mirror of
https://github.com/lldap/lldap.git
synced 2026-04-25 16:25:55 +03:00
[GH-ISSUE #415] Simple auth fails with Perl LDAP library (Convos.chat) #160
Labels
No labels
backend
blocked
bug
cleanup
dependencies
docker
documentation
duplicate
enhancement
enhancement
frontend
github_actions
good first issue
help wanted
help wanted
integration
invalid
ldap
pull-request
question
rust
rust
tests
wontfix
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/lldap-lldap#160
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @poVoq on GitHub (Jan 10, 2023).
Original GitHub issue: https://github.com/lldap/lldap/issues/415
Hard to say where exactly it fails but I can't get Convos.chat to work with LLDAP.
The support is rather simple, see the LDAP auth plugin documentation here.
It seems like the request is made as I see this in the LLDAP logs:
But Convos.chat side it claims the user or password are wrong
I made an very unspecific bug report on the Convos.chat issue tracker but I think neither me or anyone there might have an idea what is going wrong: https://github.com/convos-chat/convos/issues/815
Is there a way to narrow it down further on the LLDAP side? Thanks!
Edit; ah, verbose logging tells a better story (actual user replaced with
user@example.com):@nitnelave commented on GitHub (Jan 10, 2023):
Sure! Could you run lldap in verbose mode and post the logs?
On Tue, 10 Jan 2023, 19:06 poVoq, @.***> wrote:
@poVoq commented on GitHub (Jan 10, 2023):
See my edit above. It looks like it is not passing the
ou=peoplepart, but LLDAP requires that?@nitnelave commented on GitHub (Jan 10, 2023):
Yes, it's required. You should just be able to adjust the CONVOS_AUTH_LDAP_DN variable to add it
@poVoq commented on GitHub (Jan 10, 2023):
I just tried that via
CONVOS_AUTH_LDAP_URL="ldap://localhost:3890?ou=peoplebut the error is the same. I think this might be a bug Convos side in how the login name is converted into a DN.@nitnelave commented on GitHub (Jan 10, 2023):
No, not in the URL! :)
You define the pattern with the other variable:
CONVOS_AUTH_LDAP_DN="uid=%uid,dc=%domain,dc=%tld"You can just replace that with
CONVOS_AUTH_LDAP_DN="uid=%uid,ou=people,dc=%domain,dc=%tld"On Tue, 10 Jan 2023, 21:34 poVoq, @.***> wrote:
@poVoq commented on GitHub (Jan 10, 2023):
Duh, now I feel stupid.
This seems to mostly work. The login still fails on first try, but since the lldap log said "success" I tried again. Maybe because the Convos account had to be created first.
Ok but looks like on LLDAP side there is nothing wrong. Thanks for the help!
I'll probably make a PR with the settings once I have ironed out the remaining paper-cuts.