Fork me on GitHub

Wikimedia IRC logs browser - #wikimedia-tech

Filter:
Start date
End date

Displaying 72 items:

2026-03-08 20:34:47 <A_smart_kitten> Does anyone have a link to the Gerrit patch that required re-auth for sitewide JS changes on Wikimedia wikis (mentioned @ https://meta.wikimedia.org/wiki/Talk:Wikimedia_Foundation/Product_and_Technology/Product_Safety_and_Integrity/March_2026_User_Script_Incident#c-EMill-WMF-20260306163600-Ep%C3%ACdosis-20260306104800), or know if it was done via e.g. `PrivateSettings`?
2026-03-08 20:35:43 <A_smart_kitten> (I tried looking myself but couldn't find it 😅)
2026-03-08 21:49:50 <perryprog> Was there a change to the CSP that already got deployed? I haven't been following closely but e.g., Xtools isn't loading for me due to CSP errors
2026-03-08 21:51:51 <bawolff> There were a bunch of recent CSP changes deployed
2026-03-08 21:52:05 <bawolff> I'd suggest filing a phab ticket if its causing problems
2026-03-08 21:53:26 <perryprog> how recently deployed? Surely xwiki user scripts being blocked by CSP would be noticed pretty fast
2026-03-08 21:53:42 <bawolff> Like 3 days ago?
2026-03-08 21:54:00 <bawolff> There was a giant screw up and CSP was deployed early as a response
2026-03-08 21:54:01 <perryprog> yeah so surely someone has a ticket on it by now
2026-03-08 21:54:20 <bawolff> If everyone assumes that, nobody files a ticket
2026-03-08 21:54:37 <perryprog> noooo bystander effect isn't real; it can't hurt me :(
2026-03-08 21:55:31 <perryprog> okay yeah there's some tickets for what domains are getting added https://phabricator.wikimedia.org/T419265
2026-03-08 21:58:10 <perryprog> gah, *.mediawiki.org and www.mediawiki.org are in the CSP but not mediawiki.org >.>
2026-03-08 21:58:53 <bawolff> What else even is under mediawiki.org other than www.mediawiki.org?
2026-03-08 21:59:15 <bawolff> seems odd to include the *
2026-03-08 22:00:42 <perryprog> Not sure. I think I can workaround by just using the FQDN in my import, but it seems like better UX to add it to the CSP unless there's a good reason not to
2026-03-08 22:01:18 <bawolff> I mean, the more things in the header the more bloated it gets
2026-03-08 22:01:24 <perryprog> mm true
2026-03-08 22:01:29 <perryprog> I guess that byte cost does add up
2026-03-08 22:01:29 <bawolff> But at this point they seem to be adding the whole internet to it
2026-03-08 22:02:01 <bawolff> Think of all the extra latency you will save by avoiding the redirect. that's one whole round trip :P
2026-03-08 22:02:24 <bawolff> tbh, i don't really get the point of a CSP policy that has github and multiple CDNs in it
2026-03-08 22:02:35 <perryprog> I too clear my cache after every request
2026-03-08 22:02:46 <bawolff> lol
2026-03-08 22:03:15 <perryprog> hm; the xtools page has the install instructions including the www, so my not including it could be chalked up to user error
2026-03-08 22:04:31 <perryprog> ughhh but xtools.wmcloud.org is blocked by the CSP now
2026-03-08 22:05:44 <perryprog> oh, report only, not an actual block
2026-03-08 22:09:57 <perryprog> would be interesting to have some sort of standard for user controlled CSPs. It'd never really work on a large scale since only technical users would really get it, but being able to just locally choose what sites are on a given website's CSP would be very nice.
2026-03-08 22:11:01 <bawolff> Once upon a time i was working on CSP (this was years ago and it never came to fruition), but the vauge plan was that gadgets would be able to declare what sites they needed and there would be a pop up for the user to authorize it when they enabled the gadget
2026-03-08 22:11:24 <perryprog> idea thief!
2026-03-08 22:12:12 <bawolff> I actually think having a preference is reasonable. I mean if people are technical enough to put random junk in Special:Mypage/common.js then they are technical enough to put random urls in a field in Special:Preferences
2026-03-08 22:12:27 <bawolff> Although it all ind of comes down to what people are trying to accomplish with CSP
2026-03-08 22:12:40 <bawolff> And I'm not actually sure what the security goals of the current iteration of CSP is
2026-03-08 22:13:03 <perryprog> I mean isn't there a gadget that one-click installs stuff into your common.js for you
2026-03-08 22:13:14 <perryprog> I think it's just limiting attack surface
2026-03-08 22:13:17 <bawolff> It feels like the incident made everyone jump the gun when it came to communication
2026-03-08 22:13:32 <perryprog> which is understandable
2026-03-08 22:13:35 <bawolff> attack surface is pretty wide if you're including github.io
2026-03-08 22:14:42 <bawolff> I personally feel that network restrictions in CSP are mostly useful as a good faith privacy control (make sure admins don't uninentionally compromise user privacy) then anything that guards against malicious people
2026-03-08 22:15:48 <bawolff> Sure you could make data exfiltration and external communication really annoying, but its never going to be bullet proof
2026-03-08 22:15:57 <perryprog> yeahhh
2026-03-08 22:16:20 <bawolff> Now on the other hand, eliminationg 'unsafe-inline', that truly would make everything more secure
2026-03-08 22:16:57 <perryprog> I mean it CSP standards really wasn't designed for this kind of use case of random user scripts that anyone can grab and install
2026-03-08 22:17:45 <bawolff> I don't think any system can fix the problem of intentionally running maybe malicious code
2026-03-08 22:18:00 <bawolff> You can't both trust and not trust people. You have to choose one
2026-03-08 22:19:15 <bawolff> Like if we really wanted to eliminate the user script security problem, we'd have to do some sort of aggresive sandbox. I think figma solves this by compiling a js runtime to wasm and running user scripts inside that
2026-03-08 22:19:30 <bawolff> but that would also defeat much of the point
2026-03-08 22:19:56 <bawolff> Although imagine a world where you could have user-script like features written in lua. That'd be pretty cool
2026-03-08 22:20:02 <perryprog> noooo
2026-03-08 22:20:08 <perryprog> I don't like JS but I'd take it over lua any day
2026-03-08 22:20:46 <bawolff> Come over the to the dark side, we have arrays starting at 1
2026-03-08 22:21:00 <perryprog> literally empty standard library
2026-03-08 22:21:12 <bawolff> lol true
2026-03-08 22:21:14 <perryprog> drives me nuts how imperative it is too
2026-03-08 22:21:40 <bawolff> The other day i wanted the equivalent of javascript's String.indexOf
2026-03-08 22:21:44 <bawolff> Lua literally does not have it
2026-03-08 22:21:51 <perryprog> yeah it's painful
2026-03-09 08:35:14 <revi> is it uh… just me who can't login to idp.wikimedia.org from iOS 26.3.1 safari?
2026-03-09 08:35:53 <revi> response "Invalid CORS request"
2026-03-09 08:36:50 <revi> surprisingly iPadOS works fine, hmm
2026-03-09 11:12:35 <A_smart_kitten> revi: I just tried logging into https://idp.wikimedia.org/ on iOS 26.3.1 safari and it seems to work for me. maybe there's a config setting in safari that has the effect of stopping it working (in which case, I guess the question might be trying to figure out which config setting it might be :/)
2026-03-10 15:00:35 <snitch> [[Tech]]; Matthew at catfishing; /* Missing "continue" element for categories */ new section; https://meta.wikimedia.org/w/index.php?diff=30220168&oldid=30179242&rcid=38692781
2026-03-10 15:29:33 <snitch> [[Tech]]; Reedy; /* Missing "continue" element for categories */ Reply; https://meta.wikimedia.org/w/index.php?diff=30220230&oldid=30220168&rcid=38692938
2026-03-10 15:29:37 <Reedy> zabe: ^ think that might be you
2026-03-10 15:29:40 <wm-bot> I will let you know when I see bawolff and I will deliver that message to them
2026-03-10 15:29:40 <A_smart_kitten> @notify bawolff just letting you know as a courtesy that I mentioned an idea you shared in this channel the other day in https://phabricator.wikimedia.org/T419559. (I didn't ping you on the task as I wasn't sure if you'd want notifications from it or not)
2026-03-10 15:32:04 <perryprog> that was my idea; bawolff just time travelled and stole it from me ;P
2026-03-10 15:32:52 <A_smart_kitten> perryprog: great minds think alike? :D
2026-03-10 15:55:01 <snitch> [[Tech]]; Matthew at catfishing; /* Missing "continue" element for categories */ Reply; https://meta.wikimedia.org/w/index.php?diff=30220273&oldid=30220230&rcid=38693143
2026-03-10 15:58:08 <A_smart_kitten> (^ was filed as T419563)
2026-03-10 15:58:09 <stashbot> T419563: Action API: missing "continue" element for categories prop - https://phabricator.wikimedia.org/T419563
2026-03-10 23:45:07 <zabe> will take a look

This page is generated from SQL logs, you can also download static txt files from here