Merge lp:~wgrant/launchpad/db-cleanup-2016 into lp:launchpad/db-devel

Proposed by William Grant
Status: Merged
Merged at revision: 13564
Proposed branch: lp:~wgrant/launchpad/db-cleanup-2016
Merge into: lp:launchpad/db-devel
Diff against target: 426 lines (+81/-134)
5 files modified
database/sampledata/current-dev.sql (+27/-53)
database/sampledata/current.sql (+26/-52)
database/schema/comments.sql (+0/-15)
database/schema/patch-2209-77-3.sql (+28/-0)
database/schema/security.cfg (+0/-14)
To merge this branch: bzr merge lp:~wgrant/launchpad/db-cleanup-2016
Reviewer Review Type Date Requested Status
Colin Watson (community) Approve
Review via email: mp+307684@code.launchpad.net

Commit message

Clean up old DB tables, views, and functions.

Description of the change

Clean up old DB tables, views, and functions.

To post a comment you must log in.
Revision history for this message
Colin Watson (cjwatson) :
review: Approve

Preview Diff

[H/L] Next/Prev Comment, [J/K] Next/Prev File, [N/P] Next/Prev Hunk
=== modified file 'database/sampledata/current-dev.sql'
--- database/sampledata/current-dev.sql 2016-09-07 22:29:27 +0000
+++ database/sampledata/current-dev.sql 2016-10-05 10:15:11 +0000
@@ -1,6 +1,6 @@
1-- Copyright 2010-2016 Canonical Ltd. This software is licensed under the1-- Copyright 2010-2016 Canonical Ltd. This software is licensed under the
2-- GNU Affero General Public License version 3 (see the file LICENSE).2-- GNU Affero General Public License version 3 (see the file LICENSE).
3-- Created using pg_dump (PostgreSQL) 9.3.123-- Created using pg_dump (PostgreSQL) 9.3.5
44
5SET check_function_bodies = false;5SET check_function_bodies = false;
6SET client_encoding = 'UTF8';6SET client_encoding = 'UTF8';
@@ -2670,35 +2670,6 @@
26702670
26712671
26722672
2673ALTER TABLE cve DISABLE TRIGGER ALL;
2674
2675INSERT INTO cve (id, sequence, status, description, datecreated, datemodified, fti) VALUES (1, '1999-8979', 2, 'Firefox crashes all the time', '2005-09-07 19:00:32.944561', '2005-09-13 14:00:03.508959', NULL);
2676INSERT INTO cve (id, sequence, status, description, datecreated, datemodified, fti) VALUES (2, '1999-2345', 1, 'Possible data loss', '2005-09-07 19:00:32.944561', '2005-09-13 14:00:03.513099', NULL);
2677INSERT INTO cve (id, sequence, status, description, datecreated, datemodified, fti) VALUES (3, '2005-2730', 1, 'The HTTP proxy in Astaro Security Linux 6.0 allows remote attackers to obtain sensitive information via an invalid request, which reveals a Proxy-authorization string in an error message.', '2005-09-13 14:05:15.669384', '2005-09-13 14:05:15.669384', NULL);
2678INSERT INTO cve (id, sequence, status, description, datecreated, datemodified, fti) VALUES (4, '2005-2731', 1, 'Directory traversal vulnerability in Astaro Security Linux 6.0, when using Webmin, allows remote authenticated webmin users to read arbitrary files via a .. (dot dot) in the wfe_download parameter to index.fpl.', '2005-09-13 14:05:15.91729', '2005-09-13 14:05:15.91729', NULL);
2679INSERT INTO cve (id, sequence, status, description, datecreated, datemodified, fti) VALUES (5, '2005-2732', 1, 'AWStats 6.4, and possibly earlier versions, allows remote attackers to obtain sensitive information via a file that does not exist in the config parameter, which reveals the path in an error message.', '2005-09-13 14:05:15.992007', '2005-09-13 14:05:15.992007', NULL);
2680INSERT INTO cve (id, sequence, status, description, datecreated, datemodified, fti) VALUES (6, '2005-2733', 1, 'upload_img_cgi.php in Simple PHP Blog (SPHPBlog) does not properly restrict file extensions of uploaded files, which could allow remote attackers to execute arbitrary code.', '2005-09-13 14:05:16.072418', '2005-09-13 14:05:16.072418', NULL);
2681INSERT INTO cve (id, sequence, status, description, datecreated, datemodified, fti) VALUES (7, '2005-2734', 1, 'Cross-site scripting (XSS) vulnerability in Gallery 1.5.1-RC2 and earlier allows remote attackers to inject arbitrary web script or HTML via EXIF data, such as the Camera Model Tag.', '2005-09-13 14:05:16.202393', '2005-09-13 14:05:16.202393', NULL);
2682INSERT INTO cve (id, sequence, status, description, datecreated, datemodified, fti) VALUES (8, '2005-2735', 1, 'Cross-site scripting (XSS) vulnerability in phpGraphy 0.9.9a and earlier allows remote attackers to inject arbitrary web script or HTML via EXIF data, such as the Camera Model Tag.', '2005-09-13 14:05:16.412226', '2005-09-13 14:05:16.412226', NULL);
