30 Jan
2002
30 Jan
'02
8:32 p.m.
Florent Guillaume writes:
Something I'd like to figure out when I have time is, why does the security machinery fail in such ways when the object is not owned by a valid user ? The effective roles are the intersection of the current user's roles and the one of the executing object's owner. This is explained in the Zope Security documentation (--> zope.org).
A non-existing owner has no roles. The intersection is empty. Consequence "Unauthorized". Dieter