Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Fix eauth error with openLDAP/389 directory server groups #38406

Merged
merged 1 commit into from
Jan 6, 2017
Merged

Fix eauth error with openLDAP/389 directory server groups #38406

merged 1 commit into from
Jan 6, 2017

Conversation

alex-zel
Copy link
Contributor

Fixes #36148

What does this PR do?

Enable external (ldap) authorization based on users and groups.

What issues does this PR fix or reference?

#36148

Previous Behavior

It seems that the current tests for external user/group permissions fail to check groups, if permissions are set for groups only and no users are mentioned in the config file, users of that group won't be able to run commands.

New Behavior

There is already a test that checks for groups and users in master.py, after removing the test that checks user permissions it is possible to use groups.

Tests written?

No

Please review Salt's Contributing Guide for best practices.

@cachedout
Copy link
Contributor

@cro Can you look at this? I know you've been in the LDAP/eauth code as of late.

@cachedout cachedout requested a review from cro January 4, 2017 19:27
@cro
Copy link
Contributor

cro commented Jan 6, 2017

Go Go Jenkins!

@cro cro merged commit 179d385 into saltstack:2016.11 Jan 6, 2017
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants