--
You received this message because you are subscribed to the Google Groups "Quarkus Development mailing list" group.
To unsubscribe from this group and stop receiving emails from it, send an email to quarkus-dev...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/quarkus-dev/CAD%2BL2cwdvUreP_he53Bo_eTRQm%3D1b0DnQM%2BLkJMvPLV2RoLAiw%40mail.gmail.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/quarkus-dev/CAD%2BL2cxmoE6Wp4Z_gPc0i2DjuCWj2hKLdr1Mpp83xB6TaKFMVA%40mail.gmail.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/quarkus-dev/CAFm4XO0Fmo4yQBR-ym67KghbeJ-PFxvtX5oGTpq7Y91-3j3jWQ%40mail.gmail.com.
I already found it will break elytron-ldap (which is no real surprise). The error message is very informatie and tells you exactly what you need to do to fix it, so I don't know if we even really need to update the docs if this is not something we are telling people to use.
To view this discussion on the web visit https://groups.google.com/d/msgid/quarkus-dev/CAKW6fic-LOpP4VBaHj%3DtK-mUKRWV6Q98-O5%2BeMxz%3DGW9EUe-eQ%40mail.gmail.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/quarkus-dev/CAD%2BL2cxC%3DQeUbmfwbUzv_UCw1eFFOsqh3MgmeLofO_nnMa2Jcw%40mail.gmail.com.
When using a replicaset, it's very common to configure it this way.
Using SAAS solution like Mongo Atlas, this is the default.We can however detect it by parsing the MongoDB connection String.
To view this discussion on the web visit https://groups.google.com/d/msgid/quarkus-dev/CAD%2BL2cxmXrF_2J31g%3D3pnyb_P1pUCSks4OrHxzZqN1HFFkuy7A%40mail.gmail.com.
I have done that for LDAP. Is this a commonly used thing in mongo? If it is an edge case I think it is ok to require a property to enable it
--Guillaume
I am not sure if I like it either :-)The way I have justified it to myself is as follows:- This is a 'best effort' to mitigate a vulnerability that may never happen- Users of the quarkus-elytron-security-ldap extension will always need to add the property anyway, as the extension relies on JNDI, so the end result is the same
On Wed, Dec 15, 2021 at 12:25 AM Stuart Douglas <sdou...@redhat.com> wrote:I am not sure if I like it either :-)The way I have justified it to myself is as follows:- This is a 'best effort' to mitigate a vulnerability that may never happen- Users of the quarkus-elytron-security-ldap extension will always need to add the property anyway, as the extension relies on JNDI, so the end result is the sameThe scenario I have in mind is the following:1/ I create my Quarkus app2/ I assume JNDI is disabled given that's what is documented3/ There is a JNDI exploit but I don't feel that much concerned because of 2/4/ 2 months later, I add LDAP authentication via elytron-ldap5/ I'm screwed
--
You received this message because you are subscribed to the Google Groups "Quarkus Development mailing list" group.
To unsubscribe from this group and stop receiving emails from it, send an email to quarkus-dev...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/quarkus-dev/CAFm4XO1cV%2B0jZNccDr0KL3bMpMf60D8rAXzhGUYwA0pYN08p2Q%40mail.gmail.com.
--
You received this message because you are subscribed to the Google Groups "Quarkus Development mailing list" group.
To unsubscribe from this group and stop receiving emails from it, send an email to quarkus-dev...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/quarkus-dev/CALt0%2Bo_QyDxdKM4Joc1_Q-A3U3caA4EZKy9gRRuF%3DyZbqGCMjQ%40mail.gmail.com.
In between 4/5 we could also have the Quarkus JNDI implementation not resolve ObjectFactory bindings by default and require yet another flag to be enabled to do so. Without ObjectFactorys JNDI is much simpler and safer.