-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

In lp:142868 [1], Jamie Heilmann makes what seems to me to be a good
case for removing the current feature which allows suppression Zope2
access rules and site roots via adding tokens to the URL.  I find the
argument convincing, in spite of having used the feature to get passed a
broken site access rule at more than one time in the past.  In essence,
the feature is a convenience for those who *could* get to the
filessystem and restart the server with the equivalent environment
variables, but a "jailbreak" for those who could not.

Can anyone presetn a credible defense of the feature?  If so, please
follow up to the Launchpad issue.

I plan to remove the URL based suppression (but ont the part based on
os.environ) by the end of the week, unless folks point out issues I have
mised.


[]1 https://bugs.launchpad.net/bugs/142878


Tres.
- --
===================================================================
Tres Seaver          +1 540-429-0999          tsea...@palladion.com
Palladion Software   "Excellence by Design"    http://palladion.com
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iEYEARECAAYFAkvzPcwACgkQ+gerLs4ltQ6wFwCgtUwYRqXWp5FrBzHFM6lmN+1C
IsIAoMd8Vrvxasef5JTcbRO3rsgehKS3
=1zlI
-----END PGP SIGNATURE-----

_______________________________________________
Zope-Dev maillist  -  Zope-Dev@zope.org
https://mail.zope.org/mailman/listinfo/zope-dev
**  No cross posts or HTML encoding!  **
(Related lists - 
 https://mail.zope.org/mailman/listinfo/zope-announce
 https://mail.zope.org/mailman/listinfo/zope )

Reply via email to