Hi,
Firstly, I would like to compliment the developers/ designers/ architects of
Apache ISIS on a fine product using a great design pattern and framework (naked
objects).
A question:
While ISIS goes a long way (more than any other framework) to corralling the
developer of a business
Hi Dan,
We are building a corporate application using the ISIS framework as is (JDO,
Wicket viewer) and it is going well.
However the unfinished JUnit wrapper poses a problem for us in the long run.
Keen to see it completed (that's a vote fromme).
Unfortunately I can't publish the source
+1. Jeroen is exactly right.
From: Jeroen van der Wal jer...@stromboli.it
To: users@isis.apache.org
Sent: Monday, 20 May 2013 11:35 PM
Subject: Re: Using Apache ISIS with an XML database
Hi Steve,
A few years back I developed an XRX application using
Hi all,
We are looking at the options for controlling which fields that a user in a
particular role can edit in a way that can be externalized like in the way
Shiro externalizes role based authorization configuration for operations. Any
thoughts/ ideas or pointing out of the error of our
atomic transaction behaviour as part of the bargain.
David.
From: David Tildesley davo...@yahoo.co.nz
To: users@isis.apache.org users@isis.apache.org
Sent: Sunday, 30 June 2013 8:32 AM
Subject: Re: Microsoft CRM as a reference architecture (part 2)
Hi Oscar
. And this happens programmatically as
part of the lifecycle of the transaction entity.
Sent from my iPad
On Jul 20, 2013, at 10:07 PM, David Tildesley davo...@yahoo.co.nz wrote:
Hi O. would be easier to answer your question if you described your use
case. If it is just single database persistence I
Hi,
We are looking at building a RBAC capability that evaluates security
entitlements for users. The business rule to determine an effective role may be
based on a combination of the users attributes. e.g. job title, organisation
unit, location, organisation. The rules are not going to be all
Hi,
A question. A user may have a number of roles when using ISIS (i.e.
org.apache.isis.security.UserMemento has a list of roles 1). How hard would
it be to let the user choose which role they want to use for the session.
The story:
1. As an administrator of the application I am also a
Would JDO query be a candidate (assuming the query text can be associated with
an object and loaded from a persistent source at run-time and then executed)?
Regards,
David.
From: David Tildesley davo...@yahoo.co.nz
To: users users@isis.apache.org
Sent
Hi Oscar,
Thanks. That's handy. We'll explore that new feature.
Cheers,
David.
Sent from Yahoo! Mail on Android
Dan Haywood wrote:
Even though you say you don't want to think of this in terms of security,
it does feel like a security concern to me... at least insofar that
addRole(user, securityRole) implies access to specific functionality?
Hi Dan,
I think you have misunderstood - the security roles
Good stuff Oscar.
A few comments:
I think there needs to be a continued and strong focus on the generated UI(s)
which is frankly the sweet spot for NO/ISIS that is unmatched in any other
system. DDD is easily achieved without NO/ISIS. For us ISIS is going to live or
die based on what we can
Performance testing our ISIS (RO, Wicket viewer) based application is on our
backlog to do soon, however we haven't started yet - mainly because it is not a
significant risk for our first release.
Regards,
David.
From: Dan Haywood
.
Sent from my iPhone
On Aug 17, 2013, at 1:31 AM, David Tildesley davo...@yahoo.co.nz wrote:
Performance testing our ISIS (RO, Wicket viewer) based application is on our
backlog to do soon, however we haven't started yet - mainly because it is not
a significant risk for our first release
experience.
Our solution (when we figure it all out) should work for your scenarios also.
David.
From: David Tildesley davo...@yahoo.co.nz
To: users@isis.apache.org users@isis.apache.org
Cc: dev d...@isis.apache.org
Sent: Saturday, 7 September 2013 9:37 AM
Subject
Hi Dan,
Sounds good (for internet facing apps).
In my opinion, web UI's for internal applications were a big step backwards for
enterprises - clumsy for users and expensive to build (at least before ISIS
came along) compared to rich clients. I guess web technology has advanced to a
point
Congratulations to the team. The new features look great. I'm in awe of what
you have achieved.
David.
Hi All,
Audit service is missing one important item of information - the name of the
attribute for the value that changed.
Publishing service doesn't provide the previous value and so this doesn't
provide an alternative to address the point above.
Apart from framework changes (happy to raise
, David Tildesley davo...@yahoo.co.nz wrote:
Hi All,
Audit service is missing one important item of information - the name of
the attribute for the value that changed.
Publishing service doesn't provide the previous value and so this
doesn't provide an alternative to address the point above
,Root access,ROOT,sven,*,1
4,Setup inventory,SetupInventory,sven,*:Inventory:*:r,w,1
5,todo,TODO,sven,*:Parties:*:*,3
On Fri, Oct 25, 2013 at 3:27 AM, David Tildesley davo...@yahoo.co.nzwrote:
Copy us the whole shiro.ini file (blank out any sensitive connection info).
David
Hi Jeroen,
Out of curiosity, what was the driver for using a database view instead of
calling the behaviour on the domain layer to get the information for the view
model? Performance?
