Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Ensure preservation of return_to through OAuth login flow #3884

Merged
merged 1 commit into from
Nov 9, 2018

Conversation

Radhikadua123
Copy link
Contributor

Part of #3879

@plotsbot
Copy link
Collaborator

plotsbot commented Nov 3, 2018

1 Message
📖 @Radhikadua123 Thank you for your pull request! I’m here to help with some tips and recommendations. Please take a look at the list provided and help us review and accept your contribution! And don’t be discouraged if you see errors – we’re here to help.

Generated by 🚫 Danger

@SidharthBansal
Copy link
Member

Have you checked the behaviour on the local host?

@Radhikadua123
Copy link
Contributor Author

@SidharthBansal Nope I tried it on unstable.publiclab.org

I can deploy it there in case you want to test it out.

@SidharthBansal
Copy link
Member

Yeah please deploy it there. We need to test it before publishing it to the production

Copy link
Member

@SidharthBansal SidharthBansal left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The approach is right.
We need to test this first.

@Radhikadua123
Copy link
Contributor Author

@SidharthBansal Sure, thanks!

I have started the build here: https://jenkins.laboratoriopublico.org/job/Plots-Unstable/327/console

</a>
<ul id="login-dropdown" class="dropdown-menu" style="width:245px; color: white;">
Copy link
Member

@SidharthBansal SidharthBansal Nov 7, 2018

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

You have deleted the form by mistake I guess.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Actually, it's w.r.t. this comment : #3879 (comment)

Though in case you feel we need it, I can try adding it back.

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I see.

When Jeff and I implemented this OAuth system we made this working on the localhost, unstable, stable and on the production.
So, once you deploy this onto the unstable and check the functionality for all the providers, ping me. I will check it.

Thanks for the awesome hard work.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Oh. I wasn't sure how to get those credentials for local setup. So, I tried it on unstable only.

Yeah sure, I'll ping you once it's deployed. Build seems to be failed due to some reason and I don't have permission to start it manually from there. May be I'll push it again.

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

No need to check for all providers on the development. Just create anyone say github and check it on local.
#2856
On unstable we need to check it on all providers.
My insights says that your solution will work. I did the same solution in February.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

https://github.com/publiclab/plots2/blob/master/doc/OMNIAUTH.md

Thanks, I understand the process now!

On unstable we need to check it on all providers.

Oh cool

My insights says that your solution will work. I did the same solution in February.

Oh, so did it get dropped mistakenly in refactoring or something ?

cool, I'll try it out.

@SidharthBansal
Copy link
Member

SidharthBansal commented Nov 7, 2018 via email

@Radhikadua123
Copy link
Contributor Author

I see.

Haha true.

@SidharthBansal
Copy link
Member

SidharthBansal commented Nov 7, 2018 via email

@jywarren
Copy link
Member

jywarren commented Nov 7, 2018 via email

@Radhikadua123
Copy link
Contributor Author

@jywarren I have tested this out on unstable.publiclab.org and it works fine for me.

It's still live in case you want to try it out. :)

@SidharthBansal
Copy link
Member

Just checking it out

@SidharthBansal
Copy link
Member

Awesome!!!
Well done.

Copy link
Member

@SidharthBansal SidharthBansal left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Hi, changes looks good to me. Thanks for your work.
@jywarren can you please review this and merge this?

@jywarren
Copy link
Member

jywarren commented Nov 9, 2018

Restarted these builds to try to get them to pass!

@SidharthBansal
Copy link
Member

@jywarren all tests passed.

@jywarren jywarren merged commit 1b69521 into issue_fix_oauth_1 Nov 9, 2018
@ghost ghost removed the ready label Nov 9, 2018
@jywarren
Copy link
Member

jywarren commented Nov 9, 2018

Hooray!!! 🎉 🎉

@jywarren
Copy link
Member

jywarren commented Nov 9, 2018

Can one of you test on https://stable.publiclab.org now that it's merged? This is now auto-building from the master branch on each merge. It may take 10m to publish, you can monitor on Jenkins. Thanks!

@Radhikadua123
Copy link
Contributor Author

Thanks for merging it!

Oh wow, so I believe we have stable.publiclab.org for master branch. I see.

jywarren pushed a commit that referenced this pull request Nov 10, 2018
* Split create function into two login paths

* Ensure preservation of return_to through OAuth login flow (#3884)
@jywarren
Copy link
Member

jywarren commented Nov 10, 2018 via email

@Radhikadua123 Radhikadua123 deleted the issue_fix_oauth_2 branch November 10, 2018 00:51
SrinandanPai pushed a commit to SrinandanPai/plots2 that referenced this pull request May 5, 2019
* Split create function into two login paths

* Ensure preservation of return_to through OAuth login flow (publiclab#3884)
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants