[Catalyst-commits] r8051 -
trunk/Catalyst-Plugin-Authorization-ACL/lib/Catalyst/Plugin/Authorization
dandv at dev.catalyst.perl.org
dandv at dev.catalyst.perl.org
Mon Jun 30 10:58:55 BST 2008
Author: dandv
Date: 2008-06-30 10:58:54 +0100 (Mon, 30 Jun 2008)
New Revision: 8051
Modified:
trunk/Catalyst-Plugin-Authorization-ACL/lib/Catalyst/Plugin/Authorization/ACL.pm
Log:
Minor: fixed typo (it's -> its)
Modified: trunk/Catalyst-Plugin-Authorization-ACL/lib/Catalyst/Plugin/Authorization/ACL.pm
===================================================================
--- trunk/Catalyst-Plugin-Authorization-ACL/lib/Catalyst/Plugin/Authorization/ACL.pm 2008-06-29 20:23:03 UTC (rev 8050)
+++ trunk/Catalyst-Plugin-Authorization-ACL/lib/Catalyst/Plugin/Authorization/ACL.pm 2008-06-30 09:58:54 UTC (rev 8051)
@@ -115,7 +115,7 @@
eval { $c->execute($class, $handler) };
return 1 if $c->{_acl_forcibly_allowed};
-
+
die $@ || $Catalyst::DETACH;
}
else {
@@ -176,8 +176,8 @@
=head1 DESCRIPTION
-This module provides Access Control List style path protection, with arbitrary
-rules for L<Catalyst> applications. It operates only on the L<Catalyst>
+This module provides Access Control List style path protection, with arbitrary
+rules for L<Catalyst> applications. It operates only on the L<Catalyst>
private namespace, at least at the moment.
The two hierarchies of actions and controllers in L<Catalyst> are:
@@ -186,7 +186,7 @@
=item Private Namespace
-Every action has it's own private path. This path reflects the Perl namespaces
+Every action has its own private path. This path reflects the Perl namespaces
the actions were born in, and the namespaces of their controllers.
=item External Namespace
@@ -202,8 +202,8 @@
Various types of rules are supported, see the list under L</RULES>.
-When a path is visited, rules are tested one after the other, with the most
-exact rule fitting the path first, and continuing up the path. Testing
+When a path is visited, rules are tested one after the other, with the most
+exact rule fitting the path first, and continuing up the path. Testing
continues until a rule explcitly allows or denies access.
=head1 METHODS
@@ -217,7 +217,7 @@
parent has a C<deny_access_unless> clause attached to it.
If the rule test returns false access is not denied or allowed. Instead
-the next rule in the chain will be checked - in this sense the combinatory
+the next rule in the chain will be checked - in this sense the combinatory
behavior of these rules is like logical B<OR>.
=head2 deny_access_unless $path, $rule
@@ -228,7 +228,7 @@
unless a certain condition can be met.
If the rule test returns true access is not allowed or denied. Instead the
-next rule in the chain will be checked - in this sense the combinatory
+next rule in the chain will be checked - in this sense the combinatory
behavior of these rules is like logical B<AND>.
=head2 allow_access $path
@@ -239,7 +239,7 @@
=head2 acl_add_rule $path, $rule, [ $filter ]
-Manually add a rule to all the actions under C<$path> using the more flexible
+Manually add a rule to all the actions under C<$path> using the more flexible
(but more verbose) method:
__PACKAGE__->acl_add_rule(
@@ -362,14 +362,14 @@
If no rule decides to explicitly allow or deny access, access will be
permitted.
-Here is a rule that will always break out of rule processing by either
-explicitly allowing or denying access based on how much mojo the current
+Here is a rule that will always break out of rule processing by either
+explicitly allowing or denying access based on how much mojo the current
user has:
__PACKAGE__->acl_add_rule(
"/foo",
sub {
- my ( $c, $action ) = @_;
+ my ( $c, $action ) = @_;
if ( $c->user->mojo > 50 ) {
die $ALLOWED;
@@ -429,7 +429,7 @@
if ( $c->error and $c->error->[-1] eq "access denied" ) {
$c->error(0); # clear the error
-
+
# access denied
} else {
# normal end
More information about the Catalyst-commits
mailing list