Keyboard Shortcuts

File
u :up to issue
m :publish + mail comments
M :edit review message
j / k :jump to file after / before current file
J / K :jump to next file with a comment after / before current file
Side-by-side diff
i :toggle intra-line diffs
e :expand all comments
c :collapse all comments
s :toggle showing all comments
n / p :next / previous diff chunk or comment
N / P :next / previous comment
<Up> / <Down> :next / previous line
<Enter> :respond to / edit current comment
d :mark current comment as done
Issue
u :up to list of issues
m :publish + mail comments
j / k :jump to patch after / before current patch
o / <Enter> :open current patch in side-by-side view
i :open current patch in unified diff view
Issue List
j / k :jump to issue after / before current issue
o / <Enter> :open current issue
# : close issue
Comment/message editing
<Ctrl> + s or <Ctrl> + Enter :save comment
<Esc> :cancel edit
Rietveld Code Review Tool
Help | Bug tracker | Discussion group | Source code | Sign in
(29)
Issues Repositories Search
Open Issues | Closed Issues | All Issues | Sign in with your Google Account to create issues and add comments

Issue 6927049: Initial velruse integration

Can't Edit
Can't Publish+Mail
Start Review
Created:
13 years, 1 month ago by abentley-home
Modified:
13 years, 1 month ago
Reviewers:
rharding, hazmat, mp+139305
Visibility:
Public.
Initial velruse integration This is just the first piece of performing the OpenID authentication. It does not include logging in a principal in Pyramid. Add velruse. Add "/auth" page with login link. Add "/authcallback" page showing authentication results. https://code.launchpad.net/~abentley/charmworld/velruse-integration/+merge/139305 (do not edit description out of merge proposal)

Patch Set 1 #

Total comments: 6

Patch Set 2 : Initial velruse integration #

Created: 13 years, 1 month ago
Download [raw] [tar.bz2]
Unified diffs Side-by-side diffs Delta from patch set Stats (+79 lines, -1 line) Patch
A [revision details] View 1 chunk +2 lines, -0 lines 0 comments Download
M buildout.cfg View 1 chunk +1 line, -0 lines 0 comments Download
M charmworld/__init__.py View 3 chunks +9 lines, -1 line 0 comments Download
M charmworld/routes.py View 1 chunk +3 lines, -0 lines 0 comments Download
A charmworld/templates/auth.pt View 1 chunk +11 lines, -0 lines 0 comments Download
A charmworld/templates/auth_callback.pt View 1 chunk +22 lines, -0 lines 0 comments Download
A charmworld/views/auth.py View 1 chunk +26 lines, -0 lines 0 comments Download
M versions.cfg View 3 chunks +5 lines, -0 lines 0 comments Download
Total messages: 5
|
abentley-home
Please take a look.
13 years, 1 month ago (2012年12月11日 20:00:01 UTC) #1
Please take a look.
Sign in to reply to this message.
rharding
https://codereview.appspot.com/6927049/diff/1/charmworld/__init__.py File charmworld/__init__.py (right): https://codereview.appspot.com/6927049/diff/1/charmworld/__init__.py#newcode2 charmworld/__init__.py:2: from pyramid.session import UnencryptedCookieSessionFactoryConfig Should we look and see ...
13 years, 1 month ago (2012年12月11日 20:11:47 UTC) #2
https://codereview.appspot.com/6927049/diff/1/charmworld/__init__.py
File charmworld/__init__.py (right):
https://codereview.appspot.com/6927049/diff/1/charmworld/__init__.py#newcode2
charmworld/__init__.py:2: from pyramid.session import
UnencryptedCookieSessionFactoryConfig
Should we look and see if there's an encrypted version to use instead ootb.
https://codereview.appspot.com/6927049/diff/1/charmworld/__init__.py#newcode12
charmworld/__init__.py:12: my_session_factory =
UnencryptedCookieSessionFactoryConfig('itsaseekreet')
This should pull the session secret from the ini file. We can provide an initial
in development.ini and should be overridden in production.
https://codereview.appspot.com/6927049/diff/1/charmworld/routes.py
File charmworld/routes.py (right):
https://codereview.appspot.com/6927049/diff/1/charmworld/routes.py#newcode70
charmworld/routes.py:70: config.add_route('auth', '/auth')
We don't need the auth route right? We can just add a link to the navigation
with the openid_identifier=login.ubuntu.com?
Sign in to reply to this message.
abentley-home
Please take a look.
13 years, 1 month ago (2012年12月11日 20:23:07 UTC) #3
Please take a look.
Sign in to reply to this message.
abentley-home
https://codereview.appspot.com/6927049/diff/1/charmworld/__init__.py File charmworld/__init__.py (right): https://codereview.appspot.com/6927049/diff/1/charmworld/__init__.py#newcode2 charmworld/__init__.py:2: from pyramid.session import UnencryptedCookieSessionFactoryConfig On 2012年12月11日 20:11:47, rharding wrote: ...
13 years, 1 month ago (2012年12月11日 20:52:17 UTC) #4
https://codereview.appspot.com/6927049/diff/1/charmworld/__init__.py
File charmworld/__init__.py (right):
https://codereview.appspot.com/6927049/diff/1/charmworld/__init__.py#newcode2
charmworld/__init__.py:2: from pyramid.session import
UnencryptedCookieSessionFactoryConfig
On 2012年12月11日 20:11:47, rharding wrote:
> Should we look and see if there's an encrypted version to use instead ootb.
There isn't one that I can see.
https://codereview.appspot.com/6927049/diff/1/charmworld/__init__.py#newcode12
charmworld/__init__.py:12: my_session_factory =
UnencryptedCookieSessionFactoryConfig('itsaseekreet')
On 2012年12月11日 20:11:47, rharding wrote:
> This should pull the session secret from the ini file. We can provide an
initial
> in development.ini and should be overridden in production. 
Done.
https://codereview.appspot.com/6927049/diff/1/charmworld/routes.py
File charmworld/routes.py (right):
https://codereview.appspot.com/6927049/diff/1/charmworld/routes.py#newcode70
charmworld/routes.py:70: config.add_route('auth', '/auth')
On 2012年12月11日 20:11:47, rharding wrote:
> We don't need the auth route right? We can just add a link to the navigation
> with the openid_identifier=login.ubuntu.com?
Yes, I see this as a very temporary measure. Actually, I suspect we'll address
this by creating a new provider that returns a URL containing
openid_identifier=login.ubuntu.com from velruse.login_url
Sign in to reply to this message.
hazmat
looks good to me given rick's comments. beaker incidentally has various permutations on session factories ...
13 years, 1 month ago (2012年12月11日 21:27:00 UTC) #5
looks good to me given rick's comments.
beaker incidentally has various permutations on session factories that are more
secure (signed client cookies, backend storage) where we can store the user's
openid session info in the future.
Sign in to reply to this message.
|
Powered by Google App Engine
RSS Feeds Recent Issues | This issue
This is Rietveld f62528b

AltStyle によって変換されたページ (->オリジナル) /