Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Migrate to dreamjub for authentication #26

Open
kuboschek opened this issue Nov 11, 2016 · 2 comments
Open

Migrate to dreamjub for authentication #26

kuboschek opened this issue Nov 11, 2016 · 2 comments

Comments

@kuboschek
Copy link
Member

Currently, the voting system uses the legacy OpenJUB API for login.

A solution to this issue uses dreamjub's OAuth for user authentication.

I've already written a login provider for django-allauth, it's basically plug and play

@tkw1536
Copy link
Member

tkw1536 commented Nov 12, 2016

We should wait for dreamjub to at least have an endpoint that exposes all users to do this. That way we can completely migrate to dreamjub and ditch the old API entirely.

@kuboschek
Copy link
Member Author

This API is now available—however there is pagination, which limits results to 1000 at a time. We could either pull users 1000 at a time, and loop, or add another endpoint to dreamjub for this purpose

tkw1536 pushed a commit that referenced this issue Oct 13, 2017
Previously, authentication worked by transmitting the password to the
legacy OpenJUB API. Furthermore user data was also received from this
API. This caused problem, as Jay was able potentially able to intercept
user passwords and also depended on a legacy system.

This commit updates the authentication to use the new dreamjub api via
OAuth. Furthermore, it updates the permission system to move away from
UserProfiles and SuperAdmin models. Instead, this commit makes use of internal
Django mechanisms and stores user data directly with the model.

See also issue #26.
tkw1536 pushed a commit that referenced this issue Oct 13, 2017
Previously, authentication worked by transmitting the password to the
legacy OpenJUB API. Furthermore user data was also received from this
API. This caused problem, as Jay was able potentially able to intercept
user passwords and also depended on a legacy system.

This commit updates the authentication to use the new dreamjub api via
OAuth. Furthermore, it updates the permission system to move away from
UserProfiles and SuperAdmin models. Instead, this commit makes use of internal
Django mechanisms and stores user data directly with the model.

See also issue #26.
tkw1536 pushed a commit that referenced this issue Oct 14, 2017
Previously, authentication worked by transmitting the password to the
legacy OpenJUB API. Furthermore user data was also received from this
API. This caused problem, as Jay was able potentially able to intercept
user passwords and also depended on a legacy system.

This commit updates the authentication to use the new dreamjub api via
OAuth. Furthermore, it updates the permission system to move away from
UserProfiles and SuperAdmin models. Instead, this commit makes use of internal
Django mechanisms and stores user data directly with the model.

See also issue #26.
tkw1536 pushed a commit that referenced this issue Oct 14, 2017
Previously, authentication worked by transmitting the password to the
legacy OpenJUB API. Furthermore user data was also received from this
API. This caused problem, as Jay was able potentially able to intercept
user passwords and also depended on a legacy system.

This commit updates the authentication to use the new dreamjub api via
OAuth. Furthermore, it updates the permission system to move away from
UserProfiles and SuperAdmin models. Instead, this commit makes use of internal
Django mechanisms and stores user data directly with the model.

See also issue #26.
tkw1536 pushed a commit that referenced this issue Oct 14, 2017
Previously, authentication worked by transmitting the password to the
legacy OpenJUB API. Furthermore user data was also received from this
API. This caused problem, as Jay was able potentially able to intercept
user passwords and also depended on a legacy system.

This commit updates the authentication to use the new dreamjub api via
OAuth. Furthermore, it updates the permission system to move away from
UserProfiles and SuperAdmin models. Instead, this commit makes use of internal
Django mechanisms and stores user data directly with the model.

See also issue #26.
tkw1536 pushed a commit that referenced this issue Oct 14, 2017
Previously, authentication worked by transmitting the password to the
legacy OpenJUB API. Furthermore user data was also received from this
API. This caused problem, as Jay was able potentially able to intercept
user passwords and also depended on a legacy system.

This commit updates the authentication to use the new dreamjub api via
OAuth. Furthermore, it updates the permission system to move away from
UserProfiles and SuperAdmin models. Instead, this commit makes use of internal
Django mechanisms and stores user data directly with the model.

See also issue #26.
tkw1536 pushed a commit that referenced this issue Oct 14, 2017
Previously, authentication worked by transmitting the password to the
legacy OpenJUB API. Furthermore user data was also received from this
API. This caused problem, as Jay was able potentially able to intercept
user passwords and also depended on a legacy system.

This commit updates the authentication to use the new dreamjub api via
OAuth. Furthermore, it updates the permission system to move away from
UserProfiles and SuperAdmin models. Instead, this commit makes use of internal
Django mechanisms and stores user data directly with the model.

See also issue #26.
tkw1536 pushed a commit that referenced this issue Oct 30, 2017
Previously, authentication worked by transmitting the password to the
legacy OpenJUB API. Furthermore user data was also received from this
API. This caused problem, as Jay was able potentially able to intercept
user passwords and also depended on a legacy system.

This commit updates the authentication to use the new dreamjub api via
OAuth. Furthermore, it updates the permission system to move away from
UserProfiles and SuperAdmin models. Instead, this commit makes use of internal
Django mechanisms and stores user data directly with the model.

See also issue #26.
tkw1536 pushed a commit that referenced this issue Nov 1, 2017
Previously, authentication worked by transmitting the password to the
legacy OpenJUB API. Furthermore user data was also received from this
API. This caused problem, as Jay was able potentially able to intercept
user passwords and also depended on a legacy system.

This commit updates the authentication to use the new dreamjub api via
OAuth. Furthermore, it updates the permission system to move away from
UserProfiles and SuperAdmin models. Instead, this commit makes use of internal
Django mechanisms and stores user data directly with the model.

See also issue #26.
tkw1536 pushed a commit that referenced this issue Nov 1, 2017
Previously, authentication worked by transmitting the password to the
legacy OpenJUB API. Furthermore user data was also received from this
API. This caused problem, as Jay was able potentially able to intercept
user passwords and also depended on a legacy system.

This commit updates the authentication to use the new dreamjub api via
OAuth. Furthermore, it updates the permission system to move away from
UserProfiles and SuperAdmin models. Instead, this commit makes use of internal
Django mechanisms and stores user data directly with the model.

See also issue #26.
tkw1536 pushed a commit that referenced this issue Nov 1, 2017
Previously, authentication worked by transmitting the password to the
legacy OpenJUB API. Furthermore user data was also received from this
API. This caused problem, as Jay was able potentially able to intercept
user passwords and also depended on a legacy system.

This commit updates the authentication to use the new dreamjub api via
OAuth. Furthermore, it updates the permission system to move away from
UserProfiles and SuperAdmin models. Instead, this commit makes use of internal
Django mechanisms and stores user data directly with the model.

See also issue #26.
tkw1536 pushed a commit that referenced this issue Nov 1, 2017
Previously, authentication worked by transmitting the password to the
legacy OpenJUB API. Furthermore, user data was also received from this
API and evaluated using a custom JavaScript bridge.

This caused problem, as Jay was able potentially able to intercept user
passwords and also depended on two legacy systems, the OpenJUB API and
the memory intensive JavaScript evaluation of filters

This commit updates the authentication to use the new dreamjub api via
OAuth. Furthermore, it updates the permission system to move away from
UserProfiles and SuperAdmin models. Instead, this commit makes use of
internal Django mechanisms and stores user data directly with the model.

Furthermore, we also migrate the evaluation of filters to use a
python-based evaluation, which no longer needs a JavaScript runtime on
the server side.

See also issue #26.
tkw1536 pushed a commit that referenced this issue Nov 1, 2017
Previously, authentication worked by transmitting the password to the
legacy OpenJUB API. Furthermore, user data was also received from this
API and evaluated using a custom JavaScript bridge.

This caused problem, as Jay was able potentially able to intercept user
passwords and also depended on two legacy systems, the OpenJUB API and
the memory intensive JavaScript evaluation of filters

This commit updates the authentication to use the new dreamjub api via
OAuth. Furthermore, it updates the permission system to move away from
UserProfiles and SuperAdmin models. Instead, this commit makes use of
internal Django mechanisms and stores user data directly with the model.

Furthermore, we also migrate the evaluation of filters to use a
python-based evaluation, which no longer needs a JavaScript runtime on
the server side.

See also issue #26.
tkw1536 pushed a commit that referenced this issue Nov 1, 2017
Previously, authentication worked by transmitting the password to the
legacy OpenJUB API. Furthermore, user data was also received from this
API and evaluated using a custom JavaScript bridge.

This caused problem, as Jay was able potentially able to intercept user
passwords and also depended on two legacy systems, the OpenJUB API and
the memory intensive JavaScript evaluation of filters

This commit updates the authentication to use the new dreamjub api via
OAuth. Furthermore, it updates the permission system to move away from
UserProfiles and SuperAdmin models. Instead, this commit makes use of
internal Django mechanisms and stores user data directly with the model.

Furthermore, we also migrate the evaluation of filters to use a
python-based evaluation, which no longer needs a JavaScript runtime on
the server side.

See also issue #26.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants