Kevin......
remember?
That day I had asked you how to provide site's data to the gadget?
Can u please explain how to do it?
Which files I have to edit? and info like that........

On Jan 30, 2008 4:18 PM, Kevin Brown <[EMAIL PROTECTED]> wrote:

> On Jan 30, 2008 2:46 PM, Cassie <[EMAIL PROTECTED]> wrote:
>
> > On Wed, Jan 30, 2008 at 12:30 PM, Reinoud Elhorst <[EMAIL PROTECTED]>
> > wrote:
> >
> > > On 1/30/08, Brian Eaton <[EMAIL PROTECTED]> wrote:
> > > >
> > > > OK, I think the answer to this question is that the container and
> the
> > > > gadget server need to collaborate closely.  If the gadget server has
> > > > enough information to validate and decrypt the security token it is
> > > > already tightly coupled (sharing keys) with the container.  They
> need
> > > > to have a common understanding of policy as well.
> > > >
> > > > There's more than one way to pass that policy information between
> the
> > > > container and the gadget server.  Depending on how much information
> > > > there is it might fit into the security token, or you might want to
> > > > have them share a backend data store that they use to reference
> > > > policy.
> > > >
> > > I think I'm staring to get it. Still, there may be situations that the
> > > permission to view the viewer information is obtained client side (so
> > > neither the container nor the gadget server have any knowledge of
> this)
> > > though opensocial.requestPermission. I can imagine that in quite some
> > > implementations, this call will pop up something on the container-page
> > > (through rpc/ifpc) asking for permission to send viewer data to the
> > > gadget.
> > > As I come to think of it, if you don't want to route your opensocial
> > > dataRequest calls through ifpc to the container page,  you're going to
> > > need
> > > some extra token there to let the dataRequest call know that
> permission
> > > was
> > > obtained. This same token can (should?) then be used to let the gadget
> > > server know that the gadget has access to the viewer information.
> > >
> > > I'm actually not quite sure on how much of the requestPermission has
> > > already
> > > been implemented in shindig; perhaps I'm just stating the status quo
> > here.
> >
> >
> > We haven't implemented it yet in shindig. I would imagine though that if
> > you
> > want to pop up a dialog to the user you would ifpc to the parent page,
> the
> > parent page would pop up a dialog and get the users input. You would
> then
> > need a server call from that outer page back to your server to store the
> > bit
> > in your data storage. Then, the ifpc calls back to the inner iframe with
> > the
> > result (if needed).
> >
> > You could instead just have that call be a redirect to a new page on
> your
> > site and when it completes you would just go back to the original page
> and
> > reload all of the gadgets. This is also perfectly spec compliant.
> >
> > So either way you either need to navigate the page or use ifpc for
> > anything
> > that needs user input (because you can't trust anything that comes from
> > the
> > iframe)
> >
> > This is slightly different from any calls that just get data from the
> > server
> > though. Because you don't need any user input the calls can not be faked
> > from the users perspective, which means you can call directly back to
> your
> > server and do not need any ifpc to the outer container if you use the
> > special token on the hash.
> >
> > Does that makes sense at all or did I just confuse everybody more, lol
> :)
>
>
> You can't trust anything from anyone (on your server). It's no more
> difficult to pretend to be myspace than it is to pretend to be the iframe,
> so making an ifpc call doesn't really help you any (unless your gadget is
> only trying to authenticate against the parent site, in which case that's
> what the GadgetSigner interface is for). Without signing support,
> authentication of requests is non-existent (unless you're rendering the
> gadget on your parent domain and letting it access cookies or something).
> Anything that requires this sort of support must be done as a redirect
> today.
>



-- 
Akash Manohar
[EMAIL PROTECTED]

Reply via email to