You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -181,7 +184,7 @@ If you are looking for a simple solution to administrate your ldap server you ca
181
184
#### Use auto-generated certificate
182
185
By default, TLS is already configured and enabled, certificate is created using container hostname (it can be set by docker run --hostname option eg: ldap.example.org).
183
186
184
-
docker run --hostname ldap.my-company.com --detach osixia/openldap:1.2.2
187
+
docker run --hostname ldap.my-company.com --detach osixia/openldap:1.2.3
185
188
186
189
#### Use your own certificate
187
190
@@ -191,24 +194,24 @@ You can set your custom certificate at run time, by mounting a directory contain
191
194
--env LDAP_TLS_CRT_FILENAME=my-ldap.crt \
192
195
--env LDAP_TLS_KEY_FILENAME=my-ldap.key \
193
196
--env LDAP_TLS_CA_CRT_FILENAME=the-ca.crt \
194
-
--detach osixia/openldap:1.2.2
197
+
--detach osixia/openldap:1.2.3
195
198
196
199
Other solutions are available please refer to the [Advanced User Guide](#advanced-user-guide)
197
200
198
201
#### Disable TLS
199
202
Add --env LDAP_TLS=false to the run command:
200
203
201
-
docker run --env LDAP_TLS=false --detach osixia/openldap:1.2.2
204
+
docker run --env LDAP_TLS=false --detach osixia/openldap:1.2.3
202
205
203
206
### Multi master replication
204
207
Quick example, with the default config.
205
208
206
209
#Create the first ldap server, save the container id in LDAP_CID and get its IP:
207
-
LDAP_CID=$(docker run --hostname ldap.example.org --env LDAP_REPLICATION=true --detach osixia/openldap:1.2.2)
210
+
LDAP_CID=$(docker run --hostname ldap.example.org --env LDAP_REPLICATION=true --detach osixia/openldap:1.2.3)
#Add the pair "ip hostname" to /etc/hosts on each containers,
@@ -244,7 +247,7 @@ You may have some problems with mounted files on some systems. The startup scrip
244
247
245
248
To fix that run the container with `--copy-service` argument :
246
249
247
-
docker run [your options] osixia/openldap:1.2.2 --copy-service
250
+
docker run [your options] osixia/openldap:1.2.3 --copy-service
248
251
249
252
### Debug
250
253
@@ -253,11 +256,11 @@ Available levels are: `none`, `error`, `warning`, `info`, `debug` and `trace`.
253
256
254
257
Example command to run the container in `debug` mode:
255
258
256
-
docker run --detach osixia/openldap:1.2.2 --loglevel debug
259
+
docker run --detach osixia/openldap:1.2.3 --loglevel debug
257
260
258
261
See all command line options:
259
262
260
-
docker run osixia/openldap:1.2.2 --help
263
+
docker run osixia/openldap:1.2.3 --help
261
264
262
265
263
266
## Environment Variables
@@ -300,6 +303,7 @@ TLS options:
300
303
-**LDAP_TLS**: Add openldap TLS capabilities. Can't be removed once set to true. Defaults to `true`.
301
304
-**LDAP_TLS_CRT_FILENAME**: Ldap ssl certificate filename. Defaults to `ldap.crt`
302
305
-**LDAP_TLS_KEY_FILENAME**: Ldap ssl certificate private key filename. Defaults to `ldap.key`
306
+
-**LDAP_TLS_DH_PARAM_FILENAME**: Ldap ssl certificate dh param file. Defaults to `dhparam.pem`
303
307
-**LDAP_TLS_CA_CRT_FILENAME**: Ldap ssl CA certificate filename. Defaults to `ca.crt`
304
308
-**LDAP_TLS_ENFORCE**: Enforce TLS but except ldapi connections. Can't be disabled once set to true. Defaults to `false`.
305
309
-**LDAP_TLS_CIPHER_SUITE**: TLS cipher suite. Defaults to `SECURE256:+SECURE128:-VERS-TLS-ALL:+VERS-TLS1.2:-RSA:-DHE-DSS:-CAMELLIA-128-CBC:-CAMELLIA-256-CBC`, based on Red Hat's [TLS hardening guide](https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/7/html/Security_Guide/sec-Hardening_TLS_Configuration.html)
@@ -322,7 +326,7 @@ Replication options:
322
326
323
327
If you want to set this variable at docker run command add the tag `#PYTHON2BASH:` and convert the yaml in python:
324
328
325
-
docker run --env LDAP_REPLICATION_HOSTS="#PYTHON2BASH:['ldap://ldap.example.org','ldap://ldap2.example.org']" --detach osixia/openldap:1.2.2
329
+
docker run --env LDAP_REPLICATION_HOSTS="#PYTHON2BASH:['ldap://ldap.example.org','ldap://ldap2.example.org']" --detach osixia/openldap:1.2.3
326
330
327
331
To convert yaml to python online: http://yaml-online-parser.appspot.com/
328
332
@@ -342,7 +346,7 @@ Other environment variables:
342
346
Environment variables can be set by adding the --env argument in the command line, for example:
343
347
344
348
docker run --env LDAP_ORGANISATION="My company" --env LDAP_DOMAIN="my-company.com" \
Be aware that environment variable added in command line will be available at any time
348
352
in the container. In this example if someone manage to open a terminal in this container
@@ -353,28 +357,28 @@ he will be able to read the admin password in clear text from environment variab
353
357
For example if your environment files **my-env.yaml** and **my-env.startup.yaml** are in /data/ldap/environment
354
358
355
359
docker run --volume /data/ldap/environment:/container/environment/01-custom \
356
-
--detach osixia/openldap:1.2.2
360
+
--detach osixia/openldap:1.2.3
357
361
358
362
Take care to link your environment files folder to `/container/environment/XX-somedir` (with XX < 99 so they will be processed before default environment files) and not directly to `/container/environment` because this directory contains predefined baseimage environment files to fix container environment (INITRD, LANG, LANGUAGE and LC_CTYPE).
359
363
360
364
Note: the container will try to delete the **\*.startup.yaml** file after the end of startup files so the file will also be deleted on the docker host. To prevent that : use --volume /data/ldap/environment:/container/environment/01-custom**:ro** or set all variables in **\*.yaml** file and don't use **\*.startup.yaml**:
361
365
362
366
docker run --volume /data/ldap/environment/my-env.yaml:/container/environment/01-custom/env.yaml \
363
-
--detach osixia/openldap:1.2.2
367
+
--detach osixia/openldap:1.2.3
364
368
365
369
#### Make your own image or extend this image
366
370
367
371
This is the best solution if you have a private registry. Please refer to the [Advanced User Guide](#advanced-user-guide) just below.
368
372
369
373
## Advanced User Guide
370
374
371
-
### Extend osixia/openldap:1.2.2 image
375
+
### Extend osixia/openldap:1.2.3 image
372
376
373
377
If you need to add your custom TLS certificate, bootstrap config or environment files the easiest way is to extends this image.
0 commit comments