How to check if a user is logged in (how to properly use user.is_authenticated)?

Update for Django 1.10+: is_authenticated is now an attribute in Django 1.10. The method was removed in Django 2.0. For Django 1.9 and older: is_authenticated is a function. You should call it like As Peter Rowell pointed out, what may be tripping you up is that in the default Django template language, you don’t tack … Read more

PG::ConnectionBad: fe_sendauth: no password supplied

localhost as a host refers to a TCP connection, which means the auth method is md5 (password required) per your pg_hba.conf: # IPv4 local connections: host all all 127.0.0.1/32 md5 # IPv6 local connections: host all all ::1/128 md5 For the peer method to be taken, you’d need to connect through Unix domain sockets, and since you seem to be using … Read more

What ports need to be open for TortoiseSVN to authenticate (clear text) and commit?

What’s the first part of your Subversion repository URL? If your URL looks like: http://subversion/repos/, then you’re probably going over Port 80. If your URL looks like: https://subversion/repos/, then you’re probably going over Port 443. If your URL looks like: svn://subversion/, then you’re probably going over Port 3690. If your URL looks like: svn+ssh://subversion/repos/, then you’re probably going over Port 22. If your … Read more

What are the main differences between JWT and OAuth authentication?

TL;DR If you have very simple scenarios, like a single client application, a single API then it might not pay off to go OAuth 2.0, on the other hand, lots of different clients (browser-based, native mobile, server-side, etc) then sticking to OAuth 2.0 rules might make it more manageable than trying to roll your own system. … Read more

nodejs – error self signed certificate in certificate chain

Option 1: Disable the warning (useful for dev) From your question I’m guessing you are doing this in development as you are using a self signed certificate for SSL communication. If that’s the case, add as an environment variable wherever you are running node or running node directly with This instructs Node to allow untrusted … Read more