Compare commits

...

2 Commits

Author SHA1 Message Date
pictuga f27631954e .htaccess: bypass Safari RSS detection 2020-05-06 11:47:24 +02:00
pictuga c74abfa2f4 sheet.xsl: use CDATA for js code 2020-05-06 11:46:38 +02:00
2 changed files with 10 additions and 6 deletions

View File

@ -4,6 +4,9 @@ ErrorDocument 403 "Access forbidden"
ErrorDocument 404 /cgi/main.py
ErrorDocument 500 "A very nasty bug found his way onto this very server"
# Work around for Safari
Header set X-Content-Type-Options "nosniff"
<Files ~ "\.(py|pyc|db|log)$">
deny from all
</Files>

View File

@ -224,6 +224,7 @@
</div>
<script>
//<![CDATA[
document.getElementById("url").value = window.location.href
if (!/:html/.test(window.location.href))
@ -236,12 +237,11 @@
for (var select of document.forms[0].elements)
if (select.tagName == 'SELECT')
for (var option of select)
if (option.value)
if (options.match(option.value)) {
select.value = option.value
options = options.replace(option.value, '')
break
}
if (option.value && options.match(option.value)) {
select.value = option.value
options = options.replace(option.value, '')
break
}
document.forms[0]['extra_options'].value = options
}
@ -269,6 +269,7 @@
if (target != window.location.pathname)
window.location.href = target
}
//]]>
</script>
</body>
</html>