Martijn Faassen writes:
 > Dieter Maurer wrote:
 > [snip]
 > >  > Now replace the line "security.declarePublic('getTitle')" with something like
 > >  > "security.declareProtected('View', 'getTitle')", and suddenly nobody is
 > >  > allowed to call getTitle() on a Book object anymore.
 > > You must acquistion wrap your book objects. Otherwise, Zope's
 > > security code is unable to find the permission-role mapping.
 > > 
 > > Try:
 > > 
 > >    return books.__of__(self)
 > Aah, of course, makes sense. They should put this in the developer's guide!
 > The thing that tripped me up is that it works at all for declarePublic. :)
The basic security mechanism uses the attribute "m__roles__" in order
to protect "m". If this attribute it "None", then "m" is public.
Otherwise, it is expected to be a sequence of roles that are allowed
to use "m".

But, "ExtensionsClass" brings with it computed attributes. This allows
"m__roles__" to be not a sequence but a method returning a sequence.
When you protect "m" with a permission "p", then
"m__roles__" is set to "PermissionRole(p)". This instance dynamically
evaluates into a sequence of roles by crawling up the "aq_container"
(which is correctly "aq_parent" after "aq_inner") chain and translating
"p" into roles by interpreting the "permission-to-role" mapping
it finds on its way to the application object.

Therefore, "declarePublic" works for non-wrapped instances while
"declareProtected" requires the wrapping.


Zope-Dev maillist  -  [EMAIL PROTECTED]
**  No cross posts or HTML encoding!  **
(Related lists - )

Reply via email to