I'm proud to release version 1.4.9 of Roundup which fixes some bugs:
- fixed action taken in response to invalid GET request
- fixed classic tracker template to submit POST requests when
appropriate
- fix problems with french and german locale files (issue 2550546)
- Run each message of the mail-gateway in a separate transaction,
see http://thread.gmane.org/gmane.comp.bug-tracking.roundup.user/9500
- fix problem with bounce-message if incoming mail has insufficient
privilege, e.g., user not existing (issue 2550534)
- fix construction of individual messages to nosy recipents with
attachments (issue 2550568)
- re-order sqlite imports to handle multiple installed versions (issue
2550570)
- don't show entire history by default
(fixes http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=540629)
- remove use of string exception
If you're upgrading from an older version of Roundup you *must* follow
the "Software Upgrade" guidelines given in the maintenance
documentation.
Roundup requires python 2.3 or later (but not 3+) for correct operation.
To give Roundup a try, just download (see below), unpack and run::
roundup-demo
Release info and download page:
http://cheeseshop.python.org/pypi/roundup
Source and documentation is available at the website:
http://roundup.sourceforge.net/
Mailing lists - the place to ask questions:
http://sourceforge.net/mail/?group_id=31577
About Roundup
=============
Roundup is a simple-to-use and -install issue-tracking system with
command-line, web and e-mail interfaces. It is based on the winning
design
from Ka-Ping Yee in the Software Carpentry "Track" design competition.
Note: Ping is not responsible for this project. The contact for this
project is richard(a)users.sourceforge.net.
Roundup manages a number of issues (with flexible properties such as
"description", "priority", and so on) and provides the ability to:
(a) submit new issues,
(b) find and edit existing issues, and
(c) discuss issues with other participants.
The system will facilitate communication among the participants by
managing
discussions and notifying interested parties when issues are edited.
One of
the major design goals for Roundup that it be simple to get going.
Roundup
is therefore usable "out of the box" with any python 2.3+ (but not 3+)
installation. It doesn't even need to be "installed" to be operational,
though an install script is provided.
It comes with two issue tracker templates (a classic bug/feature
tracker and
a minimal skeleton) and four database back-ends (anydbm, sqlite, mysql
and postgresql).
python-utmp 0.8
===============
python-utmp provides 3 modules to access utmp and wtmp records:
* utmpaccess is lowlevel module written in C, wrapping/emulating glibc functions
* UTMPCONST provides useful constants
* utmp is module build on top of utmpaccess module, providing object oriented interface.
Module works on both SysV and BSD systems.
Notable changes:
* some support for python3
* __repr__ method for UtmpRecord and UtmpEntry
URL:
http://kassiopeia.juls.savba.sk/~garabik/software/python-utmp/
License:
almost public domain
--
-----------------------------------------------------------
| Radovan Garabík http://kassiopeia.juls.savba.sk/~garabik/ |
| __..--^^^--..__ garabik @ kassiopeia.juls.savba.sk |
-----------------------------------------------------------
Antivirus alert: file .signature infected by signature virus.
Hi! I'm a signature virus! Copy me into your signature file to help me spread!
A new version of the Python module which wraps GnuPG has been
released.
What Changed?
=============
This is a minor bug-fix release. See the project website (
http://code.google.com/p/python-gnupg/ ) for more information.
The current version passes all tests on Windows (Python 2.4, 2.5, 2.6,
3.1, Jython 2.5.0) and Ubuntu (Python 2.4, 2.5, 2.6, 3.0, Jython
2.5.0).
What Does It Do?
================
The gnupg module allows Python programs to make use of the
functionality provided by the Gnu Privacy Guard (abbreviated GPG or
GnuPG). Using this module, Python programs can encrypt and decrypt
data, digitally sign documents and verify digital signatures, manage
(generate, list and delete) encryption keys, using proven Public Key
Infrastructure (PKI) encryption technology based on OpenPGP.
This module is expected to be used with Python versions >= 2.4, as it
makes use of the subprocess module which appeared in that version of
Python. This module is a newer version derived from earlier work by
Andrew Kuchling, Richard Jones and Steve Traugott.
A test suite using unittest is included with the source distribution.
Simple usage:
>>> import gnupg
>>> gpg = gnupg.GPG(gnupghome='/path/to/keyring/directory')
>>> gpg.list_keys()
[{
...
'fingerprint': 'F819EE7705497D73E3CCEE65197D5DAC68F1AAB2',
'keyid': '197D5DAC68F1AAB2',
'length': '1024',
'type': 'pub',
'uids': ['', 'Gary Gross (A test user) <gary.gross(a)gamma.com>']},
{
...
