18 April 2014

The Ruby Reflector

Topic

Authentication

  Source Favicon
By Shiv Kuman of New Relic 16 days ago.
Email

…to make it work with Discourse too (instructions here ). Authentication was a great example of a project that was both beneficial to us and the greater Discourse community.

Other examples of plugins we implemented:

I built a custom Zendesk plugin that makes API calls to Zendesk to either create a ticket or display a ticket's status right from the topic show page if you are a forum moderator (screenshots here ). This is a key component of our forum's …

newrelic.com Read
  Source Favicon
Email

auth_pam.so shared library needed for PAM Authentication Plugin was missing from RPM packages. Bug fixed # 1268246 .

Fix for bug # 1227581 , a buffer pool mutex split regression, was not complete, thus a combination of write workload to InnoDB compressed table and a tablespace drop could crash the server. Bug fixed # 1269352 .

Binary RPM packages couldn't be built from source tarballs on Fedora 19. Bug fixed # 1229598 .

mysqlperformanceblog.com Read
  Source Favicon
By Ignacio Nin of MySQL Performance Blog 12 months ago.
Email

dialog.so used by the PAM Authentication Plugin couldn't be loaded with Perl and Python clients when plugin-dir option was set in the [client] section of the my.cnf . Bug fixed # 1155859 ( Sergei Glushchenko ).

Fixed the upstream bug # 68845 which could unnecessarily increase contention on log_sys->mutex in write-intensive workloads. Bug fixed # 1163439 ( Alexey Kopytov ).

Ported back from the upstream MySQL 5.6 the …

mysqlperformanceblog.com Read
  Source Favicon
By Nathen Harvey of Chef Blog 1 year ago.
Email

Describe the steps performed during a chef-client run

Describe Chef's Authentication Cycle

Build Chef roles using the Ruby DSL

Manipulate configuration through data in attributes

Use Chef's search API for dynamic configuration

List a number of additional resources that are available for help Early bird pricing for this workshop ends February 5th. Get your tickets today !

opscode.com Read
  Source Favicon
By Jennifer Burke of Chef Blog over 1 year ago.
Email

…the Anatomy of a Chef Run, Chef's Authentication Cycle, how to build roles, manipulate configuration through data in attributes, use Chef's search API for dynamic configuration, and more.

Trainings are currently scheduled in:

January 15 - Washington DC

January 16 - San Francisco

January 22 - Portland, Oregon

January 28 - New York

January 30 - Philadelphia

February 7 - Austin

February 12 - Chicago …

opscode.com Read
  Source Favicon
On Alex R. Young over 1 year ago.
Email

Authentication has been democratised by OAuth -- I know I'm more likely to try something out if I see "sign in with Twitter" or GitHub.

Speaking of Twitter... It's amazing to think about that first conference existing without Twitter. Twitter appeared in 2006, and has been prominent at many related conferences since then.

2007: iPhone. At first Apple claimed applications would be purely delivered through Safari, but eventually the App Store appeared and changed …

alexyoung.org Read
  Source Favicon
By Nic Benders of New Relic over 1 year ago.
Email

Authentication Is a Solved Problem

Our app uses LinkedIn's contact data, so we knew that every user would need to have a LinkedIn account. Using their OAuth system as our primary login meant that we didn't need to spend time on the standard login, password, email workflow as the omniauth-linkedin handled all of this for us.

Always Be Deploying

Code on the shelf is wasted inventory. And delivering a polished app in 48 hours meant there was no room for waste. We …

newrelic.com Read
  Source Favicon
By Carly Brantz of Engine Yard Developer Blog over 1 year ago.
Email

…identify the sender of the email so it can make smarter decisions about the delivery of your mail. Authentication has become a best practice for email senders since spammers have gotten really smart about disguising malicious email under the veil of a trusted brand. By pretending to send email from your domain, a practice known as phishing, spammers are tricking your customers into giving out their passwords, account information and other personally identifiable information for their own financial …

engineyard.com Read
  Source Favicon
By Dan Galipo of Transcending Frontiers over 1 year ago.
Email

Authentication module SharedAuthentication

include Spinach::DSL

Given 'I am logged in as an admin' do visit new_user_session_path user = FactoryGirl.create :admin login_with user.email, 'secret' end

def login_with email, password fill_in 'user[email]', with: email fill_in 'user[password]', with: password click_button :submit end

end

Paths module SharedPath

include Spinach::DSL

And 'I am on the objects …

thefrontiergroup.com.au Read
  Source Favicon
By Jordan Maguire of Transcending Frontiers over 1 year ago.
Email

{errors: {invalid_credentials: ' Authentication credentials provided were invalid'}}

or

{errors: {no_token: 'No authentication token was provided in request'}}

or

{errors: {invalid_token: 'Token provided was invalid'}}

403 Forbidden

The 403 Forbidden status indicates that although the request was valid the action requested failed authorization constraints. See the IETF docs.

Pretty straight forward scenario: user x tries to update resource …

thefrontiergroup.com.au Read