This is an automated email from the ASF dual-hosted git repository.

jleroux pushed a commit to branch master
in repository https://gitbox.apache.org/repos/asf/ofbiz-site.git

commit 2c91ec843aea4b619fcbec8cddc6a4568a040cf2
Author: Jacques Le Roux <[email protected]>
AuthorDate: Wed Sep 24 16:12:19 2025 +0200

    Improved: remove the link to the README page on nightlies
    
    There is rather now a link there to the site security page where the info is
    centralised
---
 security.html                  | 4 +---
 template/page/security.tpl.php | 4 +---
 2 files changed, 2 insertions(+), 6 deletions(-)

diff --git a/security.html b/security.html
index 606d1aa..e42bd4b 100644
--- a/security.html
+++ b/security.html
@@ -122,11 +122,9 @@
                      Be sure to read the children pages in the left part of 
screen.<br>
 
                 <a 
href="//cwiki.apache.org/confluence/display/OFBIZ/Keeping+OFBiz+secure" 
target="external">Keeping OFBiz secure.</a>
-                     To keep your OFBiz instance secure from exploits. Also 
read the children pages, notably
+                     To keep your OFBiz instance secure from know exploits. 
Also read the children pages, notably
                      <a 
href="//cwiki.apache.org/confluence/display/OFBIZ/How+to+secure+your+deployment"
 target="external">How to secure your deployment.</a><br>
 
-                <a 
href="//nightlies.apache.org/ofbiz/trunk/readme/html5/README.html#security" 
target="external">In the main online README file,</a>
-                 best practices and security advices for OFBiz users in 
production.
             <p> </p>
             <p><strong>All system privileges, including access to potentially 
vulnerable operations, are granted to administrators</strong>. Even if we 
assume that administrators don't attack their own websites, it's essential to 
exercise extra care when granting administrator privileges.
                        Therefore, if a security breach occurs on the 
administration page (webtools), it's generally not perceived as a problem. The 
administrator holds the power. Unless an ordinary user manages to overstep 
their bounds and act beyond their authority.
diff --git a/template/page/security.tpl.php b/template/page/security.tpl.php
index 46c1ef0..3bd1ac2 100644
--- a/template/page/security.tpl.php
+++ b/template/page/security.tpl.php
@@ -23,11 +23,9 @@
                      Be sure to read the children pages in the left part of 
screen.<br>
 
                 <a 
href="//cwiki.apache.org/confluence/display/OFBIZ/Keeping+OFBiz+secure" 
target="external">Keeping OFBiz secure.</a>
-                     To keep your OFBiz instance secure from exploits. Also 
read the children pages, notably
+                     To keep your OFBiz instance secure from know exploits. 
Also read the children pages, notably
                      <a 
href="//cwiki.apache.org/confluence/display/OFBIZ/How+to+secure+your+deployment"
 target="external">How to secure your deployment.</a><br>
 
-                <a 
href="//nightlies.apache.org/ofbiz/trunk/readme/html5/README.html#security" 
target="external">In the main online README file,</a>
-                 best practices and security advices for OFBiz users in 
production.
             <p> </p>
             <p><strong>All system privileges, including access to potentially 
vulnerable operations, are granted to administrators</strong>. Even if we 
assume that administrators don't attack their own websites, it's essential to 
exercise extra care when granting administrator privileges.
                        Therefore, if a security breach occurs on the 
administration page (webtools), it's generally not perceived as a problem. The 
administrator holds the power. Unless an ordinary user manages to overstep 
their bounds and act beyond their authority.

Reply via email to