Re: multiple authentication and session keys

2006-08-31 Thread Gary Wilson
Adrian Holovaty wrote: > Thanks for bringing this up, Gary. The get_and_delete_messages() thing > has always bothered me -- if it's activated, we do it for every > request. I suppose we could make the 'messages' part of the context > processor lazy, so that it would only call get_and_delete_messag

Re: multiple authentication and session keys

2006-08-30 Thread Cheng Zhang
On Aug 31, 2006, at 1:31 AM, Adrian Holovaty wrote: > Thanks for bringing this up, Gary. The get_and_delete_messages() thing > has always bothered me -- if it's activated, we do it for every > request. I suppose we could make the 'messages' part of the context > processor lazy, so that it would

Re: multiple authentication and session keys

2006-08-30 Thread Adrian Holovaty
On 8/29/06, Gary Wilson <[EMAIL PROTECTED]> wrote: > So I hit another little snag today related to this. The > contrib.auth.middleware.LazyUser calls contrib.auth.get_user (knowing > where to get the user from based on the backend stored in > session['_auth_user_backend']), which will return an >

Re: multiple authentication and session keys

2006-08-29 Thread Gary Wilson
So I hit another little snag today related to this. The contrib.auth.middleware.LazyUser calls contrib.auth.get_user (knowing where to get the user from based on the backend stored in session['_auth_user_backend']), which will return an authentication-backend-dependent user object. This user obj

Re: multiple authentication and session keys

2006-08-12 Thread Scott Paul Robertson
On Thu, Aug 03, 2006 at 10:42:39PM -0700, Gary Wilson wrote: > > So, the mutli authentication seems to work well for the use case of a > site accepting more than one authentication source to access some area, > but not so well for the use case of a site accepting one source of > authentication in

multiple authentication and session keys

2006-08-11 Thread Gary Wilson
So, the mutli authentication seems to work well for the use case of a site accepting more than one authentication source to access some area, but not so well for the use case of a site accepting one source of authentication in one area and another source of authentication in a different area. The