Re: T5: access control (again)

2008-01-06 Thread Robin Helgelin
On Jan 6, 2008 10:29 AM, Chris Lewis [EMAIL PROTECTED] wrote: I remember reading in the acegi docs that it was possible to swap-out the usage of spring. I feel like you'll find it's not too difficult to do. I realize I say this out of ignorance but T5 IoC is quite easy to get your head around,

Re: T5: access control (again)

2008-01-06 Thread Chris Lewis
I understand - I have looked through the tapestry-acegi wiki and the site, and they only talk about the T5 side (where as you agreed that the docs are lacking, your are right in that they are sufficient). Where I'm lost is how to set up acegi, how its invocations work, what the schema

Re: T5: access control (again)

2008-01-06 Thread Robin Helgelin
On Jan 6, 2008 11:35 AM, Chris Lewis [EMAIL PROTECTED] wrote: Let me close by clarifying my tone as I've been told I come across as harsh. I am not bashing spring, acegi, or the tapestry integration. What I am saying is that as a developer with no use for spring, using the t5 acegi module

Re: T5: access control (again)

2008-01-06 Thread Chris Lewis
Ok :-). Here's my wish list: 1. Remove Spring as a dependency. However stupid this is according to the Spring developers, it would be valuable to me (and I;m sure others like me). Apparently this isn't too difficult to do: http://www.acegisecurity.org/standalone.html 2. Provide some kind of

T5: access control (again)

2008-01-05 Thread Chris Lewis
Dear list - specifically all those having successful access control implementations, I'd like to poll you for how you did it. Not so much the action of authentication, but more so how access is monitored and restricted. This is a well-known problem in general, but I've yet to see a

RE: T5: access control (again)

2008-01-05 Thread Jonathan Barker
To: Tapestry users Subject: T5: access control (again) Dear list - specifically all those having successful access control implementations, I'd like to poll you for how you did it. Not so much the action of authentication, but more so how access is monitored and restricted. This is a well-known