2001-08-30
2001-08-30 04:09:18 by Per Hedbor <ph@opera.com>
-
5a4293e1a0db607f3883d7c9925202e2081da0de
(11 lines)
(+10/-1)
[
Show
| Annotate
]
Branch: 5.2
Tentative fix for [Bug 2093 (#2093)]. Needs to be backported (more or less) to 2.1.
Rev: server/base_server/configuration.pike:1.476
Rev: server/base_server/roxen.pike:1.720
5:
// @appears Configuration
//! A site's main configuration
- constant cvs_version = "$Id: configuration.pike,v 1.475 2001/08/28 16:32:01 per Exp $";
+ constant cvs_version = "$Id: configuration.pike,v 1.476 2001/08/30 04:09:17 per Exp $";
#include <module.h>
#include <module_constants.h>
#include <roxen.h>
1017: Inside #if defined(MODULE_LEVEL_SECURITY)
}
if(slevel && (seclevels[1] > slevel)) // "Trustlevel" to low.
+ // Regarding memory cache: This won't have any impact, since it's
+ // always the same, regardless of the client requesting the file.
return 1;
mixed err;
if( function(RequestID:int|mapping) f = seclevels[0] )
-
+ // And here we don't have to take notice of the RAM-cache either,
+ // since the security patterns themselves does that.
+ //
+ // All patterns that varies depending on the client must use
+ // NOCACHE(), to force the request to be uncached.
+ //
err=catch { return f( id ); };
else
return 0; // Ok if there are no patterns.