Summary | "Internal" Kolab users can't see account information |
Queue | Kolab |
Type | Bug |
State | Resolved |
Priority | 1. Low |
Owners | |
Requester | mzizka (at) hotmail (dot) com |
Created | 07/06/2006 (6963 days ago) |
Due | |
Updated | 08/18/2006 (6920 days ago) |
Assigned | 07/06/2006 (6963 days ago) |
Resolved | 08/18/2006 (6920 days ago) |
Github Issue Link | |
Github Pull Request | |
Milestone | |
Patch | No |
State ⇒ Resolved
New Attachment: account-info-kolab-internal.patch
previous patch.
Sorry, just been very busy, and still am. In a week or so I should
have more time to look at this.
_ldapBind() would be a better method name IMO. Beside that, looks
good.
have changed the code to only use the phpdn one everywhere (even for
binds that used to be anonymous, so for instance internal users can
also change their passwords with the passwd module). I don't think
there's any need for Horde to have manager access, unless we want to
manage users, which for now we can't. (And if we want to, it sure be a
separate and clearly labeled setting.)
Limited testing playing with the global address book in Turba with the
manager access showed it to be unstable. For instance it truncates the
list of email aliases. (Though I've not tried the HEAD revision.)
State ⇒ Feedback
_ldapBind() would be a better method name IMO. Beside that, looks good.
Queue ⇒ Kolab
New Attachment: account-info-kolab-new.patch
should work. Ditch the other one.
Priority ⇒ 1. Low
Type ⇒ Bug
Summary ⇒ "Internal" Kolab users can't see account information
Queue ⇒ Horde Base
New Attachment: account-info-kolab.patch
State ⇒ Unconfirmed
with Kolab when using its LDAP driver. This patch addresses three
proplems I encountered:
1) If you enable Kolab integration, it's not worth repeating the whole
LDAP configuration again just for this portal block. So I added a
driver which uses the Kolab configuration.
2) The LDAP driver binds anonymously, so special "internal" users in
Kolab will only see an error message because they cannot be seen when
binding anonyomously. Using this driver, the bind will use the Kolab's
pseudo-anonymous "nobody" user, or whichever was set in "phpdn" (see
#4049).3) When searching for the user entry, the LDAP systematically uses the
username stripped of any domain name. This was a problem for me since
I use the "mail" attribute for searching. I added an option on the
Kolab driver (probably should be added to the LDAP driver as well, but
I don't use that).
Critical comments welcome, as this is my first patch.