annotate tools/base64 @ 5257:928512faf565

- issue2550864: Potential information leakage via journal/history Original code didn't fully implement the security checks. Users with only Edit access on a property were not able to view the journal entry for the property. This patch fixes that. Also had additional info leakage: the target object of a link or multilink must be viewable or editable in order for the journal entry to be shown. Otherwise the existance of the target is exposed via the journal while it is blocked from searches, direct access etc.
author John Rouillard <rouilj@ieee.org>
date Sun, 27 Aug 2017 00:19:48 -0400
parents 740102dfad1d
children c75defc1c2f0
Ignore whitespace changes - Everywhere: Within whitespace: At end of lines:
rev   line source
2181
740102dfad1d favicon generation stuff
Richard Jones <richard@users.sourceforge.net>
parents:
diff changeset
1 #!/usr/bin/env python
740102dfad1d favicon generation stuff
Richard Jones <richard@users.sourceforge.net>
parents:
diff changeset
2 import zlib, base64, sys
740102dfad1d favicon generation stuff
Richard Jones <richard@users.sourceforge.net>
parents:
diff changeset
3 print base64.encodestring(zlib.compress(sys.stdin.read()))

Roundup Issue Tracker: http://roundup-tracker.org/