[Checkins] SVN: z3c.objectpolicy/trunk/ - fixed rest mark-up

Michael Howitz mh at gocept.com
Tue Aug 10 02:16:30 EDT 2010


Log message for revision 115608:
  - fixed rest mark-up
  - speaking of zope.securitypolicy instead of the zope.app variant
  

Changed:
  U   z3c.objectpolicy/trunk/CHANGES.txt
  U   z3c.objectpolicy/trunk/README.txt
  U   z3c.objectpolicy/trunk/setup.py
  U   z3c.objectpolicy/trunk/src/z3c/objectpolicy/README.txt

-=-
Modified: z3c.objectpolicy/trunk/CHANGES.txt
===================================================================
--- z3c.objectpolicy/trunk/CHANGES.txt	2010-08-10 05:16:15 UTC (rev 115607)
+++ z3c.objectpolicy/trunk/CHANGES.txt	2010-08-10 06:16:30 UTC (rev 115608)
@@ -1,6 +1,6 @@
-=======
+-------
 CHANGES
-=======
+-------
 
 0.1.0 (unreleased)
 ------------------

Modified: z3c.objectpolicy/trunk/README.txt
===================================================================
--- z3c.objectpolicy/trunk/README.txt	2010-08-10 05:16:15 UTC (rev 115607)
+++ z3c.objectpolicy/trunk/README.txt	2010-08-10 06:16:30 UTC (rev 115608)
@@ -1,2 +1,2 @@
 The objectpolicy package makes it easy to override the default
-zope.app.securitypolicy.zopepolicy on an object by object basis.
\ No newline at end of file
+zope.securitypolicy.zopepolicy on an object by object basis.
\ No newline at end of file

Modified: z3c.objectpolicy/trunk/setup.py
===================================================================
--- z3c.objectpolicy/trunk/setup.py	2010-08-10 05:16:15 UTC (rev 115607)
+++ z3c.objectpolicy/trunk/setup.py	2010-08-10 06:16:30 UTC (rev 115608)
@@ -19,7 +19,9 @@
 from setuptools import setup, find_packages
 
 def read(*rnames):
-    return open(os.path.join(os.path.dirname(__file__), *rnames)).read()
+    return (
+        open(os.path.join(os.path.dirname(__file__), *rnames)).read() +
+        '\n\n')
 
 setup (
     name='z3c.objectpolicy',
@@ -28,8 +30,11 @@
     author_email = "zope-dev at zope.org",
     description = "objectpolicy for Zope3",
     long_description=(
-        read('README.txt')
-        + '\n\n' +
+        read('README.txt')+
+        '.. contents::\n\n' +
+        read('src', 'z3c', 'objectpolicy', 'README.txt') +
+        read('src', 'z3c', 'objectpolicy', 'highlevel.txt') +
+        read('src', 'z3c', 'objectpolicy', 'lowlevel.txt') +
         read('CHANGES.txt')
         ),
     license = "ZPL 2.1",

Modified: z3c.objectpolicy/trunk/src/z3c/objectpolicy/README.txt
===================================================================
--- z3c.objectpolicy/trunk/src/z3c/objectpolicy/README.txt	2010-08-10 05:16:15 UTC (rev 115607)
+++ z3c.objectpolicy/trunk/src/z3c/objectpolicy/README.txt	2010-08-10 06:16:30 UTC (rev 115608)
@@ -1,35 +1,40 @@
 The objectpolicy package makes it easy to override the default
-zope.app.securitypolicy.zopepolicy on an object by object basis.
+zope.securitypolicy.zopepolicy on an object by object basis.
 
 By default all objects use the zopepolicy. Objects that want to have
 their own policy should have a marker interface `IObjectPolicyMarker`
 and have an adapter to `IObjectPolicy`.
 
------------
+------
 Levels
------------
+------
 
 There are two levels supported.
-o The low level is the SecurityMap.getCell level.
+
+- The low level is the SecurityMap.getCell level.
   Here are the permissions stored by principal or role.
   This works also with ZopePolicy as the security policy.
   Uses Allow, Deny, Unset values.
   Permissions descend (with ZopePolicy) to child objects or views.
   See:
+
   - IObjectPolicy.getPrincipalPermission
   - IObjectPolicy.getRolePermission
   - lowlevel.txt
+
   Installation:
   Drop the z3c.objectpolicy-configure.zcml in the instance/etc folder.
 
-o The high level is the ISecurityPolicy.checkPermission level.
+- The high level is the ISecurityPolicy.checkPermission level.
   Here the permission is usually `summarized` for the principal by it's
   roles, groups and object parent/child relations.
   ZopePolicy has to be overridden by the ObjectsPolicy security policy.
   Permissions do not decend to child objects or views.
   Uses True -- access, False -- no access values.
   See:
+
   - IObjectPolicy.checkPermission
   - highlevel.txt
+
   Installation:
   Override ZopePolicy in the instance/etc/securitypolicy.zcml



More information about the checkins mailing list