2683INSERT INTO cve (id, sequence, status, description, datecreated, datemodified, fti) VALUES (9, '2005-2736', 1, 'Cross-site scripting (XSS) vulnerability in YaPig 0.95 and earlier allows remote attackers to inject arbitrary web script or HTML via EXIF data, such as the Camera Model Tag.', '2005-09-13 14:05:16.841572', '2005-09-13 14:05:16.841572', NULL);
2684INSERT INTO cve (id, sequence, status, description, datecreated, datemodified, fti) VALUES (10, '2005-2737', 1, 'Cross-site scripting (XSS) vulnerability in PhotoPost PHP Pro 5.1 allows remote attackers to inject arbitrary web script or HTML via EXIF data, such as the Camera Model Tag.', '2005-09-13 14:05:17.043865', '2005-09-13 14:05:17.043865', NULL);
2685
2686
2687ALTER TABLE cve ENABLE TRIGGER ALL;
2688
2689
2690ALTER TABLE bugcve DISABLE TRIGGER ALL;
2691
2692INSERT INTO bugcve (id, bug, cve, date_created) VALUES (1, 1, 1, '2006-10-16 18:31:43.127783');
2693INSERT INTO bugcve (id, bug, cve, date_created) VALUES (2, 2, 2, '2006-10-16 18:31:43.128996');
2694
2695
2696ALTER TABLE bugcve ENABLE TRIGGER ALL;
2697
2698
2699
2700
2701
2702ALTER TABLE bugwatch DISABLE TRIGGER ALL;2673ALTER TABLE bugwatch DISABLE TRIGGER ALL;
27032674
2704INSERT INTO bugwatch (id, bug, bugtracker, remotebug, remotestatus, lastchanged, lastchecked, datecreated, owner, last_error_type, remote_importance, remote_lp_bug_id, next_check) VALUES (1, 2, 1, '42', 'FUBAR', '2004-09-24 20:58:04.740841', '2004-09-24 20:58:04.740841', '2004-09-24 20:58:04.740841', 12, NULL, 'BAZBAZ', NULL, NULL);2675INSERT INTO bugwatch (id, bug, bugtracker, remotebug, remotestatus, lastchanged, lastchecked, datecreated, owner, last_error_type, remote_importance, remote_lp_bug_id, next_check) VALUES (1, 2, 1, '42', 'FUBAR', '2004-09-24 20:58:04.740841', '2004-09-24 20:58:04.740841', '2004-09-24 20:58:04.740841', 12, NULL, 'BAZBAZ', NULL, NULL);
@@ -3183,8 +3154,8 @@
31833154
3184ALTER TABLE codeimport DISABLE TRIGGER ALL;3155ALTER TABLE codeimport DISABLE TRIGGER ALL;
31853156
3186INSERT INTO codeimport (id, branch, date_created, registrant, rcs_type, cvs_root, cvs_module, review_status, date_last_successful, owner, assignee, update_interval, url) VALUES (1, 75, '2007-06-25 20:04:04.226605', 52, 2, NULL, NULL, 20, NULL, 52, NULL, NULL, 'http://svn.example.org/svnroot/gnome-terminal/trunk');3157INSERT INTO codeimport (id, branch, date_created, registrant, rcs_type, cvs_root, cvs_module, review_status, date_last_successful, owner, assignee, update_interval, url, git_repository) VALUES (1, 75, '2007-06-25 20:04:04.226605', 52, 2, NULL, NULL, 20, NULL, 52, NULL, NULL, 'http://svn.example.org/svnroot/gnome-terminal/trunk', NULL);
3187INSERT INTO codeimport (id, branch, date_created, registrant, rcs_type, cvs_root, cvs_module, review_status, date_last_successful, owner, assignee, update_interval, url) VALUES (2, 76, '2007-06-25 20:04:04.379285', 52, 1, ':pserver:anonymous@anoncvs.example.org:/cvs/gnome', 'evolution', 1, NULL, 52, NULL, NULL, NULL);3158INSERT INTO codeimport (id, branch, date_created, registrant, rcs_type, cvs_root, cvs_module, review_status, date_last_successful, owner, assignee, update_interval, url, git_repository) VALUES (2, 76, '2007-06-25 20:04:04.379285', 52, 1, ':pserver:anonymous@anoncvs.example.org:/cvs/gnome', 'evolution', 1, NULL, 52, NULL, NULL, NULL, NULL);
31883159
31893160
3190ALTER TABLE codeimport ENABLE TRIGGER ALL;3161ALTER TABLE codeimport ENABLE TRIGGER ALL;
@@ -3348,6 +3319,23 @@
33483319
33493320
33503321
3322ALTER TABLE cve DISABLE TRIGGER ALL;
3323
3324INSERT INTO cve (id, sequence, status, description, datecreated, datemodified, fti) VALUES (1, '1999-8979', 2, 'Firefox crashes all the time', '2005-09-07 19:00:32.944561', '2005-09-13 14:00:03.508959', NULL);
3325INSERT INTO cve (id, sequence, status, description, datecreated, datemodified, fti) VALUES (2, '1999-2345', 1, 'Possible data loss', '2005-09-07 19:00:32.944561', '2005-09-13 14:00:03.513099', NULL);
3326INSERT INTO cve (id, sequence, status, description, datecreated, datemodified, fti) VALUES (3, '2005-2730', 1, 'The HTTP proxy in Astaro Security Linux 6.0 allows remote attackers to obtain sensitive information via an invalid request, which reveals a Proxy-authorization string in an error message.', '2005-09-13 14:05:15.669384', '2005-09-13 14:05:15.669384', NULL);
3327INSERT INTO cve (id, sequence, status, description, datecreated, datemodified, fti) VALUES (4, '2005-2731', 1, 'Directory traversal vulnerability in Astaro Security Linux 6.0, when using Webmin, allows remote authenticated webmin users to read arbitrary files via a .. (dot dot) in the wfe_download parameter to index.fpl.', '2005-09-13 14:05:15.91729', '2005-09-13 14:05:15.91729', NULL);
3328INSERT INTO cve (id, sequence, status, description, datecreated, datemodified, fti) VALUES (5, '2005-2732', 1, 'AWStats 6.4, and possibly earlier versions, allows remote attackers to obtain sensitive information via a file that does not exist in the config parameter, which reveals the path in an error message.', '2005-09-13 14:05:15.992007', '2005-09-13 14:05:15.992007', NULL);
3329INSERT INTO cve (id, sequence, status, description, datecreated, datemodified, fti) VALUES (6, '2005-2733', 1, 'upload_img_cgi.php in Simple PHP Blog (SPHPBlog) does not properly restrict file extensions of uploaded files, which could allow remote attackers to execute arbitrary code.', '2005-09-13 14:05:16.072418', '2005-09-13 14:05:16.072418', NULL);
3330INSERT INTO cve (id, sequence, status, description, datecreated, datemodified, fti) VALUES (7, '2005-2734', 1, 'Cross-site scripting (XSS) vulnerability in Gallery 1.5.1-RC2 and earlier allows remote attackers to inject arbitrary web script or HTML via EXIF data, such as the Camera Model Tag.', '2005-09-13 14:05:16.202393', '2005-09-13 14:05:16.202393', NULL);
3331INSERT INTO cve (id, sequence, status, description, datecreated, datemodified, fti) VALUES (8, '2005-2735', 1, 'Cross-site scripting (XSS) vulnerability in phpGraphy 0.9.9a and earlier allows remote attackers to inject arbitrary web script or HTML via EXIF data, such as the Camera Model Tag.', '2005-09-13 14:05:16.412226', '2005-09-13 14:05:16.412226', NULL);
3332INSERT INTO cve (id, sequence, status, description, datecreated, datemodified, fti) VALUES (9, '2005-2736', 1, 'Cross-site scripting (XSS) vulnerability in YaPig 0.95 and earlier allows remote attackers to inject arbitrary web script or HTML via EXIF data, such as the Camera Model Tag.', '2005-09-13 14:05:16.841572', '2005-09-13 14:05:16.841572', NULL);
3333INSERT INTO cve (id, sequence, status, description, datecreated, datemodified, fti) VALUES (10, '2005-2737', 1, 'Cross-site scripting (XSS) vulnerability in PhotoPost PHP Pro 5.1 allows remote attackers to inject arbitrary web script or HTML via EXIF data, such as the Camera Model Tag.', '2005-09-13 14:05:17.043865', '2005-09-13 14:05:17.043865', NULL);
3334
3335
3336ALTER TABLE cve ENABLE TRIGGER ALL;
3337
3338
33513339
33523340
33533341
@@ -9250,16 +9238,6 @@
92509238
92519239
92529240
9253ALTER TABLE questionbug DISABLE TRIGGER ALL;
9254
9255
9256
9257ALTER TABLE questionbug ENABLE TRIGGER ALL;
9258
9259
9260
9261
9262
9263ALTER TABLE questionjob DISABLE TRIGGER ALL;9241ALTER TABLE questionjob DISABLE TRIGGER ALL;
92649242
92659243
@@ -9540,6 +9518,13 @@
95409518
95419519
95429520
9521ALTER TABLE snapbuildjob DISABLE TRIGGER ALL;
9522
9523
9524
9525ALTER TABLE snapbuildjob ENABLE TRIGGER ALL;
9526
9527
9543ALTER TABLE snapfile DISABLE TRIGGER ALL;9528ALTER TABLE snapfile DISABLE TRIGGER ALL;
95449529
95459530
@@ -9669,17 +9654,6 @@
96699654
96709655
96719656
9672ALTER TABLE specificationbug DISABLE TRIGGER ALL;
9673
9674INSERT INTO specificationbug (id, specification, bug) VALUES (1, 3, 1);
9675
9676
9677ALTER TABLE specificationbug ENABLE TRIGGER ALL;
9678
9679
9680
9681
9682
9683ALTER TABLE specificationdependency DISABLE TRIGGER ALL;9657ALTER TABLE specificationdependency DISABLE TRIGGER ALL;
96849658
9685INSERT INTO specificationdependency (id, specification, dependency, date_created) VALUES (1, 4, 3, '2006-10-16 18:31:52.855436');9659INSERT INTO specificationdependency (id, specification, dependency, date_created) VALUES (1, 4, 3, '2006-10-16 18:31:52.855436');
96869660
=== modified file 'database/sampledata/current.sql'
--- database/sampledata/current.sql 2016-09-07 22:29:27 +0000
+++ database/sampledata/current.sql 2016-10-05 10:15:11 +0000
@@ -2602,35 +2602,6 @@
26022602
26032603
26042604
2605ALTER TABLE cve DISABLE TRIGGER ALL;
2606
2607INSERT INTO cve (id, sequence, status, description, datecreated, datemodified, fti) VALUES (1, '1999-8979', 2, 'Firefox crashes all the time', '2005-09-07 19:00:32.944561', '2005-09-13 14:00:03.508959', NULL);
2608INSERT INTO cve (id, sequence, status, description, datecreated, datemodified, fti) VALUES (2, '1999-2345', 1, 'Possible data loss', '2005-09-07 19:00:32.944561', '2005-09-13 14:00:03.513099', NULL);
2609INSERT INTO cve (id, sequence, status, description, datecreated, datemodified, fti) VALUES (3, '2005-2730', 1, 'The HTTP proxy in Astaro Security Linux 6.0 allows remote attackers to obtain sensitive information via an invalid request, which reveals a Proxy-authorization string in an error message.', '2005-09-13 14:05:15.669384', '2005-09-13 14:05:15.669384', NULL);
2610INSERT INTO cve (id, sequence, status, description, datecreated, datemodified, fti) VALUES (4, '2005-2731', 1, 'Directory traversal vulnerability in Astaro Security Linux 6.0, when using Webmin, allows remote authenticated webmin users to read arbitrary files via a .. (dot dot) in the wfe_download parameter to index.fpl.', '2005-09-13 14:05:15.91729', '2005-09-13 14:05:15.91729', NULL);
2611INSERT INTO cve (id, sequence, status, description, datecreated, datemodified, fti) VALUES (5, '2005-2732', 1, 'AWStats 6.4, and possibly earlier versions, allows remote attackers to obtain sensitive information via a file that does not exist in the config parameter, which reveals the path in an error message.', '2005-09-13 14:05:15.992007', '2005-09-13 14:05:15.992007', NULL);
2612INSERT INTO cve (id, sequence, status, description, datecreated, datemodified, fti) VALUES (6, '2005-2733', 1, 'upload_img_cgi.php in Simple PHP Blog (SPHPBlog) does not properly restrict file extensions of uploaded files, which could allow remote attackers to execute arbitrary code.', '2005-09-13 14:05:16.072418', '2005-09-13 14:05:16.072418', NULL);
2613INSERT INTO cve (id, sequence, status, description, datecreated, datemodified, fti) VALUES (7, '2005-2734', 1, 'Cross-site scripting (XSS) vulnerability in Gallery 1.5.1-RC2 and earlier allows remote attackers to inject arbitrary web script or HTML via EXIF data, such as the Camera Model Tag.', '2005-09-13 14:05:16.202393', '2005-09-13 14:05:16.202393', NULL);
2614INSERT INTO cve (id, sequence, status, description, datecreated, datemodified, fti) VALUES (8, '2005-2735', 1, 'Cross-site scripting (XSS) vulnerability in phpGraphy 0.9.9a and earlier allows remote attackers to inject arbitrary web script or HTML via EXIF data, such as the Camera Model Tag.', '2005-09-13 14:05:16.412226', '2005-09-13 14:05:16.412226', NULL);
2615INSERT INTO cve (id, sequence, status, description, datecreated, datemodified, fti) VALUES (9, '2005-2736', 1, 'Cross-site scripting (XSS) vulnerability in YaPig 0.95 and earlier allows remote attackers to inject arbitrary web script or HTML via EXIF data, such as the Camera Model Tag.', '2005-09-13 14:05:16.841572', '2005-09-13 14:05:16.841572', NULL);
2616INSERT INTO cve (id, sequence, status, description, datecreated, datemodified, fti) VALUES (10, '2005-2737', 1, 'Cross-site scripting (XSS) vulnerability in PhotoPost PHP Pro 5.1 allows remote attackers to inject arbitrary web script or HTML via EXIF data, such as the Camera Model Tag.', '2005-09-13 14:05:17.043865', '2005-09-13 14:05:17.043865', NULL);
2617
2618
2619ALTER TABLE cve ENABLE TRIGGER ALL;
2620
2621
2622ALTER TABLE bugcve DISABLE TRIGGER ALL;
2623
2624INSERT INTO bugcve (id, bug, cve, date_created) VALUES (1, 1, 1, '2006-10-16 18:31:43.127783');
2625INSERT INTO bugcve (id, bug, cve, date_created) VALUES (2, 2, 2, '2006-10-16 18:31:43.128996');
2626
2627
2628ALTER TABLE bugcve ENABLE TRIGGER ALL;
2629
2630
2631
2632
2633
2634ALTER TABLE bugwatch DISABLE TRIGGER ALL;2605ALTER TABLE bugwatch DISABLE TRIGGER ALL;
26352606
2636INSERT INTO bugwatch (id, bug, bugtracker, remotebug, remotestatus, lastchanged, lastchecked, datecreated, owner, last_error_type, remote_importance, remote_lp_bug_id, next_check) VALUES (1, 2, 1, '42', 'FUBAR', '2004-09-24 20:58:04.740841', '2004-09-24 20:58:04.740841', '2004-09-24 20:58:04.740841', 12, NULL, 'BAZBAZ', NULL, NULL);2607INSERT INTO bugwatch (id, bug, bugtracker, remotebug, remotestatus, lastchanged, lastchecked, datecreated, owner, last_error_type, remote_importance, remote_lp_bug_id, next_check) VALUES (1, 2, 1, '42', 'FUBAR', '2004-09-24 20:58:04.740841', '2004-09-24 20:58:04.740841', '2004-09-24 20:58:04.740841', 12, NULL, 'BAZBAZ', NULL, NULL);
@@ -3115,8 +3086,8 @@
31153086
3116ALTER TABLE codeimport DISABLE TRIGGER ALL;3087ALTER TABLE codeimport DISABLE TRIGGER ALL;
31173088
3118INSERT INTO codeimport (id, branch, date_created, registrant, rcs_type, cvs_root, cvs_module, review_status, date_last_successful, owner, assignee, update_interval, url) VALUES (1, 75, '2007-06-25 20:04:04.226605', 52, 2, NULL, NULL, 20, NULL, 52, NULL, NULL, 'http://svn.example.org/svnroot/gnome-terminal/trunk');3089INSERT INTO codeimport (id, branch, date_created, registrant, rcs_type, cvs_root, cvs_module, review_status, date_last_successful, owner, assignee, update_interval, url, git_repository) VALUES (1, 75, '2007-06-25 20:04:04.226605', 52, 2, NULL, NULL, 20, NULL, 52, NULL, NULL, 'http://svn.example.org/svnroot/gnome-terminal/trunk', NULL);
3119INSERT INTO codeimport (id, branch, date_created, registrant, rcs_type, cvs_root, cvs_module, review_status, date_last_successful, owner, assignee, update_interval, url) VALUES (2, 76, '2007-06-25 20:04:04.379285', 52, 1, ':pserver:anonymous@anoncvs.example.org:/cvs/gnome', 'evolution', 1, NULL, 52, NULL, NULL, NULL);3090INSERT INTO codeimport (id, branch, date_created, registrant, rcs_type, cvs_root, cvs_module, review_status, date_last_successful, owner, assignee, update_interval, url, git_repository) VALUES (2, 76, '2007-06-25 20:04:04.379285', 52, 1, ':pserver:anonymous@anoncvs.example.org:/cvs/gnome', 'evolution', 1, NULL, 52, NULL, NULL, NULL, NULL);
31203091
31213092
3122ALTER TABLE codeimport ENABLE TRIGGER ALL;3093ALTER TABLE codeimport ENABLE TRIGGER ALL;
@@ -3285,6 +3256,23 @@
32853256
32863257
32873258
3259ALTER TABLE cve DISABLE TRIGGER ALL;
3260
3261INSERT INTO cve (id, sequence, status, description, datecreated, datemodified, fti) VALUES (1, '1999-8979', 2, 'Firefox crashes all the time', '2005-09-07 19:00:32.944561', '2005-09-13 14:00:03.508959', NULL);
3262INSERT INTO cve (id, sequence, status, description, datecreated, datemodified, fti) VALUES (2, '1999-2345', 1, 'Possible data loss', '2005-09-07 19:00:32.944561', '2005-09-13 14:00:03.513099', NULL);
3263INSERT INTO cve (id, sequence, status, description, datecreated, datemodified, fti) VALUES (3, '2005-2730', 1, 'The HTTP proxy in Astaro Security Linux 6.0 allows remote attackers to obtain sensitive information via an invalid request, which reveals a Proxy-authorization string in an error message.', '2005-09-13 14:05:15.669384', '2005-09-13 14:05:15.669384', NULL);
3264INSERT INTO cve (id, sequence, status, description, datecreated, datemodified, fti) VALUES (4, '2005-2731', 1, 'Directory traversal vulnerability in Astaro Security Linux 6.0, when using Webmin, allows remote authenticated webmin users to read arbitrary files via a .. (dot dot) in the wfe_download parameter to index.fpl.', '2005-09-13 14:05:15.91729', '2005-09-13 14:05:15.91729', NULL);
3265INSERT INTO cve (id, sequence, status, description, datecreated, datemodified, fti) VALUES (5, '2005-2732', 1, 'AWStats 6.4, and possibly earlier versions, allows remote attackers to obtain sensitive information via a file that does not exist in the config parameter, which reveals the path in an error message.', '2005-09-13 14:05:15.992007', '2005-09-13 14:05:15.992007', NULL);
3266INSERT INTO cve (id, sequence, status, description, datecreated, datemodified, fti) VALUES (6, '2005-2733', 1, 'upload_img_cgi.php in Simple PHP Blog (SPHPBlog) does not properly restrict file extensions of uploaded files, which could allow remote attackers to execute arbitrary code.', '2005-09-13 14:05:16.072418', '2005-09-13 14:05:16.072418', NULL);
3267INSERT INTO cve (id, sequence, status, description, datecreated, datemodified, fti) VALUES (7, '2005-2734', 1, 'Cross-site scripting (XSS) vulnerability in Gallery 1.5.1-RC2 and earlier allows remote attackers to inject arbitrary web script or HTML via EXIF data, such as the Camera Model Tag.', '2005-09-13 14:05:16.202393', '2005-09-13 14:05:16.202393', NULL);
3268INSERT INTO cve (id, sequence, status, description, datecreated, datemodified, fti) VALUES (8, '2005-2735', 1, 'Cross-site scripting (XSS) vulnerability in phpGraphy 0.9.9a and earlier allows remote attackers to inject arbitrary web script or HTML via EXIF data, such as the Camera Model Tag.', '2005-09-13 14:05:16.412226', '2005-09-13 14:05:16.412226', NULL);
3269INSERT INTO cve (id, sequence, status, description, datecreated, datemodified, fti) VALUES (9, '2005-2736', 1, 'Cross-site scripting (XSS) vulnerability in YaPig 0.95 and earlier allows remote attackers to inject arbitrary web script or HTML via EXIF data, such as the Camera Model Tag.', '2005-09-13 14:05:16.841572', '2005-09-13 14:05:16.841572', NULL);
3270INSERT INTO cve (id, sequence, status, description, datecreated, datemodified, fti) VALUES (10, '2005-2737', 1, 'Cross-site scripting (XSS) vulnerability in PhotoPost PHP Pro 5.1 allows remote attackers to inject arbitrary web script or HTML via EXIF data, such as the Camera Model Tag.', '2005-09-13 14:05:17.043865', '2005-09-13 14:05:17.043865', NULL);
3271
3272
3273ALTER TABLE cve ENABLE TRIGGER ALL;
3274
3275
32883276
32893277
32903278
@@ -9162,16 +9150,6 @@
91629150
91639151
91649152
9165ALTER TABLE questionbug DISABLE TRIGGER ALL;
9166
9167
9168
9169ALTER TABLE questionbug ENABLE TRIGGER ALL;
9170
9171
9172
9173
9174
9175ALTER TABLE questionjob DISABLE TRIGGER ALL;9153ALTER TABLE questionjob DISABLE TRIGGER ALL;
91769154
91779155
@@ -9452,6 +9430,13 @@
94529430
94539431
94549432
