*** elbixio has joined #zope3-dev | 00:00 | |
*** elbixio has quit IRC | 00:08 | |
*** hazmat_ has quit IRC | 01:20 | |
*** jhauser has quit IRC | 01:25 | |
*** d2m has quit IRC | 02:04 | |
*** yota has quit IRC | 02:04 | |
*** hazmat_ has joined #zope3-dev | 02:38 | |
*** povbot` has joined #zope3-dev | 02:45 | |
*** povbot has quit IRC | 02:45 | |
*** hazmat_ has quit IRC | 03:11 | |
*** hazmat has joined #zope3-dev | 03:15 | |
*** hazmat has quit IRC | 03:57 | |
*** hazmat has joined #zope3-dev | 04:45 | |
*** projekt01 has quit IRC | 04:57 | |
*** guido_g has quit IRC | 06:16 | |
*** tarek has quit IRC | 06:47 | |
*** hazmat has quit IRC | 07:32 | |
*** hazmat has joined #zope3-dev | 07:35 | |
*** hazmat has joined #zope3-dev | 08:34 | |
*** hazmat has quit IRC | 08:47 | |
*** yutakashino has joined #zope3-dev | 11:13 | |
*** yutakashino has quit IRC | 11:31 | |
*** yutakashino_ has joined #zope3-dev | 11:31 | |
*** yutakashino_ is now known as yutakashino | 11:31 | |
*** yota has joined #zope3-dev | 11:44 | |
*** tarek has joined #zope3-dev | 13:02 | |
*** The|uni has joined #zope3-dev | 13:12 | |
*** J1m has joined #zope3-dev | 13:38 | |
*** projekt01 has joined #zope3-dev | 14:04 | |
The|uni | SteveA: hi. i'm starting to do the certification stuff now. i'll need some minutes to get into it. i'll talk to you when i need help. ok? | 14:15 |
---|---|---|
*** d2m has joined #zope3-dev | 14:24 | |
The|uni | SubversionException: ('Berkeley DB error while checkpointing after Berkeley DB transaction for filesystem /svn/repos/main/db:\nDB_INCOMPLETE: Cache flush was unable to complete', 160029) | 14:38 |
The|uni | Can someone revive the zope 3 svn? | 14:38 |
VladDrac | and move to the fsfs backend :) | 14:39 |
srichter | J1m can do this | 14:39 |
srichter | fsfs backend: once we switch to SVN 1.2 we can | 14:39 |
J1m | srichter, don't volunteer me for things | 14:39 |
mexiKON | i think 1.1 has the fsfs backend | 14:40 |
The|uni | 1.1 has | 14:40 |
srichter | J1m: I just volunteered you to restore the DB | 14:40 |
The|uni | i'm on 1.1 and we are using the fsfs backend for gocept since a month | 14:40 |
srichter | nothing else ;-) | 14:40 |
J1m | done | 14:41 |
J1m | switching to a fs backend is non-trivial | 14:42 |
J1m | The|uni, did you switch from bdb to fs? | 14:42 |
mexiKON | well, you have to dumb and restore the whole db | 14:42 |
J1m | or did you start with fs | 14:42 |
J1m | mexiKON, That's what I assumed. | 14:43 |
The|uni | J1m: i was so fortunate to start with it :) | 14:44 |
The|uni | but all that dumping stuff seems fairly easy | 14:44 |
VladDrac | j1m: we did it this weekend - it's not that hard actually | 14:45 |
The|uni | I made a mid-sized CVS to SVN migration which actually uses the dumps as an intermediate format. | 14:45 |
J1m | It's probably not that hard, but: | 14:45 |
J1m | It requires I spend time figuring out how to do it | 14:45 |
J1m | It will take a lot of time for the zope repo, which is fairly large | 14:45 |
The|uni | jupp | 14:46 |
mexiKON | it'll only grow larger the longer we wait :) | 14:46 |
J1m | I have to make sure the entire config works, including backup, viewcvs, etc. | 14:46 |
J1m | The point is that it will take a significant chuck of time. | 14:46 |
J1m | The point is that it will take a significant chunk of time. | 14:46 |
VladDrac | to get you started (for future reference): svn dump; svn create -fsfs (I think), svn load | 14:46 |
VladDrac | true | 14:46 |
J1m | Not something I have handy. :) | 14:47 |
mexiKON | yup | 14:47 |
VladDrac | well most of it is waiting | 14:47 |
The|uni | np. I didn't suggest anyone to rush anything right now. | 14:47 |
VladDrac | but true, it takes time and some thorough planning | 14:47 |
VladDrac | (neither do I, but if I can be of any help when you do migratie, let me know) | 14:47 |
The|uni | Hmm. Looks like some people are around that could answer some questions for the certification. | 14:48 |
The|uni | I'm on revising the specification document to match the current state of zope 3 a bit more closely, but I'm way out of the loop since a while. | 14:48 |
The|uni | a) we mention a "delegation" concept in the specs that regulate permission grants. | 14:49 |
The|uni | We described it like this: | 14:50 |
The|uni | Provide the ability to securely delegate control. Users can | 14:50 |
The|uni | delegate the ability to control access to selected | 14:50 |
The|uni | operations to others. To delegate a permission, a meta permission | 14:50 |
The|uni | that allows you to delegate this permission must be granted. | 14:50 |
The|uni | Is this around already or will be around, or possible to be around, or around in some other way? | 14:50 |
The|uni | I'm digging through code right now, but this is pretty slow as everything seems changed to me. :) | 14:50 |
J1m | no, we never implemented this | 14:51 |
The|uni | so how does it actually work now? | 14:51 |
The|uni | is there a single permission that protects all granting? | 14:51 |
J1m | I seem to remember discussing a security policy that we never implemented. | 14:52 |
J1m | Yes | 14:52 |
The|uni | Ok. Do you imagine it's better to remove this from the specs or still aim for it? | 14:52 |
J1m | The current security policy is documented in: | 14:53 |
The|uni | The certification project suffers from substantial lack of resources, so I'm trying to stay as close to the actual current state as possible. | 14:53 |
J1m | http://svn.zope.org/Zope3/trunk/src/zope/app/securitypolicy/zopepolicy.txt?rev=29768&view=log | 14:53 |
J1m | sorry | 14:53 |
J1m | http://svn.zope.org/Zope3/trunk/src/zope/app/securitypolicy/zopepolicy.txt?rev=29768&view=markup | 14:54 |
J1m | I still think that the sharing policy I sent you is: | 14:55 |
J1m | - Easier to document | 14:55 |
J1m | - Easier for users to understand | 14:55 |
The|uni | Which still is a problem. I think I'm currently only doing cleanup work. | 14:55 |
The|uni | The document was intended to have been submitted last week. | 14:56 |
The|uni | And I have no time in the next 8 weeks for spending on the certification again. | 14:56 |
J1m | I'm sorry I haven't had time to review it | 14:56 |
The|uni | Steve looked through it and gave me a list of points. | 14:56 |
J1m | Great! | 14:56 |
The|uni | I don't see a chance to change to a completely different policy in the timeframe, though. | 14:57 |
The|uni | So I'm going through those points now and try cleaning them up today. | 14:57 |
The|uni | Here comes a question: The policy documentation says "Managers can grant or deny..." | 14:57 |
mexiKON | The|uni, btw, when i read thru the document a while ago, i saw you mixed up the meaning of 'trunk' and 'HEAD' a few times | 14:57 |
mexiKON | The|uni, HEAD is a revision in svn, 'trunk' is a branch | 14:58 |
The|uni | mexiKON: i'll write that down. that came from the fact that we originally were still on CVS when that text was written. | 14:58 |
mexiKON | yup | 14:58 |
The|uni | So who is a "Manager"? | 14:58 |
mexiKON | basically, one should only talk about the trunk | 14:58 |
The|uni | mexiKON: ack | 14:58 |
*** bskahan has joined #zope3-dev | 14:59 | |
The|uni | Hmm. Hmm. | 15:03 |
The|uni | So the manager role simply get's all defined permissions. | 15:03 |
The|uni | which obviously would include any permission for granting/denying stuff | 15:04 |
The|uni | ah. the zope.Security permission seems to be the relevant one. | 15:04 |
srichter | yes | 15:04 |
The|uni | now comes the fun part. | 15:05 |
srichter | a Manager is a principal with the zope.Manager role | 15:05 |
J1m | This is purely a configuration choice | 15:05 |
The|uni | changing a part of the specs in the beginning and tracing down any implications | 15:05 |
J1m | Zope need not be configured this way. | 15:05 |
srichter | bote that the persmission assignment of the zope.Manager role is more subtle | 15:05 |
srichter | note that the persmission assignment of the zope.Manager role is more subtle | 15:05 |
The|uni | J1m: sure, but I need to be a bit specific ... | 15:06 |
srichter | by default, the Manager gets the permissions that are defined by the time the manager role is created | 15:06 |
J1m | Just so you aren't specific and wrong | 15:06 |
srichter | so if you create a permission later, then the manager will not have it | 15:06 |
srichter | (this bit me badly once) | 15:07 |
The|uni | srichter: hmm. i thought this to be a problem already, then i thought "maybe they fixed that, maybe it's been accepted to be that way" | 15:07 |
The|uni | J1m: I'm trying. :) | 15:08 |
srichter | The|uni: it is pretty much accepted | 15:09 |
srichter | or just not well known :-) | 15:09 |
The|uni | so is it that this declaration is usually run pretty much towards the end of configuration? | 15:10 |
srichter | yes | 15:10 |
J1m | yes | 15:10 |
The|uni | k | 15:10 |
srichter | the principals.zcml is the last thing loaded | 15:10 |
srichter | oh, never mind; the role is created before that | 15:10 |
The|uni | :) | 15:10 |
The|uni | J1m: I think I'll make it a limitation that the certified version can only be run with the default security policy. I don't see a reasonable way around this. | 15:13 |
The|uni | I'm pretty sure many people can live with it. | 15:13 |
The|uni | When people touch the security policy I can see a significant problem with the reliability of the certification to remain valid. | 15:14 |
J1m | are you also going to depend on a default configuration of the sp? | 15:15 |
J1m | (e.g. the notion of "managers") | 15:15 |
The|uni | I'm not sure about that. Everything else becomes *so* blurry immediately. | 15:16 |
The|uni | I mean, this flexibility forces me to write "Users can only do what they are allowed to do" | 15:16 |
The|uni | I don't think anyone would certify that. :/ | 15:16 |
J1m | That's why I recommend switching to a simpler security policy. | 15:17 |
J1m | Unfortunately, it's getting to be too late to switch for 3.1. | 15:17 |
J1m | But even with the current security policy, it should be possible to document it accurately. | 15:18 |
J1m | You just have t build it up in layers. | 15:18 |
The|uni | Right. But if I shouldn't document *any* part of configuration I wouldn't even be able to refere to zope.Security, right? | 15:19 |
J1m | For example: "An interaction can access a resource if it has the required permission." | 15:19 |
J1m | Then you have to define the rules for determining the required permission. | 15:19 |
J1m | You should document what can be configured. | 15:20 |
J1m | You could even document the default configuration to show how all of the pieces fit together, | 15:20 |
The|uni | .oO(This certification is so painful ...) | 15:21 |
J1m | Yes, security is like that. | 15:21 |
The|uni | It's more about resources (time, money, ...) | 15:22 |
J1m | I understand. | 15:22 |
J1m | Here's an offer: | 15:23 |
J1m | If we switch to the sharing-based sp, I'll volunteer to document it in the CS. | 15:24 |
J1m | It might take me several weeks to squeeze in time to do this however. | 15:24 |
The|uni | Nice offer, but unfeasable regarding the time constraints. The customer who pays the certification itself is pretty annoyed right now. That's why we spend time on completing the security target here at gocept. The document in itself is pretty consistent, but also at a high degree fictive. | 15:26 |
J1m | OK | 15:26 |
The|uni | So the work was moved a bit from documenting to implemeting. | 15:26 |
The|uni | Which buys us some time. | 15:26 |
The|uni | It's a drawback/compromise of course. | 15:27 |
J1m | "implementing"? | 15:27 |
The|uni | Well. We cleaned the document up that included some fiction that we (you, steve, I) invented some time ago. | 15:27 |