'fingerprint': '37F24DD4B918CC264D4F31D60C5FEFA7A921FC4A',
'keyid': '0C5FEFA7A921FC4A',
'length': '1024',
...
'uids': ['', 'Danny Davis (A test user) <danny.davis(a)delta.com>']}]
>>> encrypted = gpg.encrypt("Hello, world!", ['0C5FEFA7A921FC4A'])
>>> str(encrypted)
'-----BEGIN PGP MESSAGE-----\nVersion: GnuPG v1.4.9 (GNU/Linux)\n
\nhQIOA/6NHMDTXUwcEAf
...
-----END PGP MESSAGE-----\n'
>>> decrypted = gpg.decrypt(str(encrypted), passphrase='secret')
>>> str(decrypted)
'Hello, world!'
>>> signed = gpg.sign("Goodbye, world!", passphrase='secret')
>>> verified = verified = gpg.verify(str(signed))
>>> print "Verified" if verified else "Not verified"
'Verified'
For more information, visit http://code.google.com/p/python-gnupg/ -
as always, your feedback is most welcome (especially bug reports,
patches and suggestions for improvement). Enjoy!
Cheers
Vinay Sajip
Red Dove Consultants Ltd.
=== Leipzig Python User Group ===
We will meet on Tuesday, August 11 at 8:00 pm at the training
center of Python Academy in Leipzig, Germany
( http://www.python-academy.com/center/find.html ).
We will talk about the EuroSciPy which took place at the end
of July in Leipzig and was visited by three of our group's
members.
Food and soft drinks are provided. Please send a short
confirmation mail to info(a)python-academy.de, so we can prepare
appropriately.
Everybody who uses Python, plans to do so or is interested in
learning more about the language is encouraged to participate.
While the meeting language will be mainly German, we will provide
English translation if needed.
Current information about the meetings are at
http://www.python-academy.com/user-group .
Stefan
== Leipzig Python User Group ===
Wir treffen uns am Dienstag, 11.08.2009 um 20:00 Uhr
im Schulungszentrum der Python Academy in Leipzig
( http://www.python-academy.de/Schulungszentrum/anfahrt.html ).
Wir werden über die EuroSciPy Ende Juli in Leipzig sprechen,
an der drei Mitglieder unserer Gruppe teilgenommen haben.
Für das leibliche Wohl wird gesorgt. Eine Anmeldung unter
info(a)python-academy.de wäre nett, damit wir genug Essen
besorgen können.
Willkommen ist jeder, der Interesse an Python hat, die Sprache
bereits nutzt oder nutzen möchte.
Aktuelle Informationen zu den Treffen sind unter
http://www.python-academy.de/User-Group zu finden.
Viele Grüße
Stefan
This is a survey to find as many companies using Python as we can. You
can see the survey below:
<http://spreadsheets.google.com/viewform?formkey=dHlwaUxIY2g0ZXpUMk4tREZDSTY…..>
You don't need to work at the company to add it to this list! We will
filter for duplicates.
The answers to this survey will be kept private. If you still don't want
to identify yourself, no problem! We just want to know where Python is
being used.
Vulnerabilities have been found in the Zope Object Database (ZODB)
Zope Enterprise Objects (ZEO) network protocol that allow:
CVE-2009-0668 Arbitrary Python code execution in ZODB ZEO storage servers
CVE-2009-0669 Authentication bypass in ZODB ZEO storage servers
The vulnerabilities only apply if you are using ZEO to share a
database among multiple applications or application instances and if
untrusted clients are able to connect to your ZEO servers.
The first vulnerability (CVE-2009-0668) was introduced in ZODB 3.3
(Zope 2.8). The second vulnerability (CVE-2009-0669) was introduced
in ZODB 3.2 (Zope 2.7).
Overview
These vulnerabilities are addressed by updates to ZODB. Newer
releases of Zope are also being provided for people who get ZODB with Zope
releases.
A new release of ZODB is available here:
http://pypi.python.org/pypi/ZODB3/3.8.2
(There is also a new development release at
http://pypi.python.org/pypi/ZODB3/3.9.0b5.)
New Zope releases that include the fixes can be found here:
http://www.zope.org/Products/Zope/2.10.9http://www.zope.org/Products/Zope/2.11.4http://www.zope.org/Products/Zope/2.8.11http://www.zope.org/Products/Zope/2.9.11http://www.zope.org/Products/Zope3/3.1.1http://www.zope.org/Products/Zope3/3.2.4http://www.zope.org/Products/Zope3/3.3.3http://www.zope.org/Products/Zope3/3.4.1
We recommend updating any ZEO storoage servers you're running to ZODB
3.8.2 (or ZODB 3.9.0b5) or to ZODB software provided with the Zope
releases listed above. These versions support ZEO clients as old as
ZODB 3.2. It isn't necessary to update client software (such as Zope
application servers).
