Merge pull request #15604 from nextcloud/fix/12682/fix-possible-override-of-uniquemember
fixes possible override of uniqueMember by autodetection
This commit is contained in:
commit
755611866e
|
@ -27,7 +27,7 @@ OCA = OCA || {};
|
|||
run: function(model, configID) {
|
||||
// TODO: might be better with configuration marker as uniqueMember
|
||||
// is a valid value (although probably less common then member and memberUid).
|
||||
if(model.configuration.ldap_group_member_assoc_attribute && model.configuration.ldap_group_member_assoc_attribute !== 'uniqueMember') {
|
||||
if(model.configuration.ldap_group_member_assoc_attribute && model.configuration.ldap_group_member_assoc_attribute !== '') {
|
||||
// a value is already set. Don't overwrite and don't ask LDAP
|
||||
// without reason.
|
||||
return false;
|
||||
|
|
|
@ -456,7 +456,7 @@ class Configuration {
|
|||
'ldap_quota_def' => '',
|
||||
'ldap_quota_attr' => '',
|
||||
'ldap_email_attr' => '',
|
||||
'ldap_group_member_assoc_attribute' => 'uniqueMember',
|
||||
'ldap_group_member_assoc_attribute' => '',
|
||||
'ldap_cache_ttl' => 600,
|
||||
'ldap_uuid_user_attribute' => 'auto',
|
||||
'ldap_uuid_group_attribute' => 'auto',
|
||||
|
|
|
@ -279,7 +279,7 @@ class LDAPProvider implements ILDAPProvider, IDeletionFlagSupport {
|
|||
/**
|
||||
* Get the LDAP type of association between users and groups
|
||||
* @param string $gid group id
|
||||
* @return string the configuration, one of: 'memberUid', 'uniqueMember', 'member', 'gidNumber'
|
||||
* @return string the configuration, one of: 'memberUid', 'uniqueMember', 'member', 'gidNumber', ''
|
||||
* @throws \Exception if group id was not found in LDAP
|
||||
*/
|
||||
public function getLDAPGroupMemberAssoc($gid) {
|
||||
|
|
|
@ -794,7 +794,7 @@ class Wizard extends LDAPUtility {
|
|||
* @throws \Exception
|
||||
*/
|
||||
private function detectGroupMemberAssoc() {
|
||||
$possibleAttrs = array('uniqueMember', 'memberUid', 'member', 'gidNumber');
|
||||
$possibleAttrs = ['uniqueMember', 'memberUid', 'member', 'gidNumber'];
|
||||
$filter = $this->configuration->ldapGroupFilter;
|
||||
if(empty($filter)) {
|
||||
return false;
|
||||
|
@ -803,7 +803,7 @@ class Wizard extends LDAPUtility {
|
|||
if(!$cr) {
|
||||
throw new \Exception('Could not connect to LDAP');
|
||||
}
|
||||
$base = $this->configuration->ldapBase[0];
|
||||
$base = $this->configuration->ldapBaseGroups[0] ?: $this->configuration->ldapBase[0];
|
||||
$rr = $this->ldap->search($cr, $base, $filter, $possibleAttrs, 0, 1000);
|
||||
if(!$this->ldap->isResource($rr)) {
|
||||
return false;
|
||||
|
@ -812,7 +812,7 @@ class Wizard extends LDAPUtility {
|
|||
while(is_resource($er)) {
|
||||
$this->ldap->getDN($cr, $er);
|
||||
$attrs = $this->ldap->getAttributes($cr, $er);
|
||||
$result = array();
|
||||
$result = [];
|
||||
$possibleAttrsCount = count($possibleAttrs);
|
||||
for($i = 0; $i < $possibleAttrsCount; $i++) {
|
||||
if(isset($attrs[$possibleAttrs[$i]])) {
|
||||
|
|
|
@ -43,6 +43,7 @@ Feature: LDAP
|
|||
Scenario: Test group filter with one specific group
|
||||
Given modify LDAP configuration
|
||||
| ldapGroupFilter | cn=RedGroup |
|
||||
| ldapGroupMemberAssocAttr | member |
|
||||
| ldapBaseGroups | ou=Groups,ou=Ordinary,dc=nextcloud,dc=ci |
|
||||
And As an "admin"
|
||||
And sending "GET" to "/cloud/groups"
|
||||
|
@ -56,6 +57,7 @@ Feature: LDAP
|
|||
Scenario: Test group filter with two specific groups
|
||||
Given modify LDAP configuration
|
||||
| ldapGroupFilter | (\|(cn=RedGroup)(cn=GreenGroup)) |
|
||||
| ldapGroupMemberAssocAttr | member |
|
||||
| ldapBaseGroups | ou=Groups,ou=Ordinary,dc=nextcloud,dc=ci |
|
||||
And As an "admin"
|
||||
And sending "GET" to "/cloud/groups"
|
||||
|
@ -69,6 +71,7 @@ Feature: LDAP
|
|||
Scenario: Test group filter ruling out a group from a different base
|
||||
Given modify LDAP configuration
|
||||
| ldapGroupFilter | (objectClass=groupOfNames) |
|
||||
| ldapGroupMemberAssocAttr | member |
|
||||
| ldapBaseGroups | ou=Groups,ou=Ordinary,dc=nextcloud,dc=ci |
|
||||
And As an "admin"
|
||||
And sending "GET" to "/cloud/groups"
|
||||
|
|
|
@ -35,6 +35,7 @@ Scenario: Test LDAP group retrieval with numeric group ids and nesting
|
|||
Given modify LDAP configuration
|
||||
| ldapBaseGroups | ou=NumericGroups,dc=nextcloud,dc=ci |
|
||||
| ldapGroupFilter | (objectclass=groupOfNames) |
|
||||
| ldapGroupMemberAssocAttr | member |
|
||||
| ldapNestedGroups | 1 |
|
||||
| useMemberOfToDetectMembership | 1 |
|
||||
And As an "admin"
|
||||
|
|
|
@ -151,7 +151,7 @@ interface ILDAPProvider {
|
|||
/**
|
||||
* Get the LDAP attribute name for the type of association betweeen users and groups
|
||||
* @param string $gid group id
|
||||
* @return string the configuration, one of: 'memberUid', 'uniqueMember', 'member', 'gidNumber'
|
||||
* @return string the configuration, one of: 'memberUid', 'uniqueMember', 'member', 'gidNumber', ''
|
||||
* @throws \Exception if group id was not found in LDAP
|
||||
* @since 13.0.0
|
||||
*/
|
||||
|
|
Loading…
Reference in New Issue