The|uni | So the fictional part would have to be implemented later. | 15:28 |
The|uni | Instead of spending the work now on describing what is already there. | 15:28 |
The|uni | I'm just trying to minimize the fictional part a bit. | 15:29 |
J1m | and what if it is never implemented? | 15:29 |
The|uni | well, mitcon tries to organize resources for the implementation. | 15:29 |
The|uni | i'm not sure how much they get up with (people, money, ...) | 15:29 |
The|uni | I'm talking to them at EP what their plans are. | 15:29 |
The|uni | Are you around there? | 15:29 |
J1m | no | 15:29 |
The|uni | how pity. | 15:30 |
The|uni | Ok. Here is an attempt to rephrase the objective to allow delegation: | 15:33 |
The|uni | Provide the ability to securely delegate control. Principals that are granted | 15:34 |
The|uni | the zope.Security permission shall be able to grant (or deny) permissions to | 15:34 |
The|uni | other principals. | 15:34 |
The|uni | By default the zope.Manager role is assigned all permissions thus including | 15:34 |
The|uni | zope.Security for all managers. | 15:34 |
The|uni | s/assigned/granted/ of course | 15:35 |
J1m | IN the current sp, there are 3 kinds of grants | 15:38 |
The|uni | I saw an "undefined" around. | 15:38 |
The|uni | Actually the pattern of a single delegation permission makes zope.Security a really powerful permission. | 15:41 |
J1m | yes | 15:41 |
J1m | too powerful | 15:41 |
J1m | It would ne nice if you could only deletage permissions you had | 15:42 |
J1m | but, that's too hard to figure out with the current schema, imo | 15:42 |
The|uni | yup | 15:42 |
J1m | but, that's too hard to figure out with the current scheme, imo | 15:42 |
The|uni | implications about handing off zope.Security to others would be pretty hard to predict | 15:43 |
J1m | You *really* have to trust them. | 15:43 |
The|uni | Sure. They could kill you. :) | 15:44 |
J1m | That's why we call it safe delegation | 15:44 |
The|uni | although it isn't? | 15:44 |
The|uni | :) | 15:44 |
J1m | IN the sharing model, it's much easier to say: "Only allow users to share privileges that they have." | 15:45 |
* The|uni burns happily in the realm of trading on political issues | 15:46 | |
The|uni | I'd be glad to jump into a simpler model. I'm just _really_ scared about the time frame. If it would be possible to document it within say ... 5 hours ... I would be on it immediately. It's not a problem that it isn't around in Zope 3.1 | 15:47 |
The|uni | Ok. A deal. I print the model you send me out again, read it and compare it to the certification. | 15:47 |
* The|uni burns a bit more. | 15:48 | |
J1m | :) | 15:48 |
The|uni | If you support in convincing me that _I_ can document fast enough, I'll change. | 15:48 |
J1m | Cool | 15:48 |
* The|uni hands out syntax errors on english sentences. | 15:49 | |
The|uni | I'll read it again, first. | 15:49 |
* The|uni gets some lunch. | 15:50 | |
J1m | down | 15:54 |
J1m | oops | 15:54 |
J1m | wrong window | 15:54 |
The|uni | Ok. | 16:15 |
The|uni | Read it again. | 16:15 |
The|uni | What I understand: | 16:16 |
The|uni | roles got replaced by privileges | 16:16 |
The|uni | not permissions get granted directly but only through privileges | 16:17 |
The|uni | the grant/deny/undefined situation got easier (not sure about that) | 16:17 |
* J1m waits for The|uni to finish | 16:17 | |
The|uni | we have to talk about groups (have to do that anyway) | 16:18 |
The|uni | I'm unsure about the delegation. | 16:18 |
The|uni | (finish) | 16:18 |
J1m | priviledge->permission mapping in zcml conly, users can't change that | 16:18 |
J1m | grants are not acquired unless an object isn't sharable | 16:19 |
J1m | (not sharable objects acquire all grants) | 16:19 |
J1m | There are super users that have all permissions ... for bootstraping purposes. | 16:19 |
J1m | And (fiction): cannot share privs you don't have. (This is easy to add.) | 16:20 |
J1m | Note that the non-acquisition of grants greatly reduces the need for deny | 16:21 |
J1m | Major goal is simplicity | 16:21 |
J1m | also, pluggable policies for default grants: | 16:21 |
J1m | - Creator gets all privs | 16:21 |
J1m | - Container privs copied to new items | 16:22 |
The|uni | .oO(I foresee a hack on sharing: If I grant "sharing" to someone without any other permission who on his own grants sharing to someone with a lot of priviledges that one can share those permissions back to him then. Kinda weird bootstrapping.) | 16:22 |
J1m | These automatic grants are very useful since most users never want to think about security. | 16:22 |
The|uni | right | 16:22 |
J1m | yup wrt hack on sharing | 16:23 |
J1m | I think you've summarized the sp in very few words | 16:23 |
J1m | which is a good thing about the sp | 16:24 |
The|uni | right | 16:24 |
The|uni | now to the hard part. i'll print out the current certification docs and check for needed changes. | 16:24 |
The|uni | I'll take the secure delegation as a wanted part of the fiction, ok? | 16:24 |
J1m | yes, we plan to do that for our current project. | 16:25 |
J1m | Interestingly, I think there are 2 twists on it: | 16:25 |
J1m | - You can share a priv if you have it directly (not via group) | 16:26 |
J1m | - You can share a priv if you have it even via group | 16:26 |
J1m | Not sure if we want to allow the later | 16:26 |
The|uni | i think you need to | 16:26 |
The|uni | otherwise administrator groups become useless | 16:26 |
J1m | why? | 16:27 |
The|uni | how would they give someone else any privileges if they only received them through a group? | 16:27 |
J1m | Is that a function of the admin group? | 16:28 |
J1m | Note that there are super users. | 16:28 |
The|uni | And in regard to spelling, groups are just a convenience for not granting stuff to everyone individually. So why should the semantics be different? Adds to the complexity imho. | 16:28 |
J1m | These are not a group | 16:28 |
The|uni | I think it is a function of the admin group. | 16:28 |
J1m | k | 16:28 |
The|uni | My current image of those super users is the same as in Z2 which is a kind of Unix root equivalent. | 16:29 |
The|uni | (Just with the restriction that instead of "you should not do normal stuff with it" you "can't do normal stuff with it") | 16:30 |
J1m | yes | 16:30 |
J1m | Bootstrapping only | 16:30 |
The|uni | ack. so then managers in z2 can do everything including handing out permissions. | 16:30 |
J1m | If someone establishes such a group. Yes. | 16:31 |
The|uni | you described one in the documentation, i thought it would be a pre-configured group. | 16:33 |
The|uni | "There is a special administrative group, defined by the policy, that has all privileges [...]" | 16:33 |
J1m | I did? Hm. No, this should be application defined. | 16:33 |
The|uni | it even has doctests | 16:34 |
J1m | That is what I was refering to as the super users. | 16:36 |
* The|uni reads again | 16:36 | |
The|uni | well. so if you want to keep the rules consistent, and this really is a group, you still might want the second option. | 16:37 |
J1m | This group is handled specially, | 16:38 |
J1m | I don't think we want people loging in as members of this group normally. | 16:39 |
J1m | I would encourage people to create their own admin groups for "routine" admin tasks. | 16:39 |
The|uni | Ok. So although we agree to disagree, we want the second option anyway? | 16:39 |
J1m | ok | 16:40 |
*** andrew_m has quit IRC | 16:40 | |
The|uni | good | 16:40 |
The|uni | i'm afk for a while, checking for the stuff that need changes | 16:41 |
*** J1m is now known as J1m|away | 16:42 | |
*** yutakashino has left #zope3-dev | 16:42 | |
*** J1m|away is now known as J1m | 17:05 | |
*** philiMAC has joined #zope3-dev | 17:45 | |
J1m | srichter, ayt? | 17:50 |
srichter | J1m: yep | 17:50 |
srichter | I saw your +1, so we have to get Sidnei going :-) | 17:51 |
J1m | so are we pushing the release till next week? | 17:51 |
srichter | yeah | 17:51 |
J1m | cool | 17:51 |
*** philiMAC is now known as philIKON | 17:51 | |
J1m | I'm working on it a bit this morning | 17:51 |
J1m | But I have to stop soon | 17:51 |
srichter | ok, cool | 17:51 |
srichter | I was going to work on it in the evening | 17:52 |
J1m | I wanna make some zpkg improvements to make the process a little easier. At least for me. :) | 17:52 |
srichter | such as? | 17:52 |
J1m | Allowing relative paths in maps. | 17:52 |
J1m | This will allow me to check in maps for the zope release that use local files. | 17:52 |
srichter | I think refactoring the Python version specification from zpkgtools to one of the config files would be necessary | 17:52 |
srichter | ah | 17:53 |
J1m | I've got it working | 17:53 |
*** mexiKON has quit IRC | 17:53 | |
J1m | But I need to write a test | 17:53 |
J1m | and I probably won't have time this morning | 17:53 |
J1m | I'm also chasing errors in the geneates release | 17:54 |
J1m | Later, I need to add some missing pieces. | 17:54 |
srichter | ok | 17:54 |
srichter | that's fine for now, since we do not release till next weekend | 17:54 |
J1m | how can we arrange that apidoc/introspector only run in debug mode? | 17:54 |
J1m | only get used in debug mode? | 17:55 |
srichter | by defining a feature | 17:55 |
srichter | and check for the feature in the registration | 17:55 |
J1m | There is a serious security issue with them since they are (or one of them is) willing to import arbitrary modules. | 17:56 |
J1m | Can you chase that? | 17:56 |
srichter | I know the code that does it | 17:57 |
srichter | but I have no time right now to look into it | 17:57 |
J1m | or even just disable import of non-impoirted modules in production mode | 17:57 |
J1m | any idea why we are including observable now? | 17:58 |
srichter | I think the easiest thing is to simply remove apidoc-configure.zcml from package-includes in production mode | 17:58 |
srichter | no, it should not be there I think | 17:58 |
J1m | I don't want to distribute a security hole. | 17:58 |
J1m | Maybe apidoc shouldn't get enabled by default. | 17:58 |
srichter | maybe | 17:59 |
J1m | I don't want to rely on people remembering to disable it. | 17:59 |
srichter | do we have a solid definition of "debug mode"? | 17:59 |
J1m | Of course, it would be better if it was offline. Then this wouldn't have this issue. | 17:59 |
J1m | I'm not sure | 17:59 |
srichter | if we do, then we can use the ZCML-condition feature to solve the problem | 18:00 |
srichter | offline APIDOC is a 3.2 or 3.3 task ;-) I have thought a lot about it, but I am still lost at how to do it well | 18:01 |
srichter | (data is not that problematic, but running it as a separate app is | 18:01 |
J1m | I'm glad it's on your radar. | 18:01 |
J1m | I need to get going. | 18:03 |
J1m | later | 18:03 |
srichter | see ya | 18:03 |
*** J1m has quit IRC | 18:03 | |
*** BjornT has quit IRC | 18:57 | |
*** povbot has joined #zope3-dev | 19:49 | |
*** jhauser has joined #zope3-dev | 20:02 | |
*** __gotcha__ has joined #zope3-dev | 20:08 | |
*** __gotcha__ is now known as __gotcha | 20:08 | |
*** __gotcha_ has quit IRC | 20:22 | |
*** bskahan has quit IRC | 21:30 | |
*** dagnachew has joined #zope3-dev | 21:39 | |
* dagnachew is away: a plus | 22:20 | |
SteveA | The|uni: ping | 22:21 |
*** lunati1 has joined #zope3-dev | 22:28 | |
The|uni | pong | 22:37 |
SteveA | The|uni: hi | 22:44 |
SteveA | so, you reckon that it won't do to leave the authorization policy implementation as totally pluggable in the spec? | 22:44 |
*** timte has joined #zope3-dev | 22:45 | |
The|uni | sec. phone | 22:47 |
The|uni | back | 22:52 |
The|uni | well. I think so. Because it _appears_ to be so vital that at least I feel uncomfortable leaving it totally open. And I assume the TUV guys to think the same. | 22:52 |
The|uni | i went through the docs and looked at all the places that depend on the specific SP | 22:53 |
The|uni | there are some goals we want to aim for (e.g. secure delegation) that could be circumvented by an appropriate security policy | 22:54 |
The|uni | so it's not possible to achieve those goals without a (mutual) supportive construct of the infrastructure and the security policy | 22:54 |
SteveA | hmm | 22:54 |
The|uni | then there is a place "fdp_acf.1" which states something like: | 22:55 |
SteveA | if it is possible, i'd split the thing in two, and say, as a first step let's get the "zope3 with a black box authorization policy" certified, and the get that part alone certified. | 22:55 |
The|uni | what's the black box authorization policy? | 22:56 |
SteveA | checkPermission in the "security policy" (should be called authorization policy) | 22:56 |
SteveA | the component and stuff that plugs into the rest just there | 22:56 |
SteveA | i think it makes a clear dividing line in the whole system | 22:57 |
The|uni | right, it does. | 22:57 |
SteveA | on one side, you have security proxies, set-up of the server and environment, principals, permissions, code | 22:57 |
SteveA | on the other side, you have policy, grants databases and whatever else | 22:57 |
SteveA | and linking them, you have a single API call that returns True or False. | 22:57 |
The|uni | but still, that fdp_acf.1 function wants rules stated. And I'm not comfortable writing down "shall enforce the rules implemented by the configured authorization policy". | 22:58 |
The|uni | hmm | 22:58 |
The|uni | anyway, let me think about it for a minute | 22:58 |
SteveA | maybe mitcon and tuv would be happy to receive two documents: one now, saying "this stuff is plugged in here" | 22:58 |
SteveA | and one later saying "here's what we'll plug in here, for the certified zope3" | 22:58 |
SteveA | in the future, the former probably will not change, but the latter certainly will | 22:59 |
The|uni | ok, what is problematic is, that this way decouples quite some information from places where the CC seems to expect them | 22:59 |
The|uni | You put a lot of pointers in the functional requirements to a later location. | 22:59 |
The|uni | That will make it really hard to read and understand IMHO. | 22:59 |
The|uni | and actually it makes it even harder to show the consistency of the framework with only pointers around. | 23:00 |
The|uni | *sigh* :/ | 23:02 |
SteveA | what if there's an page you add called "authorization policy" that lists what the authorization policy says about fdp_acf.1 and all the other points where it must say something | 23:04 |
SteveA | well, called "zope 3 CC target authorization policy" | 23:04 |
SteveA | and then, say "shall enforce the decision of the zope3 CC target authorization policy" | 23:05 |
SteveA | darn, i need to restart X. | 23:06 |
*** SteveA has quit IRC | 23:06 | |
*** SteveA has joined #zope3-dev | 23:12 | |
The|uni | I'd have to ask the TUV what they think about it | 23:13 |
The|uni | The bad thing is that I have to reschedule for the next week again. | 23:13 |
The|uni | We just got a new contract and I'm going to be pretty busy starting from tomorrow, so I'll have to do that stuff on the weekends. | 23:13 |
*** lunati1 has quit IRC | 23:14 | |
*** tvon has quit IRC | 23:14 | |
* dagnachew is back | 23:15 | |
*** dagnachew has quit IRC | 23:22 | |
The|uni | I'll head off to bed now. I need to talk to the TUV during the week and get more time. | 23:23 |
SteveA | okay | 23:23 |
* The|uni burns happily enjoying the pain. | 23:23 | |
*** tvon has joined #zope3-dev | 23:48 | |
*** jhauser has quit IRC | 23:54 |
Generated by irclog2html.py 2.15.1 by Marius Gedminas - find it at mg.pov.lt!