Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

If you work at G, you should be able to see how D does permissions by looking at its ACL checking code (start with one of the files in the D server code that defines an op, and you can get to the permissions code pretty quickly). There's a lot of code in Colossus/D that is special because it has to be able to come up in a nearly empty cluster.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: