diff options
-rw-r--r-- | includes/ContentSecurityPolicy.php | 4 | ||||
-rw-r--r-- | includes/GlobalFunctions.php | 2 | ||||
-rw-r--r-- | includes/WebRequest.php | 4 | ||||
-rw-r--r-- | includes/block/AbstractBlock.php | 2 | ||||
-rw-r--r-- | includes/block/SystemBlock.php | 8 | ||||
-rw-r--r-- | includes/gallery/ImageGalleryBase.php | 2 | ||||
-rw-r--r-- | includes/gallery/TraditionalImageGallery.php | 2 | ||||
-rw-r--r-- | includes/jobqueue/JobQueueFederated.php | 2 | ||||
-rw-r--r-- | includes/jobqueue/JobRunner.php | 8 | ||||
-rw-r--r-- | includes/libs/Cookie.php | 2 | ||||
-rw-r--r-- | includes/page/Article.php | 2 | ||||
-rw-r--r-- | includes/pager/TablePager.php | 2 | ||||
-rw-r--r-- | includes/registration/ExtensionProcessor.php | 4 | ||||
-rw-r--r-- | includes/session/SessionProvider.php | 2 | ||||
-rw-r--r-- | includes/upload/UploadFromUrl.php | 4 |
15 files changed, 25 insertions, 25 deletions
diff --git a/includes/ContentSecurityPolicy.php b/includes/ContentSecurityPolicy.php index d9d906dbe6a5..08751242bfd7 100644 --- a/includes/ContentSecurityPolicy.php +++ b/includes/ContentSecurityPolicy.php @@ -243,8 +243,8 @@ class ContentSecurityPolicy { || !in_array( 'data:', $defaultSrc ) || !in_array( 'blob:', $defaultSrc ) ) { - // A future todo might be to make the whitelist options only - // add all the whitelisted sites to the header, instead of + // A future todo might be to make the allow options only + // add all the allowed sites to the header, instead of // allowing all (Assuming there is a small number of sites). // For now, the external image feature disables the limits // CSP puts on external images. diff --git a/includes/GlobalFunctions.php b/includes/GlobalFunctions.php index 28c258435bd9..82d381e05777 100644 --- a/includes/GlobalFunctions.php +++ b/includes/GlobalFunctions.php @@ -1472,7 +1472,7 @@ function wfClientAcceptsGzip( $force = false ) { if ( $result === null || $force ) { $result = false; if ( isset( $_SERVER['HTTP_ACCEPT_ENCODING'] ) ) { - # @todo FIXME: We may want to blacklist some broken browsers + # @todo FIXME: We may want to disallow some broken browsers $m = []; if ( preg_match( '/\bgzip(?:;(q)=([0-9]+(?:\.[0-9]+)))?\b/', diff --git a/includes/WebRequest.php b/includes/WebRequest.php index 541f4a3dd352..85d216eb1921 100644 --- a/includes/WebRequest.php +++ b/includes/WebRequest.php @@ -1166,10 +1166,10 @@ class WebRequest { * been dropped, this function now returns true unconditionally. * * @deprecated since 1.35 - * @param array $extWhitelist + * @param array $extList * @return bool */ - public function checkUrlExtension( $extWhitelist = [] ) { + public function checkUrlExtension( $extList = [] ) { wfDeprecated( __METHOD__, '1.35' ); return true; } diff --git a/includes/block/AbstractBlock.php b/includes/block/AbstractBlock.php index 76c55b3b5213..a09b9c1fd483 100644 --- a/includes/block/AbstractBlock.php +++ b/includes/block/AbstractBlock.php @@ -273,7 +273,7 @@ abstract class AbstractBlock { /** * Determine whether the block prevents a given right. A right - * may be blacklisted or whitelisted, or determined from a + * may be allowed or disallowed, or determined from a * property on the block object. For certain rights, the property * may be overridden according to global configs. * diff --git a/includes/block/SystemBlock.php b/includes/block/SystemBlock.php index 8667bbb399f3..e99d076f09fb 100644 --- a/includes/block/SystemBlock.php +++ b/includes/block/SystemBlock.php @@ -24,7 +24,7 @@ namespace MediaWiki\Block; /** * System blocks are temporary blocks that are created on enforcement (e.g. - * from IP blacklists) and are not saved to the database. The target of a + * from IP lists) and are not saved to the database. The target of a * system block is an IP address. System blocks do not give rise to * autoblocks and are not tracked with cookies. * @@ -57,10 +57,10 @@ class SystemBlock extends AbstractBlock { /** * Get the system block type, if any. A SystemBlock can have the following types: - * - 'proxy': the IP is blacklisted in $wgProxyList - * - 'dnsbl': the IP is associated with a blacklisted domain in $wgDnsBlacklistUrls + * - 'proxy': the IP is listed in $wgProxyList + * - 'dnsbl': the IP is associated with a listed domain in $wgDnsBlacklistUrls * - 'wgSoftBlockRanges': the IP is covered by $wgSoftBlockRanges - * - 'global-block': for backwards compatability with the UserIsBlockedGlobally hook + * - 'global-block': for backwards compatibility with the UserIsBlockedGlobally hook * * @since 1.29 * @return string|null diff --git a/includes/gallery/ImageGalleryBase.php b/includes/gallery/ImageGalleryBase.php index ce7470e2e73e..ef5d18d749db 100644 --- a/includes/gallery/ImageGalleryBase.php +++ b/includes/gallery/ImageGalleryBase.php @@ -74,7 +74,7 @@ abstract class ImageGalleryBase extends ContextSource { protected $mCaptionLength = true; /** - * @var bool Hide blacklisted images? + * @var bool Hide bad images? */ protected $mHideBadImages; diff --git a/includes/gallery/TraditionalImageGallery.php b/includes/gallery/TraditionalImageGallery.php index ff6d1384fe2c..cf141be149e3 100644 --- a/includes/gallery/TraditionalImageGallery.php +++ b/includes/gallery/TraditionalImageGallery.php @@ -118,7 +118,7 @@ class TraditionalImageGallery extends ImageGalleryBase { } elseif ( $this->mHideBadImages && $badFileLookup->isBadFile( $nt->getDBkey(), $this->getContextTitle() ) ) { - # The image is blacklisted, just show it as a text link. + # The image is bad, so just show it as a text link. $thumbhtml = "\n\t\t\t" . '<div class="thumb" style="height: ' . ( $this->getThumbPadding() + $this->mHeights ) . 'px;">' . $linkRenderer->makeKnownLink( $nt, $nt->getText() ) . diff --git a/includes/jobqueue/JobQueueFederated.php b/includes/jobqueue/JobQueueFederated.php index 90e4086cd3a7..a73d6da487d7 100644 --- a/includes/jobqueue/JobQueueFederated.php +++ b/includes/jobqueue/JobQueueFederated.php @@ -289,7 +289,7 @@ class JobQueueFederated extends JobQueue { return $job; } else { - unset( $partitionsTry[$partition] ); // blacklist partition + unset( $partitionsTry[$partition] ); } } $this->throwErrorIfAllPartitionsDown( $failed ); diff --git a/includes/jobqueue/JobRunner.php b/includes/jobqueue/JobRunner.php index c21686b49b7c..1cfa2f115d6d 100644 --- a/includes/jobqueue/JobRunner.php +++ b/includes/jobqueue/JobRunner.php @@ -218,17 +218,17 @@ class JobRunner implements LoggerAwareInterface { do { // Sync the persistent backoffs with concurrent runners $backoffs = $this->syncBackoffDeltas( $backoffs, $backoffDeltas, $wait ); - $blacklist = $throttle ? array_keys( $backoffs ) : []; + $backoffKeys = $throttle ? array_keys( $backoffs ) : []; $wait = 'nowait'; // less important now if ( $type === false ) { // Treat the default job type queues as a single queue and pop off a job $job = $this->jobQueueGroup - ->pop( JobQueueGroup::TYPE_DEFAULT, JobQueueGroup::USE_CACHE, $blacklist ); + ->pop( JobQueueGroup::TYPE_DEFAULT, JobQueueGroup::USE_CACHE, $backoffKeys ); } else { // Pop off a job from the specified job type queue unless the execution of - // that type of job is currently rate-limited by the back-off blacklist - $job = in_array( $type, $blacklist ) ? false : $this->jobQueueGroup->pop( $type ); + // that type of job is currently rate-limited by the back-off list + $job = in_array( $type, $backoffKeys ) ? false : $this->jobQueueGroup->pop( $type ); } if ( $job ) { diff --git a/includes/libs/Cookie.php b/includes/libs/Cookie.php index 1b25b5d44a4e..152a86eda19c 100644 --- a/includes/libs/Cookie.php +++ b/includes/libs/Cookie.php @@ -74,7 +74,7 @@ class Cookie { * false. The uses a method similar to IE cookie security * described here: * http://kuza55.blogspot.com/2008/02/understanding-cookie-security.html - * A better method might be to use a blacklist like + * A better method might be to use a list like * http://publicsuffix.org/ * * @todo fixme fails to detect 3-letter top-level domains diff --git a/includes/page/Article.php b/includes/page/Article.php index a421202a73ff..e0b9d5c27372 100644 --- a/includes/page/Article.php +++ b/includes/page/Article.php @@ -489,7 +489,7 @@ class Article implements Page { $oldid = $this->getOldID(); $user = $this->getContext()->getUser(); - # Another whitelist check in case getOldID() is altering the title + # Another check in case getOldID() is altering the title $permissionStatus = PermissionStatus::newEmpty(); if ( !$this->getContext()->getAuthority() ->authorizeRead( 'read', $this->getTitle(), $permissionStatus ) diff --git a/includes/pager/TablePager.php b/includes/pager/TablePager.php index d2e4baec3440..bd0d9f126dfd 100644 --- a/includes/pager/TablePager.php +++ b/includes/pager/TablePager.php @@ -405,7 +405,7 @@ abstract class TablePager extends IndexPager { /** * Get \<input type="hidden"\> elements for use in a method="get" form. * Resubmits all defined elements of the query string, except for a - * blacklist, passed in the $blacklist parameter. + * exclusion list, passed in the $noResubmit parameter. * * @param array $noResubmit Parameters from the request query which should not be resubmitted * @return string HTML fragment diff --git a/includes/registration/ExtensionProcessor.php b/includes/registration/ExtensionProcessor.php index b2879b98ed38..90c466e46ec7 100644 --- a/includes/registration/ExtensionProcessor.php +++ b/includes/registration/ExtensionProcessor.php @@ -249,7 +249,7 @@ class ExtensionProcessor implements Processor { } if ( $version === 2 ) { - // Only whitelisted attributes are set + // Only allowed attributes are set if ( in_array( $key, self::CORE_ATTRIBS ) ) { $this->storeToArray( $path, $key, $val, $this->attributes ); } @@ -258,7 +258,7 @@ class ExtensionProcessor implements Processor { if ( !in_array( $key, self::NOT_ATTRIBS ) && !in_array( $key, self::CREDIT_ATTRIBS ) ) { - // If it's not blacklisted, it's an attribute + // If it's not disallowed, it's an attribute $this->storeToArrayRecursive( $path, $key, $val, $this->attributes ); } } diff --git a/includes/session/SessionProvider.php b/includes/session/SessionProvider.php index 7adce7fd9a8e..3395a3b3beee 100644 --- a/includes/session/SessionProvider.php +++ b/includes/session/SessionProvider.php @@ -401,7 +401,7 @@ abstract class SessionProvider implements SessionProviderInterface, LoggerAwareI * If the provider is capable of returning a SessionInfo with a verified * UserInfo for the named user in some manner other than by validating * against $user->getToken(), steps must be taken to prevent that from - * occurring in the future. This might add the username to a blacklist, or + * occurring in the future. This might add the username to a list, or * it might just delete whatever authentication credentials would allow * such a session in the first place (e.g. remove all OAuth grants or * delete record of the SSL client certificate). diff --git a/includes/upload/UploadFromUrl.php b/includes/upload/UploadFromUrl.php index 29650735c3b9..fee03d8b7a9f 100644 --- a/includes/upload/UploadFromUrl.php +++ b/includes/upload/UploadFromUrl.php @@ -68,7 +68,7 @@ class UploadFromUrl extends UploadBase { /** * Checks whether the URL is for an allowed host - * The domains in the whitelist can include wildcard characters (*) in place + * The domains in the allowlist can include wildcard characters (*) in place * of any of the domain levels, e.g. '*.flickr.com' or 'upload.*.gov.uk'. * * @param string $url @@ -85,7 +85,7 @@ class UploadFromUrl extends UploadBase { } $valid = false; foreach ( $wgCopyUploadsDomains as $domain ) { - // See if the domain for the upload matches this whitelisted domain + // See if the domain for the upload matches this allowed domain $domainPieces = explode( '.', $domain ); $uploadDomainPieces = explode( '.', $parsedUrl['host'] ); if ( count( $domainPieces ) === count( $uploadDomainPieces ) ) { |