-
Notifications
You must be signed in to change notification settings - Fork 178
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Coordination about escaping issues and fixes #243
Comments
|
Thank you Erik for pushing this forward. From my organization I can only say we looked at PR #225 and it didn't work for us (@m-erhardt can explain the details better (if I remember correctly PR #225 fixes the user field by escaping a parenthesis in the username but more LDAP fields could be involved an need to be escaped)), hence there is PR #238 which we have running productively since July. I think both PR #225 and PR #238 present no breaking changes but bugfixes. |
Hi everyone & thanks to @consideRatio for picking this up. As my colleague @Nikolai-Hlubek already mentioned we initially looked into #225. After diving deeper into this rabbit hole (LDAP RFC, tests with Active Directory vs OpenLDAP) I came to the conclusion that there is a misunderstanding (or probably lack of documentation) with regards to what From the current documentation:
In my opinion So my proposed change in #238 does not tamper with
So in principle (I am not 100% sure though - who knows what LDAP implementations are out there) #238 should not be a breaking change as unaffected users (which do not have these LDAP filter characters in their LDAP attributes) should not experience any change in behaviour. All affected users previously ran into |
Thank you @Nikolai-Hlubek and @m-erhardt! I'm now quite confident #238 was a bugfix without breaking changes that should be done at all time, and not conditionally. I'm not sure if that fixed #225 as well, but I think maybe it did. @hammadab could you check if what is now in the main branch resolves your issue in #225? |
I think I've spotted a remaining bug related to EDIT: I've attempted to fix this bug, if it is a bug, with #253. In the resolve_username function, there is no bug. It looks like this, and the ldapauthenticator/ldapauthenticator/ldapauthenticator.py Lines 246 to 252 in cf6d3ae
ldapauthenticator/ldapauthenticator/ldapauthenticator.py Lines 370 to 375 in cf6d3ae
But, the bug is that the variable was escaped is re-used in ldapauthenticator/ldapauthenticator/ldapauthenticator.py Lines 419 to 430 in cf6d3ae
|
Besides this, I'm asking myself if: |
I've opened #267 to hopefully conclude the escaping business - help reasoning that it could make sense to merge or not would be great if anyone has the capacity to help with some review. |
Hey, I'm trying to co-ordinate help to make progress to an escaping bug without actual knowledge of LDAP or this authenticator, so I'm pinging a few people involved:
Goal
What I can do
I can review and merge as a jupyterhub org maintainer, but I need assicance because I'm not familiar with LDAP tech. A key concern for me when reviewing is to not disrupt existing users without issues while fixing something for other users with issues, to do that I want to ensure we have a clear communication about any breaking changes if they are needed.
What can you do?
The text was updated successfully, but these errors were encountered: