[Checkins] SVN: z3c.securitytool/trunk/src/z3c/securitytool/README.txt Cleanup of README.txt for pypi and RestructuredText

Daniel Blackburn blackburnd at gmail.com
Thu Mar 6 17:45:24 EST 2008


Log message for revision 84522:
  Cleanup of README.txt for pypi and RestructuredText

Changed:
  U   z3c.securitytool/trunk/src/z3c/securitytool/README.txt

-=-
Modified: z3c.securitytool/trunk/src/z3c/securitytool/README.txt
===================================================================
--- z3c.securitytool/trunk/src/z3c/securitytool/README.txt	2008-03-06 20:06:48 UTC (rev 84521)
+++ z3c.securitytool/trunk/src/z3c/securitytool/README.txt	2008-03-06 22:45:24 UTC (rev 84522)
@@ -11,6 +11,11 @@
 levels of detail. You can view the details of how a user came to have
 the permission on a given view, by clicking on the permission in the matrix.
 
+.. image::
+  http://farm3.static.flickr.com/2085/2294946406_607a043fa1.jpg?v=0  
+  :height: 200
+  :width: 400
+  :target: http://flickr.com/photos/blackburnd/
 
 FOR THE IMPATIENT TO VIEW YOUR SECURITY MATRIX:
 -----------------------------------------------
@@ -381,42 +386,45 @@
     >>> manager.addHeader('Authorization', authHeader)
     >>> manager.handleErrors = False
 
+    >>> server = 'http://localhost:8080/++skin++SecurityTool'
 
+    >>> manager.open(server + '/@@securityMatrix.html')
+
 First we will check if the main page is available
-    >>> manager.open('http://localhost:8080/++skin++SecurityTool/@@securityMatrix.html')
+    >>> manager.open(server + '/@@securityMatrix.html')
 
-    >>> manager.open('http://localhost:8080/++skin++SecurityTool/Folder1/@@securityMatrix.html')
+    >>> manager.open(server + '/Folder1/@@securityMatrix.html')
 
-    >>> manager.open('http://localhost:8080/++skin++SecurityTool/Folder1/Folder2/Folder3/@@securityMatrix.html')
+    >>> manager.open(server + '/Folder1/Folder2/Folder3/@@securityMatrix.html')
 
 Now lets send the filter variable so our test is complete
-    >>> manager.open('http://localhost:8080/++skin++SecurityTool/@@securityMatrix.html?'
+    >>> manager.open(server + '/@@securityMatrix.html?'
     ...              'FILTER=None&selectedSkin=ConcordTimes')
 
 
 And with the selected permission
 
-    >>> manager.open('http://localhost:8080/++skin++SecurityTool/@@securityMatrix.html?'
+    >>> manager.open(server + '/@@securityMatrix.html?'
     ...              'FILTER=None&selectedSkin=ConcordTimes&'
     ...              'selectedPermission=zope.Public')
 
 
 Here we send an invalid selectedPermisson ( just for coverage ) ;)
-    >>> manager.open('http://localhost:8080/++skin++SecurityTool/@@securityMatrix.html?'
+    >>> manager.open(server + '/@@securityMatrix.html?'
     ...              'FILTER=None&selectedSkin=ConcordTimes&'
     ...              'selectedPermission=zope.dummy')
 
 And with the None permission
-    >>> manager.open('http://localhost:8080/++skin++SecurityTool/@@securityMatrix.html?'
+    >>> manager.open(server + '/@@securityMatrix.html?'
     ...              'FILTER=None&selectedSkin=ConcordTimes&'
     ...              'selectedPermission=None')
 
 This is the principal detail page, you can get to by clicking on the
 principals name at the top of the form.
 
-    >>> manager.open('http://localhost:8080/++skin++SecurityTool/@@principalDetails.html?principal=zope.daniel')
+    >>> manager.open(server + '/@@principalDetails.html?principal=zope.daniel')
 
-    >>> manager.open('http://localhost:8080/++skin++SecurityTool/Folder1/Folder2/Folder3/@@principalDetails.html?principal=zope.daniel')
+    >>> manager.open(server + '/Folder1/Folder2/Folder3/@@principalDetails.html?principal=zope.daniel')
 
 
     >>> 'Permission settings' in manager.contents
@@ -424,7 +432,7 @@
 
 
 And lets call the view without a principal
-    >>> manager.open('http://localhost:8080/++skin++SecurityTool/@@principalDetails.html')
+    >>> manager.open(server + '/@@principalDetails.html')
     Traceback (most recent call last):
     ...
     PrincipalLookupError: no principal specified
@@ -432,24 +440,21 @@
 Here is the view you will see if you click on the actual permission
 value in the matrix intersecting the view to the user on a public view.
 
-    >>> manager.open('http://localhost:8080/++skin++SecurityTool/@@permissionDetails.html?'
+    >>> manager.open(server + '/@@permissionDetails.html?'
     ...              'principal=zope.daniel&view=PUT')
 
-    >>> 'zope.Public' in manager.contents
-    True
-
 Ok lets send the command without the principal:
-    >>> manager.open('http://localhost:8080/++skin++SecurityTool/@@permissionDetails.html?view=PUT')
+    >>> manager.open(server + '/@@permissionDetails.html?view=PUT')
     Traceback (most recent call last):
     ...
     PrincipalLookupError: no user specified
 
 And now we will test it without the view name
-  >>> manager.open('http://localhost:8080/++skin++SecurityTool/@@permissionDetails.html?principal=zope.daniel')
+  >>> manager.open(server + '/@@permissionDetails.html?principal=zope.daniel')
 
 
 And now with a view name that does not exist
-  >>> manager.open('http://localhost:8080/++skin++SecurityTool/@@permissionDetails.html?principal=zope.daniel&view=garbage')
+  >>> manager.open(server + '/@@permissionDetails.html?principal=zope.daniel&view=garbage')
 
 Lets also test with a different context level
-  >>> manager.open('http://localhost:8080/++skin++SecurityTool/Folder1/Folder2/Folder3/@@permissionDetails.html?principal=zope.daniel&view=ReadIssue.html')
+  >>> manager.open(server + '/Folder1/Folder2/Folder3/@@permissionDetails.html?principal=zope.daniel&view=ReadIssue.html')



More information about the Checkins mailing list