Revision 069fda88
Added by Thomas Noël over 13 years ago
extra/modules/root.ptl | ||
---|---|---|
803 | 803 |
uri_rest = get_request().get_path() |
804 | 804 |
if uri_rest.startswith(base_url): |
805 | 805 |
uri_rest = uri_rest[len(base_url):] |
806 |
elif uri_rest.startswith('/'): |
|
807 |
# dirty hack, ezldap reverseproxy uses a fake base_url |
|
808 |
uri_rest = uri_rest[1:] |
|
806 | 809 |
if f.category_id: |
807 | 810 |
return redirect('%s%s/%s' % (base_url, f.category.url_name, uri_rest)) |
808 | 811 |
|
Also available in: Unified diff
hack when redirect form to category/form