-
-
Notifications
You must be signed in to change notification settings - Fork 4.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add LDAP test settings command #50567
Conversation
… getters for backends Signed-off-by: Côme Chilliet <come.chilliet@nextcloud.com>
…tings Signed-off-by: Côme Chilliet <come.chilliet@nextcloud.com>
I’m quite happy with current state, only thing I would like to add is clearing the cache maybe? |
Nifty stuff 🤩 The Clearing the cache is useful, but would give it a new command. |
Signed-off-by: Côme Chilliet <come.chilliet@nextcloud.com>
Signed-off-by: Côme Chilliet <come.chilliet@nextcloud.com>
Well yeah but it’s not that easy to break into submethods because there are some early return in there to stop earlier.
I now added a |
protected function configure(): void { | ||
$this | ||
->setName('ldap:test-user-settings') | ||
->setDescription('Runs tests and show information about user related LDAP settings') |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Could we add a better description? I'm unsure what you mean with "Runs tests" 🤔
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
🐘
/backport to stable31 |
/backport to stable30 |
Summary
To help debugging issues related to LDAP configuration, this command shows how Nextcloud sees a specific LDAP user, and if provided an associated group.
This should help debugging situations where group<>member association is not working as expected, and may also help in any situation where LDAP configuration is involved.
Checklist