Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Fix handling of invalid LDAP users and groups #4331

Merged
merged 5 commits into from
Aug 5, 2022

Conversation

rhafer
Copy link
Contributor

@rhafer rhafer commented Aug 4, 2022

Description

We fixed an issue where ocis would exit with a panic when LDAP users or groups where missing required attributes (e.g. the id)
User and Groups missing any of the required attributes are now ignored.

Related Issue

Types of changes

  • Bug fix (non-breaking change which fixes an issue)

Checklist:

  • Code changes
  • Unit tests added

rhafer added 5 commits August 4, 2022 10:42
When expanding members of an LDAP group we did two group lookup per
Group. This can be avoided by expanding the members right from the
Group entry of the first query.

This also add some more unit test coverage, especially to the expand/select
group member test cases.
@rhafer rhafer requested a review from dragonchaser August 4, 2022 08:49
@sonarqubecloud
Copy link

sonarqubecloud bot commented Aug 4, 2022

Kudos, SonarCloud Quality Gate passed!    Quality Gate passed

Bug A 0 Bugs
Vulnerability A 0 Vulnerabilities
Security Hotspot A 0 Security Hotspots
Code Smell A 7 Code Smells

85.6% 85.6% Coverage
9.6% 9.6% Duplication

@rhafer rhafer requested review from micbar and wkloucek August 5, 2022 13:22
@rhafer rhafer merged commit b18944b into owncloud:master Aug 5, 2022
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Panic on missing group schema ID
2 participants