> > I believe this could be implemented pretty easily, but would like to > > get some feedback before starting the work. Regards, > > I'm about to jump on a plane and I would like to look at your > proposal but I > urge you to fully work out the design before you start coding. I > agree that > the security model that we have is too complicated for most uses > and people > have either misused it or have been confused.
That's exactly why I posted my message to the forum: I really would like to hear as many opinions, hints and criticism as I can before sitting down and getting anything done. > I have no doubt in your ability but please let us debug the design as a > group. As with the pipeline Dan and I have made tests and chatted > about how > it might work but no serious work has been done because we still need to > decide exactly how it works. Now that I re-discovered IRC, I would definitely like to talk at length about the security system. > I think that the best thing you could do is present the design in the form > of the interfaces (or UML if you prefer) and lets put the design through a > couple of use cases. I usually think about Tambora and Jetspeed as my > examples. Tambora has relatively simple security needs, but Jetspeeds are > somewhat more complicated. Ok, I will write up the Interfaces, trying to keep an eye on what's there for Turbine 3, and send it to the list for examination. > If you have ideas, throw them into CVS and we can talk about those too at > the informal meeting on the 10th @ Collab. Will notify when I have something done. > Jason van Zyl -- Gonzalo A. Diethelm [EMAIL PROTECTED] -- To unsubscribe, e-mail: <mailto:[EMAIL PROTECTED]> For additional commands, e-mail: <mailto:[EMAIL PROTECTED]>
