-
-
Notifications
You must be signed in to change notification settings - Fork 196
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Admin user history fix #669
Conversation
@crowbot I remember seeing somewhere that you use some kind of proxying at mySociety for your access to the admin interface. Is that right? Does that affect things for this pull request? |
Yes, we use http authentication via a proxied secure server to get the user On Thu, Oct 25, 2012 at 10:22 PM, Matthew Landauer <[email protected]
|
Alternatively, we could get rid of the http authentication for the "super super user" by seeding the user table with an admin user. It would simplify the code quite a bit and make things potentially more consistent for the user. |
Sorry for the delay in getting to this. So currently, mySociety uses the skip_admin_auth flag and authenticates admin users via http auth over our secure proxy server. I think in the long run, we should stop doing this, and let Alaveteli authenticate the admin users, but I'm a bit loath to change over quickly now, as super users can currently login with the same credentials in the front end as they use to access the admin interface, meaning those credentials could be intercepted when the user logs into the front end (ours is not run over https), and then used to access the admin interface. I think I'd prefer separate admin credentials, and a separate admin session (attached to the same account), or, in fact, to run the whole site over https. So I suggest for now that we merge #683 instead. This should resolve your immediate issue, and give us some time to switch our whole site to https. I think the recommendation should probably be that all Alaveteli installs run entirely over https. |
Thanks @crowbot! I've checked out #683 and it works for me. Now I understand how the +1 on merging #683 and closing this one Also +1 on moving the whole Alaveteli install to https |
On our current setup of Alevetli when an admin user makes a change and you look at it in the admin interface it doesn't correctly record the user that made the change.
I looked a little deeper and saw that there was a bunch of stuff going on where the admin user name was being passed around in the headers or something and apache rewrite rules had to be setup to handle this.
I found it all a bit confusing.
So, this patch does the simple thing and stores the admin user name in the session just like the user_id is stored in the session.
As far as I can tell this works