E&S CVS Commit: PEAK - Adjust security rules so that unprotected objects are accessible when the
pje at eby-sarna.com
pje at eby-sarna.com
Sun Jul 20 20:08:00 EDT 2003
Module Name: PEAK
Committed By: pje
Date: Mon Jul 21 00:07:30 UTC 2003
Modified Files:
PEAK/src/peak/security: interfaces.py permission.py
Log Message:
Adjust security rules so that unprotected objects are accessible when the
name being checked is None. This is because None is only used to verify
that an item retrieved from a container or sequence is accessible. In the
case where an object has no security rules defined, there is no need to
restrict access in that context, because none of its names are going to
be accessible, anyway. But, if the object is a primitive value (e.g. a
number or string), we need to be able to retrieve it from the mapping or
sequence. This change is needed so that (for example) peak.web.templates
can iterate through and display a list of numbers.
To view diffs of this commit, you can use the following URL(s):
http://cvs.eby-sarna.com/PEAK/src/peak/security/interfaces.py.diff?r1=1.4&r2=1.5
http://cvs.eby-sarna.com/PEAK/src/peak/security/permission.py.diff?r1=1.4&r2=1.5
To generate a diff of this commit:
cvs rdiff -r1.4 -r1.5 PEAK/src/peak/security/interfaces.py \
PEAK/src/peak/security/permission.py
Please note that diffs are not public domain; they are subject to the
copyright notices on the relevant files.
More information about the source-changes
mailing list