On Friday 26 August 2005 11:51, Velko Ivanov wrote:
> My question is, does this eventually mean, that ZopeConnection objects,
> which are created at run-time, are not security proxied and consequently
> unauthorized in all cases (except the system_user) and if yes, what
> should be done? I'm not familiar with the Zope3 environment and I don't
> know how and where objects get proxied.
> Or is there something I'm missing here ?

I think Dimitry addressed this problem. Is it still a problem? If so, do you 
have enough experience to produce a functional test demonstrating the 

Stephan Richter
CBU Physics & Chemistry (B.S.) / Tufts Physics (Ph.D. student)
Web2k - Web Software Design, Development and Training
Zope3-dev mailing list
Unsub: http://mail.zope.org/mailman/options/zope3-dev/archive%40mail-archive.com

Reply via email to