Security framework for Zope2.
Project description
Overview
AccessControl provides a general security framework for use in Zope.
Changelog
For changes before version 3.0, see HISTORY.rst.
4.0b6 (2018-10-09)
.requestmethod._buildFacade() is now .requestmethod.buildfacade() and renders *args, **kwargs properly (regression introduced in 4.0b5). (#70)
4.0b5 (2018-10-05)
Add icon for Bootstrap ZMI.
Fix order of roles returned by AccessControl.rolemanager.RoleManager.userdefined_roles.
Add support for Python 3.7.
Remove duplicate guard against * imports. (#60)
Add configuration for zodbupdate.
Remove leftovers from history support dropped in Zope.
4.0b4 (2018-04-16)
Drop support for Python 3.4.
Add TaintedBytes besides TaintedString in AccessControl.tainted. (#57)
4.0b3 (2018-01-27)
Fix deprecation warnings which have shown up when running the tests.
4.0b2 (2018-01-25)
Python 2 / 3 import improvements.
add Appveyor configuration to automate building Windows eggs
fix for compilers that only support C89 syntax (e.g. on Windows)
4.0b1 (2017-09-15)
Security fix: In str.format, check the security for attributes that are accessed. (Ported from 2.13).
Port override_container context manager here from 2.13.
4.0a7 (2017-05-17)
Increase Python 3 compatibility.
4.0a6 (2017-05-12)
Make the C extension Python 3 compatible.
Sanitize and test RoleManager role handling.
Drop Record dependency, which now does its own security declaration.
4.0a5 (2017-05-05)
Add support for Python 3.4 up to 3.6. (only Python implementation)
Depend on RestrictedPython >= 4.0.
4.0a4 (2017-02-01)
Use @implementer class decorator.
Remove AccessControl.Permission.name_trans to ease Python 3 migration. Use AccessControl.Permission.getPermissionIdentifier() instead.
4.0a3 (2016-08-05)
Extract .AuthEncoding to its own package for reuse.
4.0a2 (2016-08-01)
Declare missing dependency on BTrees.
4.0a1 (2016-07-21)
Modernised C code in preparation of porting to Python 3.
#16: Fixed permission handling by avoiding column and row numbers as identifiers for permissions and roles.
3.0.12 (2015-12-21)
Avoid acquiring access from module wrapped by SecurityInfo._ModuleSecurityInfo. See: https://github.com/zopefoundation/AccessControl/issues/12
3.0.11 (2014-11-02)
Harden test fix for machines that do not define localhost.
3.0.10 (2014-11-02)
Test fix for machines that do not define localhost.
3.0.9 (2014-08-08)
GitHub #6: Do not pass SecurityInfo instance itself to declarePublic/declarePrivate when using the public/private decorator. This fixes Conflicting security declarations warnings on Zope startup.
LP #1248529: Leave existing security manager in place inside RoleManager.manage_getUserRolesAndPermissions.
3.0.8 (2013-07-16)
LP #1169923: ensure initialization of shared ImplPython state (used by ImplC) when using the “C” security policy. Thanks to Arnaud Fontaine for the patch.
3.0.7 (2013-05-14)
Remove long-deprecated ‘Shared’ roles support (pre-dates Zope, never used by Zope itself)
Prevent infinite loop when looking up local roles in an acquisition chain with cycles.
3.0.6 (2012-10-31)
LP #1071067: Use a stronger random number generator and a constant time comparison function.
3.0.5 (2012-10-21)
LP #966101: Recognize special zope2.Private permission in ZCML role directive.
3.0.4 (2012-09-09)
LP #1047318: Tighten import restrictions for restricted code.
3.0.3 (2012-08-23)
Fix a bug in ZopeSecurityPolicy.py. Global variable rolesForPermissionOn could be overridden if __role__ had custom rolesForPermissionOn.
3.0.2 (2012-06-22)
Add Anonymous as a default role for Public permission.
3.0.1 (2012-05-24)
Fix tests under Python 2.6.
3.0 (2012-05-12)
Added decorators for public, private and protected security declarations.
Update tests to take advantage of automatic test suite discovery.
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distributions
Hashes for AccessControl-4.0b6-cp36-cp36m-win_amd64.whl
Algorithm | Hash digest | |
---|---|---|
SHA256 | 511bb11fca7645e702b6c2d60bdd7700a88daaca45c9f5b087a3198bcba9dcde |
|
MD5 | 9f7ba376dabac35d9785a43b957fb91d |
|
BLAKE2b-256 | f5c0a4b2bdcd1cad0d9f218c5b5fd98c3d6bd6376262924a57951a446d7a9393 |
Hashes for AccessControl-4.0b6-cp36-cp36m-win32.whl
Algorithm | Hash digest | |
---|---|---|
SHA256 | ce03615631af840b2f9b8bf6d186d2a8907976827c9ee8dd644678bdea25f8e8 |
|
MD5 | ff47c52996b0082831b26dc4ea7234d6 |
|
BLAKE2b-256 | d5657e94efd32028e53cfd42ef740a2ede55fbefb9756a661b050a768cebc092 |
Hashes for AccessControl-4.0b6-cp35-cp35m-win_amd64.whl
Algorithm | Hash digest | |
---|---|---|
SHA256 | 33feb4a3e5a5a4703f2cb638e4bed3651dac1ce902047e145ae8eadb249cb27c |
|
MD5 | 29cb5ac446df19c0bceb990257f7172e |
|
BLAKE2b-256 | 1f93a91c67d7f065f506606ee43a64dfb8d6a96fce76d15bcb4a286f44c7c8c4 |
Hashes for AccessControl-4.0b6-cp35-cp35m-win32.whl
Algorithm | Hash digest | |
---|---|---|
SHA256 | 5cddbe85be6d39b51cd48f0b48d3522fceb15c814ce059d932d0f8692448c18e |
|
MD5 | e1cca5b11cd167c2c143f18f461f6cb0 |
|
BLAKE2b-256 | 50feb238840bbb28f5c2d3110b13c4f4c32d3487eded14768cddaf613ff6e40c |
Hashes for AccessControl-4.0b6-cp27-cp27m-win_amd64.whl
Algorithm | Hash digest | |
---|---|---|
SHA256 | 9a337a53b3f3c6edc9da63251d3464ba3d819c19d243324e9501fd5399dcb544 |
|
MD5 | 5644577f6ec3f631d644834f87f7a299 |
|
BLAKE2b-256 | cb62fc17b80af6b1a88293d51345eaed036377a4e38a6351c96691013c35cb77 |
Hashes for AccessControl-4.0b6-cp27-cp27m-win32.whl
Algorithm | Hash digest | |
---|---|---|
SHA256 | 05f23f81b0f19257d9d9fb00d1858940fa99450c972cacfc3b4de6a5a940870d |
|
MD5 | d7e849e54e5f4236515dcd72c6fba7b1 |
|
BLAKE2b-256 | 19858d99bb54cc3f097aa0354a0ac167681b1789a1f484aa9025a8ee3070aa6d |