Bawolff (Brian Wolff)
Security

Today

  • Clear sailing ahead.

Tomorrow

  • Clear sailing ahead.

Tuesday

  • Clear sailing ahead.

User Details

User Since
Oct 25 2014, 1:53 AM (195 w, 1 d)
Availability
Available
IRC Nick
Bawolff
LDAP User
Brian Wolff
MediaWiki User
Bawolff [ Global Accounts ]

I work on the MediaWiki Security Team.

Recent Activity

Yesterday

Bawolff added a comment to T200052: Mandate that account passwords must be a minimum of eight characters on Wikimedia projects.

So does the paper actually say anything new? Users choosing terrible passwords is not new. The question is always a risk analysis question. Does the risk of users using stupid passwords outweigh the inconvineance of forcing good passwords? How does this vary with different classes of users? To what extent is it a personal responsibility vs how much of a threat is it to other users (esp. When talking about forcing strong passwords instead of merely suggesting them).

Sat, Jul 21, 10:33 PM · Security, Wikimedia-General-or-Unknown

Fri, Jul 20

Bawolff changed the visibility for T200014: Potential security bug in tests/qunit/data/load.mock.php .
Fri, Jul 20, 4:50 PM · MediaWiki-Core-Tests, Vuln-XSS, Security
Bawolff added a comment to T200014: Potential security bug in tests/qunit/data/load.mock.php .

This was publically disclosed at https://security.stackexchange.com/questions/189940/xss-in-big-wiki-software . Making public since private has no point now

Fri, Jul 20, 4:49 PM · MediaWiki-Core-Tests, Vuln-XSS, Security

Thu, Jul 19

Bawolff added a comment to T200014: Potential security bug in tests/qunit/data/load.mock.php .

The output is escaped via json_encode. I dont see any way to exploit this.

Thu, Jul 19, 8:58 PM · MediaWiki-Core-Tests, Vuln-XSS, Security
Bawolff added a comment to T200000: Elaborate match Google user with e-mail address in addition to user ID.

My main concerns are:

  • What if two people use the same email address
  • Would there be any way of leaking that an email address is in use (e.g. By looking for "user does not exist error"). In particular, if attacker is trying to guess what another user is using as email, would he be able to somehow figure it out by setting his email to be the same as the victim (I guess email confirmation would prevent that. Ideally though I'd like to see that attack stopped even if the malicious user somehow manages to confirm his email).
Thu, Jul 19, 7:57 PM · Patch-For-Review, GoogleLogin
Bawolff updated subscribers of T197206: ChronologyProtector waits until timeout if EmptyBagOfStuff is used for cache..

I'm going to backport this, as @UlfrTheRed the red was just complaining about this issue on irc in MediaWiki 1.31

Thu, Jul 19, 7:26 PM · MW-1.31-release-notes, Performance-Team, MW-1.32-release-notes (WMF-deploy-2018-06-26 (1.32.0-wmf.10)), Patch-For-Review, MediaWiki-Database, User-Addshore
Bawolff added a member for Security: charlotteportero.
Thu, Jul 19, 6:09 PM

Wed, Jul 18

Bawolff awarded T199865: +2 for Matěj Suchánek in mediawiki/* a Like token.
Wed, Jul 18, 8:26 PM · Repository-Ownership-Requests
Bawolff awarded T199866: +2 for Eranroz in mediawiki/* a Like token.
Wed, Jul 18, 8:25 PM · Repository-Ownership-Requests
Bawolff awarded T199869: +2 for Daimona Eaytoy in AbuseFilter a Like token.
Wed, Jul 18, 4:15 PM · Repository-Ownership-Requests, AbuseFilter
Bawolff awarded T199868: +2 for Jack Phoenix in mediawiki/* a Like token.
Wed, Jul 18, 4:09 PM · Repository-Ownership-Requests
Bawolff added a comment to T199867: +2 for Huji in mediawiki/*.

