[Catalyst] uri_for adding :443 to URL when HTTPS=on

2007-08-28 Thread Charlie Garrison
Good evening, I upgraded Catalyst-Runtime from 5.7007 to 5.7010 yesterday; and that seems to be the cause of this problem. But it could have been there before and it was never reported by our users. When users try to login https://www.resultsplus.com.au/progs/, the following error is

Re: [Catalyst] XML RPC : Authentication and Session

2007-08-28 Thread Nicolas Raspail
Quoting J. Shirley [EMAIL PROTECTED]: On 8/27/07, Nicolas Raspail [EMAIL PROTECTED] wrote: Nicolas Raspail a écrit : Hi, I'm struggling with Session URI and XML RPC with no sucess. I can't figure out how this works. I'm using Data::Dumper to dump the value of some catalyst and it seems that

[Catalyst] Trying ircxory

2007-08-28 Thread lanas
Hi, ircxory needs the following: Catalyst::Plugin::Authentication::Credential::OpenID ...missing. (would need 0.03) But on the CPAN there's only 0.02. Where is the newest version available or, is there another way ? - Thanks. Cheers, Al ___ List:

Re: [Catalyst] Mmap of shared file Operation not permitted

2007-08-28 Thread Wade . Stuart
Dennis Daupert [EMAIL PROTECTED] wrote on 08/27/2007 04:39:50 PM: Mmap of shared file /tmp/catapult/session_data failed: Operation not permitted at /usr/lib/perl5/Cache/FastMmap.pm line 496. Kiki: If /tmp is mounted with the 'noexec' option, a mmap with PROT_EXEC will fail with

Re: [Catalyst] Mmap of shared file Operation not permitted

2007-08-28 Thread August R. Wohlt
Hi Dennis, I have seen this problem with any software that tries to do an mmap() system call on simfs, which is what the openvz/ivirtuozzo product line uses in their VPS nodes. If you make any progress on this, please let me know. It'd save me a huge headache!! thanks, august On 8/27/07, Dennis

[Catalyst] Re: Mmap of shared file Operation not permitted

2007-08-28 Thread Dennis Daupert
Wade: While changing the mount options of tmp would fix the error you are seeing and is the cause of the error, it usually makes sense to leave those options on tmp. noexec and other limiting options on /tmp are to help starve off common security exploits (such as rootkit creation -- exec

Re: [Catalyst] Re: [Catalyst-dev] Ignoring Emacs temp files

2007-08-28 Thread Alejandro Imass
if you are methodic enough you can just create a script in /usr/bin that cleans temps, backs and other rotten files. Or easier yet, you can alias to something like clean_emacs to something like: find . -name *~ | xargs rm -f find . -name #*# | xargs rm -f of course you can make this more

[Catalyst] About output in a browser

2007-08-28 Thread lanas
Hi folks, In understanding how Catalyst work and how to work with , I'm making very simple stuff, like having a model that only returns a directory listing. I found something curious before starting to make a view. Every line of the directory listing, obtained with 'ls -l', will be chomped if

Re: [Catalyst] Re: [Catalyst-dev] Ignoring Emacs temp files

2007-08-28 Thread Dave Rolsky
On Tue, 28 Aug 2007, Alejandro Imass wrote: if you are methodic enough you can just create a script in /usr/bin that cleans temps, backs and other rotten files. Or easier yet, you can alias to something like clean_emacs to something like: find . -name *~ | xargs rm -f find . -name #*# | xargs