[security] view was giving web access to every fs file accessible by the web server process. Fix this security hole by storing file in session data, not direct form parameters
add_relation_type('prefered_form')
rql('SET X prefered_form Y WHERE Y canonical TRUE, X identical_to Y')
commit()
drop_attribute('EmailAddress', 'canonical')
drop_relation_definition('EmailAddress', 'identical_to', 'EmailAddress')
if 'see_also' in schema:
sync_schema_props_perms('see_also', syncprops=False, syncrdefs=False)