Skip to content

Commit

Permalink
Merge branch 'develop'
Browse files Browse the repository at this point in the history
  • Loading branch information
taylor-steve committed Feb 19, 2020
2 parents 85bc7b8 + a119002 commit ed5e02f
Show file tree
Hide file tree
Showing 754 changed files with 41,755 additions and 4,563 deletions.
2 changes: 1 addition & 1 deletion .htaccess
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@
#

# Protect files and directories from prying eyes.
<FilesMatch "\.(engine|inc|info|install|make|module|profile|test|po|sh|.*sql|theme|tpl(\.php)?|xtmpl)(~|\.sw[op]|\.bak|\.orig|\.save)?$|^(\.(?!well-known).*|Entries.*|Repository|Root|Tag|Template|composer\.(json|lock))$|^#.*#$|\.php(~|\.sw[op]|\.bak|\.orig\.save)$">
<FilesMatch "\.(engine|inc|info|install|make|module|profile|test|po|sh|.*sql|theme|tpl(\.php)?|xtmpl)(~|\.sw[op]|\.bak|\.orig|\.save)?$|^(\.(?!well-known).*|Entries.*|Repository|Root|Tag|Template|composer\.(json|lock)|web\.config)$|^#.*#$|\.php(~|\.sw[op]|\.bak|\.orig\.save)$">
<IfModule mod_authz_core.c>
Require all denied
</IfModule>
Expand Down
30 changes: 27 additions & 3 deletions CHANGELOG.txt
Original file line number Diff line number Diff line change
@@ -1,6 +1,30 @@
Drupal 7.xx, xxxx-xx-xx (development version)
-----------------------

Drupal 7.69, 2019-12-18
-----------------------
- Fixed security issues:
- SA-CORE-2019-012

Drupal 7.68, 2019-12-04
-----------------------
- Fixed: Hide toolbar when printing
- Fixed: Settings returned via ajax are not run through hook_js_alter()
- Fixed: Use drupal_http_build_query() in drupal_http_request()
- Fixed: DrupalRequestSanitizer not found fatal error when bootstrap phase order is changed
- Fixed: Block web.config in .htaccess (and vice-versa)
- Fixed: Create "scripts" element to align rendering workflow to how "styles" are handled
- PHP 7.3: Fixed 'Cannot change session id when session is active'
- PHP 7.1: Fixed 'A non-numeric value encountered in theme_pager()'
- PHP 7.x: Fixed file.inc generated .htaccess does not cover PHP 7
- PHP 5.3: Fixed check_plain() 'Invalid multibyte sequence in argument' test failures
- Fixed: Allow passing data as array to drupal_http_request()
- Fixed: Skip module_invoke/module_hook in calling hook_watchdog (excessive function_exist)
- Fixed: HTTP status 200 returned for 'Additional uncaught exception thrown while handling exception'
- Fixed: theme_table() should take an optional footer variable and produce <tfoot>
- Fixed: 'uasort() expects parameter 1 to be array, null given in node_view_multiple()'
- [regression] Fix default.settings.php permission

Drupal 7.67, 2019-05-08
-----------------------
- Fixed security issues:
Expand Down Expand Up @@ -136,7 +160,7 @@ Drupal 7.51, 2016-10-05
- Numerous API documentation improvements.
- Additional automated test coverage.

Drupal 7.50, 2016-07-07
Drupal 7.50, 2016-07-07
-----------------------
- Added a new "administer fields" permission for trusted users, which is
required in addition to other permissions to use the field UI
Expand Down Expand Up @@ -1084,7 +1108,7 @@ Drupal 7.1, 2011-05-25
----------------------
- Fixed security issues (Cross site scripting, File access bypass), see SA-CORE-2011-001.

Drupal 7.0, 2011-01-05
Drupal 7.0, 2011-01-05
----------------------
- Database:
* Fully rewritten database layer utilizing PHP 5's PDO abstraction layer.
Expand Down Expand Up @@ -1583,7 +1607,7 @@ Drupal 5.20, 2009-09-16
Drupal 5.19, 2009-07-01
-----------------------
- Fixed security issues (Cross site scripting and Password leakage in URL), see
SA-CORE-2009-007.
SA-CORE-2009-007.
- Fixed a variety of small bugs.

Drupal 5.18, 2009-05-13
Expand Down
5 changes: 1 addition & 4 deletions MAINTAINERS.txt
Original file line number Diff line number Diff line change
Expand Up @@ -11,11 +11,8 @@ The Drupal Core branch maintainers oversee the development of Drupal as a whole.
The branch maintainers for Drupal 7 are:

- Dries Buytaert 'dries' https://www.drupal.org/u/dries
- Angela Byron 'webchick' https://www.drupal.org/u/webchick
- Fabian Franz 'Fabianx' https://www.drupal.org/u/fabianx
- David Rothstein 'David_Rothstein' https://www.drupal.org/u/david_rothstein
- Stefan Ruijsenaars 'stefan.r' https://www.drupal.org/u/stefanr-0
- (provisional) Pol Dellaiera 'Pol' https://www.drupal.org/u/pol
- (provisional) Drew Webber 'mcdruid' https://www.drupal.org/u/mcdruid


Component maintainers
Expand Down
2 changes: 1 addition & 1 deletion README.md
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
# Mukurtu CMS 2.1.2
# Mukurtu CMS 2.1.3
### [Release Notes](VERSION.md)

## Contents
Expand Down
20 changes: 20 additions & 0 deletions VERSION.md
Original file line number Diff line number Diff line change
@@ -1,3 +1,23 @@
## Mukurtu 2.1.3
- Content type specific related fields (e.g., “Related Digital Heritage Items”) have been generalized and consolidated into a single “Related Content” field
- The [TK Clan](https://localcontexts.org/tk/cl/1.0) label has been added
- Default image style resolution has been doubled for the most common image styles
- Fixed permission issue that could cause CSV exports to fail for some user roles
- Switched default browse sort to search relevance
- The Original Date field will no longer auto-fill the current date during import
- Created a custom HTTP 403 error page
- The link to add users to a community now works correctly on sites installed as a sub-folder
- Theme management links now link to the correct sub-theme
- Related items featuring audio will now correctly use the HTML 5 player on the digital heritage item page
- Fixed some minor theme inconsistencies
- Reduced the number of common repeated PHP notices and warnings in the watchdog log
- Updated to Drupal 7.69
- Updated contrib modules

#### Manual Upgrade Steps
- database update: `drush updb`
- revert features: `drush fra`

## Mukurtu 2.1.2
- Fixed a bug that caused the import of some audio/video files to fail
- Adjusted the default Mukurtu theme to make sub-theming easier
Expand Down
1 change: 1 addition & 0 deletions includes/ajax.inc
Original file line number Diff line number Diff line change
Expand Up @@ -294,6 +294,7 @@ function ajax_render($commands = array()) {

// Now add a command to merge changes and additions to Drupal.settings.
$scripts = drupal_add_js();
drupal_alter('js', $scripts);
if (!empty($scripts['settings'])) {
$settings = $scripts['settings'];
array_unshift($commands, ajax_command_settings(drupal_array_merge_deep_array($settings['data']), TRUE));
Expand Down
14 changes: 8 additions & 6 deletions includes/bootstrap.inc
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@
/**
* The current system version.
*/
define('VERSION', '7.67');
define('VERSION', '7.69');

/**
* Core API compatibility.
Expand Down Expand Up @@ -2006,7 +2006,7 @@ function watchdog($type, $message, $variables = array(), $severity = WATCHDOG_NO

// It is possible that the error handling will itself trigger an error. In that case, we could
// end up in an infinite loop. To avoid that, we implement a simple static semaphore.
if (!$in_error_state && function_exists('module_implements')) {
if (!$in_error_state && function_exists('module_invoke_all')) {
$in_error_state = TRUE;

// The user object may not exist in all conditions, so 0 is substituted if needed.
Expand All @@ -2029,9 +2029,7 @@ function watchdog($type, $message, $variables = array(), $severity = WATCHDOG_NO
);

// Call the logging hooks to log/process the message
foreach (module_implements('watchdog') as $module) {
module_invoke($module, 'watchdog', $log_entry);
}
module_invoke_all('watchdog', $log_entry);

// It is critical that the semaphore is only cleared here, in the parent
// watchdog() call (not outside the loop), to prevent recursive execution.
Expand Down Expand Up @@ -2526,6 +2524,7 @@ function drupal_bootstrap($phase = NULL, $new_phase = TRUE) {

switch ($current_phase) {
case DRUPAL_BOOTSTRAP_CONFIGURATION:
require_once DRUPAL_ROOT . '/includes/request-sanitizer.inc';
_drupal_bootstrap_configuration();
break;

Expand Down Expand Up @@ -2630,6 +2629,10 @@ function _drupal_exception_handler($exception) {
_drupal_log_error(_drupal_decode_exception($exception), TRUE);
}
catch (Exception $exception2) {
// Add a 500 status code in case an exception was thrown before the 500
// status could be set (e.g. while loading a maintenance theme from cache).
drupal_add_http_header('Status', '500 Internal Server Error');

// Another uncaught exception was thrown while handling the first one.
// If we are displaying errors, then do so with no possibility of a further uncaught exception being thrown.
if (error_displayable()) {
Expand All @@ -2655,7 +2658,6 @@ function _drupal_bootstrap_configuration() {
drupal_settings_initialize();

// Sanitize unsafe keys from the request.
require_once DRUPAL_ROOT . '/includes/request-sanitizer.inc';
DrupalRequestSanitizer::sanitize();
}

Expand Down
14 changes: 8 additions & 6 deletions includes/bootstrap.inc.orig
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@
/**
* The current system version.
*/
define('VERSION', '7.67');
define('VERSION', '7.69');

/**
* Core API compatibility.
Expand Down Expand Up @@ -1998,7 +1998,7 @@ function watchdog($type, $message, $variables = array(), $severity = WATCHDOG_NO

// It is possible that the error handling will itself trigger an error. In that case, we could
// end up in an infinite loop. To avoid that, we implement a simple static semaphore.
if (!$in_error_state && function_exists('module_implements')) {
if (!$in_error_state && function_exists('module_invoke_all')) {
$in_error_state = TRUE;

// The user object may not exist in all conditions, so 0 is substituted if needed.
Expand All @@ -2021,9 +2021,7 @@ function watchdog($type, $message, $variables = array(), $severity = WATCHDOG_NO
);

// Call the logging hooks to log/process the message
foreach (module_implements('watchdog') as $module) {
module_invoke($module, 'watchdog', $log_entry);
}
module_invoke_all('watchdog', $log_entry);

// It is critical that the semaphore is only cleared here, in the parent
// watchdog() call (not outside the loop), to prevent recursive execution.
Expand Down Expand Up @@ -2518,6 +2516,7 @@ function drupal_bootstrap($phase = NULL, $new_phase = TRUE) {

switch ($current_phase) {
case DRUPAL_BOOTSTRAP_CONFIGURATION:
require_once DRUPAL_ROOT . '/includes/request-sanitizer.inc';
_drupal_bootstrap_configuration();
break;

Expand Down Expand Up @@ -2622,6 +2621,10 @@ function _drupal_exception_handler($exception) {
_drupal_log_error(_drupal_decode_exception($exception), TRUE);
}
catch (Exception $exception2) {
// Add a 500 status code in case an exception was thrown before the 500
// status could be set (e.g. while loading a maintenance theme from cache).
drupal_add_http_header('Status', '500 Internal Server Error');

// Another uncaught exception was thrown while handling the first one.
// If we are displaying errors, then do so with no possibility of a further uncaught exception being thrown.
if (error_displayable()) {
Expand All @@ -2647,7 +2650,6 @@ function _drupal_bootstrap_configuration() {
drupal_settings_initialize();

// Sanitize unsafe keys from the request.
require_once DRUPAL_ROOT . '/includes/request-sanitizer.inc';
DrupalRequestSanitizer::sanitize();
}

Expand Down
Loading

0 comments on commit ed5e02f

Please sign in to comment.