Yes, this is a blocker IMO as it breaks FTP for a whole class of
virtual hosting scenarios. No, I don't know how to fix, maybe Lennart?
Stefan
On 17. Sep 2006, at 12:52, Andreas Jung wrote:
--On 17. September 2006 12:38:11 +0200 Philipp von Weitershausen
[EMAIL PROTECTED] wrote:
AFAIK,
On Sun, 2006-17-09 at 16:09 -0300, Sidnei da Silva wrote:
b) If you dump the data to a temp file and return that as a file
iterator, it can potentially take twice the time.
Potentially, yes... but from a practical standpoint I believe this will
never happen. Writing to a tempfile over any
On Sep 17, 2006, at 3:09 PM, Sidnei da Silva wrote:
I remember having a conversation with Jim at some point where he
proposed a strategy for requests that could potentially take a long
time to finish. If I recall correctly, he proposed having a separate
ZODB connection pool.
One thing that is
On Sep 17, 2006, at 3:24 PM, Christian Theune wrote:
I wonder whether this statement is true:
Any connection handed out after the connection breaks the ACID
compliance of the request.
I wonder what Any connection handed out after the connection
means.
Jim
--
Jim Fulton
Jim Fulton wrote:
On Sep 17, 2006, at 3:24 PM, Christian Theune wrote:
I wonder whether this statement is true:
Any connection handed out after the connection breaks the ACID
compliance of the request.
I wonder what Any connection handed out after the connection
means.
Argh.
FileCacheManager does the copy-to-file-and-serve-as-iterator dance
for you.
http://www.dataflake.org/software/filecachemanager
Stefan
On 17. Sep 2006, at 21:09, Sidnei da Silva wrote:
One thing that is problematic today is serving large files
from the ZODB (ignoring the upcoming blob
On Sep 18, 2006, at 8:16 AM, Christian Theune wrote:
Jim Fulton wrote:
On Sep 17, 2006, at 3:24 PM, Christian Theune wrote:
I wonder whether this statement is true:
Any connection handed out after the connection breaks the ACID
compliance of the request.
I wonder what Any
Hey guys!
In the past few months I fiddled around with Zope2's security and access
control code. I analysied my own code and code from other developers to
search for common errors. Also I tried to think of ways to make the
security system easier and more verbose on coding errors
I have not yet
Stefan H. Holek wrote:
Log message for revision 70218:
Backport testrunner from 2.10 branch.
Changed:
_U Zope/branches/2.9/lib/python/zope/
-=-
Property changes on: Zope/branches/2.9/lib/python/zope
___
Name: svn:externals
The Buildbot has detected a failed build of Zope branches 2.9 2.4 Windows 2000
zc-bbwin2.
Buildbot URL: http://buildbot.zope.org/
Build Reason: changes
Build Source Stamp: 7709
Blamelist:
The Buildbot has detected a failed build of Zope branches 2.9 2.4 Linux
zc-buildbot.
Buildbot URL: http://buildbot.zope.org/
Build Reason: changes
Build Source Stamp: 7709
Blamelist:
Sidnei da Silva wrote at 2006-9-17 16:09 -0300:
...
c) If you use RESPONSE.write() you can break other
applications. ExternalEditor comes to mind.
If you know the size and set it in the Content-Length response
header, I cannot see a reason why it should break some applications.
...
I would
You have many good points in your list of troubles. Many of them are
resolved by using security declarations through ZCML instead. It would
be interesting to here your views on this.
//Lennart
___
Zope-Dev maillist - Zope-Dev@zope.org
Could you return an iterator to the server that knows enough to open
its own database connection? Provide it with a callback that opens
the connection and finds and chunks the relevant object?
- C
On Sep 17, 2006, at 3:09 PM, Sidnei da Silva wrote:
I remember having a conversation with
On Mon, Sep 18, 2006 at 04:44:17PM -0400, Chris McDonough wrote:
| Could you return an iterator to the server that knows enough to open
| its own database connection? Provide it with a callback that opens
| the connection and finds and chunks the relevant object?
I could certainly do that if
Oops.. should have read further on there...
On Sep 18, 2006, at 4:44 PM, Chris McDonough wrote:
Could you return an iterator to the server that knows enough to
open its own database connection? Provide it with a callback that
opens the connection and finds and chunks the relevant object?
I think it's great that you did this... nice job! I have some
specific disagreements (while I think it's a reasonable constraint,
and I think something should enforce it, I don't believe it's the job
of something that we call a *security policy* to enforce whether a
method is called,
17 matches
Mail list logo