9433ALTER TABLE snapbuildjob DISABLE TRIGGER ALL;
9434
9435
9436
9437ALTER TABLE snapbuildjob ENABLE TRIGGER ALL;
9438
9439
9455ALTER TABLE snapfile DISABLE TRIGGER ALL;9440ALTER TABLE snapfile DISABLE TRIGGER ALL;
94569441
94579442
@@ -9581,17 +9566,6 @@
95819566
95829567
95839568
9584ALTER TABLE specificationbug DISABLE TRIGGER ALL;
9585
9586INSERT INTO specificationbug (id, specification, bug) VALUES (1, 3, 1);
9587
9588
9589ALTER TABLE specificationbug ENABLE TRIGGER ALL;
9590
9591
9592
9593
9594
9595ALTER TABLE specificationdependency DISABLE TRIGGER ALL;9569ALTER TABLE specificationdependency DISABLE TRIGGER ALL;
95969570
9597INSERT INTO specificationdependency (id, specification, dependency, date_created) VALUES (1, 4, 3, '2006-10-16 18:31:52.855436');9571INSERT INTO specificationdependency (id, specification, dependency, date_created) VALUES (1, 4, 3, '2006-10-16 18:31:52.855436');
95989572
=== modified file 'database/schema/comments.sql'
--- database/schema/comments.sql 2016-07-07 19:15:37 +0000
+++ database/schema/comments.sql 2016-10-05 10:15:11 +0000
@@ -367,10 +367,6 @@
367COMMENT ON COLUMN BugTrackerComponentGroup.name IS 'The product or category name used in the remote bug tracker for grouping components.';367COMMENT ON COLUMN BugTrackerComponentGroup.name IS 'The product or category name used in the remote bug tracker for grouping components.';
368COMMENT ON COLUMN BugTrackerComponentGroup.bug_tracker IS 'The external bug tracker this component group belongs to.';368COMMENT ON COLUMN BugTrackerComponentGroup.bug_tracker IS 'The external bug tracker this component group belongs to.';
369369
370-- BugCve
371
372COMMENT ON TABLE BugCve IS 'A table that records the link between a given malone bug number, and a CVE entry.';
373
374370
375-- BugWatch371-- BugWatch
376372
@@ -1008,10 +1004,6 @@
1008COMMENT ON COLUMN Question.whiteboard IS 'A general status whiteboard. This is a scratch space to which arbitrary data can be added (there is only one constant whiteboard with no history). It is displayed at the top of the question. So its a useful way for projects to add their own semantics or metadata to the Answer Tracker.';1004COMMENT ON COLUMN Question.whiteboard IS 'A general status whiteboard. This is a scratch space to which arbitrary data can be added (there is only one constant whiteboard with no history). It is displayed at the top of the question. So its a useful way for projects to add their own semantics or metadata to the Answer Tracker.';
1009COMMENT ON COLUMN Question.faq IS 'The FAQ document that contains the long answer to this question.';1005COMMENT ON COLUMN Question.faq IS 'The FAQ document that contains the long answer to this question.';
10101006
1011-- QuestionBug
1012
1013COMMENT ON TABLE QuestionBug IS 'A link between a question and a bug, showing that the bug is somehow related to this question.';
1014
1015-- QuestionMessage1007-- QuestionMessage
10161008
1017COMMENT ON TABLE QuestionMessage IS 'A link between a question and a message. This means that the message will be displayed on the question page.';1009COMMENT ON TABLE QuestionMessage IS 'A link between a question and a message. This means that the message will be displayed on the question page.';
@@ -1337,10 +1329,6 @@
1337COMMENT ON COLUMN MessageChunk.blob IS 'Binary content for this chunk of the message.';1329COMMENT ON COLUMN MessageChunk.blob IS 'Binary content for this chunk of the message.';
1338COMMENT ON COLUMN MessageChunk.sequence IS 'Order of a particular chunk. Chunks are orders in ascending order starting from 1.';1330COMMENT ON COLUMN MessageChunk.sequence IS 'Order of a particular chunk. Chunks are orders in ascending order starting from 1.';
13391331
1340-- Comments on Lucille views
1341COMMENT ON VIEW SourcePackageFilePublishing IS 'This view is used mostly by Lucille while performing publishing and unpublishing operations. It lists all the files associated with a sourcepackagerelease and collates all the textual representations needed for publishing components etc to allow rapid queries from SQLObject.';
1342COMMENT ON VIEW BinaryPackageFilePublishing IS 'This view is used mostly by Lucille while performing publishing and unpublishing operations. It lists all the files associated with a binarypackage and collates all the textual representations needed for publishing components etc to allow rapid queries from SQLObject.';
1343
1344-- SourcePackageRelease1332-- SourcePackageRelease
13451333
1346COMMENT ON TABLE SourcePackageRelease IS 'SourcePackageRelease: A source1334COMMENT ON TABLE SourcePackageRelease IS 'SourcePackageRelease: A source
@@ -1498,9 +1486,6 @@
1498COMMENT ON COLUMN SpecificationBranch.branch IS 'The branch associated to the specification.';1486COMMENT ON COLUMN SpecificationBranch.branch IS 'The branch associated to the specification.';
1499COMMENT ON COLUMN SpecificationBranch.registrant IS 'The person who linked the specification to the branch.';1487COMMENT ON COLUMN SpecificationBranch.registrant IS 'The person who linked the specification to the branch.';
15001488
1501-- SpecificationBug
1502COMMENT ON TABLE SpecificationBug IS 'A table linking a specification and a bug. This is used to provide for easy navigation from bugs to related specs, and vice versa.';
1503
1504-- SpecificationSubscription1489-- SpecificationSubscription
1505COMMENT ON TABLE SpecificationSubscription IS 'A table capturing a subscription of a person to a specification.';1490COMMENT ON TABLE SpecificationSubscription IS 'A table capturing a subscription of a person to a specification.';
1506COMMENT ON COLUMN SpecificationSubscription.essential IS 'A field that indicates whether or not this person is essential to discussions on the planned feature. This is used by the meeting scheduler to ensure that all the essential people are at any automatically scheduled BOFs discussing that spec.';1491COMMENT ON COLUMN SpecificationSubscription.essential IS 'A field that indicates whether or not this person is essential to discussions on the planned feature. This is used by the meeting scheduler to ensure that all the essential people are at any automatically scheduled BOFs discussing that spec.';
15071492
=== added file 'database/schema/patch-2209-77-3.sql'
--- database/schema/patch-2209-77-3.sql 1970-01-01 00:00:00 +0000
+++ database/schema/patch-2209-77-3.sql 2016-10-05 10:15:11 +0000
@@ -0,0 +1,28 @@
1-- Copyright 2016 Canonical Ltd. This software is licensed under the
2-- GNU Affero General Public License version 3 (see the file LICENSE).
3
4SET client_min_messages=ERROR;
5
6DROP FUNCTION generate_openid_identifier();
7DROP FUNCTION set_openid_identifier();
8DROP FUNCTION set_shipit_normalized_address();
9DROP FUNCTION is_printable_ascii(text);
10DROP FUNCTION is_person(text);
11
12-- Unused since r5499.
13DROP FUNCTION is_team(integer);
14DROP FUNCTION is_team(text);
15
16-- Unused since r9019.
17DROP VIEW potexport;
18
19-- Unused since r18209.
20DROP VIEW binarypackagefilepublishing;
21DROP VIEW sourcepackagefilepublishing;
22
23-- Unused since r17805.
24DROP TABLE bugcve;
25DROP TABLE questionbug;
26DROP TABLE specificationbug;
27
28INSERT INTO LaunchpadDatabaseRevision VALUES (2209, 77, 3);
029
=== modified file 'database/schema/security.cfg'
--- database/schema/security.cfg 2016-10-02 00:33:51 +0000
+++ database/schema/security.cfg 2016-10-05 10:15:11 +0000
@@ -45,14 +45,9 @@
45public.fticache =45public.fticache =
46public.ftq(text) = EXECUTE46public.ftq(text) = EXECUTE
47public._ftq(text) = EXECUTE47public._ftq(text) = EXECUTE
48public.generate_openid_identifier() = EXECUTE
49public.getlocalnodeid() = EXECUTE48public.getlocalnodeid() = EXECUTE
50public.gitrepository_denorm_access(integer) = EXECUTE49public.gitrepository_denorm_access(integer) = EXECUTE
51public.is_blacklisted_name(text, integer) = EXECUTE50public.is_blacklisted_name(text, integer) = EXECUTE
52public.is_person(text) = EXECUTE
53public.is_printable_ascii(text) = EXECUTE
54public.is_team(integer) = EXECUTE
55public.is_team(text) = EXECUTE
56public.latestdatabasediskutilization =51public.latestdatabasediskutilization =
57public.launchpaddatabaserevision = SELECT52public.launchpaddatabaserevision = SELECT
58public.launchpaddatabaseupdatelog = SELECT53public.launchpaddatabaseupdatelog = SELECT
@@ -268,7 +263,6 @@
268public.pofiletranslator = SELECT263public.pofiletranslator = SELECT
269public.poll = SELECT, INSERT, UPDATE264public.poll = SELECT, INSERT, UPDATE
270public.polloption = SELECT, INSERT, UPDATE, DELETE265public.polloption = SELECT, INSERT, UPDATE, DELETE
271public.potexport = SELECT
272public.previewdiff = SELECT, INSERT, UPDATE, DELETE266public.previewdiff = SELECT, INSERT, UPDATE, DELETE
273public.processacceptedbugsjob = SELECT, INSERT, UPDATE, DELETE267public.processacceptedbugsjob = SELECT, INSERT, UPDATE, DELETE
274public.productjob = SELECT, INSERT, UPDATE, DELETE268public.productjob = SELECT, INSERT, UPDATE, DELETE
@@ -545,7 +539,6 @@
545public.pofiletranslator = SELECT539public.pofiletranslator = SELECT
546public.pomsgid = SELECT540public.pomsgid = SELECT
547public.potemplate = SELECT541public.potemplate = SELECT
548public.potexport = SELECT
549public.potmsgset = SELECT542public.potmsgset = SELECT
550public.potranslation = SELECT543public.potranslation = SELECT
551public.product = SELECT544public.product = SELECT
@@ -573,7 +566,6 @@
573public.pofiletranslator = SELECT566public.pofiletranslator = SELECT
574public.pomsgid = SELECT567public.pomsgid = SELECT
575public.potemplate = SELECT568public.potemplate = SELECT
576public.potexport = SELECT
577public.potmsgset = SELECT569public.potmsgset = SELECT
578public.potranslation = SELECT570public.potranslation = SELECT
579public.product = SELECT571public.product = SELECT
@@ -1195,7 +1187,6 @@
1195public.archivejob = SELECT, INSERT1187public.archivejob = SELECT, INSERT
1196public.binarypackagebuild = SELECT, INSERT, UPDATE1188public.binarypackagebuild = SELECT, INSERT, UPDATE
1197public.binarypackagefile = SELECT, INSERT, UPDATE1189public.binarypackagefile = SELECT, INSERT, UPDATE
1198public.binarypackagefilepublishing = SELECT, INSERT, UPDATE
1199public.binarypackagename = SELECT, INSERT, UPDATE1190public.binarypackagename = SELECT, INSERT, UPDATE
1200public.binarypackagepublishinghistory = SELECT, INSERT, UPDATE, DELETE1191public.binarypackagepublishinghistory = SELECT, INSERT, UPDATE, DELETE
1201public.binarypackagerelease = SELECT, INSERT, UPDATE1192public.binarypackagerelease = SELECT, INSERT, UPDATE
@@ -1270,7 +1261,6 @@
1270public.section = SELECT, INSERT, UPDATE1261public.section = SELECT, INSERT, UPDATE
1271public.sectionselection = SELECT, INSERT, UPDATE1262public.sectionselection = SELECT, INSERT, UPDATE
1272public.signedcodeofconduct = SELECT, INSERT, UPDATE1263public.signedcodeofconduct = SELECT, INSERT, UPDATE
1273public.sourcepackagefilepublishing = SELECT, INSERT, UPDATE
1274public.sourcepackageformatselection = SELECT, INSERT1264public.sourcepackageformatselection = SELECT, INSERT
1275public.sourcepackagename = SELECT, INSERT, UPDATE1265public.sourcepackagename = SELECT, INSERT, UPDATE
1276public.sourcepackagepublishinghistory = SELECT, INSERT, UPDATE1266public.sourcepackagepublishinghistory = SELECT, INSERT, UPDATE
@@ -1366,7 +1356,6 @@
1366public.archivepermission = SELECT1356public.archivepermission = SELECT
1367public.binarypackagebuild = SELECT, INSERT, UPDATE1357public.binarypackagebuild = SELECT, INSERT, UPDATE
1368public.binarypackagefile = SELECT, INSERT1358public.binarypackagefile = SELECT, INSERT
1369public.binarypackagefilepublishing = SELECT
1370public.binarypackagename = SELECT, INSERT1359public.binarypackagename = SELECT, INSERT
1371public.binarypackagepublishinghistory = SELECT1360public.binarypackagepublishinghistory = SELECT
1372public.binarypackagerelease = SELECT, INSERT1361public.binarypackagerelease = SELECT, INSERT
@@ -1453,7 +1442,6 @@
1453public.snapbuildjob = SELECT, INSERT, UPDATE1442public.snapbuildjob = SELECT, INSERT, UPDATE
1454public.snapfile = SELECT, INSERT, UPDATE1443public.snapfile = SELECT, INSERT, UPDATE
1455public.snappyseries = SELECT1444public.snappyseries = SELECT
1456public.sourcepackagefilepublishing = SELECT
1457public.sourcepackageformatselection = SELECT1445public.sourcepackageformatselection = SELECT
1458public.sourcepackagename = SELECT, INSERT1446public.sourcepackagename = SELECT, INSERT
1459public.sourcepackagepublishinghistory = SELECT, INSERT1447public.sourcepackagepublishinghistory = SELECT, INSERT
@@ -1484,7 +1472,6 @@
1484public.archivepermission = SELECT1472public.archivepermission = SELECT
1485public.binarypackagebuild = SELECT, INSERT, UPDATE1473public.binarypackagebuild = SELECT, INSERT, UPDATE
1486public.binarypackagefile = SELECT, UPDATE1474public.binarypackagefile = SELECT, UPDATE
1487public.binarypackagefilepublishing = SELECT
1488public.binarypackagename = SELECT1475public.binarypackagename = SELECT
1489public.binarypackagepublishinghistory = SELECT, INSERT, UPDATE1476public.binarypackagepublishinghistory = SELECT, INSERT, UPDATE
1490public.binarypackagerelease = SELECT, UPDATE1477public.binarypackagerelease = SELECT, UPDATE
@@ -1568,7 +1555,6 @@
1568public.sharingjob = SELECT, INSERT, UPDATE1555public.sharingjob = SELECT, INSERT, UPDATE
1569public.snapbuild = SELECT1556public.snapbuild = SELECT
1570public.snapfile = SELECT, UPDATE1557public.snapfile = SELECT, UPDATE
1571public.sourcepackagefilepublishing = SELECT
1572public.sourcepackagename = SELECT1558public.sourcepackagename = SELECT
1573public.sourcepackagepublishinghistory = SELECT, INSERT, UPDATE1559public.sourcepackagepublishinghistory = SELECT, INSERT, UPDATE
1574public.sourcepackagerecipebuild = SELECT1560public.sourcepackagerecipebuild = SELECT

Subscribers

People subscribed via source and target branches

to status/vote changes: