John Rouillard <rouilj+...@cs.umb.edu> added the comment:

Hello Berker:

In message <1510376704.3.0.213398074469.issue...@psf.upfronthosting.co.za>,
Berker Peksag writes:
>Thank you for your quick response and for your detailed analysis, John.
>
>I will attach a patch to implement your suggestions.
>
>> My thought was that the random function wasn't so random. The new 1.5.1+
>> (what will be 1.6) roundup uses more random data than 1.4.20. Addition
>> of nonces to protect against csrf etc. consumes random data.
>
>Should I open an upstream issue to document this at
> http://roundup.sourceforge.net/docs/upgrading.html ?

Can you try my patch with and without the random.seed() call and see
if it makes a difference on bugs.python.org.

If the patch without random.seed() works then there is something
different happening on the b.p.o tracker and my test tracker.

As I said the code I got from your tracker wouldn't run at all in my
installation (context was always None, _klass wasn't a valid property
etc.). Given that I had to do surgery to even make it not crash I
wonder if there is something else in the code base that I am missing.

How the b.p.o tracker executed?  I run roundup as a stand alone
daemon with a web server front end proxying to the roundup
instance. How is b.p.o configured?  CGI, stand alone daemon, wsgi,
mod_python, zope?

I wonder if that makes a difference.

_______________________________________________________
PSF Meta Tracker <metatrac...@psf.upfronthosting.co.za>
<http://psf.upfronthosting.co.za/roundup/meta/issue644>
_______________________________________________________
_______________________________________________
Tracker-discuss mailing list
Tracker-discuss@python.org
https://mail.python.org/mailman/listinfo/tracker-discuss
Code of Conduct: https://www.python.org/psf/codeofconduct/

Reply via email to