From: "Bertrand Delacretaz" <[EMAIL PROTECTED]>
Date: Thu, 20 Jul 2006 10:13:06 +0200

On 7/19/06, [EMAIL PROTECTED] <[EMAIL PROTECTED]> wrote:

...<map:match pattern="buildIndex">
        <map:generate src="http://localhost:8080//index.xml
"/>...


...which means every (outside) user could be able to start the index when
calling buildIndex. I would like to avoid that. Question is: how? ..

The clean and safest way is to use Cocoon's authentication framework
to require authentication before accessing buildindex.

But you could also:

a) check the client's IP address and allow only requests from
localhost to buildindex (if you're using a reverse proxy in front of
Cocoon you'll get this via the X-Forwarded-For header, which you can
check with a WildcardHeaderMatcher, but see
http://bob.pythonmac.org/archives/2005/09/23/apache-x-forwarded-for-caveat)

b) use security by obscurity and use a hard go guess URL instead of
buildindex. It's not really safe but the risks are not very high
either if it's just for index creation

-Bertrand

Another possibility - you could always use the J2EE container-provided security and add a security-constraint to your web.xml for <url-pattern>/buildindex</url-pattern>. That might be simpler than learning the authentication framework or acegi if don't need to authenticate users in the rest of your site.


Andrew.



---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Reply via email to