Skip to content
This repository was archived by the owner on Nov 19, 2024. It is now read-only.

Fixes 404s #6816

Merged
merged 5 commits into from
Mar 9, 2020
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
4 changes: 2 additions & 2 deletions src/cloud/project/project-webint-basic.md
Original file line number Diff line number Diff line change
Expand Up @@ -10,7 +10,7 @@ functional_areas:
- Configuration
---

The {{site.data.var.ece}} [Project Web Interface](https://accounts.magento.cloud) enables you to do the following for all Starter and Pro environments:
The {{site.data.var.ece}} [Project Web Interface](https://account.magento.com/customer/account/login/) enables you to do the following for all Starter and Pro environments:

- [Access projects](#project-access)
- Create and manage projects
Expand All @@ -31,7 +31,7 @@ The Project Web Interface provides several ways to access your project and envir

To access projects and environments through the Project Web Interface:

1. [Log in to your project](https://accounts.magento.cloud).
1. [Log in to your project](https://account.magento.com/customer/account/login/).
1. Click **Access Project** for a list of URLs and SSH.

![Access your project by URL or SSH]({{ site.baseurl }}/common/images/cloud_project-access.png){:width="600px"}
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -222,7 +222,7 @@ Where:
[2]: https://packagist.org/
[3]: https://getcomposer.org/doc/05-repositories.md#path
[4]: https://www.iso.org/iso-639-language-codes.html
[5]: https://docs.magento.com/marketplace/sellers/company-profile.html
[5]: https://devdocs.magento.com/marketplace/sellers/profile-company.html
[6]: https://marketplace.magento.com/
[7]: https://marketplace.magento.com
[8]: {{ page.baseurl }}/extension-dev-guide/package/package_module.html#package-metapackage
Expand Down
1 change: 0 additions & 1 deletion src/guides/v2.3/extension-dev-guide/prepare/lifecycle.md
Original file line number Diff line number Diff line change
Expand Up @@ -309,6 +309,5 @@ Avoid this situation by not including dependencies in your uninstall event class
[`ModuleDataSetupInterface`]: {{ site.mage2bloburl }}/{{page.guide_version}}/lib/internal/Magento/Framework/Setup/ModuleDataSetupInterface.php
[Customer module's DefaultCustomerGroupsAndAttributes.php]: {{ site.mage2bloburl }}/{{page.guide_version}}/app/code/Magento/Customer/Setup/Patch/Data/DefaultCustomerGroupsAndAttributes.php
[`ModuleContextInterface`]: {{ site.mage2bloburl }}/{{page.guide_version}}/lib/internal/Magento/Framework/Setup/ModuleContextInterface.php
[User module's UpgradeData.php]: {{ site.mage2bloburl }}/{{page.guide_version}}/app/code/Magento/User/Setup/UpgradeData.php
[Component Manager]: {{ page.baseurl }}/comp-mgr/extens-man/extensman-uninst-final.html
[`UninstallInterface`]: {{ site.mage2bloburl }}/{{page.guide_version}}/lib/internal/Magento/Framework/Setup/UninstallInterface.php
Original file line number Diff line number Diff line change
Expand Up @@ -16,7 +16,7 @@ As a developer, you should avoid using functions that introduce vulnerabilities
The following is a list of [PHP](https://glossary.magento.com/php) functions that are known to be vulnerable and exploitable.
Avoid using these functions in your code.

* [`eval`](http://php.net/manual/en/function.eval.php){:target="_blank"} - Using `eval` is considered bad practice because of its ability to [execute arbitrary PHP code](https://www.owasp.org/index.php/PHP_Security_Cheat_Sheet#Code_Injection){:target="_blank"}.
* [`eval`](http://php.net/manual/en/function.eval.php){:target="_blank"} - Using `eval` is considered bad practice because of its ability to [execute arbitrary PHP code](https://cheatsheetseries.owasp.org/cheatsheets/Injection_Prevention_Cheat_Sheet.html){:target="_blank"}.
* [`serialize`](http://php.net/manual/en/function.serialize.php){:target="_blank"}/[`unserialize`](http://php.net/manual/en/function.unserialize.php){:target="_blank"} - Attackers can create an exploit for these functions by passing a string with a serialized arbitrary object to the `unserialize` function to [run arbitrary code](https://www.owasp.org/index.php/PHP_Object_Injection){:target="_blank"}.
* [`md5`](http://php.net/manual/en/function.md5.php){:target="_blank"} - The algorithm for this function is known to have [cryptographic weaknesses](https://www.owasp.org/index.php/Guide_to_Cryptography#Hashes){:target="_blank"}.
You should never use this function for hashing passwords or any other sensitive data.
Expand Down
2 changes: 1 addition & 1 deletion src/guides/v2.3/security/two-factor-authentication.md
Original file line number Diff line number Diff line change
Expand Up @@ -16,7 +16,7 @@ Two-Factor Authentication gives you the ability to:
At this time, Two-Factor Authentication can be installed only from the command line.

{:.bs-callout-info}
**Magento Community Contribution** - Magento thanks [Riccardo Tempesta](https://twitter.com/rictempesta) of [MageSpecialist](https://partners.magento.com/portal/details/partner/id/129) for contributing these features as part of the Magento Community Engineering program.
**Magento Community Contribution** - Magento thanks [Riccardo Tempesta](https://twitter.com/rictempesta) of [MageSpecialist](https://partners.magento.com/portal/details/partner/index/id/129/) for contributing these features as part of the Magento Community Engineering program.

## Install 2FA

Expand Down