He's also been here forever. I think he is probably the oldest contributor to mediawiki without +2 at this point.

Wed, Jul 18, 4:07 PM · Repository-Ownership-Requests
Bawolff awarded T199867: +2 for Huji in mediawiki/* a Like token.
Wed, Jul 18, 4:06 PM · Repository-Ownership-Requests

Tue, Jul 17

Bawolff added a comment to T141490: Deploy improved FancyCaptcha.

So this has been stuck for a while. I decided to look into what else we can do with hopefully less contention.

Tue, Jul 17, 8:56 PM · Security, Wikimedia-Site-requests
Bawolff changed the visibility for T199797: includes/shell/Command.php tried to execute /bin/bash.
Tue, Jul 17, 1:21 PM · MediaWiki-Shell, Security
Bawolff closed T199797: includes/shell/Command.php tried to execute /bin/bash as Invalid.

This is normal behaviour when mediawiki is configured to use image magick's convert(1) for resizing images.

Tue, Jul 17, 1:20 PM · MediaWiki-Shell, Security

Fri, Jul 13

Bawolff added a comment to T139301: Remove @author lines from code.

Copyright statements should be "Copyright [year] Wikimedia Foundation and contributors"

Fri, Jul 13, 9:44 PM · MW-1.30-release-notes, Patch-For-Review, MediaWiki-General-or-Unknown, WMF-Legal, RfC, Developer-Advocacy

Thu, Jul 12

Bawolff renamed T199397: make phan-taint-check be able to verify moustache templates from make phan-taint-check be able to berify moustache templates to make phan-taint-check be able to verify moustache templates.
Thu, Jul 12, 3:33 AM · phan-taint-check-plugin
Bawolff created T199403: `composer lint` in mediawiki core doesn't work.
Thu, Jul 12, 3:23 AM · Composer, MediaWiki-Core-Tests
Bawolff created T199397: make phan-taint-check be able to verify moustache templates.
Thu, Jul 12, 2:05 AM · phan-taint-check-plugin

Wed, Jul 11

Bawolff added a comment to T193332: CentralNotice - CSP overreach.
OK thanks...!!! Do you know if, as it is, it allows gadgets and user scripts?
Wed, Jul 11, 5:16 PM · Fundraising Sprint Karma chameleons hide amongst us, Fundraising Sprint Junebugs prefer July, Fundraising-Backlog, MediaWiki-extensions-CentralNotice
Bawolff added a comment to T193332: CentralNotice - CSP overreach.

We may be adjusting the core csp header
Its kind of rediculously long. We also plan on disabling nonces in the initial rollout. So the core stuff should be considered to be in flux

Wed, Jul 11, 4:41 AM · Fundraising Sprint Karma chameleons hide amongst us, Fundraising Sprint Junebugs prefer July, Fundraising-Backlog, MediaWiki-extensions-CentralNotice

Tue, Jul 10

Bawolff changed the visibility for T190941: Our HTTPS private keys seem to be obtainable under non-US surveillance laws, creating a worldwide MITM attack vector.
Tue, Jul 10, 6:39 PM · Security
Bawolff closed T190941: Our HTTPS private keys seem to be obtainable under non-US surveillance laws, creating a worldwide MITM attack vector as Declined.
Tue, Jul 10, 6:38 PM · Security
Bawolff added a comment to T192704: Edits attributed to 127.0.0.1.

Can you give steps to reliably reproduce human editors being attributed to the wrong user? Its unlikely we would be able to fix it unless we can reliably reproduce the issue.

Tue, Jul 10, 4:02 AM · MediaWiki-extensions-Other
Bawolff changed the visibility for T198984: xss wp-world toolforge.
Tue, Jul 10, 12:17 AM · Toolforge, Vuln-XSS, Security
Bawolff changed the visibility for T190759: XSS in erwin85 relatedchanges.
Tue, Jul 10, 12:14 AM · Vuln-XSS, Security, Tool-Erwin's-tools
Bawolff closed T190759: XSS in erwin85 relatedchanges as Resolved.

I escaped everything that gets thrown to html.

Can I push the change to the public repository? See the git log if you want.

Tue, Jul 10, 12:14 AM · Vuln-XSS, Security, Tool-Erwin's-tools
Bawolff removed a project from T184387: Improve the Cargo Special:Drilldown page: Security.
Tue, Jul 10, 12:06 AM · Outreach-Programs-Projects, Patch-For-Review, Google-Summer-of-Code (2018), MediaWiki-extensions-Cargo
Bawolff removed a project from T184408: Expose "home wiki" on Special:MultiLock: Security.
Tue, Jul 10, 12:05 AM · Stewards-and-global-tools, MediaWiki-extensions-CentralAuth
Bawolff moved T190941: Our HTTPS private keys seem to be obtainable under non-US surveillance laws, creating a worldwide MITM attack vector from MediaWiki/Security Team/To triage to Operational issues on the Security board.

In terms of this ticket, I'm not sure there's much we can do at the moment. Can I close & make public this ticket?

Tue, Jul 10, 12:01 AM · Security

Mon, Jul 9

Bawolff added a comment to T196892: Raw HTML in page descriptions.

I personally think we should document the situation carefully, but ultimately this is clients responsibility

Mon, Jul 9, 11:49 PM · Mobile-Content-Service, Security, MediaWiki-extensions-WikibaseClient, Security-Extensions, Wikidata, Reading-Infrastructure-Team-Backlog
Bawolff removed a project from T198031: Reinitialise my ssh key on login.tools.wmflabs.org: Security.
Mon, Jul 9, 11:46 PM · cloud-services-team, Toolforge
Bawolff removed a project from T198031: Reinitialise my ssh key on login.tools.wmflabs.org: Security.
Mon, Jul 9, 11:45 PM · cloud-services-team, Toolforge
Bawolff changed the visibility for T198031: Reinitialise my ssh key on login.tools.wmflabs.org.
Mon, Jul 9, 11:45 PM · cloud-services-team, Toolforge
Bawolff added a comment to T198031: Reinitialise my ssh key on login.tools.wmflabs.org.

@Pamputt Hi. Can you do this yourself at https://wikitech.wikimedia.org/wiki/Special:Preferences#mw-prefsection-openstack ?

Mon, Jul 9, 11:45 PM · cloud-services-team, Toolforge
Bawolff moved T198138: Disable agent forwarding to important hosts from MediaWiki/Security Team/To triage to Operational issues on the Security board.
Mon, Jul 9, 11:43 PM · Operations, Security
Bawolff triaged T199020: installer by default does not create a new mysql user. should default to the more secure approach as Low priority.
Mon, Jul 9, 11:41 PM · MediaWiki-Installer, Security
Bawolff triaged T198795: Extension:GlobalBlocking should prevent any way of local account creation, attachment included as Low priority.

[This is considered a low priority in the context of security issues which we prioritize based on severity. My marking it as low should not be taken to mean i think its unimportant or anything like that]

Mon, Jul 9, 11:35 PM · Anti-Harassment, Security, GlobalBlocking
Bawolff added a project to T198795: Extension:GlobalBlocking should prevent any way of local account creation, attachment included: Anti-Harassment.

Is this in scope of Anti-Harassment team?

Mon, Jul 9, 11:34 PM · Anti-Harassment, Security, GlobalBlocking
Bawolff triaged T198813: Integrate MFA into Gerrit as Low priority.
Mon, Jul 9, 11:16 PM · Release-Engineering-Team (Next), Security, Upstream, Gerrit
Bawolff moved T198813: Integrate MFA into Gerrit from MediaWiki/Security Team/To triage to Other WMF team on the Security board.

Personally I wish that gerrit just used oAuth and we just used on wiki SUL 2fa.... but i guess its a bit late for that.

Mon, Jul 9, 11:16 PM · Release-Engineering-Team (Next), Security, Upstream, Gerrit
Bawolff triaged T193552: Make installer grant only needed rights to db user as Low priority.
Mon, Jul 9, 9:24 PM · Security-Core, MediaWiki-Installer, Security
Bawolff updated subscribers of T192704: Edits attributed to 127.0.0.1.
Mon, Jul 9, 9:21 PM · MediaWiki-extensions-Other
Bawolff removed a project from T192704: Edits attributed to 127.0.0.1: Security.
Mon, Jul 9, 9:21 PM · MediaWiki-extensions-Other
Bawolff removed a project from T192704: Edits attributed to 127.0.0.1: Security.
Mon, Jul 9, 9:20 PM · MediaWiki-extensions-Other
Bawolff renamed T192704: Edits attributed to 127.0.0.1 from Edit attributed to 127.0.0.1 to Edits made by extension AutoCreatePage attributed to 127.0.0.1.
Mon, Jul 9, 9:20 PM · MediaWiki-extensions-Other
Bawolff added a comment to T192704: Edits attributed to 127.0.0.1.

This is not a security issue per-se. Making this bug public and moving out of Security

Mon, Jul 9, 9:19 PM · MediaWiki-extensions-Other
Bawolff closed T193837: Add OOUI widgets to taint-check as Resolved.

May have to wait until composer.json in mediawiki core is updated to the new version of oojs before we see the results... but this bug is complete now.

Mon, Jul 9, 3:58 PM · Patch-For-Review, phan-taint-check-plugin
Bawolff added a comment to T197002: Make taint-check pass for AbuseFilter.

it passes locally for me, so once all these things are merged, and a new version of phan-taint-check is tagged, this bug should be done.

Mon, Jul 9, 3:57 PM · MW-1.32-release-notes (WMF-deploy-2018-07-10 (1.32.0-wmf.12)), AbuseFilter, Patch-For-Review, phan-taint-check-plugin

Sun, Jul 8

Bawolff added a comment to T199055: &banner causes CSP warning.

So this is from the CentralNotice CSP, not the mediawiki CSP we are experimenting with.

Sun, Jul 8, 5:10 PM · Fundraising-Backlog, Security, User-revi, MediaWiki-extensions-CentralNotice
Bawolff added a comment to T199050: [[Togo]]straße is linked only until "ß" (Wikipedia).

Ah - I am having this issue on the enwiki page "Afrikanisches Viertel" https://en.wikipedia.org/wiki/Afrikanisches_Viertel so I assume there are separately configured linktrails depending on the wiki language?

Sun, Jul 8, 4:51 PM · MediaWiki-Parser

Sat, Jul 7

Bawolff added projects to T199020: installer by default does not create a new mysql user. should default to the more secure approach: Security, MediaWiki-Installer.
Sat, Jul 7, 3:15 PM · MediaWiki-Installer, Security
Bawolff created T199020: installer by default does not create a new mysql user. should default to the more secure approach.
Sat, Jul 7, 3:14 PM · MediaWiki-Installer, Security

Fri, Jul 6

Bawolff added projects to T198984: xss wp-world toolforge: Vuln-XSS, Toolforge.
Fri, Jul 6, 6:10 PM · Toolforge, Vuln-XSS, Security
Bawolff created T198984: xss wp-world toolforge.
Fri, Jul 6, 6:07 PM · Toolforge, Vuln-XSS, Security

Thu, Jul 5

Bawolff closed T195017: Renameuser extension does not pass phan-taint-check 1.2.0, a subtask of T193909: update phan-taint-check to 1.2.0, as Resolved.
Thu, Jul 5, 6:33 PM · MW-1.32-release-notes (WMF-deploy-2018-05-08 (1.32.0-wmf.3)), Patch-For-Review, phan-taint-check-plugin
Bawolff closed T195017: Renameuser extension does not pass phan-taint-check 1.2.0 as Resolved.

Not sure what this is about, but after https://gerrit.wikimedia.org/r/#/c/mediawiki/extensions/Renameuser/+/410876/ and https://gerrit.wikimedia.org/r/#/c/mediawiki/extensions/Renameuser/+/424495/ seems like it works fine.

Thu, Jul 5, 6:33 PM · MediaWiki-extensions-Renameuser, phan-taint-check-plugin
Bawolff added a comment to T197002: Make taint-check pass for AbuseFilter.

Change 444020 had a related patch set uploaded (by Brian Wolff; owner: Brian Wolff):
[mediawiki/extensions/AbuseFilter@master] Minor escaping fixes

https://gerrit.wikimedia.org/r/444020

Thu, Jul 5, 5:27 PM · MW-1.32-release-notes (WMF-deploy-2018-07-10 (1.32.0-wmf.12)), AbuseFilter, Patch-For-Review, phan-taint-check-plugin
Bawolff added a comment to T195010: CategoryTree extension does not pass phan-taint-check 1.2.0.

Change 444019 had a related patch set uploaded (by Brian Wolff; owner: Brian Wolff):
[mediawiki/extensions/CategoryTree@master] Fix some raw html messages

https://gerrit.wikimedia.org/r/444019

Thu, Jul 5, 5:24 PM · Patch-For-Review, MediaWiki-extensions-CategoryTree, phan-taint-check-plugin
Bawolff added a subtask for T2212: Some MediaWiki: messages not safe in HTML (tracking): Unknown Object (Task).
Thu, Jul 5, 5:04 PM · Tracking, I18n, MediaWiki-Internationalization
Bawolff added a comment to T198810: Enforce 2FA for GitHub members.

It'd be kind of nice if people who are members solely so all commits in wmf repos appear in their contribs graph without having to star every repo, didn't have to have 2fa (and had no rights). But I guess that's not an option.

Thu, Jul 5, 4:28 PM · Release-Engineering-Team (Watching / External), Security-Team, GitHub-Mirrors

Tue, Jul 3

Bawolff added a member for Security: Imarlier.
Tue, Jul 3, 10:20 AM

Mon, Jul 2

Bawolff closed T190875: Security review for Wikidata queries data release proposal as Resolved.

I think this is ok, and I have no objections, with the caveat that (imo), security's role should be ensuring that stuff meets a certain standard or is safe against a certain threat model. I don't entirely feel confident that I'm competent to review something where the criteria of what we're trying to protect against is unspecified. That said, as far as I can tell, the proposal sounds reasonable.

Mon, Jul 2, 8:27 AM · Privacy, Security-Reviews, User-Smalyshev, Wikidata, Research
Bawolff closed T190875: Security review for Wikidata queries data release proposal, a subtask of T183020: Investigate the possibility to release Wikidata queries, as Resolved.
Mon, Jul 2, 8:27 AM · Data-release, User-Smalyshev, Wikidata, Research

Tue, Jun 26

Bawolff added a comment to T190875: Security review for Wikidata queries data release proposal.

Sorry for the delay, this kind of got preempted by t194204 but is now next on my todo list.

Tue, Jun 26, 12:46 PM · Privacy, Security-Reviews, User-Smalyshev, Wikidata, Research

Mon, Jun 25

Bawolff added a comment to T113831: Remove MSSQL support from MediaWiki core.

Please explain what "MediaWikiPingback" is and where it comes from and how it works. Or a link.

Mon, Jun 25, 4:41 AM · Technical-Debt (Deprecation), MSSQL, MediaWiki-Database

Sat, Jun 23

Tractopelle-jaune awarded T71061: Show patrol marks on Special:Contributions a Love token.
Sat, Jun 23, 1:11 PM · MediaWiki-Special-pages, Patch-For-Review, MediaWiki-Patrolling

Jun 19 2018

Bawolff changed the visibility for T189763: status.wikimedia.org should have an alternative privacy policy.
Jun 19 2018, 3:22 AM · monitoring, Operations, Privacy, Security

Jun 18 2018

Bawolff added a comment to T197544: Make it possible to prefill Special:BotPasswords form.

Adding Security tag as this task is about prefilling a form that generate login tokens.

Jun 18 2018, 2:03 PM · Security, Huggle, MediaWiki-Authentication-and-authorization
Bawolff added a comment to T189943: Reveal email recipient's username in checkuser query results.

Legal needs to approve as a privacy thing.

Jun 18 2018, 6:53 AM · Anti-Harassment, Privacy, Security-Team, CheckUser, Stewards-and-global-tools

Jun 16 2018

Bawolff added a comment to T197501: Make users without 2FA setup not have checkuser right regardless of their groups.

@Bawolff from what I understand, the way CheckUser works right now is it calls checkPermissions which is inherited from SpecialPage. I am thinking we can override this method in which we first call the parent function, and then call a hook (and I need your suggestion for its name, does onCUCheckPermission sound good?) to allow other extensions to control whether the method results in a pass or a fail situation. Finally, we can modify MediaWiki-extensions-OATHAuth code to return a pass if the user has 2FA enabled and fail otherwise.

I think the limitation here is what @Reedy mentioned in T150562 i.e. the communication piece will be messy (as in, the user will get a generic permission error, not one that specifically says "you need to enable 2FA"). Unless there is a way to avoid that which I am not able to think of.

Jun 16 2018, 9:53 PM · Stewards-and-global-tools, MediaWiki-Authentication-and-authorization, CheckUser, MediaWiki-extensions-OATHAuth

Jun 15 2018

Bawolff updated the task description for T197501: Make users without 2FA setup not have checkuser right regardless of their groups.
Jun 15 2018, 10:45 PM · Stewards-and-global-tools, MediaWiki-Authentication-and-authorization, CheckUser, MediaWiki-extensions-OATHAuth
Bawolff created T197501: Make users without 2FA setup not have checkuser right regardless of their groups.
Jun 15 2018, 10:44 PM · Stewards-and-global-tools, MediaWiki-Authentication-and-authorization, CheckUser, MediaWiki-extensions-OATHAuth
Bawolff added a comment to T85756: Make (redacted) log_search table available on ToolLabs.

I agree with anomie's assesment. If ls_field is on a whitelist and we are sure that ls_log_id references something on the log_type whitelist and is not revdel'ed it should be fine to expose

Jun 15 2018, 5:42 PM · MediaWiki-General-or-Unknown, Security, Data-Services, DBA
Bawolff added a comment to T197444: Our Phabricator is being attacked.

yeah, we know

Jun 15 2018, 8:40 AM · Phabricator

Jun 14 2018

Bawolff added a project to T96499: dbtree loads third party resources (from jquery.com and google.com): Privacy.
Jun 14 2018, 8:42 AM · Privacy, Traffic, HTTPS, Operations, Patch-For-Review, DBA, WMF-Legal

Jun 13 2018

Bawolff added a comment to T197160: All security-sensitive MediaWiki functionality should require elevated security.

If we make too many things require reauth then we run the risk of annoying users. We also run the risk of making entering your password a common occurance which could aid phising attacks

Jun 13 2018, 8:11 PM · User-Tgr, Epic, MediaWiki-Authentication-and-authorization, Security-General
Bawolff added a comment to T197136: Tie certain user rights to elevated security.

You would also have to be careful about the case where the right is just checked for asethic purposes (e.g. adding a link to the special page if the user has the right to do the action)

Jun 13 2018, 4:38 PM · MediaWiki-User-management, Security-Core
Bawolff added a member for Security: Ladsgroup.
Jun 13 2018, 4:07 PM
Bawolff removed a project from T100452: [Migrated] Fix unbalanced brackets inside gallery: Security.
Jun 13 2018, 4:02 PM · WorkType-NewFunctionality, AutoWikiBrowser
Bawolff removed a project from T100452: [Migrated] Fix unbalanced brackets inside gallery: Security.
Jun 13 2018, 4:01 PM · WorkType-NewFunctionality, AutoWikiBrowser
Bawolff awarded T197070: +2 for MarcoAurelio in mediawiki/* a Like token.
Jun 13 2018, 1:33 PM · Repository-Ownership-Requests

Jun 12 2018

Bawolff created T197025: update.php errors on sqlite - patch-ar_rev_id-not-null.sql - no such column: ar_actor.
Jun 12 2018, 6:42 PM · MediaWiki-Installer, MediaWiki-Database, SQLite

Jun 11 2018

Gerrit Code Review <gerrit@wikimedia.org> committed rENPUd0acf5fc4dcc: Update patch set 2 (authored by Bawolff).
Update patch set 2
Jun 11 2018, 9:20 PM
Gerrit Code Review <gerrit@wikimedia.org> committed rENPU5b67c0b58564: Update patch set 2 (authored by Bawolff).
Update patch set 2
Jun 11 2018, 9:20 PM
Gerrit Code Review <gerrit@wikimedia.org> committed rENPU8dc9311cf446: Update patch set 2 (authored by Bawolff).
Update patch set 2
Jun 11 2018, 9:20 PM
Gerrit Code Review <gerrit@wikimedia.org> committed rENPUde43fad3029c: Create patch set 2 (authored by Bawolff).
Create patch set 2
Jun 11 2018, 9:20 PM
Gerrit Code Review <gerrit@wikimedia.org> committed rENPUa5d5a4d79a9c: Update patch set 2 (authored by Bawolff).
Update patch set 2
Jun 11 2018, 9:20 PM
Gerrit Code Review <gerrit@wikimedia.org> committed rENPU593b476ef072: Update patch set 2 (authored by Bawolff).
Update patch set 2
Jun 11 2018, 9:20 PM
Gerrit Code Review <gerrit@wikimedia.org> committed rENPU28ff9d6ab9cf: Create patch set 2 (authored by Bawolff).
Create patch set 2
Jun 11 2018, 9:20 PM
Gerrit Code Review <gerrit@wikimedia.org> committed rENPU0b1f0f5384ae: Update patch set 2 (authored by Bawolff).
Update patch set 2
Jun 11 2018, 9:20 PM
Gerrit Code Review <gerrit@wikimedia.org> committed rENPU3c1d49eb787f: Create patch set 2 (authored by Bawolff).
Create patch set 2
Jun 11 2018, 9:20 PM
Gerrit Code Review <gerrit@wikimedia.org> committed rENPU9f4f35cb6a54: Update patch set 1 (authored by Bawolff).
Update patch set 1
Jun 11 2018, 9:19 PM
Gerrit Code Review <gerrit@wikimedia.org> committed rEBSR8cf61df7e747: Update patch set 1 (authored by Bawolff).
Update patch set 1
Jun 11 2018, 9:03 PM
Gerrit Code Review <gerrit@wikimedia.org> committed rEEMA85eea80b948f: Update patch set 2 (authored by Bawolff).
Update patch set 2
Jun 11 2018, 8:31 PM
Gerrit Code Review <gerrit@wikimedia.org> committed rEEMA1862e5c8cc0e: Update patch set 2 (authored by Bawolff).
Update patch set 2
Jun 11 2018, 8:31 PM
Gerrit Code Review <gerrit@wikimedia.org> committed rEEMA2138365b7436: Update patch set 2 (authored by Bawolff).
Update patch set 2
Jun 11 2018, 8:31 PM
Gerrit Code Review <gerrit@wikimedia.org> committed rEEMAb955c7f64a73: Update patch set 2 (authored by Bawolff).
Update patch set 2
Jun 11 2018, 8:31 PM
Gerrit Code Review <gerrit@wikimedia.org> committed rEEMA2ef18235b655: Update patch set 1 (authored by Bawolff).
Update patch set 1
Jun 11 2018, 8:31 PM