On Jan 6, 2008 10:29 AM, Chris Lewis [EMAIL PROTECTED] wrote:
I remember reading in the acegi docs that it was possible to swap-out
the usage of spring. I feel like you'll find it's not too difficult to
do. I realize I say this out of ignorance but T5 IoC is quite easy to
get your head around,
I understand - I have looked through the tapestry-acegi wiki and the
site, and they only talk about the T5 side (where as you agreed that the
docs are lacking, your are right in that they are sufficient). Where I'm
lost is how to set up acegi, how its invocations work, what the schema
On Jan 6, 2008 11:35 AM, Chris Lewis [EMAIL PROTECTED] wrote:
Let me close by clarifying my tone as I've been told I come across as
harsh. I am not bashing spring, acegi, or the tapestry integration. What
I am saying is that as a developer with no use for spring, using the t5
acegi module
Ok :-). Here's my wish list:
1. Remove Spring as a dependency. However stupid this is according to
the Spring developers, it would be valuable to me (and I;m sure others
like me). Apparently this isn't too difficult to do:
http://www.acegisecurity.org/standalone.html
2. Provide some kind of
Dear list - specifically all those having successful access control
implementations,
I'd like to poll you for how you did it. Not so much the action of
authentication, but more so how access is monitored and restricted. This
is a well-known problem in general, but I've yet to see a
To: Tapestry users
Subject: T5: access control (again)
Dear list - specifically all those having successful access control
implementations,
I'd like to poll you for how you did it. Not so much the action of
authentication, but more so how access is monitored and restricted. This
is a well-known