> > I believe this could be implemented pretty easily, but would like to
> > get some feedback before starting the work.  Regards,
>
> I'm about to jump on a plane and I would like to look at your
> proposal but I
> urge you to fully work out the design before you start coding. I
> agree that
> the security model that we have is too complicated for most uses
> and people
> have either misused it or have been confused.

That's exactly why I posted my message to the forum: I really would
like to hear as many opinions, hints and criticism as I can before
sitting down and getting anything done.

> I have no doubt in your ability but please let us debug the design as a
> group. As with the pipeline Dan and I have made tests and chatted
> about how
> it might work but no serious work has been done because we still need to
> decide exactly how it works.

Now that I re-discovered IRC, I would definitely like to talk at
length about the security system.

> I think that the best thing you could do is present the design in the form
> of the interfaces (or UML if you prefer) and lets put the design through a
> couple of use cases. I usually think about Tambora and Jetspeed as my
> examples. Tambora has relatively simple security needs, but Jetspeeds are
> somewhat more complicated.

Ok, I will write up the Interfaces, trying to keep an eye on what's there
for Turbine 3, and send it to the list for examination.

> If you have ideas, throw them into CVS and we can talk about those too at
> the informal meeting on the 10th @ Collab.

Will notify when I have something done.

> Jason van Zyl


--
Gonzalo A. Diethelm
[EMAIL PROTECTED]


--
To unsubscribe, e-mail:   <mailto:[EMAIL PROTECTED]>
For additional commands, e-mail: <mailto:[EMAIL PROTECTED]>

Reply via email to