On Wed, Oct 30, 2013 at 2:36 PM, Stuart Cracraft <[email protected]>wrote:

>
> I don't follow you. Can you re-phrase?
>

It's easy to figure this out after a quick research

{{{#!sh

$ grep -n -r "No policy allowed" trac
trac/perm.py:469: self.log.debug("No policy allowed %s performing %s on %r",
Binary file trac/perm.pyc matches
}}}

... and then browsing to
http://trac.edgewall.org/browser/trunk/trac/perm.py#L482 (or a local
checkout of Trac source code) reveals this code

{{{#!py

def check_permission(self, action, username=None, resource=None, perm=None):
   # ---- 8< ---- Further code omitted ---- 8< ----
   self.log.debug("No policy allowed %s performing %s on %r",
                      username, action, resource)
   return False
}}}

Therefore the answer to your question after a 5 min research is that such
lines are debug logging entries emitted prior to returning False for a
permission check , which means that

  - Some permission check not scoped to a particular resource failed
  - You will not see them if logging level is adjusted to leave DEBUG
entries out
    * http://trac.edgewall.org/wiki/TracLogging

-- 
Regards,

Olemis - @olemislc

Apacheā„¢ Bloodhound contributor
http://issues.apache.org/bloodhound
http://blood-hound.net

Blog ES: http://simelo-es.blogspot.com/
Blog EN: http://simelo-en.blogspot.com/

Featured article:

-- 
You received this message because you are subscribed to the Google Groups "Trac 
Users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To post to this group, send email to [email protected].
Visit this group at http://groups.google.com/group/trac-users.
For more options, visit https://groups.google.com/groups/opt_out.

Reply via email to