diff options
-rw-r--r-- | new_bug.cgi | 3 | ||||
-rw-r--r-- | template/en/default/bug/new_bug.html.tmpl | 2 |
2 files changed, 4 insertions, 1 deletions
diff --git a/new_bug.cgi b/new_bug.cgi index 6a62d0dcb..6a49e0b68 100644 --- a/new_bug.cgi +++ b/new_bug.cgi @@ -57,12 +57,13 @@ if (lc($cgi->request_method) eq 'post') { my $token = $cgi->param('token'); check_hash_token($token, ['new_bug']); my @keywords = $cgi->param('keywords'); + my @groups = $cgi->param('groups'); my $new_bug = Bugzilla::Bug->create({ short_desc => scalar($cgi->param('short_desc')), product => scalar($cgi->param('product')), component => scalar($cgi->param('component')), bug_severity => 'normal', - groups => [], + groups => \@groups, op_sys => 'Unspecified', rep_platform => 'Unspecified', version => scalar( $cgi->param('version')), diff --git a/template/en/default/bug/new_bug.html.tmpl b/template/en/default/bug/new_bug.html.tmpl index 7608d156b..d064398c5 100644 --- a/template/en/default/bug/new_bug.html.tmpl +++ b/template/en/default/bug/new_bug.html.tmpl @@ -54,6 +54,8 @@ %] [% INCLUDE bug_modal/common_new_comment.html.tmpl disable_cols=1 %] + <input name="groups" value="core-security" id="group_core-security" type="checkbox"> Many users could be harmed by this security problem: + it should be kept hidden from the public until it is resolved <br> [% END %] [% WRAPPER bug_modal/module.html.tmpl title = "Attach a File" collapsed = 1 %] <div class="file-container"> |