Hi Remy,
> As I stated in the comments of the bug, I don't agree with your
> interpretation about the JSP displaying "code".
Sorry again for not making myself clear. To put it exact (I hope ...):
There are cases in complex include/forward scenarios where Tomcat serves
JSPs as static resources. So the *client browser* receives something like
this as plain text:
<%@page language="java" %>
<%
application.getRequestDispatcher("/html/test.html").forward(request,
response);
%>
<%-- possible harmful information like database login information etc. may
also appear here --%>
This was what I referred to as "JSP source code". After reading your comment
I noticed how ambiguous that was (sorry again). Now the question is: Is it
dangerous if the client sees a JSP including all embedded scriptlets? I'd
say yes since developers usually rely upon their Java/JSP code not visible
to clients (e.g. because database username and password
are stored there - and let's not argue whether this is good design ;-)).
Best regards
Andreas
PS Thanks for incorporating the patch that changes the shutdown order in
StandardContext.
--
To unsubscribe, e-mail: <mailto:[EMAIL PROTECTED]>
For additional commands, e-mail: <mailto:[EMAIL PROTECTED]>