diff --git a/autoload.php b/autoload.php index 1e5ad34e3ba8c6293196a4f1a9dd308b5594dfbb..477f243b213586d3abb4527f109661cfe07cc3b5 100644 --- a/autoload.php +++ b/autoload.php @@ -8,7 +8,6 @@ * @see index.php * @see core/install.php * @see core/rebuild.php - * @see core/modules/statistics/statistics.php */ return require __DIR__ . '/vendor/autoload.php'; diff --git a/composer/Plugin/Scaffold/GenerateAutoloadReferenceFile.php b/composer/Plugin/Scaffold/GenerateAutoloadReferenceFile.php index 4a576388262cdd7077c2743855ab6904986c51d9..6123a838ab3e6f22271c60a92d2c057b02b8a3f0 100644 --- a/composer/Plugin/Scaffold/GenerateAutoloadReferenceFile.php +++ b/composer/Plugin/Scaffold/GenerateAutoloadReferenceFile.php @@ -113,7 +113,6 @@ protected static function autoLoadContents($relative_autoload_path) { * @see index.php * @see core/install.php * @see core/rebuild.php - * @see core/modules/statistics/statistics.php */ return require __DIR__ . '/{$relative_autoload_path}'; diff --git a/core/assets/scaffold/files/default.settings.php b/core/assets/scaffold/files/default.settings.php index 63fb2df74a1bc9faf82fc5a72d9a76e090d6f20c..98b25a83581d09193996e01d01affcb2f0c43272 100644 --- a/core/assets/scaffold/files/default.settings.php +++ b/core/assets/scaffold/files/default.settings.php @@ -355,14 +355,13 @@ * security, or encryption benefits. In an environment where Drupal * is behind a reverse proxy, the real IP address of the client should * be determined such that the correct client IP address is available - * to Drupal's logging, statistics, and access management systems. In - * the most simple scenario, the proxy server will add an - * X-Forwarded-For header to the request that contains the client IP - * address. However, HTTP headers are vulnerable to spoofing, where a - * malicious client could bypass restrictions by setting the - * X-Forwarded-For header directly. Therefore, Drupal's proxy - * configuration requires the IP addresses of all remote proxies to be - * specified in $settings['reverse_proxy_addresses'] to work correctly. + * to Drupal's logging and access management systems. In the most simple + * scenario, the proxy server will add an X-Forwarded-For header to the request + * that contains the client IP address. However, HTTP headers are vulnerable to + * spoofing, where a malicious client could bypass restrictions by setting the + * X-Forwarded-For header directly. Therefore, Drupal's proxy configuration + * requires the IP addresses of all remote proxies to be specified in + * $settings['reverse_proxy_addresses'] to work correctly. * * Enable this setting to get Drupal to determine the client IP from the * X-Forwarded-For header. If you are unsure about this setting, do not have a diff --git a/core/lib/Drupal/Core/Render/Element/Link.php b/core/lib/Drupal/Core/Render/Element/Link.php index b84a1b6ab5a4a46c4a0bcd8ea492ff8ab14a2c3b..ea2c35f46b9fcac4bef9887a2859c9a1f731f30b 100644 --- a/core/lib/Drupal/Core/Render/Element/Link.php +++ b/core/lib/Drupal/Core/Render/Element/Link.php @@ -136,13 +136,6 @@ public static function preRenderLink($element) { * // passing in to links.html.twig. * ), * ), - * 'statistics' => array( - * '#theme' => 'links__node__statistics', - * '#links' => array( - * // An array of links associated with node statistics, suitable for - * // passing in to links.html.twig. - * ), - * ), * 'translation' => array( * '#theme' => 'links__node__translation', * '#links' => array( diff --git a/core/modules/tracker/help_topics/tracker.tracking_changed_content.html.twig b/core/modules/tracker/help_topics/tracker.tracking_changed_content.html.twig index 957e400405929e769ef1bf49d03943483676f693..7dfc73067257d4bd242705d4ae46d2a969501890 100644 --- a/core/modules/tracker/help_topics/tracker.tracking_changed_content.html.twig +++ b/core/modules/tracker/help_topics/tracker.tracking_changed_content.html.twig @@ -2,7 +2,6 @@ label: 'Viewing lists of recently-updated content' related: - core.tracking_content - - statistics.tracking_popular_content - history.tracking_user_content --- {% set recent_link_text %} diff --git a/sites/default/default.settings.php b/sites/default/default.settings.php index 63fb2df74a1bc9faf82fc5a72d9a76e090d6f20c..98b25a83581d09193996e01d01affcb2f0c43272 100644 --- a/sites/default/default.settings.php +++ b/sites/default/default.settings.php @@ -355,14 +355,13 @@ * security, or encryption benefits. In an environment where Drupal * is behind a reverse proxy, the real IP address of the client should * be determined such that the correct client IP address is available - * to Drupal's logging, statistics, and access management systems. In - * the most simple scenario, the proxy server will add an - * X-Forwarded-For header to the request that contains the client IP - * address. However, HTTP headers are vulnerable to spoofing, where a - * malicious client could bypass restrictions by setting the - * X-Forwarded-For header directly. Therefore, Drupal's proxy - * configuration requires the IP addresses of all remote proxies to be - * specified in $settings['reverse_proxy_addresses'] to work correctly. + * to Drupal's logging and access management systems. In the most simple + * scenario, the proxy server will add an X-Forwarded-For header to the request + * that contains the client IP address. However, HTTP headers are vulnerable to + * spoofing, where a malicious client could bypass restrictions by setting the + * X-Forwarded-For header directly. Therefore, Drupal's proxy configuration + * requires the IP addresses of all remote proxies to be specified in + * $settings['reverse_proxy_addresses'] to work correctly. * * Enable this setting to get Drupal to determine the client IP from the * X-Forwarded-For header. If you are unsure about this setting, do not have a