-
Notifications
You must be signed in to change notification settings - Fork 76
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
support for per-user encryption #537
Conversation
This comment has been minimized.
This comment has been minimized.
I'm unsure what I need to do to fix the CI error. Any help? |
Signed-off-by: summersab <[email protected]>
Regarding nextcloud/server#27929 (comment) @summersab you mean the CI drone check? Not sure either, it says the "master" and "stable21" integration tests were cancelled, while the "stable22" integration tests was done and succeeded. Not sure how those work. I just confirmed to run another check (composer) which went well, but I don't think that is related to what drone does. Can you rebase onto current master, so I can see whether drone fails exact the same way? |
Failures seemed to be an unrelated timeout, I've retriggered the CI. |
* @return string|null | ||
* @since 23.0.0 | ||
*/ | ||
public function getCurrentUserSecret() { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Waiting for server PR to be finalized, with a new interface
I tried this patch and there are currently some issues: The The
|
This comment has been minimized.
This comment has been minimized.
Whether it's Generally But I lack the overview to reliably follow how everything is linked. As passwords intentionally were made nullable, looks like using |
@MichaIng thanks for bringing me up to speed on the discussion! @summersab I had some time at hand, so here is my working version of this patch, that additionally fixes #547 https://gist.github.com/immerda/527cd5ef0c73cb0e5e4ed6e34c824324 |
@immerda Your patch is causing some errors after I apply it:
I'm pretty sure the rest of my code is clean and unmodified. Any clue? |
hah, good that somebody else tests it :) I used this unused table user_saml_auth_token to store the hashes, since it was already there... But that table seems to also have a field called name, for some reason and depending on the database backend, it complains if we don't set it to something. so let's set the name to sso_secret_hash, it could be useful in the future if there are multiple kind of tokens... I have update the patch. basically added lines 38, 67 and 73 once it is working you should see hashes being inserted into user_saml_auth_token |
Seems to be working, @immerda! I'll poke at it a little more over the weekend just to be sure. |
@summersab sorry, found another bug that is only triggered when the token exires. updated my gist. line 65 needs to be |
You're a good man*, @immerda - thanks! *Or woman - don't want to assume. |
nextcloud/server#27929 has been merged, so work here can go on. When the new interface is used, a password must be set, the string is not nullable at server side. |
Implementing PR #498 from immerda. It's a feature I'd like to have, and he hasn't been active on GitHub since December. So, I'd like to submit the PR.