Security framework for Zope2.
Project description
Overview
AccessControl provides a general security framework for use in Zope.
Changelog
For changes before version 3.0, see HISTORY.rst.
4.0b3 (2018-01-27)
Fix deprecation warnings which have shown up when running the tests.
4.0b2 (2018-01-25)
Python 2 / 3 import improvements.
add Appveyor configuration to automate building Windows eggs
fix for compilers that only support C89 syntax (e.g. on Windows)
4.0b1 (2017-09-15)
Security fix: In str.format, check the security for attributes that are accessed. (Ported from 2.13).
Port override_container context manager here from 2.13.
4.0a7 (2017-05-17)
Increase Python 3 compatibility.
4.0a6 (2017-05-12)
Make the C extension Python 3 compatible.
Sanitize and test RoleManager role handling.
Drop Record dependency, which now does its own security declaration.
4.0a5 (2017-05-05)
Add support for Python 3.4 up to 3.6. (only Python implementation)
Depend on RestrictedPython >= 4.0.
4.0a4 (2017-02-01)
Use @implementer class decorator.
Remove AccessControl.Permission.name_trans to ease Python 3 migration. Use AccessControl.Permission.getPermissionIdentifier() instead.
4.0a3 (2016-08-05)
Extract .AuthEncoding to its own package for reuse.
4.0a2 (2016-08-01)
Declare missing dependency on BTrees.
4.0a1 (2016-07-21)
Modernised C code in preparation of porting to Python 3.
#16: Fixed permission handling by avoiding column and row numbers as identifiers for permissions and roles.
3.0.12 (2015-12-21)
Avoid acquiring access from module wrapped by SecurityInfo._ModuleSecurityInfo. See: https://github.com/zopefoundation/AccessControl/issues/12
3.0.11 (2014-11-02)
Harden test fix for machines that do not define localhost.
3.0.10 (2014-11-02)
Test fix for machines that do not define localhost.
3.0.9 (2014-08-08)
GitHub #6: Do not pass SecurityInfo instance itself to declarePublic/declarePrivate when using the public/private decorator. This fixes Conflicting security declarations warnings on Zope startup.
LP #1248529: Leave existing security manager in place inside RoleManager.manage_getUserRolesAndPermissions.
3.0.8 (2013-07-16)
LP #1169923: ensure initialization of shared ImplPython state (used by ImplC) when using the “C” security policy. Thanks to Arnaud Fontaine for the patch.
3.0.7 (2013-05-14)
Remove long-deprecated ‘Shared’ roles support (pre-dates Zope, never used by Zope itself)
Prevent infinite loop when looking up local roles in an acquisition chain with cycles.
3.0.6 (2012-10-31)
LP #1071067: Use a stronger random number generator and a constant time comparison function.
3.0.5 (2012-10-21)
LP #966101: Recognize special zope2.Private permission in ZCML role directive.
3.0.4 (2012-09-09)
LP #1047318: Tighten import restrictions for restricted code.
3.0.3 (2012-08-23)
Fix a bug in ZopeSecurityPolicy.py. Global variable rolesForPermissionOn could be overridden if __role__ had custom rolesForPermissionOn.
3.0.2 (2012-06-22)
Add Anonymous as a default role for Public permission.
3.0.1 (2012-05-24)
Fix tests under Python 2.6.
3.0 (2012-05-12)
Added decorators for public, private and protected security declarations.
Update tests to take advantage of automatic test suite discovery.
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distributions
Hashes for AccessControl-4.0b3-cp36-cp36m-win_amd64.whl
Algorithm | Hash digest | |
---|---|---|
SHA256 | a0a0a5b188877fe77fb435c128a3a189aeab46f0eae9d891d3b9dea5557db72d |
|
MD5 | d468a5748e7bbe6ef27b0ecdca5a09f7 |
|
BLAKE2b-256 | 2e2f3979f9d311181250c01cd35596611b8874e33d1eb68f83c6eefbaf3fa11f |
Hashes for AccessControl-4.0b3-cp36-cp36m-win32.whl
Algorithm | Hash digest | |
---|---|---|
SHA256 | ba76d3fb8bf54dbeff811797d80fd31c561708cd350a723d2c387345a3b2bf89 |
|
MD5 | 0b8c6bccb754383ea8d73fdd3f657bf9 |
|
BLAKE2b-256 | f80a6f4fc10d47040857f843fa20d5c52e97d4df1c4f12d41a2d5783e0190db6 |
Hashes for AccessControl-4.0b3-cp35-cp35m-win_amd64.whl
Algorithm | Hash digest | |
---|---|---|
SHA256 | f39dff8bd299ec620ce6e359be21a5b5069e3d3b7dd8882d11e8094beb723f2e |
|
MD5 | ff6b9b376d782db713e7ed0981d3066b |
|
BLAKE2b-256 | c6ca1887643cd35a41174727e45c80000dd7dc1d0e867f0ad031fea11d3e6198 |
Hashes for AccessControl-4.0b3-cp35-cp35m-win32.whl
Algorithm | Hash digest | |
---|---|---|
SHA256 | 0d06a147caf0355226dee4b8a549cd79b0c855b5d17cafdc9718a14f54c6bb67 |
|
MD5 | fa2b7122db0b81b1935c24ef1b8ba8f9 |
|
BLAKE2b-256 | 18e20335598f99ac026ab6b365acf6393bcf008edff562c4c0f70c5d89203bf3 |
Hashes for AccessControl-4.0b3-cp34-cp34m-win_amd64.whl
Algorithm | Hash digest | |
---|---|---|
SHA256 | 00f5955fb45b278f32a7b8b356cb3edb5c1216deee5bf1e02465ce8b009492f9 |
|
MD5 | 48e9b8a0dd659e819cbefee83a6e6898 |
|
BLAKE2b-256 | c0769b543f394bf338d80bc403f201df158b578ea7c51b7368245438d04e5813 |
Hashes for AccessControl-4.0b3-cp34-cp34m-win32.whl
Algorithm | Hash digest | |
---|---|---|
SHA256 | fa1053d1bda4b5d2c615bdea9b1400bed639131d1058d75dcec44e29822dd2b7 |
|
MD5 | 19cf04da3c4ca855a4f147e1572caffc |
|
BLAKE2b-256 | 6c5af05bf9dade9a168334567ca378f27ff5d9641d2b907889895b4d9343d7cd |
Hashes for AccessControl-4.0b3-cp27-cp27m-win_amd64.whl
Algorithm | Hash digest | |
---|---|---|
SHA256 | 6c73e7604995fa701b8d9305b854f64931ae8ef048f6374b2e1b115f92fc6eb8 |
|
MD5 | 7abc6f0d472e6f0e371921c5bc70c1c9 |
|
BLAKE2b-256 | 806056191f1df7024018cfc392c4c3a8e24ee074c770533d7f2c01564c85d93e |
Hashes for AccessControl-4.0b3-cp27-cp27m-win32.whl
Algorithm | Hash digest | |
---|---|---|
SHA256 | b8a8fd09a5bc0ea0efa86422be5a79965b0b6e60a0427492c37fa9b7264c5ea4 |
|
MD5 | 3761db7866e714099f367ed5c17986c8 |
|
BLAKE2b-256 | 8ffe8bf73f03e31c69117ba74c22f09adef88a367e88eb5817bc0ef586d3a7b0 |