Pas-plugins-sqlalchemy

Latest version: v0.4.2

Safety actively analyzes 681812 Python packages for vulnerabilities to keep your Python projects secure.

Scan your dependencies

Page 1 of 2

0.5

-----------------

- now require Products.PlonePAS >= 5.0.4.
This is not the (current) version proposed by Plone 4.3, but is the version
suggested by plone4.csrffixes hotfix, so probably all Plone 4.3 must move
to this version in any case.
[keul]

- fixed the manual creation of a PAS plugin instance from ZMI interface
[keul]

- the PAS plugin now can be used only as *group provider*.
This means that you can now add users from other PAS plugins to SQL groups.
This is (for now?) limited to *users*: you can't add external groups to sql
groups.
[keul]

- provided an optional ``setup`` script to be run on z3c.saconfig
initialization.
[keul]

- properly plugin initialization, with custom icon
[keul]

0.4.2

------------------

- MANIFEST was not fixed in version 0.4.1 (still a brown bag release)
[keul]
- Fixed brown bag release (again).
[malthe]

0.4.1

------------------

- Fixed brown bag release.
[malthe]

0.4

----------------

- added link to cache settings view in zmi
[agitator]
- now require Products.PlonePAS >= 5.0.4.
This is not the (current) version proposed by Plone 4.3, but is the version
suggested by plone4.csrffixes hotfix, so probably all Plone 4.3 must move
to this version in any case.
[keul]

- fixed the manual creation of a PAS plugin instance from ZMI interface
[keul]

- the PAS plugin now can be used only as *group provider*.
This means that you can now add users from other PAS plugins to SQL groups.
This is (for now?) limited to *users*: you can't add external groups to sql
groups.
[keul]

- provided an optional ``setup`` script to be run on z3c.saconfig
initialization.
[keul]

- properly plugin initialization, with custom icon
[keul]

- fix: ``getPropertiesForUser`` uses principals ``_properties`` mapping now
to map to the column used for ``zope_id`` id this is needed.
[jensens]

- do not expect a configured database connection on plugin install time in
order to play nice with collective.saconnect. Also be less verbose if there
is no connection configured.
[jensens]

- fix: different custom setup un-/install marker for install and uninstall
[jensens]

- Standardize name of installation profile to ``default``.
[jensens]

- modernized: Pep8, Travis CI, ...
[jensens]

- using _get_principal_by_id to get principal in doChangeUser,
doDeleteUser, and allowPasswordSet methods
[gborelli]

- using '__mapper__' instead of '__table__' to check Column type.
It allows to customize user model in another class with
polymorphic_identity
[gborelli]

- fixed getPropertiesForUser, return None if principal doesn't exist
[gborelli]

- check if principal exists before updating its properties
[gborelli]

- Fixed methods ``doSetProperty`` and ``setPropertiesForUser`` such
that they accept a generic principal and not necessarily an instance
of the plugin's principal class.
[malthe]

- Wrap user properties in an actually mutable user property sheet
(which writes changes back to the plugin). Previously, a mutable
property sheet was returned, but this is incorrect since changes
aren't persisted.

While the PAS interface specifies that a dict should be returned for
an immutable result, we opt for a hybrid: a dict-aware user property
sheet which does not promise mutability. The motivation is that the
pluggable authentication service only supports a select list of
property value types and not, for instance, Python's own date and
time classes. By returning a property sheet, we can provide a schema
explicitly and not force the authentication service to "guess"
(infer) it.
[malthe]

0.3

----------------

- Fire `IPropertiesUpdated` (from PAS) event on `setPropertiesForUser`
to allow components to take action when user properties are updated.
[malthe]

- Merged SVN repository (select branches) into the existing Github
repository to consolidate improvements.
[malthe]

- Add title and description to groups.

GetRolesForPrincipal needs to listen to __ignore_group_roles__ and
__ignore_direct_roles__ from the request to work with plone 4.
GetRolesForPrincipal needs to take group roles into account as
default.
[sunew]

- Merged many changes from the branches: wichert-flexible,
wichert-flexible-pw-encryption, zedr-mysql-optimized, auspex.

Version 0.3 is not compatible with the earlier versions, upgrading
will require some migration (not included).
[sunew]

- Seperate user_id and login - as in PAS. (Not complete?)
[wichert]

- Refactor user, group, and principal classes to enable more sharing
of functionality between groups and users.
[wichert]

- Length of varchars to be compatible with MySQL
[auspex, wichert, sunew, zedr]

- Cleaned up the properties - only the plone properties are in the
model now. Override the model if you need more fields.
[sunew]

- Password and salt readonly.
[wichert, sunew]

- remove IUpdatePlugin related stuff. Not used.
[wichert]

- Make models configurable via dotted path zmi properties.
[wichert]

- Also make the Principal class configurable.
[sunew]

- Add missing security declarations (match those for the same methods
in PlonePAS and PluggableAuthService).
[sunew]

- Fully implement IRoleAssignerPlugin: missed doRemoveRoleFromPrincipal.
[sunew]

- More tests, tests pass for plone 4.0.7.
[sunew]

0.2.1

------------------------

- Fixed some tests. Now tests passes on plone 4.0.7.
[sunew]

- Convert to and from UTF-8 and unicode. Plone uses UTF-8 internally
and most Python deployments will coerce using the 'ascii' codec,
resulting in unicode decode errors. [mborch]

Page 1 of 2

Links

Releases

© 2024 Safety CLI Cybersecurity Inc. All Rights Reserved.