[Desktop-packages] [Bug 1898479] [NEW] Shotwell: Russian translation is invalid

2020-10-04 Thread Bogdan Vasiliev
Public bug reported:

Shotwell 0.30.10-0ubuntu0.1 distributed in Ubuntu 20.04.1 has broken
russian localization.

In ru.po file all translated date templates are invalid, %е (russian
letter "Е") is used instead of %e (english "E"). All dates in Shotwell
are incorrectly spelled, like 'Пн %е января 2020'.

The fix has been released upstream:
https://gitlab.gnome.org/Teams/Translation/ru/-/issues/5

** Affects: shotwell (Ubuntu)
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to shotwell in Ubuntu.
https://bugs.launchpad.net/bugs/1898479

Title:
  Shotwell: Russian translation is invalid

Status in shotwell package in Ubuntu:
  New

Bug description:
  Shotwell 0.30.10-0ubuntu0.1 distributed in Ubuntu 20.04.1 has broken
  russian localization.

  In ru.po file all translated date templates are invalid, %е (russian
  letter "Е") is used instead of %e (english "E"). All dates in Shotwell
  are incorrectly spelled, like 'Пн %е января 2020'.

  The fix has been released upstream:
  https://gitlab.gnome.org/Teams/Translation/ru/-/issues/5

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/shotwell/+bug/1898479/+subscriptions

-- 
Mailing list: https://launchpad.net/~desktop-packages
Post to : desktop-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~desktop-packages
More help   : https://help.launchpad.net/ListHelp


[Desktop-packages] [Bug 1776873] Re: Whitelisted allowedURLschemes breaks some desktop apps

2020-04-28 Thread Bogdan Vasiliev
Well, you have the Code of Conduct, and we do not have normal software
that would not break user systems. Is there any correlation here we
cannot discuss because of the Code of Conduct.

I am very sorry that my rudeness upset such unique snowflakes as the
snap team.

The problem is described two years and still present, the importance is
"Wishlist".

Is somewhere an open technical discussion about solving the problem in
Ubuntu, other than the request to submitting url schemes to the
whitelist? In my opinion, this is a fundamental architectural problem
and it cannot be solved by PR from a third-party developer.

-- 
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to chromium-browser in Ubuntu.
https://bugs.launchpad.net/bugs/1776873

Title:
  Whitelisted allowedURLschemes breaks some desktop apps

Status in snapd:
  Triaged
Status in chromium-browser package in Ubuntu:
  Confirmed

Bug description:
  
https://github.com/snapcore/snapd/blob/7952972d4897e085030b288e44dc98b824f6723a/userd/launcher.go#L55

  snapd has a hard-coded list of allowed URL schemes. Currently that is
  limited to "http", "https", "mailto", "snap".

  We have a number of applications in the store which are trying to use
  protocol handlers outside this scope and break when that's not
  possible.

  e.g.

  Telegram Desktop: tg:/
  Github Desktop: git:/
  IRCCloud Desktop: irc:/

  These are the ones I know of, others may also be affected. Can we
  please at least expand the list to those that we know of, and perhaps
  research other popular protocol handlers?

  Ideally we wouldn't have a whitelist, because this delays our ability
  to land new applications with as-yet unknown url schemes.

To manage notifications about this bug go to:
https://bugs.launchpad.net/snapd/+bug/1776873/+subscriptions

-- 
Mailing list: https://launchpad.net/~desktop-packages
Post to : desktop-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~desktop-packages
More help   : https://help.launchpad.net/ListHelp


[Desktop-packages] [Bug 1776873] Re: Whitelisted allowedURLschemes breaks some desktop apps

2020-04-23 Thread Bogdan Vasiliev
There is no one objective reason to whitelisting link schemes for
applications.

Usual URLs worked well for years for iteract between apps, but here you
brought the fucking snap, which doesn’t improve anything, but also
breaks the normal behavior of other applications.

Please bring back the normal URLs behavior or go fuck.

-- 
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to chromium-browser in Ubuntu.
https://bugs.launchpad.net/bugs/1776873

Title:
  Whitelisted allowedURLschemes breaks some desktop apps

Status in snapd:
  Triaged
Status in chromium-browser package in Ubuntu:
  Confirmed

Bug description:
  
https://github.com/snapcore/snapd/blob/7952972d4897e085030b288e44dc98b824f6723a/userd/launcher.go#L55

  snapd has a hard-coded list of allowed URL schemes. Currently that is
  limited to "http", "https", "mailto", "snap".

  We have a number of applications in the store which are trying to use
  protocol handlers outside this scope and break when that's not
  possible.

  e.g.

  Telegram Desktop: tg:/
  Github Desktop: git:/
  IRCCloud Desktop: irc:/

  These are the ones I know of, others may also be affected. Can we
  please at least expand the list to those that we know of, and perhaps
  research other popular protocol handlers?

  Ideally we wouldn't have a whitelist, because this delays our ability
  to land new applications with as-yet unknown url schemes.

To manage notifications about this bug go to:
https://bugs.launchpad.net/snapd/+bug/1776873/+subscriptions

-- 
Mailing list: https://launchpad.net/~desktop-packages
Post to : desktop-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~desktop-packages
More help   : https://help.launchpad.net/ListHelp


[Desktop-packages] [Bug 1776873] Re: Whitelisted allowedURLschemes breaks some desktop apps

2020-04-23 Thread Bogdan Vasiliev
In short, the best way to improve the situaition is sudo apt purge
snapd.

Does snapd solve any user's problem? No one. Does it break usual apps
behavior? Absolutely, as in this case.

Why I should to PR for repairing things that works perfectly for years
in any desktop behavior before you came? Did you forget to take your
meds?

-- 
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to chromium-browser in Ubuntu.
https://bugs.launchpad.net/bugs/1776873

Title:
  Whitelisted allowedURLschemes breaks some desktop apps

Status in snapd:
  Triaged
Status in chromium-browser package in Ubuntu:
  Confirmed

Bug description:
  
https://github.com/snapcore/snapd/blob/7952972d4897e085030b288e44dc98b824f6723a/userd/launcher.go#L55

  snapd has a hard-coded list of allowed URL schemes. Currently that is
  limited to "http", "https", "mailto", "snap".

  We have a number of applications in the store which are trying to use
  protocol handlers outside this scope and break when that's not
  possible.

  e.g.

  Telegram Desktop: tg:/
  Github Desktop: git:/
  IRCCloud Desktop: irc:/

  These are the ones I know of, others may also be affected. Can we
  please at least expand the list to those that we know of, and perhaps
  research other popular protocol handlers?

  Ideally we wouldn't have a whitelist, because this delays our ability
  to land new applications with as-yet unknown url schemes.

To manage notifications about this bug go to:
https://bugs.launchpad.net/snapd/+bug/1776873/+subscriptions

-- 
Mailing list: https://launchpad.net/~desktop-packages
Post to : desktop-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~desktop-packages
More help   : https://help.launchpad.net/ListHelp