-
Notifications
You must be signed in to change notification settings - Fork 33
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Porting features to CKAN core #2
Comments
Incomplete until your recent flask-related commit: Up until now you couldn't override all the options (which is why I mentioned it when you were working on it :P)
This is a specific requirement in most modern policies. Since we don't include proper rate limiting on resets or attempts it's even more important to increase attack time. |
I stand corrected, this will be available on 2.7 :) |
just a chime in on this... time limited (just had twins! 🍼 🍼 ). Will have to look over to help explain the implementation on some of the features (vendor produced this code). Otherwise, raid the code and take what you need. |
@camfindlay congratulations! Go back to the twins :) |
@amercader anything still needed on this issue? I'll close this issue in the next 24 hours unless there is anything pressing needing looked at. Can always reopen or open new issues to address specific parts 👍 |
@camfindlay these are all still valuable contributions to CKAN core, but the tech team doesn't have the capacity to work on them right now. We would be more than happy to provide guidance if you or someone else wanted to have a go at submitting some pull requests though! |
Hi @amercader and @TkTech. |
@anotheredward fantastic! ping us if you are unsure about anything. It might be worth to create an issue in the main CKAN repo if you need to discuss a particular approach. |
This is the first PR to merge features from the plugin: data-govt-nz/ckanext-security#2 into ckan core
Likewise. Also reachable on our IRC channel #ckan @ freenode, although I can be slow to respond. |
@anotheredward any other core PRs we can reference here? |
This is the first PR to merge features from the plugin: data-govt-nz/ckanext-security#2 into ckan core
ckan/ckan#4192 Don't confirm user exists on reset form Beaker Session/CSRF Protection requires a small amount of additional configuration/documentation, as we're looking at spinning up another 2 redis instances (one for session management and one for CSRF tokens) as we want the instances to have a memory limit and eviction strategy of deleting the least recently used Session/CSRF token (We used to use memcached, which works like this out of the box). |
@camfindlay This is great!
As @wardi said on the mailing list it would be great to get as many of these as possible in CKAN core. See my comments below:
This could be ported straight to core (here)
Can you describe how this works?
This has been on our list forever and would be awesome to get integrated in core. Do you think that your implementation is generic enough for this? Do you mind give an overview of the implementation?
I just merged this to master and will be part of 2.7.x (ckan/ckan#3531)
IIRC this was already available, it's just a matter of configuring the relevant
beaker.*
config options right? (and perhaps document it better, with a dedicated section in the docs)That sounds really sensible and something that could be ported upstream. I could not find where or how you do it though.
See ckan/ckan#3601. We definitely want to increase the default requirement but allow extensions to override to fit custom requirements. Obviously the main problem is that there is not an easy way to override the user schema as there is no suitable interface, so you either have to monkey-patch like in your case or override the whole
user_update
to pass a custom schema. We need to provide anIUserForm
that allows the same customization as egIDatasetForm
.I think this is something that different maintainers may have different views on, so I'm not too worried about getting it into core but also not against it.
It would be great to know your views on this and better yet if some PR come out of it!
cc @ckan/Core
The text was updated successfully, but these errors were encountered: