File tree Expand file tree Collapse file tree 6 files changed +17
-2
lines changed Expand file tree Collapse file tree 6 files changed +17
-2
lines changed Original file line number Diff line number Diff line change @@ -17,6 +17,7 @@ and this project adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0
17
17
- Migration docs for migration from v2 to v3 of the testing suite.
18
18
- Option to use PHP CS Fixer instead of PHPCS
19
19
- Pimcore coding standards with [ PER coding standards] ( https://www.php-fig.org/per/coding-style/ )
20
+ - Added support for an Allow List within the Security Checker.
20
21
21
22
### Changed
22
23
- [ BREAKING] The composer.json configurations ` config.youwe-testing-suite.type ` and ` config.mediact-testing-suite.type `
Original file line number Diff line number Diff line change 32
32
"php-cs-fixer/shim" : " @stable" ,
33
33
"php-parallel-lint/php-parallel-lint" : " ^1.4" ,
34
34
"phpmd/phpmd" : " ^2.15" ,
35
- "phpro/grumphp-shim" : " ^2.12 " ,
35
+ "phpro/grumphp-shim" : " ^2.15 " ,
36
36
"phpstan/phpstan" : " @stable" ,
37
37
"squizlabs/php_codesniffer" : " ^3.12.0" ,
38
38
"youwe/composer-dependency-installer" : " ^2.0" ,
Original file line number Diff line number Diff line change @@ -51,6 +51,7 @@ parameters:
51
51
52
52
securitychecker.lockfile : ./composer.lock
53
53
securitychecker.run_always : true
54
+ securitychecker.allow_list : []
54
55
55
56
git_blacklist.keywords :
56
57
- " die("
@@ -149,3 +150,4 @@ grumphp:
149
150
securitychecker_enlightn :
150
151
lockfile : ' %securitychecker.lockfile%'
151
152
run_always : ' %securitychecker.run_always%'
153
+ allow_list : ' %securitychecker.allow_list%'
Original file line number Diff line number Diff line change 3
3
4
4
# Extend git triggers with common Drupal constructs
5
5
parameters :
6
- git_blacklist.triggered_by : [ 'php', 'js', 'twig' ]
6
+ git_blacklist.triggered_by : [ 'php', 'js', 'twig' ]
7
+
8
+ # securitychecker.allow_list:
9
+ # - CVE-2002-0121 # Add a jira ticket indicating when this vulnerability will be fixed (update/upgrade will be
10
+ # performed). Within that ticket explain this (new) vulnerability.
Original file line number Diff line number Diff line change @@ -17,3 +17,7 @@ parameters:
17
17
- " <?php echo"
18
18
- " Magento\\\\ Framework\\\\ App\\\\ ObjectManager"
19
19
git_blacklist.triggered_by : [ 'php', 'js', 'phtml' ]
20
+
21
+ # securitychecker.allow_list:
22
+ # - CVE-2002-0121 # Add a jira ticket indicating when this vulnerability will be fixed (update/upgrade will be
23
+ # performed). Within that ticket explain this (new) vulnerability.
Original file line number Diff line number Diff line change @@ -8,3 +8,7 @@ parameters:
8
8
# Disable PHPCS (which is enabled by default) in favour of PHP CS Fixer
9
9
phpcs.enabled : false
10
10
phpcsfixer.enabled : true
11
+
12
+ # securitychecker.allow_list:
13
+ # - CVE-2002-0121 # Add a jira ticket indicating when this vulnerability will be fixed (update/upgrade will be
14
+ # performed). Within that ticket explain this (new) vulnerability.
You can’t perform that action at this time.
0 commit comments