When a user creates a task, this entry appears in the timeline:
Qgil changed Security from none to none.
Can this entry be avoided in the future? No need to change anything in tasks that already have it.
When a user creates a task, this entry appears in the timeline:
Qgil changed Security from none to none.
Can this entry be avoided in the future? No need to change anything in tasks that already have it.
Project | Branch | Lines +/- | Subject | |
---|---|---|---|---|
operations/puppet | production | +1 -1 | phabricator: Change security_topic from "default: none" to "default: default" |
Unknown Object (Diffusion Commit) | |
Unknown Object (Diffusion Commit) |
Status | Subtype | Assigned | Task | ||
---|---|---|---|---|---|
Duplicate | mmodell | T76008 Nonexistent change in custom policy logged when mentioning a security task | |||
Resolved | mmodell | T479 "changed Security from none to none." in initial task creation |
I'm not exactly sure why this is happening. I looked through the security plugin code and I don't see anything that would be causing this.
apparently this is not just a problem at initial filing time. T109#10883:
jeremyb-phone set Security to none.
Yes, it also affects tickets that were imported or created before setting up the specific Security field values.
Do we have any idea whether the Bugzilla and RT migrated tasks will inherit this problem as well?
Do we have any idea whether the Bugzilla and RT migrated tasks will inherit this problem as well?
Can this be tested on the bugzilla preview?
Imported BZ tasks didn't get "changed Security from none to none", thankfully. But the first time you use "Edit Task", Phabricator thinks that you "set Security to none", which is equally annoying. See T58091 for an example.
This is annoying but I've tried everything I can think of to make it go away and no matter what I've tried phab still does some form of this logging in the task transactions. It's dumb and I really don't know what the solution is but I'll keep this on my radar.
Is it worth to ask for a second pair of eyes upstream? It is just a detail but it is indeed annoying.
As an intermediate solution, could we have a bot go through and null edit every task to mark all the tasks that are currently public as Security = none.
This currently feels like death by a thousand cuts. If Phabricator/Maniphest insists that every task have a security policy, can we just do a single pass with a bot and get this over with?
Please let us fix T493 (should be done one of these days) and see what happens with this problem.
I finally got to the bottom of the "none" to "none" issue:
The field configuration has "default": "none"
And the options also has "default": "none"
however, the value of "default" is supposed to point to the key of the entry in options, so
we need to change it to "default": "default" as in the following field config:
"security_topic" : { "default" : "default", "description" : "Used for security oriented custom extensions", "instructions" : "Security settings will override permissions and projects as needed.", "name" : "Security", "options" : { "default" : "none", "sensitive" : "Private Issue", "security-bug" : "Security Bug" }, "search" : true, "type" : "select" }
Change 179407 had a related patch set uploaded (by 20after4):
change "default: none" to "default: default" for phabricator's security_topic field to fix the "changed none to none" bug. This fixes T479
This is extra confusing when a task has a non-public view policy. Security is none but also it's not visible to a typcial user. (maybe off-topic for this task. feel free to point me somewhere else)
@Qgil & @jeremyb-phone: The patch linked above will resolve the issue of confusing entries in the task transaction log. It will not prevent you from setting a custom policy yet leaving the security field set to none. You shouldn't need to use the custom policy interface, just set the security field and let phabricator take care of generating the custom policy for you.
Change 179407 merged by Rush:
phabricator: Change security_topic from "default: none" to "default: default"
The "USERNAME set Security to none" action is still happening for tasks imported from bugzilla, and is confusing some users. See T20871#983927
There's a plan to do this or has it been declined?
This isn't fixed on new tasks either. https://phabricator.wikimedia.org/T89398#1035387
I think @PiRSquared17 used "Edit Task" to subscribe you and thus triggered T87135. This task is only about the initial creation of a task which worked fine for T89398.
No. There were two errors triggered (likely) by different code paths:
Mixing this up in one task is not aiding fixing them as then energy is lost in deciphering what already has been resolved and what still needs to be fixed.