Issue #3410210 by quietone, sourabhjain, smustgrave, Spokje, catch: Remove statistics module from comments
parent
5d87e70d98
commit
4a5308123a
|
@ -8,7 +8,6 @@
|
||||||
* @see index.php
|
* @see index.php
|
||||||
* @see core/install.php
|
* @see core/install.php
|
||||||
* @see core/rebuild.php
|
* @see core/rebuild.php
|
||||||
* @see core/modules/statistics/statistics.php
|
|
||||||
*/
|
*/
|
||||||
|
|
||||||
return require __DIR__ . '/vendor/autoload.php';
|
return require __DIR__ . '/vendor/autoload.php';
|
||||||
|
|
|
@ -113,7 +113,6 @@ final class GenerateAutoloadReferenceFile {
|
||||||
* @see index.php
|
* @see index.php
|
||||||
* @see core/install.php
|
* @see core/install.php
|
||||||
* @see core/rebuild.php
|
* @see core/rebuild.php
|
||||||
* @see core/modules/statistics/statistics.php
|
|
||||||
*/
|
*/
|
||||||
|
|
||||||
return require __DIR__ . '/{$relative_autoload_path}';
|
return require __DIR__ . '/{$relative_autoload_path}';
|
||||||
|
|
|
@ -355,14 +355,13 @@ $settings['update_free_access'] = FALSE;
|
||||||
* security, or encryption benefits. In an environment where Drupal
|
* security, or encryption benefits. In an environment where Drupal
|
||||||
* is behind a reverse proxy, the real IP address of the client should
|
* is behind a reverse proxy, the real IP address of the client should
|
||||||
* be determined such that the correct client IP address is available
|
* be determined such that the correct client IP address is available
|
||||||
* to Drupal's logging, statistics, and access management systems. In
|
* to Drupal's logging and access management systems. In the most simple
|
||||||
* the most simple scenario, the proxy server will add an
|
* scenario, the proxy server will add an X-Forwarded-For header to the request
|
||||||
* X-Forwarded-For header to the request that contains the client IP
|
* that contains the client IP address. However, HTTP headers are vulnerable to
|
||||||
* address. However, HTTP headers are vulnerable to spoofing, where a
|
* spoofing, where a malicious client could bypass restrictions by setting the
|
||||||
* malicious client could bypass restrictions by setting the
|
* X-Forwarded-For header directly. Therefore, Drupal's proxy configuration
|
||||||
* X-Forwarded-For header directly. Therefore, Drupal's proxy
|
* requires the IP addresses of all remote proxies to be specified in
|
||||||
* configuration requires the IP addresses of all remote proxies to be
|
* $settings['reverse_proxy_addresses'] to work correctly.
|
||||||
* specified in $settings['reverse_proxy_addresses'] to work correctly.
|
|
||||||
*
|
*
|
||||||
* Enable this setting to get Drupal to determine the client IP from the
|
* Enable this setting to get Drupal to determine the client IP from the
|
||||||
* X-Forwarded-For header. If you are unsure about this setting, do not have a
|
* X-Forwarded-For header. If you are unsure about this setting, do not have a
|
||||||
|
|
|
@ -136,13 +136,6 @@ class Link extends RenderElement {
|
||||||
* // passing in to links.html.twig.
|
* // passing in to links.html.twig.
|
||||||
* ),
|
* ),
|
||||||
* ),
|
* ),
|
||||||
* 'statistics' => array(
|
|
||||||
* '#theme' => 'links__node__statistics',
|
|
||||||
* '#links' => array(
|
|
||||||
* // An array of links associated with node statistics, suitable for
|
|
||||||
* // passing in to links.html.twig.
|
|
||||||
* ),
|
|
||||||
* ),
|
|
||||||
* 'translation' => array(
|
* 'translation' => array(
|
||||||
* '#theme' => 'links__node__translation',
|
* '#theme' => 'links__node__translation',
|
||||||
* '#links' => array(
|
* '#links' => array(
|
||||||
|
|
|
@ -2,7 +2,6 @@
|
||||||
label: 'Viewing lists of recently-updated content'
|
label: 'Viewing lists of recently-updated content'
|
||||||
related:
|
related:
|
||||||
- core.tracking_content
|
- core.tracking_content
|
||||||
- statistics.tracking_popular_content
|
|
||||||
- history.tracking_user_content
|
- history.tracking_user_content
|
||||||
---
|
---
|
||||||
{% set recent_link_text %}
|
{% set recent_link_text %}
|
||||||
|
|
|
@ -355,14 +355,13 @@ $settings['update_free_access'] = FALSE;
|
||||||
* security, or encryption benefits. In an environment where Drupal
|
* security, or encryption benefits. In an environment where Drupal
|
||||||
* is behind a reverse proxy, the real IP address of the client should
|
* is behind a reverse proxy, the real IP address of the client should
|
||||||
* be determined such that the correct client IP address is available
|
* be determined such that the correct client IP address is available
|
||||||
* to Drupal's logging, statistics, and access management systems. In
|
* to Drupal's logging and access management systems. In the most simple
|
||||||
* the most simple scenario, the proxy server will add an
|
* scenario, the proxy server will add an X-Forwarded-For header to the request
|
||||||
* X-Forwarded-For header to the request that contains the client IP
|
* that contains the client IP address. However, HTTP headers are vulnerable to
|
||||||
* address. However, HTTP headers are vulnerable to spoofing, where a
|
* spoofing, where a malicious client could bypass restrictions by setting the
|
||||||
* malicious client could bypass restrictions by setting the
|
* X-Forwarded-For header directly. Therefore, Drupal's proxy configuration
|
||||||
* X-Forwarded-For header directly. Therefore, Drupal's proxy
|
* requires the IP addresses of all remote proxies to be specified in
|
||||||
* configuration requires the IP addresses of all remote proxies to be
|
* $settings['reverse_proxy_addresses'] to work correctly.
|
||||||
* specified in $settings['reverse_proxy_addresses'] to work correctly.
|
|
||||||
*
|
*
|
||||||
* Enable this setting to get Drupal to determine the client IP from the
|
* Enable this setting to get Drupal to determine the client IP from the
|
||||||
* X-Forwarded-For header. If you are unsure about this setting, do not have a
|
* X-Forwarded-For header. If you are unsure about this setting, do not have a
|
||||||
|
|
Loading…
Reference in New Issue