David.
On Tuesday, 12 November 2013 1:09 AM, Jeroen van der Wal jer...@stromboli.it
wrote:
To answer
Many thanks to the ISIS team for this bug fix.
Cheers,
David.
On Thursday, 14 November 2013 8:59 PM, Dan Haywood
d...@haywood-associates.co.uk wrote:
The Isis team is pleased to announce the release of:
- Wicket Viewer 1.3.1
- Simple Archetype 1.3.1
- Quickstart Archetype 1.3.1
This is
I'm interested in the answer to that also.
David.
On Sunday, 17 November 2013 8:50 AM, james agada okwuiag...@gmail.com wrote:
When creating a view model, I am retrieving the OID of a referenced entity.
Is it possible to retrieve an entity with just the OID which is usually an
integer
Hi,
Good news: sonar owasp plugin picked up only 4 vulnerabilities (of 97 active
OWASP rules) and overall 0.1% OWASP risk factor score (the app under test based
on 1.3.0 ISIS core and 1.3.1 wicket viewer) and those vulnerabilities may be
attributable to the business code we wrote rather than
Nice work :) . Looking forward to 1.4.0 also.
On Monday, 17 February 2014 4:52 AM, Dan Haywood
d...@haywood-associates.co.uk wrote:
Hi folks,
just a heads-up that the Isis website now contains a new page and
screencast [1] showing how Estatio [2] uses the Excel domainservice [3]
that I
Would love to come but I live on the other side of the world. Hope it goes well.
David.
On Friday, 28 March 2014 12:42 AM, Dan Haywood d...@haywood-associates.co.uk
wrote:
Just a further reminder that we would love to have a couple of members of
the user community along to meet with us in
Well done on 1.5 release. Hope the conference goes well.
David.
On Sunday, 8 June 2014 6:40 AM, GESCONSULTOR o@gesconsultor.com wrote:
Really nice way to celebrate the success of the first IsisCon !!!
This development platform has a great potential for the years to come.
It's been
Hi Dan, Ged,
No, unfortunately this wasn't pursued. However we did go down the view object
track for a simple backend ws integration.
Augustinus has touched on the same issue - ISIS domain should be capable of
having non-locally persisted domain objects that can save or have data
injected
and PD.
Where a single annotation [@DomainObject, @Model, or whatever else] would blur
the lines of responsibility.
Do I understand this correctly?
Jeremy D. Branham
Tel: **DOTNET
-Original Message-
From: David Tildesley [mailto:davo...@yahoo.co.nz]
Sent: Wednesday, December 31, 2014 4:36
be careful with anemic domains :))
Regards,
Oscar
[1]
https://github.com/VaughnVernon/IDDD_Samples/tree/master/iddd_collaboration/src/main/java/com/saasovation/collaboration
El 1/1/2015, a las 20:45, David Tildesley davo...@yahoo.co.nz escribió:
Hi Oscar,
I think we may be looking
That's great documentation Dan. Thanks!
Kind Regards,
David.
On Tuesday, 16 June 2015 6:49 PM, Dan Haywood
d...@haywood-associates.co.uk wrote:
Hi folks,
Over the last month or so I've been reworking the Isis website, to:
- consolidate our how-to documentation into a comprehensive
-db.org/exist/apps/XSLTForms-Demo/modules/form.xq?form=tic-tac-toe.xml
On Sun, Jul 26, 2015 at 11:38 AM, David Tildesley davo...@yahoo.co.nz wrote:
Hi,
I am looking for some ideas around how ISIS could be helpful in the following
Use Case. N.B. For non-disclosure reasons, I have to mask the real
, Stephen Cameron
steve.cameron...@gmail.com wrote:
Hi David, I was speaking of the values/entries not the catalog or code-list
collection object, which as you say will have some behaviour.
On Thu, Jul 30, 2015 at 3:53 PM, David Tildesley davo...@yahoo.co.nz wrote:
Hi Stephen,
Notwithstanding any
://www.balisage.net/Proceedings/vol10/html/Velasquez01/BalisageVol10-Velasquez01.html
[2] http://lib.tkk.fi/Diss/2007/isbn9789512285662/article3.pdf
[3]
http://exist-db.org/exist/apps/XSLTForms-Demo/modules/form.xq?form=tic-tac-toe.xml
On Sun, Jul 26, 2015 at 11:38 AM, David Tildesley davo...@yahoo.co.nz
Hi Stephen,
Notwithstanding any issues with ISIS, I disagree with your assertion
quoteIn terms of
domain modelling such code-lists are simple types that 'represent' things
on the boundary of the domain of interest./quote
When Peter Coad came up with the 4 domain archetypes and the DNC (Domain
]
http://blog.javaforge.net/post/31913732423/howto-create-java-pojo-at-runtime-with-javassist
On 26 July 2015 at 03:38, David Tildesley davo...@yahoo.co.nz wrote:
Hi,
I am looking for some ideas around how ISIS could be helpful in the
following Use Case. N.B. For non-disclosure
Hi David,
When you say via EJB do you mean that you want to front end ISIS
application with session beans and invoke those from another application via
remote EJB invocation?
Are you are saying that you want to do that just because you want to avoid
having to learn REST/Json?
Or you are
Hi,
I am looking for some ideas around how ISIS could be helpful in the following
Use Case. N.B. For non-disclosure reasons, I have to mask the real problem
domain however at the same time try and give you a sense of what it all about
and the degree of complexity.
UC1. Apply for 'XYZ'
N.B.
On Sunday, 15 November 2015 5:37 AM, Dan Haywood
wrote:
> Thanks for this James.
> My observation re: using the (relational) data model as the initial input
> though is that this is likely to lead to rather coupled code, ultimately
> not maintainable.
Thanks Dan for this comprehensive reply.
Regards,David.
On Monday, 16 November 2015 8:48 PM, Dan Haywood
<d...@haywood-associates.co.uk> wrote:
On 15 November 2015 at 20:30, David Tildesley <davo...@yahoo.co.nz> wrote:
Hi All,
I am looking for reasons why Apache IS
question though, I'd say its the naked objects approach more
than use of OO per se that aids that, you focus more on the objects than on
specific use-cases. If that is done an anaemic design seems improbable.
On Mon, Nov 16, 2015 at 7:30 AM, David Tildesley <davo...@yahoo.co.nz>
wrote:
&
Hi All,
I am looking for reasons why Apache ISIS framework promotes and enables a "rich
domain model" [1] [2] and therefore promotes OO design.
And of course any reasons to the contrary (i.e. things that ISIS does that gets
in the way of OO design).
Or is it simply neutral? i.e. developer
Hi Stephen,
On Tuesday, 6 October 2015 12:20 AM, Stephen Cameron
wrote:
>In fact as configurable systems get more and more complex, the need
>for>programming disappears, to be replaced by 'configurators' (business
>analysts?) tweeking workflow and rules engines.
I
Hi,
Just to add an architectural perspective - I think you are all right and all
wrong at the same time ;).
Dan is absolutely right if he constrains his comments to Domain Objects (which
I believe is the case).
I think the framework should enforce the Naked Object principles (which are in
turn
Hi Anton,
Having just read all about Keycloak and the fact it is ASL 2.0 licensed, I
think that is an excellent idea. Apache Shiro has the advantage with it's fine
grained permission model and role to application permission mapping but
Keycloak is a much more comprehensive access manager that
Thanks Dan,Very useful.
Cheers,David.
Sent from Yahoo Mail on Android
On Sat, 2 Apr, 2016 at 0:00, Dan Haywood
wrote: Hi folks,
I've spent a few evenings recording some new screencasts for v1.12.0 [1]
Do take a look, you'll probably see something that you
Good point Kambiz - with the likes of S3 object storage this is becoming a
common requirement - especially for very large files where loading the whole
file into memory is not appropriate. And much better than storing in a rdbms
blob column.
I suggest a hidden mandatory attribute on a domain
Hi Uma,
Just an idea: you could extend
org.apache.isis.viewer.wicket.viewer.integration.wicket.WebRequestCycleForIsis
1. Check for a Wicket Session: org.apache.wicket.protocol.http.WebSession.get();
2. If none, assume the "container" has authenticated the user so then check
HttpServletRequest
Hi Martin,
You haven't described a tenancy problem so I wouldn't necessarily try
and bend that to your problem. I would model it in the domain and use
domain behavior. The behaviour checks if the user is a member of a
committee (Committee) in the role of managing
(ConcertManager) the
Just read my own post. Sorry those chevrons were meant to be double, and
they are only indicating color modelling "archetypes"[1] - force of
habit - helps me conceptualize problem domains.
[1] http://www.nebulon.com/articles/fdd/download/adspostera3.pdf
On 24-Sep-16 3:59 PM, David
Hi All,
Imho:
Putting the "don't do CRUD" principle spin on this: Isn't it just a
matter of allowing a "Concert" component (I call it component since it
will have several objects that are associated with the primary
moment-interval) instance to be "built up" until it can be "published"?
All
);
}
public String disables(Object domainObject, ApplicationUser
applicationUser) {
return null;
}
}
Hope that makes sense, let us know how you get on.
Cheers
Dan
[1] https://github.com/isisaddons/isis-module-security
[2] https://github.com/danhaywood/security-gene
to always
point to the latest (perhaps use a Proxy, for example - and another
administrative view that displays the full set of changes over time).
Cheers,
Kevin
On 2017-03-08 06:05, David Tildesley wrote:
> Hi,
> I have a need to keep public records and to be able to edit objects
design is handling changes to the structure of these over
time... Anyway backward breaking change would be problematic.
HTH
Dan
On Tue, 14 Mar 2017, 05:39 David Tildesley, <davo...@yahoo.co.nz.invalid>
wrote:
> Thanks Kevin,
> I guess I was looking for something like deep clone u
Hi,
I have a need to keep public records and to be able to edit objects and put
them through a publishing lifecycle whilst public can view the current record
without seeing the changes.
Temporal object pattern [1] seems like the simplest pattern.
Then it comes down to how hard or easy it is to
55 matches
Mail list logo