-
-
Notifications
You must be signed in to change notification settings - Fork 1.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add more config options to saslauthd.conf #1708
Add more config options to saslauthd.conf #1708
Conversation
- SASLAUTHD_LDAP_PASSWORD_ATTR => ldap_password_attr - SASLAUTHD_LDAP_AUTH_METHOD => ldap_auth_method - SASLAUTHD_LDAP_MECH => ldap_mech
This looks fine to me, but it would have been nice if someone who uses ldap could have a look. @fbartels or @aendeavor you don't use ldap either, do you? |
I do not use LDAP either, but to be honest, this seems absolutely fine to me. The guidelines for scripting were read, implementation and documentation is flawless too. I feel like we won't get anyone anytime soon to who uses LDAP and can review these changes. @erik-wramner I'd say it's fine to merge this, what do you think? EDIT: The only thing that could be done is adding one or two tests to |
I am totally in favor of adding unit tests but I could not find a codecov like percentage and this did discourage me from writing tests By the way, a enormous thank you for this repository that solved a nightmare of implementations by adding a docker way of doing a cool web server. I have only one note: It seems to be missing things or a little bit of paint to make this project 100% percent LDAP TLS strict encryption compatible ;) |
I understand. Yeah, I would like to see Codecov too, but: I will propose this in #1699, where adding this action I would deem appropriate:) I've decided that this fine for merging. @erik-wramner if there are issue in the future why are a result of this PR, I think it's fine to have @williamdes look at them (too) as he seems to use LDAP ;) You mentioned:
That would be awesome. |
Here is my repository, I will try to add tests using real world tests and harden the security as much as possible |
Here we are 🚀 |
Follow up of: #980
Fixes: #1704
Note: actually I have to have 2 values for the
userPassword
attribute in my LDAP because sasl will not authenticate using my ssha256 stored password value, this pull-request is my hope to address my current issue.Documentations used: