-
Notifications
You must be signed in to change notification settings - Fork 255
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Allow ignoring the ppolicy extension #6904
Conversation
6d393c2
to
343c768
Compare
|
How do I run those tests @alexey-tikhonov ? With |
The covscan step fails with: "Error: Process completed with exit code 247." - there's no logs uploaded or details, so I'm not sure if that's an internal CI failure, or something I should address. |
I'm going to disagree with codefactor here :) That one function is pretty simple. Let me know if you really want to redesign it for this change. |
Code looks good but there are more places where LDAP_CONTROL_PASSWORDPOLICYREQUEST is used. Also, can you squash the commits together, please? We will also need to add some metadata, namely:
|
I looked at the other sites using It looks like the only way to properly implement it would be to push the |
41cf86d
to
1f4ab74
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Hi, I just found some indentation requests.
Can you also modify this test and add parametrization to test use_ppolicy = false|true?
Adding it to state sounds like a good approach. Correct me if I'm wrong, but you already did this in the latest version of your patch, right? |
Yup, turned out much less of an issue than I expected (doesn't need to be passed between request/response) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The patch looks good. Please fix the indentation as Pavel already pointed out, so we can merge it.
It would be also nice if you also rebase to the current mater so we can see latest tests on this PR - but this is not strictly needed.
aa6d6c6
to
b6af61e
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM, thanks for the effort
|
Introduce `ldap_use_ppolicy` and allow disabling it to interact with providers that send broken ppolicy responses. This fixes interaction with the Okta LDAP gateway. Resolves: SSSD#6666 :config: Add a ldap_use_ppolicy option for backends with broken ppolicy extension handling.
b6af61e
to
54a158c
Compare
I took the liberty and fixed this, I also added this argument to other relevant test cases. Let's wait for PR CI. |
Introduce
ldap_use_ppolicy
and allow disabling it to interact with providers that send broken ppolicy responses.This fixes interaction with the Okta LDAP gateway.