Problem/Motivation
Currently it's only possible to delete a file entity by the owner of an file entity. There is no additional condition defined for any permission or even an exception for user/1 (main admin user).
Proposed resolution
- Add a delete form for files
- Add a button to the list of file operations
- Add two new permissions,
delete any filesanddelete own files.
Remaining tasks
Add the form and button
Remove the edit permissions in current patch
User interface changes
New form and button for deleting files - reusing existing patterns


API changes
New permissions
Data model changes
None expected.
Original Issue summary:
I've faced with problem when user with id '1' (main admin user) can't delete file entities created by another user. I used view_bulk_operations for deleting file entities. I thought user 1 has absolute access to all entities.
Release notes snippet
Content administrators can now be given permission to delete any file, rather than just files they created. An operations field can be added to views on File entities to add a delete button. The view that ships with the File module has been updated to include the operations field. Existing sites need to add themselves.
| Comment | File | Size | Author |
|---|---|---|---|
| #149 | 2949017-149.patch | 25.66 KB | alexpott |
| #149 | 146-149-interdiff.txt | 1.77 KB | alexpott |
| #147 | 144-146-interdiff.txt | 2.72 KB | alexpott |
| #146 | 2949017-146.patch | 24.45 KB | alexpott |
| #146 | 144-146-interdiff.txt | 1.07 KB | alexpott |
Issue fork drupal-2949017
Show commands
Start within a Git clone of the project using the version control instructions.
Or, if you do not have SSH keys set up on git.drupalcode.org:
Comments
Comment #2
khiminrm commentedComment #3
khiminrm commentedComment #4
volegerIt's not a good approach.
I guess it's better to check
$account->isAdmin().Comment #5
seperezf commentedWe probably can use the 'administer content' permission for this?
Comment #6
oknateHere are some related issues to read over:
Uploaded files are impossible to replace
Deleting an entity with revisions and file/image field does not release file usage of non-default revisions, causing files to linger
Node revisions: Have an option to delete attached files even when revisions are enabled for a node
The problem with allowing any user to delete a file that has references to it is that all references to that file would need to be removed or else you leave hanging dependencies, which if not handled properly, can cause fatal errors.
Until they figure out how to traverse every entity and remove every reference when deleting a file, this issue will remain stuck.
Imagine if you have 2 billion references to your file. Now, on file delete you need to execute queries to look up all of the references, iterate through them and delete all of those references.
Now consider revisions and translations.
This is why Drupal 8 hasn't yet figured out how to let admin's delete files. You can't do a potentially limitless number of queries on entity delete.
Comment #7
seperezf commented@oknate I get it. Just curious tho, is the "Used in" count in /admin/content/files accurate? I would assume not.
Comment #8
oknateWhether that's accurate depends if you're using modules that use files without updating the file_usage table or not using the file.usage service.
Right now that field_usage table doesn't list specifically where the file is used on an entity, so if you used the same file on two different fields, I'm not sure if it would keep that count accurate or not.
Comment #9
johnpitcairn commentedRe #6: begs the question of why the user who created the file entities CAN delete them, doesn't it? The same problems still exist.
Comment #10
c-logemannCurrently we have a very bad situation about managing files in D8. We have a customer which is very confused about this situation where editors cannot delete files by others. I created a views bulk operation view with a filter on file usage. But the currently the editors need to talk to each others for just deleting files. And if an editor isn't available to delete his/her own file entity we (the maintenance company) needs to manipulate the ownership of an file entity in database. With this bug D8 is currently not usable for professional file management.
About changing status to major
Because deleting files of other users was possible in D7 and this bug "Cause a significant admin- or developer-facing bug with no workaround." I set the status to "major".
About changing title and issue summary
The fact that currently even user/1 is not able to delete file entities is true. But solving this problem only for user/1 and patch #3 is not helpful. We need a solution where user/1 can give admin or editor roles also this option and can maybe bypass this permission like it is in other places. I believe we need to define another permission which allows to block this functionality especially with the knowing problems in mind.
About the proposed solution
I know about ideas to restrict user/1 permissions which are currently mostly organized as hard coded permission bypass. I am open to start at this place to change this and only use a permission to allow file entity deletions especially as long user/1 can add herself/himself to an admin role and add this permission to this role.
Comment #11
c-logemannJust an additional important point especially related to upcoming #GDPR Compliance in Europe. When there are data in uploaded files we need to delete because we are forced by law there is currently no way without manipulating database and/or file system directly.
Comment #12
Anonymous (not verified) commentedTotally agree!
A year ago, I and @Wim Leers already tried to create this permission. See #2843139-17: EntityResource: Provide comprehensive test coverage for File entity, and tighten access control handler with search by
administer fileswords. Because we really lose control over the file management on the site, where users can add files. I'm surprised why it meets such resistance.Regression occurred in #2310307: File needs CRUD permissions to make REST work on entity/file/{id} where there was also a discussion about this condition. But for obvious reasons, we have some kind of taboo on creating new permissions :)
Comment #13
c-logemannWhen it's so difficult to get an additional permission we can maybe follow the suggestion of comment #5: "'administer content".
I think I will use a patch like this to temporary solve the problems of our customers.
Comment #14
c-logemannFixed patch of comment #5 (removed "docroot" from file path).
Comment #15
Anonymous (not verified) commentedThank you, @C_Logemann! Patch have 2 small CS flaws (> 80 length of comment, == not a strict compare). But in any case, we need feedback about this change from experienced developers.
Comment #16
cilefen commentedComment #17
c-logemann@vaplas For a first step I just fixed the #5 patch that it can be applied normally. I didn't made tests or a deeper review yet. That's on my to-do list.
Comment #18
c-logemannJust fixed comment on patch and still not tested functionally by myself.
Comment #19
andypostIt needs new permission otoh if user owns file he could edit it
There's no such permission in d8, also "administer nodes" defined by node module which is not dependency for the file one
Comment #20
c-logemann@andypost When "administer content" is still a permission of the node module it's really wrong to use this beside a custom workaround. Maybe this permission should be renamed because "content" is in D8 more than just nodes including files (see: "admin/content/files").
I hope we can get this fixed including a new permission in core system.
Comment #21
c-logemannBefore someone want to start adding a new permission (s)he should communicate about this in this issue to avoid double work. And I think if we want to get this committed we also need to extend the testing part when we introduce a new file permission.
Comment #22
andypost@C_Logemann basically if your module depends on presence of permission from other module you have to add dependency on the first. Another option is use module_exists before checking for permission
I'm sure that file module needs own permissions to manipulate file entities that could be tricky like comment module doing... lots of thin places which require extra testing for permission permutation
In a light of GDPR we have to allow owner user (person who created file entity) to delete it anyway!
Comment #23
graber commentedA serious issue, I think we should:
1. Add a permission to delete file entities.
2a.
Add a queue worker or an immediate operation (depending on the amount) that finds file usage and resolves dependencies - probably removing
field values prior to deleting the file entity.
If the deletion is implemented by a third party module, a message (in case of VBO a confirmation step) will need to be implemented where
dependencies are listed.
2b.
Another option (probably an easier one) would be checking file usage and not granting deletion access of the file entity if it is used. Then it'd be completely up to the user to handle dependencies first.
Any thoughts?
Comment #24
oknateOne thought I had is to replace the file itself (not the file entity) with a default file. Since it's difficult to know how to handle dependencies, if you want to delete a file from the server and it's attached to a file entity, the file entity could be left intact and adjusted so that it points to a default file. This would avoid issues where fatal errors are thrown because code in a contrib module or custom module hasn't handled that file entity being removed. Perhaps that could be an option: 1) remove file and replace with default or 2) remove references to file, where possible. As of right now, I'm not sure there's a way to do a reference lookup of all the usages of a file entity reference. The usage table just specifies the parent, not the specific field. And I'm not sure how you'd find entity embeds in text fields. That's why I think, although a bit crazy, leaving the file entity and deleting the file might be a way to allow deleting files and avoiding leaving hanging dependencies.
Comment #25
c-logemannThat's already implemented and I think it's clear that this should not be removed. It also should be explicit included in testing.
Comment #26
c-logemannCurrently I think the possibility to delete files by owners has no UI and can be used via API like Views Bulk Operations is using. With GDPR in mind there should also an interface to delete files by its owners in core. But I think this should be handled by another issue.
Comment #27
joelpittetRelated issues: #2950127: Add helpful reason for 'update' and 'delete' access not being allowed to FileAccessControlHandler #2310307: File needs CRUD permissions to make REST work on entity/file/{id}
Comment #28
joelpittetComment #29
joelpittet#37.2 in #2310307: File needs CRUD permissions to make REST work on entity/file/{id} may be a good solution to re-introduce the D7 permissions:
Thoughts on adding "delete own files" and "delete any files" permissions?
Comment #30
mgiffordAdding parent item.
Comment #31
andypostGood idea!
Comment #32
mgiffordComment #33
c-logemannI added the following issue as child: #2936175: Add delete button to admin/content/file
Maybe we also need a UI for users to view their own orphaned files and get the possibility to delete.
Comment #35
sdmeyers commentedBy any user do mean any user or any specific user (i.e. admin)? Right now this show stopper for us, since we often update files and the old files contain incorrect information. It seems the justification here is, "you don't know how you are using your files so we are going to assume you are going to screw up and not let you touch them." Which I think is the wrong approach.
This is a reasonable solution. Another would be to return a sensible error if something attempts to access a non-existent file entity.
That said... currently we can't replace files either. Which would be another reasonable thing to add along with "delete". In fact a good "replace" could do a lot to mitigate the need for delete.
The point here is there are real business needs to be able to remove a file from our system, permanently. The justifications for not implementing this, which I accept are real, don't IMO outweigh the needs. So at the very least this should be implemented so though willing to risk the issues with removing files can do so.
Comment #36
maxplus commentedI know this is not the right approach but I needed a quick fix so I updated the patch from #3 to work with the current 8.6.1
Comment #37
maxplus commentedSorry, posted wrong patch
Comment #38
s_leu commentedA real patch for this should probably incorporate the approach suggested in #23 combined with re-introducing the D7 permissions as suggested in #29. And of course it needs a whole bunch of tests :)
Comment #39
c-logemannBecause I needed a workaround for a customer I tested patch #18 and figured out, that the machine name of the "Administer content" permission is "administer nodes". Because this is just a workaround on one customer system and I agree that we need a new permission for this I don't share this patch o this place and hide the buggy patch #18.
Comment #40
rwohlebAt least until a better solution comes along, such as a new permission, I think it makes a lot more sense to tie things to "administer site configuration". A user like UID 1 will have that permission and it means we aren't tied to the node module. For all the reasons discussed, file deletion shouldn't be a common action anyways. Attached is a patch along these lines.
Comment #41
rwohlebReroll of the patch to apply cleanly to 8.6.x.
Comment #42
nbaosullivan commentedReroll of the patch to apply cleanly to 8.5.x.
Comment #43
c-logemann@nbaosullivan Your patch cannot apply because it's not relative to Drupal project/web root folder. I think you built it inside a project repository e.g. composer project because it's starting with "/web/core/modules ...". This should be "/core/modules ...". This is needed to be auto applied by the d.o testing system and e.g. via composer with "cweagans/composer-patches" connected to "drupal/core".
When patch is used on this common way I think we don't need a speacial 8.5 version because the related code didn't changed.
Comment #45
ndobromirov commentedThis is not a good option, as it essentially increases the special state for user 1. Note that there is ongoing work in core to remove the special state for that user.
There are two options defined in here. I am changing to use existing in the description for this one. This is also why I've added the third option - add a new permission.
So at the moment there is an implicit permission that anyone can delete his own file.
I am adding a new admin-level permission to manage delete any file and make the check here to respect that.
This patch is against current 8.8.x (1d29b748af).
There is new
Ifin the code - so it needs tests :). Keeping as needs work for that.Comment #46
ndobromirov commentedNeeds review - to trigger the bot.
After that will revert it back as per previous comment.
Comment #47
mpp commentedrefactored all == to === for consistency.
Comment #48
zero2one commentedPatch #47 worked for me on 8.6.15.
Comment #50
Mike_Kreuzer commentedJust in case it's useful in the interim - Delete files
Comment #51
alison#47 let me delete files as a non-user-1 administrator, woo hoo! I haven't tested permissions settings for other user roles.
core 8.7.3
vbo 8.x-3.2
................
Might should update (or remove) the code comment at line 72, ya?
(And the "forbidden" message -- )
Comment #53
alisonAny chance this could become part of core files admin view, instead of needing VBO...?
(Or, perhaps a more important question: Is this patch headed for adoption, or not likely? I was wondering if it might have become outdated / superseded, or if it's still relevant etc.)
Comment #54
c-logemannI'm not a core maintainer but I'm sure we can get this very important functionality in core when it's ready to commit. But there is still some work to be done including testing etc.
Comment #55
Steven McCoy commentedFirst time contributor here - please be gentle ;) I've modified the patch to work with the latest current release.
Comment #56
c-logemannComment #57
dwwThanks, @Steven McCoy for contributing! A few issues with patch #55:
fatal: corrupt patch at line 47Nice changes, but IMHO out of scope for this issue.
This comment is no longer really true. Something like:
"Otherwise, only the file owner ..."
Cheers,
-Derek
Comment #58
dwwwhoops ;)
Comment #59
dwwLike so. Since #55 doesn't apply, here's a raw diff of the two patch files. Actual interdiff relative to #47 also attached.
Probably still NW for failing tests and adding new tests, but let's at least get some valid testbot results to work from.
Thanks,
-Derek
Comment #60
matroskeenHey folks,
Thanks for the patch, the last one works great!
However, I'm changing back to "Needs work" cause we need tests.
By the way, shouldn't we also introduce "delete own files" permission? (as we have for other entities)
If so, does it make sense to do it here?
Comment #61
matroskeenComment #62
matroskeenAdding a new patch with additional permissions for delete/edit operations.
I'm also thinking about hook_update_N() that will add "edit own files", "delete own files" permissions for existing users to avoid unexpected issues in existing installations. What do you think?
Comment #64
matroskeenI would like to receive some feedback before going forward and fixing other tests.
Are we going in the right direction here?
Comment #65
Steven McCoy commented...
Comment #66
Steven McCoy commentedThis makes patch #59 work on the current 8.7.x
Comment #67
andypostComment #68
avpadernoComment #70
replicaobscuraPatch #66 adds the new permission but does not seem to be checking it anywhere. I think it is missing that piece from the previous patch.
Additionally, #59 still applies properly for me in Drupal 8.9, so I'm not sure there is even a need to re-roll that.
#62 looks like a good change to me, but I haven't had a chance to try it out yet.
Comment #71
hardik_patel_12 commentedworking on it.
Comment #72
hardik_patel_12 commentedKindly review a patch.
Comment #74
pameeela commentedPatch in #59 is working for me on 8.9.1.
Using it defensively on a site with a custom view for 'Delete files' that has the bulk options but only shows temporary files, and only admins can access it. The bulk options are not available on the files overview to prevent anyone from doing anything too destructive :)
This is partly to get around the access checking issues with bulk actions. As @dww reminded me, these will allow you to use an action even if you don't have permission. So by removing the bulk options from the overview page and only adding them to a custom view that uses the 'Delete any file' permission, we can make sure the bulk action is only used by those with the correct permissions.
Comment #75
douggreen commentedWhile the above patch adds the permission, it's still not useful OOTB without an additional module like VBO. Shouldn't we also add the delete-form link template and form class to the entity like file_delete_ui does?
Comment #76
vegardjo commentedThis is a bit of a side track, but if you're in the situation that you need to delete *all* your files, you can do it with Drush:
drush edel file. A lot easier than VBO and the other suggestions I found.Comment #80
eelkeblokRemoving reference to user 1 from title. We're actually trying very hard to de-specialize uid 1 in #540008: Add a container parameter that can remove the special behavior of UID#1.
Comment #82
xem8vfdh commentedis this slated for 9.3 release?
Comment #83
larowlanIt depends on folks moving it forward
Comment #84
xem8vfdh commentedThanks @iarowlan, fingers crossed. Thanks everyone for the work here.
Comment #85
netsliverAttached patch for latest 9.3.x
Comment #89
hai.nguyen.phc commentedCredit to #55
I just modified it a bit to work with Drupal Core 9.3.9
Comment #90
c-logemannComment #91
wickwood commentedWe have found the patch in #89 working.
But there seems to be a bug with Drupal Core itself because we a user can remove their own Media Files when they are being used before applying this patch.
And after applying this patch, an admin can remove files by any user whether they are being used or not, which does not seem prudent to us.
However, it is very nice to finally be able to remove Media Files uploaded by another user!
Comment #93
jose.carvalheira commentedHello
Just adapted #72 for working in 9.3.16
Comment #94
jose.carvalheira commentedComment #95
cilefen commented9.3.x is only security releases now.
Comment #96
mfbLooks like patch at #94 is missing the newline at end of file, so is considered a corrupt patch file.
Comment #97
ranjith_kumar_k_u commentedRerolled #94
Comment #98
avpadernoComment #99
mrinalini9 commentedFixing custom commands failure issue in #97, please review it.
Comment #101
anybodyComment #102
sourabhjainI will work on this.
Comment #103
sourabhjainRerolled the patch for 9.5.x.
Please review.
Comment #104
avpadernoComment #105
sourabhjainResolved the custom command failed issue in #103.
Please review.
Comment #106
sourabhjainComment #107
avpadernoComment #108
acbramley commentedAs per feedback on the MR, there's no reason this should be in a hook instead of the FileAccessControlHandler class.
Comment #109
oakulm commentedJust as a tought we propably need schema update because most of the sites have already some file fields enabled so uninstall is propably out of the question?
Comment #110
sourabhjainComment #112
oakulm commentedDisregard https://www.drupal.org/project/drupal/issues/2949017#comment-14706968 permissions are in config....
Comment #113
oakulm commentedAs per @acbramley's comment hook_file_access has been removed in favor of FileAccessControlHandler. Also Kernel/AccessTest.php was failing so it has been fixed.
Comment #114
oakulm commentedRemoved left overs from file.module
Comment #116
alexpottWe're going to need an update path to grant the delete the files you own permission to all the roles. There's an interesting question about the anonymous role because currently if a file is owned by user 0 then the anonymous user can delete it?!?!!?
Patch attached:
node_node_access()and does the same with cacheabilityComment #117
alexpottHere's more test coverage of the cacheability metadata so we can be sure it stays correct.
Comment #118
alexpottFixing UserCreationTrait/PHPStan over in #3319683: Fix PHPStan errors from UserCreationTrait and AssertMailTrait... will upload a patch with an update path once that lands.
Comment #119
alexpottHere's a tested upgrade path and some more tidy up of the tests. The biggest change here is the of the "edit any files" and "delete any files" permissions. I think the correct english here is "edit any file" and "delete any file".
We're going to need a change record and release note to announce this change.
Comment #121
alexpottHmmm #119 highlights 2 issues..
Fun, not fun.
Comment #122
alexpottCreated issues for #121 see:
Comment #123
larowlanany reason not to use Role::hasPermission here? (and below too)
we should assertTrue($role->isAdmin()) here too so there's at least one positive assertion
Should we assertGreaterThan(1 instead because the fact it's 2 isn't important, the fact its > 1 is
sneaky
Is this actually correct?
Shouldn't create access be checked against the access handler and not an entity? (realise this is an existing issue)
Is this intentional?
Comment #124
alexpottThanks for the review @larowlan.
Comment #125
alexpottThe blockers (so far) are in... rerolling the patch to remvoe the PHPStan stuff and address #123. Hopefully green.
Comment #126
alexpottOops forgot to commit removal PHPStan baseline changes... ignore #125
Comment #127
alexpottLet's fix a comment and remove unrelated change.
Comment #128
alexpottSo the patch is working and allows people using VBO to delete a file. And it works nicely with the Media FIle Delete module. However, with vanilla core I think we might need to consider adding a delete button to the files view as this patch currently does not give you a UI to delete a file with Drupal Core alone. Alternatively we could handle the UI considerations in a follow-up.
Comment #129
larowlanI would vote for leaving the UI to a separate follow up so we can engage the UX team. I'll try to review this again in the next seven days
Comment #130
berdirI'm OK to push that to a follow-up but then we don't really solve the problem here, seems a bit weird. More like a blocker for this then that would need to get committed first and then we'd get back to a UI here.
But a default bulk operations and views entity operations field should be simple enough to add, so we could combine it. I'd say our default UI patterns don't really need a UX review?
I need to have a closer look as well, but I do have two thoughts already:
* This is going to conflict/overlap with existing permissions and logic in the file_entity module. It's not used much anymore, but I expect it will need to be updated for this.
* It's a bit unclear to me why this includes edit permissions. Core has no UI for editing files and I don't see us ever adding that and if we're not careful and open that up through REST/JSON API then that could result in really weird problems or even security issues (for example, being able to edit the filename).
Comment #131
alexpottI think I like @berdir is suggesting here. Add a delete form and button to the files listing and remove the edit permission as out of scope. Will work on this next week if no one beats me to it.
Comment #132
larowlanSounds good, Berdir is right - we have patterns for this stuff
Comment #133
larowlanFor #131
Added a release note snippet
Added a draft change record
Updated the issue summary
Comment #134
vuilI used the patch of #127 about the usage of "Fancy File Delete" module but on the step "Update Database" I received the following error:
$ drush updb -yI'll investigate more and (I hope) will post more info about the issue... We are on Drupal 9.5.0 release & PHP 8.1
Comment #135
vuilThere is no issue when we use the correct for Drupal 9.5.x core #114 patch.
Comment #136
froboy@vuil it looks like
use Drupal\Core\Config\Entity\ConfigEntityUpdater;already exists in the D9 version offile.post_update.phpbut it's gone in D10 and somehow the patch applies cleanly but duplicates that line. Removing it allows the update to apply cleanly.Here's what I get in D9.3 when the patch applies:
No change necessary for the D10 version, this is just information for folks trying to backport the patch.
Comment #137
froboyI've attached a backport of #127 for D9.5 (and back to 9.3 at least)
Comment #138
mukhtarm commentedExactly i ran in to this issue, thanks for backporting to D9 @froboy
Comment #139
alexpottRemoved the edit file permissions from the patch - this can be dealt with in a separate issue - if we need to deal with it at all.
Comment #140
alexpottHere's a UI for deleting files based upon entity defaults. Unfortunately we can't use \Drupal\views\Plugin\views\field\EntityOperations for two reasons - file does not have a list handler - and if we did then we'd have to work out what to do with the update access as file owners are allowed to do that but we have no UI for it.
Comment #141
alexpottComment #143
alexpottOk re-read EntityListBuilder again - that won't add an update operation because we have no update link template for File (because no form). So that's good. So I've added a list builder and added the routes necessary for a file listing without views and added tests.
Thinking about all this code - it might be possible to use the default list builder and not provide any routes to it. Then we wouldn't have the complexity of maintaining a non-views UI but we'd be able to add the operations field in views.
Comment #144
alexpottYeah I don't think this issue should be adding a non-views UI if it doesn't have to. And it does not.
Comment #145
larowlanI think we need to update the default roles in umami/standard to add this permission to keep the existing functionality
Also I'm seeing PHP warnings in Umami when I install and visit the files overview
Warning: Undefined array key 0 in Drupal\file\FileAccessControlHandler->checkAccess() (line 67 of core/modules/file/src/FileAccessControlHandler.php).There's not change to that line in this patch, so it might be an existing issue with Umami and how it creates the files for default content (i.e. without adding a UID). Looking at the File entity, it appears as though the UID field is not required. I did search for an existing issue and couldn't find one - should we tidy this up here whilst we're at it - or alternatively add another bug to resolve it.
Adding some screenshots for the UI changes
Comment #146
alexpott@larowlan great catch!
I've added test coverage for files with no related user entity. Yes it kind of is an existing bug but we trigger it due to views checking 'update' access when we get the available operations - it eventually calls out to \Drupal\Core\Entity\EntityListBuilder::getDefaultOperations() and this does
if ($entity->access('update') && $entity->hasLinkTemplate('edit-form')) {- there is definitely an argument for those conditions being flipped as the link template getting is undoubtedly cheaper - but hey it revealed the bug here.I've also added the correct perms to each role for Umami.
Comment #147
alexpottFixing the interdiff...
Comment #148
larowlanShould we be adding that permission to the roles in standard too?
It has user.role.content_editor and user.role.authenticated.
Looks like there were 6 fails in the umami tests in that test run, not sure why its not being surfaced here.
Comment #149
alexpottFixed umami and added permissions to standard roles.
Comment #150
larowlanI think the patch at #149 (not the MRs) is RTBC
Thanks @alexpott for keeping this moving
Comment #151
alexpottUpdated the release notes and added the release highlights tag.
Comment #152
megachrizWarning for users that try to apply the patch from #149 on Drupal 9.5: that will cause the following error:
For Drupal 10.0 this problem is not present, because there file.post_update.php has no class imports: https://git.drupalcode.org/project/drupal/-/blob/10.0.x/core/modules/fil....
Comment #153
mrshowermanIn case anyone needs it, here's #149 re-rolled to 9.5.x. The only change is the updated imports mentioned by @MegaChriz.
Comment #154
needs-review-queue-bot commentedThe Needs Review Queue Bot tested this issue. It no longer applies to Drupal core. Therefore, this issue status is now "Needs work".
Apart from a re-roll or rebase, this issue may need more work to address feedback in the issue or MR comments. To progress an issue, incorporate this feedback as part of the process of updating the issue. This helps other contributors to know what is outstanding.
Consult the Drupal Contributor Guide to find step-by-step guides for working with issues.
Comment #155
nod_Bot was tripped up by the last patch for a different branch than the issue's.
Comment #156
megachrizLet's hide the patch that's not relevant for the commit.
Comment #157
nod_Excluding this issue from bot review since
1. The last patch is for a different branch and no tests were run on it (as such I'm not able to know it's for a different branch and to ignore it)
2. There is an open MR more recent than the actual patch that needs to be committed.
Comment #159
lauriiiFew notes:
Removed this comment on commit.
Committed 0d58b3c and pushed to 10.1.x. Thanks!
Not backporting to 10.0.x or 9.5.x because of the post update hook.