[Erp5-report] r8026 - /spec/mandriva/2006.0/zope-VerboseSecurity/

nobody at svn.erp5.org nobody at svn.erp5.org
Mon Jun 19 17:41:35 CEST 2006


Author: kevin
Date: Mon Jun 19 17:41:30 2006
New Revision: 8026

URL: http://svn.erp5.org?rev=8026&view=rev
Log:
Commit zope-VerboseSecurity-0.6-1mdk spec files and patches

Added:
    spec/mandriva/2006.0/zope-VerboseSecurity/
    spec/mandriva/2006.0/zope-VerboseSecurity/zope-VerboseSecurity.spec   (with props)

Added: spec/mandriva/2006.0/zope-VerboseSecurity/zope-VerboseSecurity.spec
URL: http://svn.erp5.org/spec/mandriva/2006.0/zope-VerboseSecurity/zope-VerboseSecurity.spec?rev=8026&view=auto
==============================================================================
--- spec/mandriva/2006.0/zope-VerboseSecurity/zope-VerboseSecurity.spec (added)
+++ spec/mandriva/2006.0/zope-VerboseSecurity/zope-VerboseSecurity.spec Mon Jun 19 17:41:30 2006
@@ -1,0 +1,73 @@
+%define product   VerboseSecurity
+%define version   0.6
+%define release   1
+
+%define zope_home %{_prefix}/lib/zope
+%define software_home %{zope_home}/lib/python
+
+Summary:   A Zope product that helps explain the reason for denied security access
+Name:      zope-%{product}
+Version:   %{version}
+Release:   %mkrel %{release}
+License:   ZPL
+Group:     System/Servers
+Source0:   %{product}-%{version}.tar.bz2
+URL:       http://hathawaymix.org/Software/VerboseSecurity
+BuildRoot: %{_tmppath}/%{name}-%{version}-%{release}-rootdir
+BuildArch: noarch
+Requires:  zope
+
+#----------------------------------------------------------------------
+%description
+Zope has a flexible, fine-grained security model that lets you configure
+context-dependent mappings from users to roles and from roles to
+permissions. The model fits most organizations' needs and has been used
+all over the world, but the flexibility sometimes comes at a price of
+complexity.
+
+One major difficulty in using the Zope security model is its lack of
+clarity when access is denied. Because production sites should not reveal
+too much about the site to those who are denied access, the lack of
+verbosity in the default Zope security policy is appropriate for such
+sites. But site developers need more details.
+
+This product attempts to explain the complete reasoning for failed
+access. It shows what object was being accessed, what permission is
+required to access it, what roles map to that permission in that context,
+the executable object and its owner, the effective proxy roles, and other
+pertinent information. All of this information appears in the exception
+message when access is denied.
+
+#----------------------------------------------------------------------
+%prep
+%setup -c
+
+%build
+
+%install
+%{__rm} -rf  %{buildroot}
+%{__mkdir_p} %{buildroot}/%{software_home}/Products
+%{__cp} -a * %{buildroot}%{software_home}/Products/
+
+%clean
+%{__rm} -rf %{buildroot}
+
+%post
+if [ "`%{_prefix}/bin/zopectl status`" != "daemon manager not running" ] ; then
+  service zope restart
+fi
+
+%postun
+if [ -f "%{_prefix}/bin/zopectl" ] && [ "`%{_prefix}/bin/zopectl status`" != "daemon manager not running" ] ; then
+  service zope restart
+fi
+
+%files
+%defattr(0644, root, root, 0755)
+%doc %{product}/CHANGES.txt %{product}/README.txt %{product}/version.txt
+%{software_home}/Products/*
+
+#----------------------------------------------------------------------
+%changelog
+* Tue Jan 31 2006 Kevin Deldycke <kevin at nexedi.com> 0.6-1mdk
+- Initial release

Propchange: spec/mandriva/2006.0/zope-VerboseSecurity/zope-VerboseSecurity.spec
------------------------------------------------------------------------------
    svn:executable = *




More information about the Erp5-report mailing list