Skip to content

Commit 7ce084b

Browse files
committed
Merge branch 'release-1.4.0' into stable
2 parents 2a03b39 + 23c26ed commit 7ce084b

File tree

17 files changed

+193
-60
lines changed

17 files changed

+193
-60
lines changed

.gitignore

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,2 +1,3 @@
1+
.DS_Store
12
!/.git*
23
/VOLUMES

CHANGELOG.md

Lines changed: 23 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4,16 +4,35 @@ All notable changes to this project will be documented in this file.
44
The format is based on [Keep a Changelog](http://keepachangelog.com/en/1.0.0/)
55
and this project adheres to [Semantic Versioning](http://semver.org/spec/v2.0.0.html).
66

7+
## [1.4.0] - 2020-06-15
8+
30M+ docker pulls 🎉🎉🎉 thanks to all contributors 💕
9+
### Added
10+
- Allow setting ports on ldap and ldaps #403. Thanks to @chirauki !
11+
- Address firewall issues on RHEL in README #394. Thanks to @BirkhoffLee !
12+
- Ensure ca certs are up to date #387. Thanks to @Jyrno42 !
13+
- Install slapd-contrib to include pbkdf2 pw support #365. Thanks to @col-panic !
14+
- Seeding from internal path. #361. Thanks to @dbck !
15+
- Enable openldap uid/gid to be specified at runtime #336. Thanks to @lj020326 !
16+
17+
### Changes
18+
- Update openldap 2.4.48 to 2.4.50
19+
- LDAP_TLS_PROTOCOL_MIN is deprecated #432. Thanks to @mettacrawler !
20+
- Better handling of environment variables checks #382. Thanks to @obourdon !
21+
22+
### Fixed
23+
- Multi-node replication fixes #420. Thanks to @pcolmer !
24+
- Grant root manage access to database #416. Thanks to @olia-dev !
25+
726
## [1.3.0] - 2019-09-29
8-
## Added
27+
### Added
928
- Multiarch support
1029

11-
## Changes
30+
### Changes
1231
- Update openldap 2.4.47 to 2.4.48 #247
1332
- Upgrade baseimage to light-baseimage:1.2.0 (debian buster)
1433

1534
## [1.2.5] - 2019-08-16
16-
## Added
35+
### Added
1736
- Support for docker secrets #325. Thanks to @anagno !
1837
- Add DISABLE_CHOWN environment variable #240
1938
- pqChecker lib to check passwords strength with ppolicy pwdCheckModule
@@ -252,6 +271,7 @@ Environment variable LDAP_REPLICATION_HDB_SYNCPROV changed to LDAP_REPLICATION_D
252271
## [0.10.0] - 2015-03-03
253272
New version initial release, no changelog before this sorry.
254273

274+
[1.4.0]: https://github.com/osixia/docker-openldap/compare/v1.3.0...v1.4.0
255275
[1.3.0]: https://github.com/osixia/docker-openldap/compare/v1.2.5...v1.3.0
256276
[1.2.5]: https://github.com/osixia/docker-openldap/compare/v1.2.4...v1.2.5
257277
[1.2.4]: https://github.com/osixia/docker-openldap/compare/v1.2.3...v1.2.4

Makefile

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
NAME = osixia/openldap
2-
VERSION = 1.3.0
2+
VERSION = 1.4.0
33

44
.PHONY: build build-nocache test tag-latest push push-latest release git-tag-version
55

README.md

Lines changed: 51 additions & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@
44
![Docker Stars](https://img.shields.io/docker/stars/osixia/openldap.svg)
55
![](https://images.microbadger.com/badges/image/osixia/openldap.svg)
66

7-
Latest release: 1.3.0 - OpenLDAP 2.4.48 - [Changelog](CHANGELOG.md) | [Docker Hub](https://hub.docker.com/r/osixia/openldap/) 
7+
Latest release: 1.4.0 - OpenLDAP 2.4.50 - [Changelog](CHANGELOG.md) | [Docker Hub](https://hub.docker.com/r/osixia/openldap/) 
88

99
**A docker image to run OpenLDAP.**
1010

@@ -19,6 +19,7 @@ Latest release: 1.3.0 - OpenLDAP 2.4.48 - [Changelog](CHANGELOG.md) | [Docker H
1919
- [Data persistence](#data-persistence)
2020
- [Edit your server configuration](#edit-your-server-configuration)
2121
- [Seed ldap database with ldif](#seed-ldap-database-with-ldif)
22+
- [Seed from internal path](#seed-from-internal-path)
2223
- [Use an existing ldap database](#use-an-existing-ldap-database)
2324
- [Backup](#backup)
2425
- [Administrate your ldap server](#administrate-your-ldap-server)
@@ -38,7 +39,7 @@ Latest release: 1.3.0 - OpenLDAP 2.4.48 - [Changelog](CHANGELOG.md) | [Docker H
3839
- [Docker Secrets](#docker-secrets)
3940
- [Make your own image or extend this image](#make-your-own-image-or-extend-this-image)
4041
- [Advanced User Guide](#advanced-user-guide)
41-
- [Extend osixia/openldap:1.3.0 image](#extend-osixiaopenldap130-image)
42+
- [Extend osixia/openldap:1.4.0 image](#extend-osixiaopenldap140-image)
4243
- [Make your own openldap image](#make-your-own-openldap-image)
4344
- [Tests](#tests)
4445
- [Kubernetes](#kubernetes)
@@ -58,11 +59,11 @@ If you find this image useful here's how you can help:
5859
## Quick Start
5960
Run OpenLDAP docker image:
6061

61-
docker run --name my-openldap-container --detach osixia/openldap:1.3.0
62+
docker run --name my-openldap-container --detach osixia/openldap:1.4.0
6263

6364
Do not forget to add the port mapping for both port 389 and 636 if you wish to access the ldap server from another machine.
6465

65-
docker run -p 389:389 -p 636:636 --name my-openldap-container --detach osixia/openldap:1.3.0
66+
docker run -p 389:389 -p 636:636 --name my-openldap-container --detach osixia/openldap:1.4.0
6667

6768
Either command starts a new container with OpenLDAP running inside. Let's make the first search in our LDAP container:
6869

@@ -98,7 +99,7 @@ It will create an empty ldap for the company **Example Inc.** and the domain **e
9899
By default the admin has the password **admin**. All those default settings can be changed at the docker command line, for example:
99100

100101
docker run --env LDAP_ORGANISATION="My Company" --env LDAP_DOMAIN="my-company.com" \
101-
--env LDAP_ADMIN_PASSWORD="JonSn0w" --detach osixia/openldap:1.3.0
102+
--env LDAP_ADMIN_PASSWORD="JonSn0w" --detach osixia/openldap:1.4.0
102103

103104
#### Data persistence
104105

@@ -120,6 +121,14 @@ For more information about docker data volume, please refer to:
120121

121122
> [https://docs.docker.com/engine/tutorials/dockervolumes/](https://docs.docker.com/engine/tutorials/dockervolumes/)
122123
124+
#### Firewall issues on RHEL/CentOS
125+
Docker Engine doesn't work well with firewall-cmd and can cause issues if you're connecting to the LDAP server from another container on the same machine. You can fix this by running:
126+
```
127+
$ firewall-cmd --add-port=389/tcp --permanent
128+
$ firewall-cmd --add-port=636/tcp --permanent
129+
$ firewall-cmd --reload
130+
```
131+
Learn more about this issue at https://github.com/moby/moby/issues/32138
123132

124133
#### Edit your server configuration
125134

@@ -149,12 +158,30 @@ argument to entrypoint if you don't want to overwrite them.
149158
# single file example:
150159
docker run \
151160
--volume ./bootstrap.ldif:/container/service/slapd/assets/config/bootstrap/ldif/50-bootstrap.ldif \
152-
osixia/openldap:1.3.0 --copy-service
161+
osixia/openldap:1.4.0 --copy-service
153162

154163
#directory example:
155164
docker run \
156165
--volume ./ldif:/container/service/slapd/assets/config/bootstrap/ldif/custom \
157-
osixia/openldap:1.3.0 --copy-service
166+
osixia/openldap:1.4.0 --copy-service
167+
168+
#### Seed from internal path
169+
170+
This image can load ldif and schema files at startup from an internal path. This is useful if a continuous integration service mounts automatically the working copy (sources) into a docker service, which has a relation to the ci job.
171+
172+
For example: Gitlab is not capable of mounting custom paths into docker services of a ci job, but gitlab automatically mounts the working copy in every service container. So the working copy (sources) are accessible under `/builds` in every services
173+
of a ci job. The path to the working copy can be obtained via `${CI_PROJECT_DIR}`. See also: https://docs.gitlab.com/runner/executors/docker.html#build-directory-in-service
174+
175+
This may also work with other CI services, if they automatically mount the working directory to the services of a ci job like gitlab ci does.
176+
177+
In order to seed ldif or schema files from internal path you must set the specific environment variable `LDAP_SEED_INTERNAL_LDIF_PATH` and/or `LDAP_SEED_INTERNAL_SCHEMA_PATH`. If set this will copy any *.ldif or *.schema file into the default seeding
178+
directories of this image.
179+
180+
Example variables defined in gitlab-ci.yml:
181+
182+
variables:
183+
LDAP_SEED_INTERNAL_LDIF_PATH: "${CI_PROJECT_DIR}/docker/openldap/ldif"
184+
LDAP_SEED_INTERNAL_SCHEMA_PATH: "${CI_PROJECT_DIR}/docker/openldap/schema"
158185

159186
### Use an existing ldap database
160187

@@ -165,7 +192,7 @@ simply mount this directories as a volume to `/var/lib/ldap` and `/etc/ldap/slap
165192

166193
docker run --volume /data/slapd/database:/var/lib/ldap \
167194
--volume /data/slapd/config:/etc/ldap/slapd.d \
168-
--detach osixia/openldap:1.3.0
195+
--detach osixia/openldap:1.4.0
169196

170197
You can also use data volume containers. Please refer to:
171198
> [https://docs.docker.com/engine/tutorials/dockervolumes/](https://docs.docker.com/engine/tutorials/dockervolumes/)
@@ -185,7 +212,7 @@ If you are looking for a simple solution to administrate your ldap server you ca
185212
#### Use auto-generated certificate
186213
By default, TLS is already configured and enabled, certificate is created using container hostname (it can be set by docker run --hostname option eg: ldap.example.org).
187214

188-
docker run --hostname ldap.my-company.com --detach osixia/openldap:1.3.0
215+
docker run --hostname ldap.my-company.com --detach osixia/openldap:1.4.0
189216

190217
#### Use your own certificate
191218

@@ -195,24 +222,24 @@ You can set your custom certificate at run time, by mounting a directory contain
195222
--env LDAP_TLS_CRT_FILENAME=my-ldap.crt \
196223
--env LDAP_TLS_KEY_FILENAME=my-ldap.key \
197224
--env LDAP_TLS_CA_CRT_FILENAME=the-ca.crt \
198-
--detach osixia/openldap:1.3.0
225+
--detach osixia/openldap:1.4.0
199226

200227
Other solutions are available please refer to the [Advanced User Guide](#advanced-user-guide)
201228

202229
#### Disable TLS
203230
Add --env LDAP_TLS=false to the run command:
204231

205-
docker run --env LDAP_TLS=false --detach osixia/openldap:1.3.0
232+
docker run --env LDAP_TLS=false --detach osixia/openldap:1.4.0
206233

207234
### Multi master replication
208235
Quick example, with the default config.
209236

210237
#Create the first ldap server, save the container id in LDAP_CID and get its IP:
211-
LDAP_CID=$(docker run --hostname ldap.example.org --env LDAP_REPLICATION=true --detach osixia/openldap:1.3.0)
238+
LDAP_CID=$(docker run --hostname ldap.example.org --env LDAP_REPLICATION=true --detach osixia/openldap:1.4.0)
212239
LDAP_IP=$(docker inspect -f "{{ .NetworkSettings.IPAddress }}" $LDAP_CID)
213240

214241
#Create the second ldap server, save the container id in LDAP2_CID and get its IP:
215-
LDAP2_CID=$(docker run --hostname ldap2.example.org --env LDAP_REPLICATION=true --detach osixia/openldap:1.3.0)
242+
LDAP2_CID=$(docker run --hostname ldap2.example.org --env LDAP_REPLICATION=true --detach osixia/openldap:1.4.0)
216243
LDAP2_IP=$(docker inspect -f "{{ .NetworkSettings.IPAddress }}" $LDAP2_CID)
217244

218245
#Add the pair "ip hostname" to /etc/hosts on each containers,
@@ -248,7 +275,7 @@ You may have some problems with mounted files on some systems. The startup scrip
248275

249276
To fix that run the container with `--copy-service` argument :
250277

251-
docker run [your options] osixia/openldap:1.3.0 --copy-service
278+
docker run [your options] osixia/openldap:1.4.0 --copy-service
252279

253280
### Debug
254281

@@ -257,11 +284,11 @@ Available levels are: `none`, `error`, `warning`, `info`, `debug` and `trace`.
257284

258285
Example command to run the container in `debug` mode:
259286

260-
docker run --detach osixia/openldap:1.3.0 --loglevel debug
287+
docker run --detach osixia/openldap:1.4.0 --loglevel debug
261288

262289
See all command line options:
263290

264-
docker run osixia/openldap:1.3.0 --help
291+
docker run osixia/openldap:1.4.0 --help
265292

266293

267294
## Environment Variables
@@ -327,7 +354,7 @@ Replication options:
327354

328355
If you want to set this variable at docker run command add the tag `#PYTHON2BASH:` and convert the yaml in python:
329356

330-
docker run --env LDAP_REPLICATION_HOSTS="#PYTHON2BASH:['ldap://ldap.example.org','ldap://ldap2.example.org']" --detach osixia/openldap:1.3.0
357+
docker run --env LDAP_REPLICATION_HOSTS="#PYTHON2BASH:['ldap://ldap.example.org','ldap://ldap2.example.org']" --detach osixia/openldap:1.4.0
331358

332359
To convert yaml to python online: http://yaml-online-parser.appspot.com/
333360

@@ -340,6 +367,8 @@ Other environment variables:
340367
- **LDAP_SSL_HELPER_PREFIX**: ssl-helper environment variables prefix. Defaults to `ldap`, ssl-helper first search config from LDAP_SSL_HELPER_* variables, before SSL_HELPER_* variables.
341368
- **HOSTNAME**: set the hostname of the running openldap server. Defaults to whatever docker creates.
342369
- **DISABLE_CHOWN**: do not perform any chown to fix file ownership. Defaults to `false`
370+
- LDAP_OPENLDAP_UID: runtime docker user uid to run container as
371+
- LDAP_OPENLDAP_GID: runtime docker user gid to run container as
343372

344373

345374
### Set your own environment variables
@@ -348,7 +377,7 @@ Other environment variables:
348377
Environment variables can be set by adding the --env argument in the command line, for example:
349378

350379
docker run --env LDAP_ORGANISATION="My company" --env LDAP_DOMAIN="my-company.com" \
351-
--env LDAP_ADMIN_PASSWORD="JonSn0w" --detach osixia/openldap:1.3.0
380+
--env LDAP_ADMIN_PASSWORD="JonSn0w" --detach osixia/openldap:1.4.0
352381

353382
Be aware that environment variable added in command line will be available at any time
354383
in the container. In this example if someone manage to open a terminal in this container
@@ -359,14 +388,14 @@ he will be able to read the admin password in clear text from environment variab
359388
For example if your environment files **my-env.yaml** and **my-env.startup.yaml** are in /data/ldap/environment
360389

361390
docker run --volume /data/ldap/environment:/container/environment/01-custom \
362-
--detach osixia/openldap:1.3.0
391+
--detach osixia/openldap:1.4.0
363392

364393
Take care to link your environment files folder to `/container/environment/XX-somedir` (with XX < 99 so they will be processed before default environment files) and not directly to `/container/environment` because this directory contains predefined baseimage environment files to fix container environment (INITRD, LANG, LANGUAGE and LC_CTYPE).
365394

366395
Note: the container will try to delete the **\*.startup.yaml** file after the end of startup files so the file will also be deleted on the docker host. To prevent that : use --volume /data/ldap/environment:/container/environment/01-custom**:ro** or set all variables in **\*.yaml** file and don't use **\*.startup.yaml**:
367396

368397
docker run --volume /data/ldap/environment/my-env.yaml:/container/environment/01-custom/env.yaml \
369-
--detach osixia/openldap:1.3.0
398+
--detach osixia/openldap:1.4.0
370399

371400
#### Docker Secrets
372401

@@ -385,13 +414,13 @@ This is the best solution if you have a private registry. Please refer to the [A
385414

386415
## Advanced User Guide
387416

388-
### Extend osixia/openldap:1.3.0 image
417+
### Extend osixia/openldap:1.4.0 image
389418

390419
If you need to add your custom TLS certificate, bootstrap config or environment files the easiest way is to extends this image.
391420

392421
Dockerfile example:
393422

394-
FROM osixia/openldap:1.3.0
423+
FROM osixia/openldap:1.4.0
395424
MAINTAINER Your Name <[email protected]>
396425

397426
ADD bootstrap /container/service/slapd/assets/config/bootstrap

example/docker-compose.yml

Lines changed: 8 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
version: '2'
22
services:
33
openldap:
4-
image: osixia/openldap:1.3.0
4+
image: osixia/openldap:1.4.0
55
container_name: openldap
66
environment:
77
LDAP_LOG_LEVEL: "256"
@@ -22,11 +22,10 @@ services:
2222
LDAP_TLS_CA_CRT_FILENAME: "ca.crt"
2323
LDAP_TLS_ENFORCE: "false"
2424
LDAP_TLS_CIPHER_SUITE: "SECURE256:-VERS-SSL3.0"
25-
LDAP_TLS_PROTOCOL_MIN: "3.1"
2625
LDAP_TLS_VERIFY_CLIENT: "demand"
2726
LDAP_REPLICATION: "false"
28-
#LDAP_REPLICATION_CONFIG_SYNCPROV: "binddn="cn=admin,cn=config" bindmethod=simple credentials=$LDAP_CONFIG_PASSWORD searchbase="cn=config" type=refreshAndPersist retry="60 +" timeout=1 starttls=critical"
29-
#LDAP_REPLICATION_DB_SYNCPROV: "binddn="cn=admin,$LDAP_BASE_DN" bindmethod=simple credentials=$LDAP_ADMIN_PASSWORD searchbase="$LDAP_BASE_DN" type=refreshAndPersist interval=00:00:00:10 retry="60 +" timeout=1 starttls=critical"
27+
#LDAP_REPLICATION_CONFIG_SYNCPROV: "binddn="cn=admin,cn=config" bindmethod=simple credentials=$$LDAP_CONFIG_PASSWORD searchbase="cn=config" type=refreshAndPersist retry="60 +" timeout=1 starttls=critical"
28+
#LDAP_REPLICATION_DB_SYNCPROV: "binddn="cn=admin,$$LDAP_BASE_DN" bindmethod=simple credentials=$$LDAP_ADMIN_PASSWORD searchbase="$$LDAP_BASE_DN" type=refreshAndPersist interval=00:00:00:10 retry="60 +" timeout=1 starttls=critical"
3029
#LDAP_REPLICATION_HOSTS: "#PYTHON2BASH:['ldap://ldap.example.org','ldap://ldap2.example.org']"
3130
KEEP_EXISTING_CONFIG: "false"
3231
LDAP_REMOVE_CONFIG_AFTER_SETUP: "true"
@@ -40,8 +39,11 @@ services:
4039
ports:
4140
- "389:389"
4241
- "636:636"
43-
domainname: "example.org" # important: same as hostname
44-
hostname: "example.org"
42+
# For replication to work correctly, domainname and hostname must be
43+
# set correctly so that "hostname"."domainname" equates to the
44+
# fully-qualified domain name for the host.
45+
domainname: "example.org"
46+
hostname: "ldap-server"
4547
phpldapadmin:
4648
image: osixia/phpldapadmin:latest
4749
container_name: phpldapadmin

example/extend-osixia-openldap/Dockerfile

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
FROM osixia/openldap:1.3.0
1+
FROM osixia/openldap:1.4.0
22
MAINTAINER Your Name <[email protected]>
33

44
ADD bootstrap /container/service/slapd/assets/config/bootstrap

example/kubernetes/simple/ldap-deployment.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ spec:
1313
spec:
1414
containers:
1515
- name: ldap
16-
image: osixia/openldap:1.3.0
16+
image: osixia/openldap:1.4.0
1717
volumeMounts:
1818
- name: ldap-data
1919
mountPath: /var/lib/ldap

example/kubernetes/using-secrets/gce-statefullset.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ spec:
1212
spec:
1313
containers:
1414
- name: azaldap
15-
image: osixia/openldap:1.3.0
15+
image: osixia/openldap:1.4.0
1616
imagePullPolicy: IfNotPresent
1717
#command: ["/bin/bash","-c","while [ 1 = 1 ] ; do sleep 1; date; done"]
1818
ports:

example/kubernetes/using-secrets/ldap-deployment.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ spec:
1313
spec:
1414
containers:
1515
- name: ldap
16-
image: osixia/openldap:1.3.0
16+
image: osixia/openldap:1.4.0
1717
args: ["--copy-service"]
1818
volumeMounts:
1919
- name: ldap-data

image/Dockerfile

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
# Use osixia/light-baseimage
22
# sources: https://github.com/osixia/docker-light-baseimage
3-
FROM osixia/light-baseimage:release-1.2.0-dev
3+
FROM osixia/light-baseimage:1.2.0
44

55
ARG LDAP_OPENLDAP_GID
66
ARG LDAP_OPENLDAP_UID
@@ -10,8 +10,8 @@ ARG PQCHECKER_MD5=c005ce596e97d13e39485e711dcbc7e1
1010

1111
# Add openldap user and group first to make sure their IDs get assigned consistently, regardless of whatever dependencies get added
1212
# If explicit uid or gid is given, use it.
13-
RUN if [ -z "${LDAP_OPENLDAP_GID}" ]; then groupadd -r openldap; else groupadd -r -g ${LDAP_OPENLDAP_GID} openldap; fi \
14-
&& if [ -z "${LDAP_OPENLDAP_UID}" ]; then useradd -r -g openldap openldap; else useradd -r -g openldap -u ${LDAP_OPENLDAP_UID} openldap; fi
13+
RUN if [ -z "${LDAP_OPENLDAP_GID}" ]; then groupadd -g 911 -r openldap; else groupadd -r -g ${LDAP_OPENLDAP_GID} openldap; fi \
14+
&& if [ -z "${LDAP_OPENLDAP_UID}" ]; then useradd -u 911 -r -g openldap openldap; else useradd -r -g openldap -u ${LDAP_OPENLDAP_UID} openldap; fi
1515

1616
# Add buster-backports in preparation for downloading newer openldap components, especially sladp
1717
RUN echo "deb http://ftp.debian.org/debian buster-backports main" >> /etc/apt/sources.list
@@ -33,11 +33,13 @@ RUN echo "path-include /usr/share/doc/krb5*" >> /etc/dpkg/dpkg.cfg.d/docker && a
3333
libsasl2-modules-sql \
3434
openssl \
3535
slapd \
36+
slapd-contrib \
3637
krb5-kdc-ldap \
3738
&& curl -o pqchecker.deb -SL http://www.meddeb.net/pub/pqchecker/deb/8/pqchecker_${PQCHECKER_VERSION}_amd64.deb \
3839
&& echo "${PQCHECKER_MD5} *pqchecker.deb" | md5sum -c - \
3940
&& dpkg -i pqchecker.deb \
4041
&& rm pqchecker.deb \
42+
&& update-ca-certificates \
4143
&& apt-get remove -y --purge --auto-remove curl ca-certificates \
4244
&& apt-get clean \
4345
&& rm -rf /var/lib/apt/lists/* /tmp/* /var/tmp/*

0 commit comments

Comments
 (0)