-
Notifications
You must be signed in to change notification settings - Fork 34
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Make LDAP client-side TLS authentication optional #137
base: master
Are you sure you want to change the base?
Conversation
Is there a chance that this could be reviewed sometime soon? |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Hi @sabo, thanks for the contribution!
Sorry for the delay on merging―it's likely because there were no tests to accompany this change in behavior, and it might be a while before the maintainers can get around to adding them.
If you're interested in accelerating the release of this patch: a contribution of tests would be gladly accepted!
tests added |
Hi, since @sabo added tests could it be reviewed now? Pretty please :) |
Does anything else need to happen for this to be reviewed? |
@op-ct re-upping this, is the review for this PR waiting on anything else on my end? |
Adds a configuration option
client_tls
tosssd::provider::ldap
that, when set to false, lets SSSD LDAP providers be configured without setting client-side TLS certificate and key options.