

Please read How to review security advisory coverage applications , Application workflow , What to cover in an application review , and Tools to use for reviews .

The important notes are the following.

  • It is preferable to wait for a Code Review Administrator before commenting on newly created applications. Code Review Administrators will do some preliminary checks that are necessary before any change on the project files is suggested.
  • Reviewers should show the output of a CLI tool only once per application. The configuration used for these tools needs to be the same configuration used by GitLab CI, stored in the GitLab Templates repository.
  • It may be best to have the applicant fix things before further review.

For new reviewers, I would also suggest to first read In which way the issue queue for coverage applications is different from other project queues .

🇮🇹Italy apaderno Brescia, 🇮🇹
  • The following points are just a start and don't necessarily encompass all of the changes that may be necessary
  • A specific point may just be an example and may apply in other places
  • A review is about code that does not follow the coding standards, contains possible security issue, or does not correctly use the Drupal API
  • The single review points are not ordered, not even by importance

src/Form/NodeSwapperConfirmForm.php

  /**
   * The config factory.
   *
   * @var \Drupal\Core\Config\ConfigFactoryInterface
   */
  protected $configFactory;

A parent class already defines that property, which does not need to be re-declared.

  public function __construct(
    ConfigFactoryInterface $config_factory,
    RequestStack $request_stack,
    Connection $connection,
    AliasManagerInterface $alias_manager,
    TimeInterface $time,
    EntityTypeManagerInterface $entity_type_manager,
    NodeSwapperService $node_swapper_service,
    NodeInterface $src,
    NodeInterface $dest,
  ) {
    $this->configFactory = $config_factory;
    $this->requestStack = $request_stack;
    $this->database = $connection;
    $this->aliasManager = $alias_manager;
    $this->time = $time;
    $this->entityTypeManager = $entity_type_manager;
    $this->nodeSwapperService = $node_swapper_service;
    $this->src = $src;
    $this->dest = $dest;
  }

  /**
   * {@inheritdoc}
   */
  public static function create(ContainerInterface $container) {
    return new static(
      $container->get('config.factory'),
      $container->get('request_stack'),
      $container->get('database'),
      $container->get('path_alias.manager'),
      $container->get('datetime.time'),
      $container->get('entity_type.manager'),
      $container->get('node_swapper.service'),
      $container->get('current_route_match')->getParameter('src'),s
      $container->get('current_route_match')->getParameter('dest'),
    );
  }

create() should also call $this->setMessenger() with the messenger service retrieved from the container.

    $message = '';
    $message .= "<p>This will point all alises and redirects of \"{$src_node->label()}\" to \"{$dest_node->label()}\".</p>";
    $message .= "<p>In addition, <b>ALL</b> aliases of \"New Node\" will be deleted. Redirects will not be deleted.</p>";

$message needs to be a translatable string.

🇮🇹Italy apaderno Brescia, 🇮🇹

There are no unpublished posts/comments.

🇮🇹Italy apaderno Brescia, 🇮🇹

I did not find any post/comment to publish.

🇮🇹Italy apaderno Brescia, 🇮🇹

The issue summary should explain what needs to be improved and why.

🇮🇹Italy apaderno Brescia, 🇮🇹

Truly, this application should get reviewed by other reviewers too. A partial review is not sufficient to change the status to Reviewed & tested by the community.

🇮🇹Italy apaderno Brescia, 🇮🇹

Truly, this application should wait for other reviewers.

🇮🇹Italy apaderno Brescia, 🇮🇹

The code has not been changes as for my previous #38 📌 dbc:2.1.x Needs review comment.

🇮🇹Italy apaderno Brescia, 🇮🇹

Truly, the arguments order does not matter with the previous implementation either.

mod_len = MAX(known_len, 1);

/* This is security sensitive code. Do not optimize this for speed. */
result = known_len - user_len;
for (j = 0; j < user_len; j++) {
    result |= known_str[j % mod_len] ^ user_str[j];
}

RETURN_BOOL(0 == result);

C code to compare in constant time two strings cannot be much different from the previous implementation and the actual implementation. I cannot see in which way they could rewrite the code to be dependent from the arguments order and still be constant-time code.

🇮🇹Italy apaderno Brescia, 🇮🇹

The issue summary says Drupal core uses hash_equals() in multiple places. The merge request just fixes the given example, but it should fix all the hash_equals() calls, when the user input is passed as first argument.

🇮🇹Italy apaderno Brescia, 🇮🇹

It is not a matter of pre-calculated values, which would eventually be values I calculate before I need them (and store in some places), not right before calling hash_equals().

In PhpassHashedPasswordBase::check(), the attacker is trying to guess the password so the hash computed from the sent password has to be second.

$computed_hash is not user-input. The user can just change the entered password, but finding a password that gives a specific hash is only possible by brute force, by definition of cryptographic hash, which is invertible and collision resistant.
With passwords, the operation is more complex, and it is more difficult to find a password that gives an exact $computed_hash.

When the PHP doc says the known string "must be kept secret" it does not mean it can't be stored, it means it is the sensitive string that an attacker would be trying to get with a timing attack.

You missed the point. Neither $computed_hash nor $stored_hash is user-input (provided in the HTTP request), so there is no difference in choosing which value to pass as second argument; my preference is for $stored_hash, which could not be the preference somebody else has. It is no longer a matter of user input. (This does not mean the arguments order should not be changed.)

Timing attacks work by sending a lot of different values and checking if the time it takes the server to respond vary.

The only way to avoid timing attacks is using constant-time code, which does not mean just using hash_equals().

🇮🇹Italy apaderno Brescia, 🇮🇹

In the example used by the PHP documentation, the hash calculated from a value provided by the user is passed as first parameter, not second.

// Value and signature are provided by the user, e.g. within the URL
// and retrieved using $_GET.
$value = 'username=rasmuslerdorf';
$signature = '8c35009d3b50caf7f5d2c1e031842e6b7823a1bb781d33c5237cd27b57b5f327';

if (hash_equals(hash_hmac('sha256', $value, $secretKey), $signature)) {
    echo "The value is correctly signed.", PHP_EOL;
} else {
    echo "The value was tampered with.", PHP_EOL;
}
🇮🇹Italy apaderno Brescia, 🇮🇹

$known_string is the calculated hash, which must be kept secret. It cannot be a value stored in the database.

🇮🇹Italy apaderno Brescia, 🇮🇹

I added matthijs as maintainer.

🇮🇹Italy apaderno Brescia, 🇮🇹

Thank you for applying!

Please read Review process for security advisory coverage: What to expect for more details and Security advisory coverage application checklist to understand what reviewers look for. Tips for ensuring a smooth review gives some hints for a smoother review.

The important notes are the following.

  • If you have not done it yet, enable GitLab CI for the project, and fix what reported from the phpcs job. This help to fix most of what reviewers would report.
  • For the time this application is open, only your commits are allowed. No other people, including other maintainers/co-maintainers can make commits.
  • The purpose of this application is giving you a new drupal.org role that allows you to opt projects into security advisory coverage, either projects you already created, or projects you will create. The project status won't be changed by this application.
  • Nobody else will get the permission to opt projects into security advisory policy. If there are other maintainers/co-maintainers who will to get that permission, they need to apply with a different module.
  • We only accept an application per user. If you change your mind about the project to use for this application, or it is necessary to use a different project for the application, please update the issue summary with the link to the correct project and the issue title with the project name and the branch to review.

To the reviewers

Please read How to review security advisory coverage applications , Application workflow , What to cover in an application review , and Tools to use for reviews .

The important notes are the following.

  • It is preferable to wait for a Code Review Administrator before commenting on newly created applications. Code Review Administrators will do some preliminary checks that are necessary before any change on the project files is suggested.
  • Reviewers should show the output of a CLI tool only once per application. The configuration used for these tools needs to be the same configuration used by GitLab CI, stored in the GitLab Templates repository.
  • It may be best to have the applicant fix things before further review.

For new reviewers, I would also suggest to first read In which way the issue queue for coverage applications is different from other project queues .

🇮🇹Italy apaderno Brescia, 🇮🇹

This issue queue is for reporting changes to the documentation. It is not an issue queue for reporting bugs in contributed projects, nor for asking support for those projects.

🇮🇹Italy apaderno Brescia, 🇮🇹

I removed the articles from that feed and suspended it.

🇮🇹Italy apaderno Brescia, 🇮🇹

May you give a title of an article from that feed shown on Planet Drupal?

It is not possible to search for feed URLs; searching for drupal.com.ua in this issue queue does not give any issue link, not even the link for this very issue.

🇮🇹Italy apaderno Brescia, 🇮🇹

Lines like the following ones needs to be changed, then.

return $computed_hash && hash_equals($stored_hash, $computed_hash);

$computed_hash is the expected hash, not the user-provided value.
In that case, there is no user-provided value, but a value stored in the database, which could be altered. If I follow that warning, it is $stored_hash that needs to be passed as second argument.

I did not check all the hash_equals() calls, but there are more lines that should be changed, if we follow to the letter the warning given in the PHP documentation.

🇮🇹Italy apaderno Brescia, 🇮🇹

Thank you for applying!

Please read Review process for security advisory coverage: What to expect for more details and Security advisory coverage application checklist to understand what reviewers look for. Tips for ensuring a smooth review gives some hints for a smoother review.

The important notes are the following.

  • If you have not done it yet, enable GitLab CI for the project, and fix what reported from the phpcs job. This help to fix most of what reviewers would report.
  • For the time this application is open, only your commits are allowed. No other people, including other maintainers/co-maintainers can make commits.
  • The purpose of this application is giving you a new drupal.org role that allows you to opt projects into security advisory coverage, either projects you already created, or projects you will create. The project status won't be changed by this application.
  • Nobody else will get the permission to opt projects into security advisory policy. If there are other maintainers/co-maintainers who will to get that permission, they need to apply with a different module.
  • We only accept an application per user. If you change your mind about the project to use for this application, or it is necessary to use a different project for the application, please update the issue summary with the link to the correct project and the issue title with the project name and the branch to review.

To the reviewers

Please read How to review security advisory coverage applications , Application workflow , What to cover in an application review , and Tools to use for reviews .

The important notes are the following.

  • It is preferable to wait for a Code Review Administrator before commenting on newly created applications. Code Review Administrators will do some preliminary checks that are necessary before any change on the project files is suggested.
  • Reviewers should show the output of a CLI tool only once per application. The configuration used for these tools needs to be the same configuration used by GitLab CI, stored in the GitLab Templates repository.
  • It may be best to have the applicant fix things before further review.

For new reviewers, I would also suggest to first read In which way the issue queue for coverage applications is different from other project queues .

🇮🇹Italy apaderno Brescia, 🇮🇹

It that's really the case, should we try to get the PHP doc fixed?

The PHP documentation should not show the It is important to provide the user-supplied string as the second parameter, rather than the first. warning, which seems to be a left-over from the previous implementation.
IMO, it does not generally make sense. For example, in Drupal, hashes are not always values users provide.

🇮🇹Italy apaderno Brescia, 🇮🇹

Looking at the C code used by php_safe_bcmp(), I would say that inverting the arguments does not increase the possibilities of timing attacks.

	const volatile unsigned char *ua = (const volatile unsigned char *)ZSTR_VAL(a);
	const volatile unsigned char *ub = (const volatile unsigned char *)ZSTR_VAL(b);
	size_t i = 0;
	int r = 0;

	if (ZSTR_LEN(a) != ZSTR_LEN(b)) {
		return -1;
	}

	/* This is security sensitive code. Do not optimize this for speed. */
	while (i < ZSTR_LEN(a)) {
		r |= ua[i] ^ ub[i];
		++i;
	}

	return r;

r |= ua[i] ^ ub[i]; and r |= ub[i] ^ ua[i]; would take the same amount of time to run.

🇮🇹Italy apaderno Brescia, 🇮🇹

I take that in the following code the $known_hash parameter should be $computed_hash, and the $user_string parameter should be $stored_hash.

return $computed_hash && hash_equals($stored_hash, $computed_hash);

(In other words, the correct code should be the following one.

return $computed_hash && hash_equals($computed_hash, $stored_hash);

I did not check all the calls to hash_equals(). There could be other cases where the arguments must be inverted.

I am not sure the code should be changed as for the first point. Checking the string lengths in PHP could make the code more susceptible of timing attacks. If that is not a reason for changing code, the first point should be removed from the issue summary.

Is there any evidence that passing the arguments in the wrong order would increase the possibilities of timing attacks?
Given that base64_encode() and base64_decode() are not constant-time, and both the functions are used by Drupal core, would just fixing the arguments-order for hash_equals() make Drupal core code less prone of timing attacks?

🇮🇹Italy apaderno Brescia, 🇮🇹

The typical path to confirming users usually involves reviewing the content created on this site. In this case, you have not created any content except this post, so there is no content to review.

I am postponing this issue, for now. After you have posted some content on this site, you may want to add a comment to this issue to request a new review.

Please see Become a confirmed user for information on the role and how it is granted.

Thank you and welcome!

🇮🇹Italy apaderno Brescia, 🇮🇹

I can do it, but not before July 10. (I am a little busy these days.)

🇮🇹Italy apaderno Brescia, 🇮🇹

Anything that GitLab replaces should be reverted, including <one line to give the program's name and a brief idea of what it does.>.

The license file does not contain any header. It starts with GNU GENERAL PUBLIC LICENSE.

🇮🇹Italy apaderno Brescia, 🇮🇹

See the merge request I created in the project issue queue. It contains the correct license file.

🇮🇹Italy apaderno Brescia, 🇮🇹

I usually create the license file from the GitLab interface, knowing that <year> and <name of author> are replaced by the current year and the name of the person adding the file, when they should not be.

🇮🇹Italy apaderno Brescia, 🇮🇹

I do not have time to make a more complete review, but the following point needs to be fixed.

Projects hosted on drupal.org are licensed under GPLv2+, the same license used from Drupal core. If you are licensing a project under a different license, it cannot he hosted on drupal.org. More details are given in Drupal Git Contributor Agreement & Repository Usage Policy .

All code that is a derivative work of Drupal (typically PHP code, including but not limited to: core patches, modules, themes, etc) committed to Drupal.org's git repository is licensed as GPL version 2.0 and later (official short identifier: “GPL-2.0-or-later”). This means that the code is licensed under GPLv2, and there exists an option that allows downstream recipients to re-license the code to be under a later version of GPL.

For code licensed under GPLv3, see See I want to release my work under GPL version 3 or under GPL version 2-only. Can I do so and host it on Drupal.org?

No. You can release your work under any GPL version 2 or later compatible license. However, you may only check it into Drupal's Git repositories if you are releasing it under the same license as Drupal itself, that is GPL version 2 or later, allowing users to choose between the terms of the GPL version 2 or the terms in any new versions as updated by the FSF. If you are unable or unwilling to do so, do not check it into a Drupal Git repository.

🇮🇹Italy apaderno Brescia, 🇮🇹

Thank you for applying!

Please read Review process for security advisory coverage: What to expect for more details and Security advisory coverage application checklist to understand what reviewers look for. Tips for ensuring a smooth review gives some hints for a smoother review.

The important notes are the following.

  • If you have not done it yet, enable GitLab CI for the project, and fix what reported from the phpcs job. This help to fix most of what reviewers would report.
  • For the time this application is open, only your commits are allowed. No other people, including other maintainers/co-maintainers can make commits.
  • The purpose of this application is giving you a new drupal.org role that allows you to opt projects into security advisory coverage, either projects you already created, or projects you will create. The project status won't be changed by this application.
  • Nobody else will get the permission to opt projects into security advisory policy. If there are other maintainers/co-maintainers who will to get that permission, they need to apply with a different module.
  • We only accept an application per user. If you change your mind about the project to use for this application, or it is necessary to use a different project for the application, please update the issue summary with the link to the correct project and the issue title with the project name and the branch to review.

To the reviewers

Please read How to review security advisory coverage applications , Application workflow , What to cover in an application review , and Tools to use for reviews .

The important notes are the following.

  • It is preferable to wait for a Code Review Administrator before commenting on newly created applications. Code Review Administrators will do some preliminary checks that are necessary before any change on the project files is suggested.
  • Reviewers should show the output of a CLI tool only once per application. The configuration used for these tools needs to be the same configuration used by GitLab CI, stored in the GitLab Templates repository.
  • It may be best to have the applicant fix things before further review.

For new reviewers, I would also suggest to first read In which way the issue queue for coverage applications is different from other project queues .

🇮🇹Italy apaderno Brescia, 🇮🇹

Remember to change status, when the project is ready for review, as in this queue Active means Don't review yet the project I am using for this application.

🇮🇹Italy apaderno Brescia, 🇮🇹

Thank you for applying!

Please read Review process for security advisory coverage: What to expect for more details and Security advisory coverage application checklist to understand what reviewers look for. Tips for ensuring a smooth review gives some hints for a smoother review.

The important notes are the following.

  • If you have not done it yet, enable GitLab CI for the project, and fix what reported from the phpcs job. This help to fix most of what reviewers would report.
  • For the time this application is open, only your commits are allowed. No other people, including other maintainers/co-maintainers can make commits.
  • The purpose of this application is giving you a new drupal.org role that allows you to opt projects into security advisory coverage, either projects you already created, or projects you will create. The project status won't be changed by this application.
  • Nobody else will get the permission to opt projects into security advisory policy. If there are other maintainers/co-maintainers who will to get that permission, they need to apply with a different module.
  • We only accept an application per user. If you change your mind about the project to use for this application, or it is necessary to use a different project for the application, please update the issue summary with the link to the correct project and the issue title with the project name and the branch to review.

To the reviewers

Please read How to review security advisory coverage applications , Application workflow , What to cover in an application review , and Tools to use for reviews .

The important notes are the following.

  • It is preferable to wait for a Code Review Administrator before commenting on newly created applications. Code Review Administrators will do some preliminary checks that are necessary before any change on the project files is suggested.
  • Reviewers should show the output of a CLI tool only once per application. The configuration used for these tools needs to be the same configuration used by GitLab CI, stored in the GitLab Templates repository.
  • It may be best to have the applicant fix things before further review.

For new reviewers, I would also suggest to first read In which way the issue queue for coverage applications is different from other project queues .

🇮🇹Italy apaderno Brescia, 🇮🇹

I published Add filter option for bynder compact view Active and confirmed the account.

Production build 0.71.5 2024