fix: Allow using LDAP passwords in UIAA #1226

Merged
ginger merged 1 commit from jade/fix-ldap-uiaa into main 2025-12-16 14:04:36 +00:00
Owner

Fixes #1131

Fixes #1131
fix: Allow using LDAP passwords in UIAA
Some checks failed
Documentation / Build and Deploy Documentation (pull_request) Successful in 56s
Checks / Prek / Pre-commit & Formatting (pull_request) Failing after 1m51s
Checks / Prek / Clippy and Cargo Tests (pull_request) Successful in 11m6s
816f487766
Fixes #1131

Co-authored-by: Jade Ellis <jade@ellis.link>
Jade 2025-12-14 01:15:12 +00:00
Jade force-pushed jade/fix-ldap-uiaa from 816f487766
Some checks failed
Documentation / Build and Deploy Documentation (pull_request) Successful in 56s
Checks / Prek / Pre-commit & Formatting (pull_request) Failing after 1m51s
Checks / Prek / Clippy and Cargo Tests (pull_request) Successful in 11m6s
to fb09b700ce
All checks were successful
Documentation / Build and Deploy Documentation (pull_request) Successful in 1m6s
Checks / Prek / Pre-commit & Formatting (pull_request) Successful in 2m21s
Checks / Prek / Clippy and Cargo Tests (pull_request) Successful in 10m53s
2025-12-14 01:21:45 +00:00
Compare
nex approved these changes 2025-12-14 19:53:11 +00:00
nex left a comment
Owner

Do any of us have a way to test this?

Do any of us have a way to test this?
Author
Owner

Nope, but it looks like it should work to me. ideally @Clubs or one of the otehr users who reported this could test it

Nope, but it looks like it should work to me. ideally @Clubs or one of the otehr users who reported this could test it
First-time contributor

Attempted to make a dockerfile to give it a check, and still getting the error. I can check back when I'm less sleepy to see if my steps for setting up the image and compose files were flawed. However as of right now, it seems like there may still be an issue. I can also double check to make sure I didn't configure something wrong with LDAP either, and see if I can't figure out some more on my end

Attempted to make a dockerfile to give it a check, and still getting the error. I can check back when I'm less sleepy to see if my steps for setting up the image and compose files were flawed. However as of right now, it seems like there may still be an issue. I can also double check to make sure I didn't configure something wrong with LDAP either, and see if I can't figure out some more on my end
First-time contributor

Okay scratch that kinda, it works if the LDAP name and mxid local part are an exact match. The configuration being used over here with LDAP has uppercase characters in the names used at login, but that are lowercase with the mxids, which means one of the checks fails, and that leads to an m_forbidden due to an access token and user id mismatch. Changing the name of a user to lowercase in the LDAP setup fixes the issue and it works as intended. I'm unsure if thats considered a misconfiguration of the LDAP config, or if thats something that user id/access token validation is supposed to take into account

Okay scratch that kinda, it works if the LDAP name and mxid local part are an exact match. The configuration being used over here with LDAP has uppercase characters in the names used at login, but that are lowercase with the mxids, which means one of the checks fails, and that leads to an m_forbidden due to an access token and user id mismatch. Changing the name of a user to lowercase in the LDAP setup fixes the issue and it works as intended. I'm unsure if thats considered a misconfiguration of the LDAP config, or if thats something that user id/access token validation is supposed to take into account
Owner

@Clubs wrote in #1226 (comment):

Okay scratch that kinda, it works if the LDAP name and mxid local part are an exact match. The configuration being used over here with LDAP has uppercase characters in the names used at login, but that are lowercase with the mxids, which means one of the checks fails, and that leads to an m_forbidden due to an access token and user id mismatch. Changing the name of a user to lowercase in the LDAP setup fixes the issue and it works as intended. I'm unsure if thats considered a misconfiguration of the LDAP config, or if thats something that user id/access token validation is supposed to take into account

There's not really a way for Continuwuity's validation to take this into account because it always searches for the lowercase mxid and can't guess how it might be capitalized on the LDAP side.

@Clubs wrote in https://forgejo.ellis.link/continuwuation/continuwuity/pulls/1226#issuecomment-22173: > Okay scratch that kinda, it works if the LDAP name and mxid local part are an exact match. The configuration being used over here with LDAP has uppercase characters in the names used at login, but that are lowercase with the mxids, which means one of the checks fails, and that leads to an m_forbidden due to an access token and user id mismatch. Changing the name of a user to lowercase in the LDAP setup fixes the issue and it works as intended. I'm unsure if thats considered a misconfiguration of the LDAP config, or if thats something that user id/access token validation is supposed to take into account There's not really a way for Continuwuity's validation to take this into account because it always searches for the lowercase mxid and can't guess how it might be capitalized on the LDAP side.
First-time contributor

@ginger wrote in #1226 (comment):

@Clubs wrote in #1226 (comment):

Okay scratch that kinda, it works if the LDAP name and mxid local part are an exact match. The configuration being used over here with LDAP has uppercase characters in the names used at login, but that are lowercase with the mxids, which means one of the checks fails, and that leads to an m_forbidden due to an access token and user id mismatch. Changing the name of a user to lowercase in the LDAP setup fixes the issue and it works as intended. I'm unsure if thats considered a misconfiguration of the LDAP config, or if thats something that user id/access token validation is supposed to take into account

There's not really a way for Continuwuity's validation to take this into account because it always searches for the lowercase mxid and can't guess how it might be capitalized on the LDAP side.

Yeah, definitely feels like more of a configuration issue than a Continuwuity issue at this point. I'll do some reconfiguring of our LDAP setup on my end, which should let me check in with some other users as well. The only thing I'd suggest on this front is maybe a note about case being important somewhere, but I also don't know how much that would occur in the wild to begin with. Thank y'all so much for this

@ginger wrote in https://forgejo.ellis.link/continuwuation/continuwuity/pulls/1226#issuecomment-22176: > @Clubs wrote in #1226 (comment): > > > Okay scratch that kinda, it works if the LDAP name and mxid local part are an exact match. The configuration being used over here with LDAP has uppercase characters in the names used at login, but that are lowercase with the mxids, which means one of the checks fails, and that leads to an m_forbidden due to an access token and user id mismatch. Changing the name of a user to lowercase in the LDAP setup fixes the issue and it works as intended. I'm unsure if thats considered a misconfiguration of the LDAP config, or if thats something that user id/access token validation is supposed to take into account > > There's not really a way for Continuwuity's validation to take this into account because it always searches for the lowercase mxid and can't guess how it might be capitalized on the LDAP side. Yeah, definitely feels like more of a configuration issue than a Continuwuity issue at this point. I'll do some reconfiguring of our LDAP setup on my end, which should let me check in with some other users as well. The only thing I'd suggest on this front is maybe a note about case being important somewhere, but I also don't know how much that would occur in the wild to begin with. Thank y'all so much for this
First-time contributor

Can confirm that changing the casing has made it work for me and some of the other users with our ldap setup that were having the issue under this fix. Thank y'all so much

Can confirm that changing the casing has made it work for me and some of the other users with our ldap setup that were having the issue under this fix. Thank y'all so much
ginger force-pushed jade/fix-ldap-uiaa from fb09b700ce
All checks were successful
Documentation / Build and Deploy Documentation (pull_request) Successful in 1m6s
Checks / Prek / Pre-commit & Formatting (pull_request) Successful in 2m21s
Checks / Prek / Clippy and Cargo Tests (pull_request) Successful in 10m53s
to cdc53b3421
Some checks failed
Documentation / Build and Deploy Documentation (pull_request) Successful in 53s
Checks / Prek / Pre-commit & Formatting (pull_request) Successful in 1m27s
Checks / Prek / Clippy and Cargo Tests (pull_request) Successful in 8m46s
Documentation / Build and Deploy Documentation (push) Successful in 1m5s
Checks / Prek / Pre-commit & Formatting (push) Successful in 2m38s
Release Docker Image / Build linux-amd64 (release) (push) Successful in 6m11s
Release Docker Image / Build linux-arm64 (release) (push) Successful in 6m28s
Release Docker Image / Create Multi-arch Release Manifest (push) Failing after 10s
Checks / Prek / Clippy and Cargo Tests (push) Has been cancelled
Release Docker Image / Build linux-amd64 (max-perf) (push) Successful in 15m10s
Release Docker Image / Build linux-arm64 (max-perf) (push) Successful in 15m8s
Release Docker Image / Create Max-Perf Manifest (push) Failing after 10s
2025-12-16 13:55:35 +00:00
Compare
ginger scheduled this pull request to auto merge when all checks succeed 2025-12-16 13:56:05 +00:00
ginger merged commit cdc53b3421 into main 2025-12-16 14:04:36 +00:00
ginger added this to the 0.5.0 milestone 2025-12-16 14:04:52 +00:00
Sign in to join this conversation.
No reviewers
nex
No milestone
No project
No assignees
4 participants
Notifications
Due date
The due date is invalid or out of range. Please use the format "yyyy-mm-dd".

No due date set.

Dependencies

No dependencies set.

Reference
continuwuation/continuwuity!1226
No description provided.