Newsgroups: php.internals Path: news.php.net Xref: news.php.net php.internals:27526 Return-Path: Mailing-List: contact internals-help@lists.php.net; run by ezmlm Delivered-To: mailing list internals@lists.php.net Received: (qmail 36018 invoked by uid 1010); 18 Jan 2007 20:38:44 -0000 Delivered-To: ezmlm-scan-internals@lists.php.net Delivered-To: ezmlm-internals@lists.php.net Received: (qmail 36003 invoked from network); 18 Jan 2007 20:38:44 -0000 Received: from unknown (HELO lists.php.net) (127.0.0.1) by localhost with SMTP; 18 Jan 2007 20:38:44 -0000 Authentication-Results: pb1.pair.com header.from=pollita@php.net; sender-id=unknown; domainkeys=good Authentication-Results: pb1.pair.com smtp.mail=pollita@php.net; spf=permerror; sender-id=unknown Received-SPF: error (pb1.pair.com: domain php.net from 140.211.166.39 cause and error) DomainKey-Status: good X-DomainKeys: Ecelerity dk_validate implementing draft-delany-domainkeys-base-01 X-PHP-List-Original-Sender: pollita@php.net X-Host-Fingerprint: 140.211.166.39 osu1.php.net Linux 2.4/2.6 Received: from [140.211.166.39] ([140.211.166.39:42620] helo=osu1.php.net) by pb1.pair.com (ecelerity 2.1.1.9-wez r(12769M)) with ESMTP id 1E/2C-22081-3DADFA54 for ; Thu, 18 Jan 2007 15:38:43 -0500 X-DomainKeys: Ecelerity dk_sign implementing draft-delany-domainkeys-base-01 DomainKey-Signature: q=dns; a=rsa-sha1; c=nofws; s=mx; d=php.net; h=From:Subject:To:Date; b=cgaIUNxjXEU3kmPO37rxS1nyXIPbn0nHVzr1Fx2pAHbbao73dcZ3vmmf6oRPtI6W emHYSt+9KuzTG2TzaMluVOVlCXrlUssjg15s2HgfQTY67rTotT1vgHIdNSbFRUaD Authentication-Results: osu1.php.net smtp.user=pollita; auth=pass (LOGIN) X-Host-Fingerprint: 207.126.230.225 unknown Received: from [207.126.230.225] ([207.126.230.225:42455] helo=[10.72.106.237]) by osu1.php.net (ecelerity 2.1.1.11-rc1 r(13363/13364M)) with ESMTPSA (cipher=AES256-SHA) id 2A/8C-27923-42BDFA54 for ; Thu, 18 Jan 2007 12:40:04 -0800 Message-ID: <45AFDACB.4040007@php.net> Date: Thu, 18 Jan 2007 12:38:35 -0800 User-Agent: Thunderbird 1.5.0.9 (Windows/20061207) MIME-Version: 1.0 To: =?ISO-8859-1?Q?David_Z=FClke?= CC: PHP Internals References: <45AD76C3.5030303@php.net> <84D1223A-9B47-4076-B1AE-85659525C21D@bitxtender.com> In-Reply-To: <84D1223A-9B47-4076-B1AE-85659525C21D@bitxtender.com> Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit Subject: Re: [PHP-DEV] allow_url_fopen / allow_url_include and fine grained control From: pollita@php.net (Sara Golemon) > I assume this would also mean all userland stream wrappers become is_url=1? > > Anyway, +1. > This patch, by itself, doesn't affect the is_urlness of userspace wrappers. Whether or not we change their designation is up to a separate concensus (I'm in favor of it for the record). Funnily enough though, Pierre and I were just discussing the problem of userspace wrappers. Specifying all potential userspace wrapper names in a whitelist style allow_url_fopen setting isn't realistic, so we thought it might be a good idea to add a sort of "meta-wrapper" name to be used in the whitelist style. e.g. allow_url_fopen=file,http,ftp,user would allow those first three wrappers explicitly by name, plus any userdefined wrapper (regardless of specific name). For completeness, we might also add a metawrapper called "internal" for "All non-userspace based wrappers", though the specific usefulness of that is a little more iffy... -Sara