Closed GoogleCodeExporter closed 9 years ago
There is an easy solution to this one, but the issue itself is a bit trickier
to swallow.
First, the solution. You have to add a path to ignore in your web.config for
the securitySwitch section. This path entry should be set to ignore your Styles
directory.
<add path="~/Styles" security="Ignore" />
As for the issue itself. What's happening is the module is emitting JavaScript
to change the window.location when bypassSecurityWarning is set to true. In
your case, the screen.css file was being intercepted by the module, it was not
found in your web.config and assumed to be accessed only insecurely, and the JS
was emitted for it to change the location. By ignoring all files in your Styles
directory, the module doesn't interfere.
"Fixing" this "issue" is another story. It's not entirely possible to know if a
request for a resource is text/html or not. You know, but this module can't
know (even looking for certain extensions isn't foolproof if a handler .axd is
used to return CSS, etc.).
So, for now, my solution will be to just inform this module to ignore your
basic resources to avoid these issues. In fact, you should ignore such
resources regardless to prevent unnecessary evaluation and redirects.
Original comment by vent...@gmail.com
on 25 May 2011 at 7:03
Thanks!
Original comment by rick...@gmail.com
on 25 May 2011 at 7:22
Just an FYI that this worked for our website. Thanks again.
Original comment by rick...@gmail.com
on 26 May 2011 at 12:13
Excellent! Thanks for the update.
Original comment by vent...@gmail.com
on 26 May 2011 at 9:43
Original issue reported on code.google.com by
rick...@gmail.com
on 25 May 2011 at 1:46