Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Multi server configuration #3

Open
wants to merge 9 commits into
base: develop
Choose a base branch
from
Open

Multi server configuration #3

wants to merge 9 commits into from

Conversation

lucasvanschaik
Copy link
Member

I have implemented support for multiple servers when generating aliases for URL via pathauto.
An alias is generated when a new object is ingested into Islandora. Because we have an ingest server the alias is only made there. The public server does not get a trigger to generate an alias. With this PR it does get a trigger.
Please code review someone!

When multiple servers are used, the creation of aliases is only triggered
on the server where the object is ingested. Configuration options are
added so the creation of an alias triggers an action on another server
that also creates the alias.
Copy link
Member

@bencomp bencomp left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Seems okay to me, although perhaps we should talk about variable naming some time :)

Have you tested all scenarios?
I do wonder about any differences between and Drupal community preferences about drupal_hash_base64 and drupal_hmac_base64. In any case, triggers should only use HTTPS and the secret should be long to prevent recovering the secret through eavesdropping the triggers and brute-forcing.

$status = 401;
}

if ($success && ($op !== 'insert' && $op !== 'update')) {
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

$success -> $issuccess?

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

You are a great code reviewer! Solved this in 24be51b

@lucasvanschaik
Copy link
Member Author

Seems okay to me, although perhaps we should talk about variable naming some time :)

Have you tested all scenarios?
I do wonder about any differences between and Drupal community preferences about drupal_hash_base64 and drupal_hmac_base64. In any case, triggers should only use HTTPS and the secret should be long to prevent recovering the secret through eavesdropping the triggers and brute-forcing.

Thanks for code review again: I agree that long secrets and https will make it more secure. Do you think I need to make a check for both in code when entering in the form? And when a request is received? I could also check if time is within a few seconds of the current time? But this might be overkill, or not?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants