Changeset

379:eebc19c224fb

Moved the file to a directory
author leonbogaert
date Wed, 06 Jul 2011 23:34:36 +0200
parents 378:7dcc5953d799
children 380:5ef71af77ae2
files mod_flash_policy mod_flash_policy/mod_flash_policy.lua
diffstat 2 files changed, 46 insertions(+), 46 deletions(-) [+]
line wrap: on
line diff
--- a/mod_flash_policy	Wed Jul 06 21:25:28 2011 +0000
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,46 +0,0 @@
-local filters = require "util.filters";
-local config = {}
-config.file = module:get_option_string("crossdomain_file", "");
-config.string = module:get_option_string("crossdomain_string", [[<?xml version="1.0"?><!DOCTYPE cross-domain-policy SYSTEM "/xml/dtds/cross-domain-policy.dtd"><cross-domain-policy><site-control permitted-cross-domain-policies="master-only"/><allow-access-from domain="*" /></cross-domain-policy>]]);
-local string = ''
-if not config.file ~= '' then
-	local f = assert(io.open(config.file));
-	string = f:read("*all");
-else
-	string = config.string
-end
-
-module:log("debug", "crossdomain string: "..string);
-
-module:set_global();
-
-function filter_policy(data, session)
-	-- Since we only want to check the first block of data, remove the filter
-	filters.remove_filter(session, "bytes/in", filter_policy);
-	if data == "<policy-file-request/>\0" then
-		session.send([[<?xml version="1.0"?>
-		<!DOCTYPE cross-domain-policy SYSTEM "/xml/dtds/cross-domain-policy.dtd">
-		<cross-domain-policy>
-			<site-control permitted-cross-domain-policies="master-only"/>
-			<allow-access-from domain="livechat.concepts.tim-online.nl" to-ports="5222" />
-		</cross-domain-policy>]].."\0");
-		return nil; -- Drop data to prevent it reaching the XMPP parser
-	else
-		return data; -- Pass data through, it wasn't a policy request
-	end
-	
-end
-
-function filter_session(session)
-	if session.type == "c2s_unauthed" then
-		filters.add_filter(session, "bytes/in", filter_policy, -1);
-	end
-end
-
-function module.load()
-	filters.add_filter_hook(filter_session);
-end
-
-function module.unload()
-	filters.remove_filter_hook(filter_session);
-end
\ No newline at end of file
--- /dev/null	Thu Jan 01 00:00:00 1970 +0000
+++ b/mod_flash_policy/mod_flash_policy.lua	Wed Jul 06 23:34:36 2011 +0200
@@ -0,0 +1,46 @@
+local filters = require "util.filters";
+local config = {}
+config.file = module:get_option_string("crossdomain_file", "");
+config.string = module:get_option_string("crossdomain_string", [[<?xml version="1.0"?><!DOCTYPE cross-domain-policy SYSTEM "/xml/dtds/cross-domain-policy.dtd"><cross-domain-policy><site-control permitted-cross-domain-policies="master-only"/><allow-access-from domain="*" /></cross-domain-policy>]]);
+local string = ''
+if not config.file ~= '' then
+	local f = assert(io.open(config.file));
+	string = f:read("*all");
+else
+	string = config.string
+end
+
+module:log("debug", "crossdomain string: "..string);
+
+module:set_global();
+
+function filter_policy(data, session)
+	-- Since we only want to check the first block of data, remove the filter
+	filters.remove_filter(session, "bytes/in", filter_policy);
+	if data == "<policy-file-request/>\0" then
+		session.send([[<?xml version="1.0"?>
+		<!DOCTYPE cross-domain-policy SYSTEM "/xml/dtds/cross-domain-policy.dtd">
+		<cross-domain-policy>
+			<site-control permitted-cross-domain-policies="master-only"/>
+			<allow-access-from domain="livechat.concepts.tim-online.nl" to-ports="5222" />
+		</cross-domain-policy>]].."\0");
+		return nil; -- Drop data to prevent it reaching the XMPP parser
+	else
+		return data; -- Pass data through, it wasn't a policy request
+	end
+	
+end
+
+function filter_session(session)
+	if session.type == "c2s_unauthed" then
+		filters.add_filter(session, "bytes/in", filter_policy, -1);
+	end
+end
+
+function module.load()
+	filters.add_filter_hook(filter_session);
+end
+
+function module.unload()
+	filters.remove_filter_hook(filter_session);
+end
\ No newline at end of file