Issue #3410210 by quietone, sourabhjain, smustgrave, Spokje, catch: Remove statistics module from comments
							parent
							
								
									5d87e70d98
								
							
						
					
					
						commit
						4a5308123a
					
				| 
						 | 
					@ -8,7 +8,6 @@
 | 
				
			||||||
 * @see index.php
 | 
					 * @see index.php
 | 
				
			||||||
 * @see core/install.php
 | 
					 * @see core/install.php
 | 
				
			||||||
 * @see core/rebuild.php
 | 
					 * @see core/rebuild.php
 | 
				
			||||||
 * @see core/modules/statistics/statistics.php
 | 
					 | 
				
			||||||
 */
 | 
					 */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
return require __DIR__ . '/vendor/autoload.php';
 | 
					return require __DIR__ . '/vendor/autoload.php';
 | 
				
			||||||
| 
						 | 
					
 | 
				
			||||||
| 
						 | 
					@ -113,7 +113,6 @@ final class GenerateAutoloadReferenceFile {
 | 
				
			||||||
 * @see index.php
 | 
					 * @see index.php
 | 
				
			||||||
 * @see core/install.php
 | 
					 * @see core/install.php
 | 
				
			||||||
 * @see core/rebuild.php
 | 
					 * @see core/rebuild.php
 | 
				
			||||||
 * @see core/modules/statistics/statistics.php
 | 
					 | 
				
			||||||
 */
 | 
					 */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
return require __DIR__ . '/{$relative_autoload_path}';
 | 
					return require __DIR__ . '/{$relative_autoload_path}';
 | 
				
			||||||
| 
						 | 
					
 | 
				
			||||||
| 
						 | 
					@ -355,14 +355,13 @@ $settings['update_free_access'] = FALSE;
 | 
				
			||||||
 * security, or encryption benefits. In an environment where Drupal
 | 
					 * security, or encryption benefits. In an environment where Drupal
 | 
				
			||||||
 * is behind a reverse proxy, the real IP address of the client should
 | 
					 * is behind a reverse proxy, the real IP address of the client should
 | 
				
			||||||
 * be determined such that the correct client IP address is available
 | 
					 * be determined such that the correct client IP address is available
 | 
				
			||||||
 * to Drupal's logging, statistics, and access management systems. In
 | 
					 * to Drupal's logging and access management systems. In the most simple
 | 
				
			||||||
 * the most simple scenario, the proxy server will add an
 | 
					 * scenario, the proxy server will add an X-Forwarded-For header to the request
 | 
				
			||||||
 * X-Forwarded-For header to the request that contains the client IP
 | 
					 * that contains the client IP address. However, HTTP headers are vulnerable to
 | 
				
			||||||
 * address. However, HTTP headers are vulnerable to spoofing, where a
 | 
					 * spoofing, where a malicious client could bypass restrictions by setting the
 | 
				
			||||||
 * malicious client could bypass restrictions by setting the
 | 
					 * X-Forwarded-For header directly. Therefore, Drupal's proxy configuration
 | 
				
			||||||
 * X-Forwarded-For header directly. Therefore, Drupal's proxy
 | 
					 * requires the IP addresses of all remote proxies to be specified in
 | 
				
			||||||
 * configuration requires the IP addresses of all remote proxies to be
 | 
					 * $settings['reverse_proxy_addresses'] to work correctly.
 | 
				
			||||||
 * specified in $settings['reverse_proxy_addresses'] to work correctly.
 | 
					 | 
				
			||||||
 *
 | 
					 *
 | 
				
			||||||
 * Enable this setting to get Drupal to determine the client IP from the
 | 
					 * Enable this setting to get Drupal to determine the client IP from the
 | 
				
			||||||
 * X-Forwarded-For header. If you are unsure about this setting, do not have a
 | 
					 * X-Forwarded-For header. If you are unsure about this setting, do not have a
 | 
				
			||||||
| 
						 | 
					
 | 
				
			||||||
| 
						 | 
					@ -136,13 +136,6 @@ class Link extends RenderElement {
 | 
				
			||||||
   *       // passing in to links.html.twig.
 | 
					   *       // passing in to links.html.twig.
 | 
				
			||||||
   *     ),
 | 
					   *     ),
 | 
				
			||||||
   *   ),
 | 
					   *   ),
 | 
				
			||||||
   *   'statistics' => array(
 | 
					 | 
				
			||||||
   *     '#theme' => 'links__node__statistics',
 | 
					 | 
				
			||||||
   *     '#links' => array(
 | 
					 | 
				
			||||||
   *       // An array of links associated with node statistics, suitable for
 | 
					 | 
				
			||||||
   *       // passing in to links.html.twig.
 | 
					 | 
				
			||||||
   *     ),
 | 
					 | 
				
			||||||
   *   ),
 | 
					 | 
				
			||||||
   *   'translation' => array(
 | 
					   *   'translation' => array(
 | 
				
			||||||
   *     '#theme' => 'links__node__translation',
 | 
					   *     '#theme' => 'links__node__translation',
 | 
				
			||||||
   *     '#links' => array(
 | 
					   *     '#links' => array(
 | 
				
			||||||
| 
						 | 
					
 | 
				
			||||||
| 
						 | 
					@ -2,7 +2,6 @@
 | 
				
			||||||
label: 'Viewing lists of recently-updated content'
 | 
					label: 'Viewing lists of recently-updated content'
 | 
				
			||||||
related:
 | 
					related:
 | 
				
			||||||
  - core.tracking_content
 | 
					  - core.tracking_content
 | 
				
			||||||
  - statistics.tracking_popular_content
 | 
					 | 
				
			||||||
  - history.tracking_user_content
 | 
					  - history.tracking_user_content
 | 
				
			||||||
---
 | 
					---
 | 
				
			||||||
{% set recent_link_text %}
 | 
					{% set recent_link_text %}
 | 
				
			||||||
| 
						 | 
					
 | 
				
			||||||
| 
						 | 
					@ -355,14 +355,13 @@ $settings['update_free_access'] = FALSE;
 | 
				
			||||||
 * security, or encryption benefits. In an environment where Drupal
 | 
					 * security, or encryption benefits. In an environment where Drupal
 | 
				
			||||||
 * is behind a reverse proxy, the real IP address of the client should
 | 
					 * is behind a reverse proxy, the real IP address of the client should
 | 
				
			||||||
 * be determined such that the correct client IP address is available
 | 
					 * be determined such that the correct client IP address is available
 | 
				
			||||||
 * to Drupal's logging, statistics, and access management systems. In
 | 
					 * to Drupal's logging and access management systems. In the most simple
 | 
				
			||||||
 * the most simple scenario, the proxy server will add an
 | 
					 * scenario, the proxy server will add an X-Forwarded-For header to the request
 | 
				
			||||||
 * X-Forwarded-For header to the request that contains the client IP
 | 
					 * that contains the client IP address. However, HTTP headers are vulnerable to
 | 
				
			||||||
 * address. However, HTTP headers are vulnerable to spoofing, where a
 | 
					 * spoofing, where a malicious client could bypass restrictions by setting the
 | 
				
			||||||
 * malicious client could bypass restrictions by setting the
 | 
					 * X-Forwarded-For header directly. Therefore, Drupal's proxy configuration
 | 
				
			||||||
 * X-Forwarded-For header directly. Therefore, Drupal's proxy
 | 
					 * requires the IP addresses of all remote proxies to be specified in
 | 
				
			||||||
 * configuration requires the IP addresses of all remote proxies to be
 | 
					 * $settings['reverse_proxy_addresses'] to work correctly.
 | 
				
			||||||
 * specified in $settings['reverse_proxy_addresses'] to work correctly.
 | 
					 | 
				
			||||||
 *
 | 
					 *
 | 
				
			||||||
 * Enable this setting to get Drupal to determine the client IP from the
 | 
					 * Enable this setting to get Drupal to determine the client IP from the
 | 
				
			||||||
 * X-Forwarded-For header. If you are unsure about this setting, do not have a
 | 
					 * X-Forwarded-For header. If you are unsure about this setting, do not have a
 | 
				
			||||||
| 
						 | 
					
 | 
				
			||||||
		Loading…
	
		Reference in New Issue