diff options
author | Sebastin Santy <sebastinssanty@gmail.com> | 2017-08-16 06:01:44 +0200 |
---|---|---|
committer | Dylan William Hardison <dylan@hardison.net> | 2017-08-16 06:01:44 +0200 |
commit | 0f06e232470fe9ba5400f72b725d7e685468e1b0 (patch) | |
tree | 8bdd94a85a6fb5b164ac203605c1fe50aceb6954 | |
parent | 1a35dbbc73f74efa955227a04acf74c465bd1e49 (diff) | |
download | bugzilla-0f06e232470fe9ba5400f72b725d7e685468e1b0.tar.gz bugzilla-0f06e232470fe9ba5400f72b725d7e685468e1b0.tar.xz |
Bug 1390112 - Option for filing security bugs
-rw-r--r-- | new_bug.cgi | 3 | ||||
-rw-r--r-- | template/en/default/bug/new_bug.html.tmpl | 2 |
2 files changed, 4 insertions, 1 deletions
diff --git a/new_bug.cgi b/new_bug.cgi index 6a62d0dcb..6a49e0b68 100644 --- a/new_bug.cgi +++ b/new_bug.cgi @@ -57,12 +57,13 @@ if (lc($cgi->request_method) eq 'post') { my $token = $cgi->param('token'); check_hash_token($token, ['new_bug']); my @keywords = $cgi->param('keywords'); + my @groups = $cgi->param('groups'); my $new_bug = Bugzilla::Bug->create({ short_desc => scalar($cgi->param('short_desc')), product => scalar($cgi->param('product')), component => scalar($cgi->param('component')), bug_severity => 'normal', - groups => [], + groups => \@groups, op_sys => 'Unspecified', rep_platform => 'Unspecified', version => scalar( $cgi->param('version')), diff --git a/template/en/default/bug/new_bug.html.tmpl b/template/en/default/bug/new_bug.html.tmpl index 7608d156b..d064398c5 100644 --- a/template/en/default/bug/new_bug.html.tmpl +++ b/template/en/default/bug/new_bug.html.tmpl @@ -54,6 +54,8 @@ %] [% INCLUDE bug_modal/common_new_comment.html.tmpl disable_cols=1 %] + <input name="groups" value="core-security" id="group_core-security" type="checkbox"> Many users could be harmed by this security problem: + it should be kept hidden from the public until it is resolved <br> [% END %] [% WRAPPER bug_modal/module.html.tmpl title = "Attach a File" collapsed = 1 %] <div class="file-container"> |