-
Notifications
You must be signed in to change notification settings - Fork 2.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
We need a smarter occ app:check-code #17187
Comments
We currently ignore certain classes that have no corresponding public API, but clearly there are some that we falsely include. Could you list some of them? In addition, we should be creating public APIs when app developers flag up app compliance issues like this. @rullzer has been doing a lot of work in this regard. |
Ah, I didn't know that. I didn't bother checking the code 😳 Here are some
|
The right way to fix it is to add this OCP calls that are needed. No dirty workarounds please :-) |
Of course this needs fixing via OCP (it's taking years), but you can't have a compliance test which contains sections which nobody can pass. |
Not sure why it has to take years. Just request a missing call and it can be added to the next version. Most likely also back ported to the next patch release if the OCP is only a wrapper without logic. |
The original request to fix OC/OCP is from 2013 #4863 and while good progress has been made, especially these past months, the methods I've mentioned are not that easy to bring to the public space, especially The encryption app was holding things up. Maybe things will be easier with 2.0, but there needs to be a move from using View to using Node and to move the whole sharing architecture to the public space. Very few people can do that, so I don't think we'll be able to use these methods before next year and that means no compliance until then. |
these folders are not scanned |
Not true
Should I fill a bug report then?
OK! |
seriously - why is there php code in the js folder? |
Devs don't control what the vendor provides in the package they use and usually all files have to be distributed. |
Then it simply is a crappy library. One shall not ship not required files. I mean: Seriously a Java Applet? (Same-Origin-Policy anyone?) And a bigshot.php script that is insecure if your PHP version is vulnerable to Null Byte attacks? (a ton are – RHEL only fixed it for example because we complained loud enough) And also insecure if your script runs on Windows? There is a reason why our libs that we ship all have some exclusions using the .gitignore file. |
I'll just distribute the archive along with the JS then. |
Great news 🎩 |
👎 I don't see the use cases for these things, you can just get the user folder and everything works fine ™️ |
It doesn't when you only have a token to work with... and that's the main problem. Apps can't serve the content of public shares using only public APIs. |
This issue has been automatically closed. |
Devs have no choice but use some private APIs which have no OCP equivalent and by doing so, their apps are being flagged as being "not compliant". Those methods should be listed, but have no impact on the app's compliance status.
Also, the app checker should treat code located in the vendor folders differently.
Issues should still be reported, so that an admin can estimate the quality of the libs chosen to support the app, but it shouldn't have an impact on the app's compliance status.
The text was updated successfully, but these errors were encountered: