Yes I try a new app without defining auth models myself, just changed the
connection string for postgres and it works.

I don't have the typo in my code, it maybe happen when copy/paste the code
somehow.

I just add this : auth=Auth(db, *hmac_key=Auth.get_or_create_key()*)

No change.

Richard

On Tue, May 15, 2012 at 10:04 AM, Massimo Di Pierro <
[email protected]> wrote:

> There is a typo in your code:
>
> uth.settings.hmac_key='sha512:**8e95c268-cc31-4119-890d-**a5790d3e05d3'
>
> should be
>
> auth.settings.hmac_key='sha512:**8e95c268-cc31-4119-890d-**a5790d3e05d3'
>
> although this is probably not the cause for your problems. Does it work if
> you use sqlite? Does it work if you use postgresql with a new database?
>
> On Monday, 14 May 2012 15:53:40 UTC-5, Richard wrote:
>>
>> Hello,
>>
>> I try one more time to upgrade to 1.99.7 today without succes. But now I
>> know what append... It works fine, until I try to logon with a user...
>>
>> In shell it works fine, can access to any tables...
>>
>> Is there change to the logon process has been changed between 1.99.4 and
>> 1.99.7?
>>
>> Thanks
>>
>> Richard
>>
>> On Thu, Mar 8, 2012 at 12:54 PM, Richard Vézina <
>> [email protected]> wrote:
>>
>>> Ping!
>>>
>>> Richard
>>>
>>>
>>> On Wed, Mar 7, 2012 at 10:48 AM, Richard Vézina <
>>> [email protected]> wrote:
>>>
>>>> I use to download source package and make my update by my own
>>>> (manually). I don't use the update feature.
>>>>
>>>>  Here most of my db.py that contain db connection and all related auth
>>>> configuration :
>>>>
>>>> db=DAL('postgres://USER:**[email protected]:5432/**DATABASE<http://USER:[email protected]:5432/DATABASE>',
>>>> \
>>>>     migrate_enabled=False)
>>>>
>>>>
>>>> from gluon.tools import *
>>>> auth=Auth(globals(),db)              # authentication/authorization
>>>>
>>>> auth_table = db.define_table(
>>>>     auth.settings.table_user_name,
>>>>     Field('first_name', length=128, default=None,
>>>>         required=True,
>>>>         notnull=True,
>>>>         requires = IS_NOT_EMPTY(error_message=T(**
>>>> auth.messages.is_empty)),
>>>>         ),
>>>>     Field('last_name', length=128, default=None,
>>>>         requires = IS_NOT_EMPTY(error_message=T(**
>>>> auth.messages.is_empty)),
>>>>         ),
>>>>     Field('email', length=128, default=None, unique=True,
>>>> label=T('Email'),
>>>>         requires = [IS_EMAIL(error_message=T(**
>>>> auth.messages.invalid_email)),
>>>>             IS_NOT_IN_DB(db, 'auth_user.email')],
>>>>         ),
>>>>     Field('password', 'password', length=256,
>>>>           readable=False, label=T('Password'),
>>>>           required=True,
>>>>           notnull=True,
>>>>           requires = CRYPT(min_length=auth.**
>>>> settings.password_min_length,
>>>>               error_message=T('too short'))
>>>>           ),
>>>>     Field('registration_key', length=128, default=None,
>>>>           writable=False, readable=False),
>>>>     Field('reset_password_key', length=512,
>>>>         writable=False, readable=False, default=None
>>>>         ),
>>>>     Field('initials','string',**length=5),
>>>>     migrate=False,
>>>>     format='%(first_name)s %(last_name)s (%(id)s)')
>>>>
>>>> auth.settings.table_user = auth_table # no idea what this line do...
>>>>
>>>> auth_table = db.define_table(
>>>>     auth.settings.table_event_**name,
>>>>     Field('time_stamp','datetime',**default=request.now),
>>>>     Field('client_ip','string',**length=512,default=request.**client),
>>>>     Field('user_id',db.auth_user),
>>>>     Field('origin','string',**length=512),
>>>>     Field('description','text'),
>>>>     migrate=False,)
>>>>
>>>> auth_table = db.define_table(
>>>>     auth.settings.table_group_**name,
>>>>     Field('role','string',length=**512),
>>>>     Field('description','text'),
>>>>     migrate=False,
>>>>     format='%(role)s (%(id)s)')
>>>>
>>>> auth_table = db.define_table(
>>>>     auth.settings.table_**membership_name,
>>>>     Field('user_id','db.auth_user'**),
>>>>     Field('group_id','db.auth_**group'),
>>>>     migrate=False,)
>>>>
>>>> db.auth_membership.user_id.**requires=IS_IN_DB(db,'auth_**user.id<http://auth_user.id>','%(first_name)s
>>>> %(last_name)s (%(id)s)')
>>>> db.auth_membership.group_id.**requires=IS_IN_DB(db,'auth_**group.id<http://auth_group.id>
>>>> ','%(role)s-%(**description)s (%(id)s)')
>>>>
>>>> db.auth_membership.user_id.**represent=\
>>>>     lambda value: (value!=None and "%(first_name)s %(last_name)s
>>>> (%(id)s)" %db.auth_user[value]) or 'None'
>>>> db.auth_membership.group_id.**represent=\
>>>>     lambda value: (value!=None and "%(role)s (%(id)s)"
>>>> %db.auth_group[value]) or 'None'
>>>>
>>>> db.define_table('auth_group_**allowed',
>>>>     Field('id','id'),
>>>>     Field('user_id','db.auth_user'**),
>>>>     Field('group_id','db.auth_**group'),
>>>>     Field('active_gr','boolean'),
>>>>     migrate=False,
>>>>     sequence_name='auth_group_**allowed_id_seq')
>>>>
>>>> db.auth_group_allowed.user_id.**requires=IS_IN_DB(db,'auth_**user.id<http://auth_user.id>','%(first_name)s
>>>> %(last_name)s (%(id)s)')
>>>> db.auth_group_allowed.group_**id.requires=IS_IN_DB(db,'auth_**group.id<http://auth_group.id>','%(role)s
>>>> (%(id)s)')
>>>>
>>>> db.auth_group_allowed.user_id.**represent=\
>>>>      lambda value: (value!=None and "%(first_name)s %(last_name)s
>>>> (%(id)s)" %db.auth_user[value]) or 'None'
>>>> db.auth_group_allowed.group_**id.represent=\
>>>>     lambda value: (value!=None and "%(role)s (%(id)s)"
>>>> %db.auth_group[value]) or 'None'
>>>>
>>>> auth_table = db.define_table(
>>>>     auth.settings.table_**permission_name,
>>>>     Field('group_id','db.auth_**group'),
>>>>     Field('name','string',length=**512),
>>>>     Field('table_name','string',**length=512),
>>>>     Field('record_id','integer'),
>>>>     migrate=False,)
>>>>
>>>> db.auth_permission.group_id.**requires=\
>>>>     IS_IN_DB(db,'auth_group.id','%**(role)s (%(id)s)')
>>>>
>>>> db.auth_permission.group_id.**represent=\
>>>>     lambda id: "%(role)s (%(id)s)" %db.auth_group[id]
>>>>
>>>> auth_table = db.define_table(
>>>>     auth.settings.table_cas_name,
>>>>     Field('user_id','integer'),
>>>>     Field('created_on','datetime')**,
>>>>     Field('url','string',length=**512),
>>>>     Field('uuid','string',length=**512),
>>>>     migrate=False,)
>>>>
>>>> crud=Crud(globals(),db)              # for CRUD helpers using auth
>>>> service=Service(globals())           # for json, xml, jsonrpc, xmlrpc,
>>>> amfrpc
>>>>
>>>> crud.settings.auth=auth
>>>>
>>>> uth.settings.hmac_key='sha512:**8e95c268-cc31-4119-890d-**a5790d3e05d3'
>>>> auth.define_tables()                 # creates all needed tables
>>>> auth.settings.actions_**disabled.append('profile') # prohibit users to
>>>> modify their profile
>>>> auth.settings.actions_**disabled.append('register')
>>>>
>>>> Thanks
>>>>
>>>> Richard
>>>>
>>>>
>>>> On Wed, Mar 7, 2012 at 10:24 AM, pbreit <[email protected]> wrote:
>>>>
>>>>> Are you able to upgrade to most recent version of Web2py? We might
>>>>> need to see more of your model code that specifies the DB and auth.
>>>>
>>>>
>>>>
>>>
>>

Reply via email to