summaryrefslogtreecommitdiff
path: root/docs/tutorials/bfgwiki
diff options
context:
space:
mode:
authorChris McDonough <chrism@agendaless.com>2010-06-23 14:55:33 +0000
committerChris McDonough <chrism@agendaless.com>2010-06-23 14:55:33 +0000
commit1025eb090fb902568f546527856c22e3356bd526 (patch)
tree61cce418cb302e268d399641821503f20162c8fd /docs/tutorials/bfgwiki
parent12062aefc65a9ecf76f223e76b1f75259607c790 (diff)
downloadpyramid-1025eb090fb902568f546527856c22e3356bd526.tar.gz
pyramid-1025eb090fb902568f546527856c22e3356bd526.tar.bz2
pyramid-1025eb090fb902568f546527856c22e3356bd526.zip
- The authorization chapter of the SQLAlchemy Wiki Tutorial
(docs/tutorials/bfgwiki2) was changed to demonstrate authorization via a group rather than via a direct username.
Diffstat (limited to 'docs/tutorials/bfgwiki')
-rw-r--r--docs/tutorials/bfgwiki/authorization.rst28
1 files changed, 14 insertions, 14 deletions
diff --git a/docs/tutorials/bfgwiki/authorization.rst b/docs/tutorials/bfgwiki/authorization.rst
index 8ae3c079d..91224c23e 100644
--- a/docs/tutorials/bfgwiki/authorization.rst
+++ b/docs/tutorials/bfgwiki/authorization.rst
@@ -206,28 +206,28 @@ pass a ``permission`` argument to each of our
- We add ``permission='edit'`` to the decorator attached to the
``add_page`` view function. This makes the assertion that only
- users who possess the effective ``view`` permission at the time of
+ users who possess the effective ``edit`` permission at the time of
the request may invoke this view. We've granted the
- ``group:editors`` principal the view permission at the root model
- via its ACL, so only the a user whom is a member of the group named
- ``group:editors`` will able to invoke the ``add_page`` view. We've
- likewise given the ``editor`` user membership to this group via thes
- ``security.py`` file by mapping him to the ``group:editors`` group
- in the ``GROUPS`` data structure (``GROUPS =
+ ``group:editors`` principal the ``edit`` permission at the root
+ model via its ACL, so only the a user whom is a member of the group
+ named ``group:editors`` will able to invoke the ``add_page`` view.
+ We've likewise given the ``editor`` user membership to this group
+ via thes ``security.py`` file by mapping him to the
+ ``group:editors`` group in the ``GROUPS`` data structure (``GROUPS =
{'editor':['group:editors']}``); the ``groupfinder`` function
consults the ``GROUPS`` data structure. This means that the
``editor`` user can add pages.
- We add ``permission='edit'`` to the ``bfg_view`` decorator attached
to the ``edit_page`` view function. This makes the assertion that
- only users who possess the effective ``view`` permission at the time
+ only users who possess the effective ``edit`` permission at the time
of the request may invoke this view. We've granted the
- ``group:editors`` principal the view permission at the root model
- via its ACL, so only the a user whom is a member of the group named
- ``group:editors`` will able to invoke the ``edit_page`` view. We've
- likewise given the ``editor`` user membership to this group via thes
- ``security.py`` file by mapping him to the ``group:editors`` group
- in the ``GROUPS`` data structure (``GROUPS =
+ ``group:editors`` principal the ``edit`` permission at the root
+ model via its ACL, so only the a user whom is a member of the group
+ named ``group:editors`` will able to invoke the ``edit_page`` view.
+ We've likewise given the ``editor`` user membership to this group
+ via thes ``security.py`` file by mapping him to the
+ ``group:editors`` group in the ``GROUPS`` data structure (``GROUPS =
{'editor':['group:editors']}``); the ``groupfinder`` function
consults the ``GROUPS`` data structure. This means that the
``editor`` user can edit pages.