Security framework for Zope2.
Project description
Overview
AccessControl provides a general security framework for use in Zope.
Changelog
For changes before version 3.0, see HISTORY.rst.
4.0b4 (2018-04-16)
Drop support for Python 3.4.
Add TaintedBytes besides TaintedString in AccessControl.tainted. (#57)
4.0b3 (2018-01-27)
Fix deprecation warnings which have shown up when running the tests.
4.0b2 (2018-01-25)
Python 2 / 3 import improvements.
add Appveyor configuration to automate building Windows eggs
fix for compilers that only support C89 syntax (e.g. on Windows)
4.0b1 (2017-09-15)
Security fix: In str.format, check the security for attributes that are accessed. (Ported from 2.13).
Port override_container context manager here from 2.13.
4.0a7 (2017-05-17)
Increase Python 3 compatibility.
4.0a6 (2017-05-12)
Make the C extension Python 3 compatible.
Sanitize and test RoleManager role handling.
Drop Record dependency, which now does its own security declaration.
4.0a5 (2017-05-05)
Add support for Python 3.4 up to 3.6. (only Python implementation)
Depend on RestrictedPython >= 4.0.
4.0a4 (2017-02-01)
Use @implementer class decorator.
Remove AccessControl.Permission.name_trans to ease Python 3 migration. Use AccessControl.Permission.getPermissionIdentifier() instead.
4.0a3 (2016-08-05)
Extract .AuthEncoding to its own package for reuse.
4.0a2 (2016-08-01)
Declare missing dependency on BTrees.
4.0a1 (2016-07-21)
Modernised C code in preparation of porting to Python 3.
#16: Fixed permission handling by avoiding column and row numbers as identifiers for permissions and roles.
3.0.12 (2015-12-21)
Avoid acquiring access from module wrapped by SecurityInfo._ModuleSecurityInfo. See: https://github.com/zopefoundation/AccessControl/issues/12
3.0.11 (2014-11-02)
Harden test fix for machines that do not define localhost.
3.0.10 (2014-11-02)
Test fix for machines that do not define localhost.
3.0.9 (2014-08-08)
GitHub #6: Do not pass SecurityInfo instance itself to declarePublic/declarePrivate when using the public/private decorator. This fixes Conflicting security declarations warnings on Zope startup.
LP #1248529: Leave existing security manager in place inside RoleManager.manage_getUserRolesAndPermissions.
3.0.8 (2013-07-16)
LP #1169923: ensure initialization of shared ImplPython state (used by ImplC) when using the “C” security policy. Thanks to Arnaud Fontaine for the patch.
3.0.7 (2013-05-14)
Remove long-deprecated ‘Shared’ roles support (pre-dates Zope, never used by Zope itself)
Prevent infinite loop when looking up local roles in an acquisition chain with cycles.
3.0.6 (2012-10-31)
LP #1071067: Use a stronger random number generator and a constant time comparison function.
3.0.5 (2012-10-21)
LP #966101: Recognize special zope2.Private permission in ZCML role directive.
3.0.4 (2012-09-09)
LP #1047318: Tighten import restrictions for restricted code.
3.0.3 (2012-08-23)
Fix a bug in ZopeSecurityPolicy.py. Global variable rolesForPermissionOn could be overridden if __role__ had custom rolesForPermissionOn.
3.0.2 (2012-06-22)
Add Anonymous as a default role for Public permission.
3.0.1 (2012-05-24)
Fix tests under Python 2.6.
3.0 (2012-05-12)
Added decorators for public, private and protected security declarations.
Update tests to take advantage of automatic test suite discovery.
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distributions
Hashes for AccessControl-4.0b4-cp36-cp36m-win_amd64.whl
Algorithm | Hash digest | |
---|---|---|
SHA256 | db1bb79e81869647ac4e306622d88ce298dab328b18e10931ef3e5633ec00edb |
|
MD5 | 59208368e2bcd4bdb46d3d3274a99541 |
|
BLAKE2b-256 | d75fecea33476ff74ee36e83f8666285ff2cef85a5940f0574aa1da03a7d3e45 |
Hashes for AccessControl-4.0b4-cp36-cp36m-win32.whl
Algorithm | Hash digest | |
---|---|---|
SHA256 | ca601b40694a06b63ed050046f1f513a47c16f98353fa377f86d675ee701114a |
|
MD5 | 17568cc5b89ac581e39dd8b31fcca917 |
|
BLAKE2b-256 | f090717a6ccbb84e367bf09d2a997d4f3c59c0a5d3e51d8a88ff3fc221731ebe |
Hashes for AccessControl-4.0b4-cp35-cp35m-win_amd64.whl
Algorithm | Hash digest | |
---|---|---|
SHA256 | 3c6b60b987e43e7b01d45650e933b2a9c7e46bcca12475f1cb5c409ba36771ce |
|
MD5 | a5f95cfc0f2fb492f3eb80ae2d83b27f |
|
BLAKE2b-256 | e1e71b151120d7b045260fab5b38ec7a9483a0b3f5049ce7cfd7bb4e1eb90f0d |
Hashes for AccessControl-4.0b4-cp35-cp35m-win32.whl
Algorithm | Hash digest | |
---|---|---|
SHA256 | 54bf366a29431aa082022025f3588bb28a2f9497b5087796ead20ad02323eca5 |
|
MD5 | 010db4c4bd9287016bcf320e61c9a04c |
|
BLAKE2b-256 | ce8c9e20045939e955c2a075a31388ece2966cb2fe914005412259b774e26c4a |
Hashes for AccessControl-4.0b4-cp27-cp27m-win_amd64.whl
Algorithm | Hash digest | |
---|---|---|
SHA256 | 92e2d44f405932b3c16eddfc897c88c5d531ce32ce5c4f43bc742489ff18697a |
|
MD5 | ad255310031798558a696434bfbe628d |
|
BLAKE2b-256 | 48b2a9ab5df302ede2a5e3ded886291c46fe784c5ca594bbf1499127cdd3cc8f |
Hashes for AccessControl-4.0b4-cp27-cp27m-win32.whl
Algorithm | Hash digest | |
---|---|---|
SHA256 | 1e5cdb5e96c2b1a0cce6a9473be6fb22545a4470d2de63d39e8b439043f7e3dd |
|
MD5 | c2e76c14d8e8cf4b803fd14585a3df73 |
|
BLAKE2b-256 | 11d1c39a196e1ac0bbc5b0860c519ec3daa47a5aebe79c113a3897bac6127eb3 |