Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Expand
titleHow does user authentication work?

Currently it’s invoking the session API of Iguana itself so every login is done with an Iguana login. I was a little lazy with how I did it - it doesn’t maintain a session.

The authentication is just done using HTTP basic authentication.

One could use #hash_tags on users if one wanted to restrict the data being given to particular users but for this example the code doesn’t do this for simplicity, the code uses Iguana's session API for login, relying on Iguana's own login credentials. However, it doesn't maintain a session and simply authenticates via HTTP basic authentication.

For simplicity, the example code doesn't restrict data access per user, but this could be implemented using #hash_tags if needed.

Advice about Reporting

Expand
titleWhy build reports from first principles instead of using built in reporting tools in applications?

Built-in reporting tools because, while they’re quick to set up, they often hit limits and can’t combine data from different systems, like customer management and accounting.

By extracting data from the source systems and store it in separate 'shadow' tables for easy querying gives more power and flexibility.

It’s a first-principles method to give more flexibility and power when building reports.

...