Skip to content

Commit

Permalink
Display surname and givenName attributes.
Browse files Browse the repository at this point in the history
This PR makes it so that givenName and surname attributes are returned for users.

Fixes #5386
  • Loading branch information
ainmosni committed Jan 12, 2023
1 parent df0e643 commit 1f2f7d4
Show file tree
Hide file tree
Showing 3 changed files with 35 additions and 6 deletions.
6 changes: 6 additions & 0 deletions changelog/unreleased/enhancement-sname-attributes.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,6 @@
Enhancement: display surname and givenName attributes

When querying the graph API, the surname and givenName attributes are now displayed for users.

https://github.com/owncloud/ocis/pull/
https://github.com/owncloud/ocis/issues/5386
23 changes: 21 additions & 2 deletions services/graph/pkg/identity/ldap.go
Original file line number Diff line number Diff line change
Expand Up @@ -18,6 +18,11 @@ import (
"golang.org/x/exp/slices"
)

const (
givenNameAttribute = "givenname"
surNameAttribute = "sn"
)

type LDAP struct {
useServerUUID bool
writeEnabled bool
Expand Down Expand Up @@ -46,6 +51,8 @@ type userAttributeMap struct {
id string
mail string
userName string
givenName string
surname string
}

type groupAttributeMap struct {
Expand All @@ -67,6 +74,8 @@ func NewLDAPBackend(lc ldap.Client, config config.LDAP, logger *log.Logger) (*LD
id: config.UserIDAttribute,
mail: config.UserEmailAttribute,
userName: config.UserNameAttribute,
givenName: givenNameAttribute,
surname: surNameAttribute,
}

if config.GroupNameAttribute == "" || config.GroupIDAttribute == "" {
Expand Down Expand Up @@ -266,6 +275,8 @@ func (i *LDAP) getUserByDN(dn string) (*ldap.Entry, error) {
i.userAttributeMap.id,
i.userAttributeMap.mail,
i.userAttributeMap.userName,
i.userAttributeMap.surname,
i.userAttributeMap.givenName,
}

filter := fmt.Sprintf("(objectClass=%s)", i.userObjectClass)
Expand Down Expand Up @@ -373,6 +384,8 @@ func (i *LDAP) getLDAPUserByFilter(filter string) (*ldap.Entry, error) {
i.userAttributeMap.id,
i.userAttributeMap.mail,
i.userAttributeMap.userName,
i.userAttributeMap.surname,
i.userAttributeMap.givenName,
}
return i.searchLDAPEntryByFilter(i.userBaseDN, attrs, filter)
}
Expand Down Expand Up @@ -430,6 +443,8 @@ func (i *LDAP) GetUsers(ctx context.Context, queryParam url.Values) ([]*libregra
i.userAttributeMap.id,
i.userAttributeMap.mail,
i.userAttributeMap.userName,
i.userAttributeMap.surname,
i.userAttributeMap.givenName,
},
nil,
)
Expand Down Expand Up @@ -932,13 +947,17 @@ func (i *LDAP) createUserModelFromLDAP(e *ldap.Entry) *libregraph.User {

opsan := e.GetEqualFoldAttributeValue(i.userAttributeMap.userName)
id := e.GetEqualFoldAttributeValue(i.userAttributeMap.id)
givenName := e.GetEqualFoldAttributeValue(i.userAttributeMap.givenName)
surname := e.GetEqualFoldAttributeValue(i.userAttributeMap.surname)

if id != "" && opsan != "" {
return &libregraph.User{
DisplayName: pointerOrNil(e.GetEqualFoldAttributeValue(i.userAttributeMap.displayName)),
Mail: pointerOrNil(e.GetEqualFoldAttributeValue(i.userAttributeMap.mail)),
OnPremisesSamAccountName: &opsan,
Id: &id,
GivenName: &givenName,
Surname: &surname,
}
}
i.logger.Warn().Str("dn", e.DN).Msg("Invalid User. Missing username or id attribute")
Expand Down Expand Up @@ -991,11 +1010,11 @@ func (i *LDAP) userToLDAPAttrValues(user libregraph.User) (map[string][]string,
} else {
sn = *user.OnPremisesSamAccountName
}
attrs["sn"] = []string{sn}
attrs[i.userAttributeMap.surname] = []string{sn}

// When we get a givenName, we set the attribute.
if givenName := user.GetGivenName(); givenName != "" {
attrs["givenname"] = []string{givenName}
attrs[i.userAttributeMap.givenName] = []string{givenName}
}

if !i.usePwModifyExOp && user.PasswordProfile != nil && user.PasswordProfile.Password != nil {
Expand Down
12 changes: 8 additions & 4 deletions services/graph/pkg/identity/ldap_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -45,6 +45,8 @@ var userEntry = ldap.NewEntry("uid=user",
"displayname": {"DisplayName"},
"mail": {"user@example"},
"entryuuid": {"abcd-defg"},
"sn": {"surname"},
"givenname": {"givenName"},
})

var invalidUserEntry = ldap.NewEntry("uid=user",
Expand Down Expand Up @@ -136,6 +138,8 @@ func TestCreateUser(t *testing.T) {
assert.Equal(t, displayName, newUser.GetDisplayName())
assert.Equal(t, mail, newUser.GetMail())
assert.Equal(t, userName, newUser.GetOnPremisesSamAccountName())
assert.Equal(t, givenName, newUser.GetGivenName())
assert.Equal(t, surname, newUser.GetSurname())
}

func TestCreateUserModelFromLDAP(t *testing.T) {
Expand Down Expand Up @@ -359,14 +363,14 @@ func TestGetGroup(t *testing.T) {
BaseDN: "uid=user,ou=people,dc=test",
SizeLimit: 1,
Filter: "(objectClass=inetOrgPerson)",
Attributes: []string{"displayname", "entryUUID", "mail", "uid"},
Attributes: []string{"displayname", "entryUUID", "mail", "uid", "sn", "givenname"},
Controls: []ldap.Control(nil),
}
sr3 := &ldap.SearchRequest{
BaseDN: "uid=invalid,ou=people,dc=test",
SizeLimit: 1,
Filter: "(objectClass=inetOrgPerson)",
Attributes: []string{"displayname", "entryUUID", "mail", "uid"},
Attributes: []string{"displayname", "entryUUID", "mail", "uid", "sn", "givenname"},
Controls: []ldap.Control(nil),
}

Expand Down Expand Up @@ -454,14 +458,14 @@ func TestGetGroups(t *testing.T) {
BaseDN: "uid=user,ou=people,dc=test",
SizeLimit: 1,
Filter: "(objectClass=inetOrgPerson)",
Attributes: []string{"displayname", "entryUUID", "mail", "uid"},
Attributes: []string{"displayname", "entryUUID", "mail", "uid", "sn", "givenname"},
Controls: []ldap.Control(nil),
}
sr3 := &ldap.SearchRequest{
BaseDN: "uid=invalid,ou=people,dc=test",
SizeLimit: 1,
Filter: "(objectClass=inetOrgPerson)",
Attributes: []string{"displayname", "entryUUID", "mail", "uid"},
Attributes: []string{"displayname", "entryUUID", "mail", "uid", "sn", "givenname"},
Controls: []ldap.Control(nil),
}

Expand Down

0 comments on commit 1f2f7d4

Please sign in to comment.