Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Isn't this code rather leaky?

What if, for instance, the file DOES exist but the current user doesn't have read permission.



The example code isn't a treatise on proper file handling, it's a minimal example of Option




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: