Commit d59e0600 authored by jake%bugzilla.org's avatar jake%bugzilla.org

Bug 177997 - Update the AOL Server section with the new configuration information.

parent 9daaa3f9
...@@ -1724,11 +1724,14 @@ deny from all ...@@ -1724,11 +1724,14 @@ deny from all
<programlisting> <programlisting>
ns_register_filter preauth GET /bugzilla/localconfig filter_deny ns_register_filter preauth GET /bugzilla/localconfig filter_deny
ns_register_filter preauth GET /bugzilla/localconfig~ filter_deny
ns_register_filter preauth GET /bugzilla/\#localconfig\# filter_deny
ns_register_filter preauth GET /bugzilla/*.pl filter_deny ns_register_filter preauth GET /bugzilla/*.pl filter_deny
ns_register_filter preauth GET /bugzilla/localconfig filter_deny
ns_register_filter preauth GET /bugzilla/syncshadowdb filter_deny ns_register_filter preauth GET /bugzilla/syncshadowdb filter_deny
ns_register_filter preauth GET /bugzilla/runtests.sh filter_deny ns_register_filter preauth GET /bugzilla/runtests.sh filter_deny
ns_register_filter preauth GET /bugzilla/data/* filter_deny
ns_register_filter preauth GET /bugzilla/template/* filter_deny
proc filter_deny { why } { proc filter_deny { why } {
ns_log Notice "filter_deny" ns_log Notice "filter_deny"
return "filter_return" return "filter_return"
...@@ -1736,17 +1739,29 @@ proc filter_deny { why } { ...@@ -1736,17 +1739,29 @@ proc filter_deny { why } {
</programlisting> </programlisting>
<warning> <warning>
<para>This doesn't appear to account for everything mentioned in <para>This probably doesn't account for all possible editor backup
<xref linkend="security"/>. In particular, it doesn't block access files so you may wish to add some additional variations of
to the <filename class="directory">data</filename> or <filename>localconfig</filename>. For more information, see
<filename class="directory">template</filename> directories. It also
doesn't account for the editor backup files that were the topic of
<ulink url="http://bugzilla.mozilla.org/show_bug.cgi?id=186383">bug <ulink url="http://bugzilla.mozilla.org/show_bug.cgi?id=186383">bug
186383</ulink>, <ulink 186383</ulink> or <ulink
url="http://online.securityfocus.com/bid/6501">Bugtraq ID 6501</ulink>, url="http://online.securityfocus.com/bid/6501">Bugtraq ID 6501</ulink>.
and a partial cause for the 2.16.2 release.
</para> </para>
</warning> </warning>
<note>
<para>If you are using webdot from research.att.com (the default
configuration for the <option>webdotbase</option> paramater), you
will need to allow access to <filename>data/webdot/*.dot</filename>
for the reasearch.att.com machine.
</para>
<para>If you are using a local installation of <ulink
url="http://www.graphviz.org">GraphViz</ulink>, you will need to allow
everybody to access <filename>*.png</filename>,
<filename>*.gif</filename>, <filename>*.jpg</filename>, and
<filename>*.map</filename> in the
<filename class="directory">data/webdot</filename> directory.
</para>
</note>
</section> </section>
</section> </section>
......
...@@ -1724,11 +1724,14 @@ deny from all ...@@ -1724,11 +1724,14 @@ deny from all
<programlisting> <programlisting>
ns_register_filter preauth GET /bugzilla/localconfig filter_deny ns_register_filter preauth GET /bugzilla/localconfig filter_deny
ns_register_filter preauth GET /bugzilla/localconfig~ filter_deny
ns_register_filter preauth GET /bugzilla/\#localconfig\# filter_deny
ns_register_filter preauth GET /bugzilla/*.pl filter_deny ns_register_filter preauth GET /bugzilla/*.pl filter_deny
ns_register_filter preauth GET /bugzilla/localconfig filter_deny
ns_register_filter preauth GET /bugzilla/syncshadowdb filter_deny ns_register_filter preauth GET /bugzilla/syncshadowdb filter_deny
ns_register_filter preauth GET /bugzilla/runtests.sh filter_deny ns_register_filter preauth GET /bugzilla/runtests.sh filter_deny
ns_register_filter preauth GET /bugzilla/data/* filter_deny
ns_register_filter preauth GET /bugzilla/template/* filter_deny
proc filter_deny { why } { proc filter_deny { why } {
ns_log Notice "filter_deny" ns_log Notice "filter_deny"
return "filter_return" return "filter_return"
...@@ -1736,17 +1739,29 @@ proc filter_deny { why } { ...@@ -1736,17 +1739,29 @@ proc filter_deny { why } {
</programlisting> </programlisting>
<warning> <warning>
<para>This doesn't appear to account for everything mentioned in <para>This probably doesn't account for all possible editor backup
<xref linkend="security"/>. In particular, it doesn't block access files so you may wish to add some additional variations of
to the <filename class="directory">data</filename> or <filename>localconfig</filename>. For more information, see
<filename class="directory">template</filename> directories. It also
doesn't account for the editor backup files that were the topic of
<ulink url="http://bugzilla.mozilla.org/show_bug.cgi?id=186383">bug <ulink url="http://bugzilla.mozilla.org/show_bug.cgi?id=186383">bug
186383</ulink>, <ulink 186383</ulink> or <ulink
url="http://online.securityfocus.com/bid/6501">Bugtraq ID 6501</ulink>, url="http://online.securityfocus.com/bid/6501">Bugtraq ID 6501</ulink>.
and a partial cause for the 2.16.2 release.
</para> </para>
</warning> </warning>
<note>
<para>If you are using webdot from research.att.com (the default
configuration for the <option>webdotbase</option> paramater), you
will need to allow access to <filename>data/webdot/*.dot</filename>
for the reasearch.att.com machine.
</para>
<para>If you are using a local installation of <ulink
url="http://www.graphviz.org">GraphViz</ulink>, you will need to allow
everybody to access <filename>*.png</filename>,
<filename>*.gif</filename>, <filename>*.jpg</filename>, and
<filename>*.map</filename> in the
<filename class="directory">data/webdot</filename> directory.
</para>
</note>
</section> </section>
</section> </section>
......
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment