Hi,
I read the doc about external authentication but I'm not sure to understand
all of it (I'm a newbie).
I would like to use both capacities of NIS :
- the use of Linux login and password for access to Galaxy
- and exploit the system user accounts to the restric
PLEASE don't cross-post. See my answer to the same question you posted here:
https://biostar.usegalaxy.org/p/13725/
Hans-Rudolf
On 08/12/2015 11:01 AM, Floreline TOUCHARD wrote:
Hi,
I read the doc about external authentication but I'm not sure to
understand all of it (I'm a newbie).
I wou
Hi Guys,
I started pulling in the patches named below. After applying patch 345 (curl
... | patch -p1), all new job submissions and finishing jobs fail with
/tsl/services/galaxy/dist/galaxy-dist/lib/galaxy/__init__.py:63: UserWarning:
Module simplejson was already imported from
/tsl/services/
Hi Christian,
I'd suggest creating a virtualenv and starting Galaxy from that.
--nate
On Wed, Aug 12, 2015 at 8:24 AM, Christian Schudoma (TSL) <
christian.schud...@sainsbury-laboratory.ac.uk> wrote:
> Hi Guys,
>
> I started pulling in the patches named below. After applying patch 345
> (curl .
Hey everyone,
So I rely a lot on specific versions of tools in the toolshed, and am often
testing out the install process to make sure everything's working. Today I
noticed that my install process was failing, and it looks like it's due to
not being able to install previous versions of tools thro
Hi Aaron,
this is most probably connected with a bug that we discovered today in the
'reset metadata for all my repositories' feature. Unfortunately we
discovered it by running it on Main Tool Shed. We have an alternate (time
consuming) way of fixing individual repos (like I just did for the
samto
*DESCRIPTION*
A security vulnerability was recently discovered by Nicola Soranzo at The
Genome Analysis Centre that would allow unauthorized access to Galaxy
accounts on Galaxy servers using the LDAP authentication framework plugin.
This is due to the fact that LDAP may be configured to allow anon
*DESCRIPTION*
A security vulnerability was recently discovered by Scott B. Szakonyi at
The Center for Research Computing at the University of Notre Dame that
would allow a malicious actor to exploit the workflow import form to cause
a user's browser to execute javascript not originating from withi
*DESCRIPTION*
A security vulnerability was recently discovered by Peter Cock at the James
Hutton Institute that would allow a malicious actor to upload new versions
to repositories on which they have not been granted access.
*AFFECTED VERSIONS*
This issue affects versions of the Tool Shed beginn
Heh, always something that's discovered after the fact. Happens to me all
the time. Thanks for getting back to me quickly. Looks like the fix you
did works. Only other tool is sam_to_bam
https://toolshed.g2.bx.psu.edu/repository?repository_id=01221a8c57f0fc1a&changeset_revision=c73bf16b45df.
Ho
10 matches
Mail list logo