Ryan Nowakowski
Ryan Nowakowski
FYI, This is using r18275734586793c2c0043662cda33b3ee6cecf4f (next branch)
Here's a [workaround](https://github.com/pinax/pinax-starter-projects/pull/46) but it's probably not the right fix.
Ok, it seems I need to use `account.decorators.login_required` instead of `django.contrib.auth.decorators.login_required`. I figured this out by digging through the code. I couldn't [find it in the docs](https://www.google.com/search?q=site%3Adjango-user-accounts.readthedocs.io%2F+login_required&ie=utf-8&oe=utf-8#q=site:django-user-accounts.readthedocs.io+login_required)
I've create a [pull request](https://github.com/pinax/django-user-accounts/pull/243) against the docs. Is there a way we can get rid of this login_decorator and use Django's built-in instead?
Here's a temporary hack ```python (offlineimap) user@host:~/sandboxes/offlineimap3 [tubaman]$ git diff master diff --git a/offlineimap/imaplibutil.py b/offlineimap/imaplibutil.py index 13b2299..0a80d21 100644 --- a/offlineimap/imaplibutil.py +++ b/offlineimap/imaplibutil.py @@ -94,6 +94,8 @@ class UsefulIMAPMixIn: try: #...
I believe I have this same issue. I'm using 0.7 from Debian Wheezy. Here's the protected URL: https://buildbot.myfamilyvault.com/builders/stage%20mfv-web/builds/42 Here's my apache config snippet: ``` AuthType OpenID require valid-user AuthOpenIDTrusted ^https://www.google.com/accounts/o8/ud...
Django's commit: https://github.com/django/django/commit/9fd9f8bbb23407254aa0ba851dbcc8e7f696c3de
> Thanks, however this would need a test, please! Added
tox is failing [here](https://github.com/tubaman/django-sms/runs/6611107888?check_suite_focus=true#step:5:58) but the failure is in the filebased backend which I didn't touch
It's _way_ out of date. I have a new version that I'm working on. My recommendation in the meantime is to try something like ofxclient[1]. 1. https://github.com/captin411/ofxclient On Fri, Feb...