Message223142
| Author | r.david.murray |
|---|---|
| Recipients | barry, jesstess, pitrou, r.david.murray, zvyn |
| Date | 2014-07-15.19:56:10 |
| SpamBayes Score | -1.0 |
| Marked as misclassified | Yes |
| Message-id | <1405454170.63.0.971181733425.issue21935@psf.upfronthosting.co.za> |
| In-reply-to |
| Content | |
|---|---|
Describing how a programmer would implement authentication is exactly the API I was referring to, and that includes the signature and semantics of _verify_user_credentials. I agree that (1) seems the cleanest. I'd favor 1.1, NotImplemented, which lets the programmer see immediately what they did wrong. |
|
| History | |||
|---|---|---|---|
| Date | User | Action | Args |
| 2014-07-15 19:56:10 | r.david.murray | set | recipients: + r.david.murray, barry, pitrou, jesstess, zvyn |
| 2014-07-15 19:56:10 | r.david.murray | set | messageid: <1405454170.63.0.971181733425.issue21935@psf.upfronthosting.co.za> |
| 2014-07-15 19:56:10 | r.david.murray | link | issue21935 messages |
| 2014-07-15 19:56:10 | r.david.murray | create | |