Skip to content
This repository was archived by the owner on Nov 19, 2024. It is now read-only.

Commit d2f94f6

Browse files
authored
Merge pull request #6816 from magento/db_404s
Fixes 404s
2 parents 76b217d + 15ff730 commit d2f94f6

File tree

5 files changed

+5
-6
lines changed

5 files changed

+5
-6
lines changed

src/cloud/project/project-webint-basic.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ functional_areas:
1010
- Configuration
1111
---
1212

13-
The {{site.data.var.ece}} [Project Web Interface](https://accounts.magento.cloud) enables you to do the following for all Starter and Pro environments:
13+
The {{site.data.var.ece}} [Project Web Interface](https://account.magento.com/customer/account/login/) enables you to do the following for all Starter and Pro environments:
1414

1515
- [Access projects](#project-access)
1616
- Create and manage projects
@@ -31,7 +31,7 @@ The Project Web Interface provides several ways to access your project and envir
3131

3232
To access projects and environments through the Project Web Interface:
3333

34-
1. [Log in to your project](https://accounts.magento.cloud).
34+
1. [Log in to your project](https://account.magento.com/customer/account/login/).
3535
1. Click **Access Project** for a list of URLs and SSH.
3636

3737
![Access your project by URL or SSH]({{ site.baseurl }}/common/images/cloud_project-access.png){:width="600px"}

src/guides/v2.3/extension-dev-guide/build/composer-integration.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -222,7 +222,7 @@ Where:
222222
[2]: https://packagist.org/
223223
[3]: https://getcomposer.org/doc/05-repositories.md#path
224224
[4]: https://www.iso.org/iso-639-language-codes.html
225-
[5]: https://docs.magento.com/marketplace/sellers/company-profile.html
225+
[5]: https://devdocs.magento.com/marketplace/sellers/profile-company.html
226226
[6]: https://marketplace.magento.com/
227227
[7]: https://marketplace.magento.com
228228
[8]: {{ page.baseurl }}/extension-dev-guide/package/package_module.html#package-metapackage

src/guides/v2.3/extension-dev-guide/prepare/lifecycle.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -309,6 +309,5 @@ Avoid this situation by not including dependencies in your uninstall event class
309309
[`ModuleDataSetupInterface`]: {{ site.mage2bloburl }}/{{page.guide_version}}/lib/internal/Magento/Framework/Setup/ModuleDataSetupInterface.php
310310
[Customer module's DefaultCustomerGroupsAndAttributes.php]: {{ site.mage2bloburl }}/{{page.guide_version}}/app/code/Magento/Customer/Setup/Patch/Data/DefaultCustomerGroupsAndAttributes.php
311311
[`ModuleContextInterface`]: {{ site.mage2bloburl }}/{{page.guide_version}}/lib/internal/Magento/Framework/Setup/ModuleContextInterface.php
312-
[User module's UpgradeData.php]: {{ site.mage2bloburl }}/{{page.guide_version}}/app/code/Magento/User/Setup/UpgradeData.php
313312
[Component Manager]: {{ page.baseurl }}/comp-mgr/extens-man/extensman-uninst-final.html
314313
[`UninstallInterface`]: {{ site.mage2bloburl }}/{{page.guide_version}}/lib/internal/Magento/Framework/Setup/UninstallInterface.php

src/guides/v2.3/extension-dev-guide/security/non-secure-functions.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ As a developer, you should avoid using functions that introduce vulnerabilities
1616
The following is a list of [PHP](https://glossary.magento.com/php) functions that are known to be vulnerable and exploitable.
1717
Avoid using these functions in your code.
1818

19-
* [`eval`](http://php.net/manual/en/function.eval.php){:target="_blank"} - Using `eval` is considered bad practice because of its ability to [execute arbitrary PHP code](https://www.owasp.org/index.php/PHP_Security_Cheat_Sheet#Code_Injection){:target="_blank"}.
19+
* [`eval`](http://php.net/manual/en/function.eval.php){:target="_blank"} - Using `eval` is considered bad practice because of its ability to [execute arbitrary PHP code](https://cheatsheetseries.owasp.org/cheatsheets/Injection_Prevention_Cheat_Sheet.html){:target="_blank"}.
2020
* [`serialize`](http://php.net/manual/en/function.serialize.php){:target="_blank"}/[`unserialize`](http://php.net/manual/en/function.unserialize.php){:target="_blank"} - Attackers can create an exploit for these functions by passing a string with a serialized arbitrary object to the `unserialize` function to [run arbitrary code](https://www.owasp.org/index.php/PHP_Object_Injection){:target="_blank"}.
2121
* [`md5`](http://php.net/manual/en/function.md5.php){:target="_blank"} - The algorithm for this function is known to have [cryptographic weaknesses](https://www.owasp.org/index.php/Guide_to_Cryptography#Hashes){:target="_blank"}.
2222
You should never use this function for hashing passwords or any other sensitive data.

src/guides/v2.3/security/two-factor-authentication.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ Two-Factor Authentication gives you the ability to:
1616
At this time, Two-Factor Authentication can be installed only from the command line.
1717

1818
{:.bs-callout-info}
19-
**Magento Community Contribution** - Magento thanks [Riccardo Tempesta](https://twitter.com/rictempesta) of [MageSpecialist](https://partners.magento.com/portal/details/partner/id/129) for contributing these features as part of the Magento Community Engineering program.
19+
**Magento Community Contribution** - Magento thanks [Riccardo Tempesta](https://twitter.com/rictempesta) of [MageSpecialist](https://partners.magento.com/portal/details/partner/index/id/129/) for contributing these features as part of the Magento Community Engineering program.
2020

2121
## Install 2FA
2222

0 commit comments

Comments
 (0)