log

age author description
Thu, 12 Feb 2009 02:33:05 +0000 Mark Doliner Add a note that we should use hash tables for the permit and deny lists.
Thu, 12 Feb 2009 06:02:20 +0000 Etan Reisner I'm pretty sure this is what we meant here.
Thu, 12 Feb 2009 06:00:15 +0000 Etan Reisner Let XS do the argument checking/erroring for us for the components argument to