Restricting access to ZEO storage servers
It is very important to restrict write access to ZODB databases. These
releases only protect against vulnerabilities in the ZEO network
protocol. ZODB uses Python pickles to store data. Loading data from
the database can cause arbitrary code to be executed as part of object
deserialization. Clients have full access to manipulate database
data. For this reason, it is very important that only trusted clients
be allowed to write to ZODB databases.
Jim
--
Jim Fulton
Dear Python users,
The Moovida team is happy to announce the release of Moovida Media
Center 1.0.6, code-named "Jana".
Moovida, formerly known as Elisa, is a cross-platform and open-source
Media Center written in Python.
It uses GStreamer [1] for media playback and pigment [2] to create an
appealing and intuitive user interface.
This new version fixes many important bugs (see attached release notes)
among which crashes on windows (reduced by 35%) and improves the overall
performance (the UI is twice as fluid and Moovida uses 10MB less memory).
Thanks to contributions from the community, Moovida now ships with
complete translations for Spanish, French, Italian, Polish and Brazilian
Portuguese. Everyone is welcome to contribute to translate Moovida in
their mother tongue: see http://translations.launchpad.net/elisa.
This release is a lightweight release, meaning it is pushed through our
automatic plugin update system. Additionally a windows installer is
available for download on our website.
As usual, for users already running Moovida, the upgrade to 1.0.6 should
be done automatically via the plugin repository.
A complete list of the issues fixed can be found at:
http://launchpad.net/elisa/+milestone/1.0.6
This is also summarised in the (attached) release notes.
Installers and sources can be downloaded from
http://www.moovida.com/download/
Bug reports and feature requests are welcome at
http://bugs.launchpad.net/elisa/+filebug
Have a media-centered week,
Olivier, for the Moovida team
[1] http://www.gstreamer.net/
[2] https://code.fluendo.com/pigment/trac
Moovida 1.0.6 "Jana"
====================
This is Moovida 1.0.6, sixth release of the 1.0 branch.
New features since 1.0.5:
- A common caching module in the core
Bugs fixed since 1.0.5:
- 380974: Widget styles updated too often
- 392082: [win:crash] Startup crash when calling __GetProcFromComCtl32 on Acer machines
- 401839: [win32] Moovida doesn't start for usernames containing an apostrophe
- 259135: [linux] Unable to display pictures served by Coherence over UPnP
- 268220: 'Setup LIRC' script crashes after setting up all keys
- 293805: [solaris] Moovida doesn't install desktop file
- 388910: Picture library is not opening
- 396501: Multiple simultaneous loading of the same section
- 396510: Unable to login into flickr account
- 398541: [win32] FLAC files not recognized
- 399384: Tracebacks when entering/scrolling a list controller
- 403058: Texts cuts if Liberation font used by Moovida
- 408707: Description of track/song going beyond the length of 'textbox'
- 254951: The discogs resource provider modifies requests
- 274324: Hide passwords in the text entry of the on-screen-keyboard
- 296523: Generic "favorites" plugin depends on the "shoutcast" plugin
- 303307: Invalid frob error from the flickr plugin
- 319517: Flickr account cannot be accessed again if once logged out
- 390625: Text gets regenerated for widgets not seen on screen
- 396948: List widgets don't properly update when deleting or changing items
- 400137: moovida 1.0.5. crashes in i18n when no locale is set
- 403966: [win32] Removed media sources re-appear
- 329849: The man-page is outdated
- 399977: HAL plugin should work on Solaris
Download
You can find source releases of Moovida on the download page:
http://www.moovida.com/download
Moovida Homepage
More details can be found on the project's website: http://www.moovida.com
Support and Bugs
We use Launchpad for bug reports and feature requests:
https://bugs.launchpad.net/elisa/+filebug
Developers
All code is in a Bazaar branch and can be checked out from there.
It is hosted on Launchpad: https://code.launchpad.net/elisa
Contributors to this release:
- Anna Wojdel
- David McLeod
- Fernando Casanova Coch
- Florian Boucault
- Guillaume Emont
- Jutta Mailander
- Lionel Martin
- Loïc Molinari
- Maxwell Young
- Michał Sawicz
- Olivier Tilloy
- Philippe Normand
- Rafał Zawadzki
- Ugo Riboni
- Xose Pérez
Pyowa Meeting - Thursday, Aug. 8th, 2009
Time: 6:30 - 8:45 p.m.
Location: Ames Public Library, Founders Suite, Ames, IA
Itinerary:
- Presentation on Building Executables and Installers with GUI2Exe and Inno
Setup
- Possible group programming exercise
- Social Time
We hope to see you there!
--------------------
Mike Driscoll
www.pyowa.org