-
Notifications
You must be signed in to change notification settings - Fork 1
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[QA] UI maps credentials to a malformed URL, when protocol is specified. #258
Comments
not a regression, needs checking later |
Seems there is no workaround and this is mandatory for the authentication scheme. Blocker. |
@C0rby had some objections as well... IIRC reading back the password to the UI (even if it is hidden) isn't recommended https://github.com/owncloud/search_elastic/blob/master/js/settings/admin.js#L12-L19 So please coordinate with @C0rby if required... |
Summary: The URL parameter needs a proper handling for URL schemas (https/http/none) |
Yes, the password shouldn't be displayed in the UI nor should it be sent back as an API response. |
@jnweiger I have been working on this ticket and would like to know if the protocol could be a select with two options (HTTP, HTTPS)? |
The protocol should IMO be part of the url and not a separate field. Php should provide a function to properly parse/split and build urls instead of the manual split and concatenation. |
Well the least that shoud be done is that the password field is URL encoded before sending the request. But generally the URL handling needs to be made more resilient. That is why I say that we need to parse the URL and then correctly append the path. |
@C0rby I think that after the connection port should not go anything else because in that field we are configuring the connection to the server, not requests to the elastic. Do you think there is any scenario where you have parts of the url after the port? |
It's not about what you intend a user to put there but what a (malicious) user COULD put there. This could be abused to scan the internal network for hosts/applications. Even if it would take a while with that method. |
And also yes, I think there could be setups where the elastic server is reachable at a subpath like 10.10.10.161/elastic. |
Confirmed fixed in 2.2.0-rc1 |
New scope: HTTPS support is needed for Elastic.
Seen in search_elastic 2.1.0 RC1
occ config:app:get search_elastic servers
Switch the Authentiction dropdown from 'Select Authentication' to 'User and password'
enter correct username and password. Click save settings, the indicator remains red and the message says cannot connect.
The server URL is now malformed:
occ config:app:get search_elastic servers
Expected behaviour
://
Attempted Workaround
This stores the URL correctly in the database (
http://elastic:[email protected]:9200
), but after a refresh the web page displays garbled fields:Still an index cannot be created:
Actual workaround
The text was updated successfully, but these errors were encountered: