Summary | LDAP Prefs backend, kronolith tries to bind w/o password |
Queue | Kronolith |
Queue Version | 2.3.1 |
Type | Bug |
State | Duplicate |
Priority | 1. Low |
Owners | |
Requester | simon (at) simonandkate (dot) net |
Created | 05/06/2009 (5904 days ago) |
Due | |
Updated | 06/16/2009 (5863 days ago) |
Assigned | 05/12/2009 (5898 days ago) |
Resolved | 06/16/2009 (5863 days ago) |
Github Issue Link | |
Github Pull Request | |
Milestone | |
Patch | No |
State ⇒ Duplicate
ticket #8353.New Attachment: 0005-fix-8246-LDAP-Prefs-backend-kronolith-tries-to.patch
&Prefs::singleton($GLOBALS['conf']['prefs']['driver'],
the current user, but not necessarily. Thus the password should only
be used if $user is the current user.
The updated patch should now do exactly the above.
&Prefs::singleton($GLOBALS['conf']['prefs']['driver'],
the current user, but not necessarily. Thus the password should only
be used if $user is the current user.
new event after logon. With the patch I don't get the error. So it's
working for me.
From what you are saying though I understand that there are times
that Kronolith uses this code to call users other than the current
user at times?
In which case does the code need to be split to obtain the password
for when it's current user as per the patch that fixes my error message?
State ⇒ Feedback
&Prefs::singleton($GLOBALS['conf']['prefs']['driver'],
the current user, but not necessarily. Thus the password should only
be used if $user is the current user.
the string used in the Ingo issue, should have grepped for Prefs:: as
you mentioned.
New Attachment: 0003-fix-8246-LDAP-Prefs-backend-kronolith-tries-to.patch
being instanciated:
I see only the need to patch one place (see attachment).
Please correct me if i'm wrong.
grep -n "Prefs::" * -r
&Prefs::singleton($conf['prefs']['driver'], 'kronolith', $user, '',
null, false);
accessed by some other user? so there is no need for a patch.
&Prefs::singleton($GLOBALS['conf']['prefs']['driver'],
&Prefs::singleton($GLOBALS['conf']['prefs']['driver'],
&$GLOBALS['prefs']; for other users, the logged-in user password won't
help, i think. no
patch needed
Prefs::singleton($GLOBALS['conf']['prefs']['driver'],
Prefs::factory($conf['prefs']['driver'], 'horde',
Milestone ⇒
State ⇒ Unconfirmed
New Attachment: kronolith.jpg
Patch ⇒ No
Queue ⇒ Kronolith
Summary ⇒ LDAP Prefs backend, kronolith tries to bind w/o password
Type ⇒ Bug
Priority ⇒ 1. Low
bind to LDAP as user without password.
System is using LDAP for preferences. The first time after logging on
to the Horde system, saving a new event in Kronolith generates the
error message in the attached screenshot. The event saves correctly
and is written to SQL as needed. The issue appears to be cosmetic
only. Once the error has been thrown, subsequent event saves do NOT
produce the error until after a logout / login.
LDAP logs show:
May 6 18:25:18 server01 slapd[1156]: conn=73358 op=2 BIND
dn="uid=simon,ou=users,dc=simonandkate,dc=lan" method=128
May 6 18:25:18 server01 slapd[1156]: conn=73358 op=2 RESULT tag=97
err=53 text=unauthenticated bind (DN with no password) disallowed
In Ingo it was a line in Storage.php (see
http://bugs.horde.org/ticket/7418), but that's not the case here I
don't think.