You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -184,7 +184,7 @@ If you are looking for a simple solution to administrate your ldap server you ca
184
184
#### Use auto-generated certificate
185
185
By default, TLS is already configured and enabled, certificate is created using container hostname (it can be set by docker run --hostname option eg: ldap.example.org).
186
186
187
-
docker run --hostname ldap.my-company.com --detach osixia/openldap:1.2.3
187
+
docker run --hostname ldap.my-company.com --detach osixia/openldap:1.2.4
188
188
189
189
#### Use your own certificate
190
190
@@ -194,24 +194,24 @@ You can set your custom certificate at run time, by mounting a directory contain
194
194
--env LDAP_TLS_CRT_FILENAME=my-ldap.crt \
195
195
--env LDAP_TLS_KEY_FILENAME=my-ldap.key \
196
196
--env LDAP_TLS_CA_CRT_FILENAME=the-ca.crt \
197
-
--detach osixia/openldap:1.2.3
197
+
--detach osixia/openldap:1.2.4
198
198
199
199
Other solutions are available please refer to the [Advanced User Guide](#advanced-user-guide)
200
200
201
201
#### Disable TLS
202
202
Add --env LDAP_TLS=false to the run command:
203
203
204
-
docker run --env LDAP_TLS=false --detach osixia/openldap:1.2.3
204
+
docker run --env LDAP_TLS=false --detach osixia/openldap:1.2.4
205
205
206
206
### Multi master replication
207
207
Quick example, with the default config.
208
208
209
209
#Create the first ldap server, save the container id in LDAP_CID and get its IP:
210
-
LDAP_CID=$(docker run --hostname ldap.example.org --env LDAP_REPLICATION=true --detach osixia/openldap:1.2.3)
210
+
LDAP_CID=$(docker run --hostname ldap.example.org --env LDAP_REPLICATION=true --detach osixia/openldap:1.2.4)
Be aware that environment variable added in command line will be available at any time
352
352
in the container. In this example if someone manage to open a terminal in this container
@@ -357,28 +357,28 @@ he will be able to read the admin password in clear text from environment variab
357
357
For example if your environment files **my-env.yaml** and **my-env.startup.yaml** are in /data/ldap/environment
358
358
359
359
docker run --volume /data/ldap/environment:/container/environment/01-custom \
360
-
--detach osixia/openldap:1.2.3
360
+
--detach osixia/openldap:1.2.4
361
361
362
362
Take care to link your environment files folder to `/container/environment/XX-somedir` (with XX < 99 so they will be processed before default environment files) and not directly to `/container/environment` because this directory contains predefined baseimage environment files to fix container environment (INITRD, LANG, LANGUAGE and LC_CTYPE).
363
363
364
364
Note: the container will try to delete the **\*.startup.yaml** file after the end of startup files so the file will also be deleted on the docker host. To prevent that : use --volume /data/ldap/environment:/container/environment/01-custom**:ro** or set all variables in **\*.yaml** file and don't use **\*.startup.yaml**:
365
365
366
366
docker run --volume /data/ldap/environment/my-env.yaml:/container/environment/01-custom/env.yaml \
367
-
--detach osixia/openldap:1.2.3
367
+
--detach osixia/openldap:1.2.4
368
368
369
369
#### Make your own image or extend this image
370
370
371
371
This is the best solution if you have a private registry. Please refer to the [Advanced User Guide](#advanced-user-guide) just below.
372
372
373
373
## Advanced User Guide
374
374
375
-
### Extend osixia/openldap:1.2.3 image
375
+
### Extend osixia/openldap:1.2.4 image
376
376
377
377
If you need to add your custom TLS certificate, bootstrap config or environment files the easiest way is to extends this image.
0 commit comments