Skip to content

Commit e4df8b2

Browse files
committed
Merge branch 'hotfix-1.1.11' into stable
2 parents e55a7ce + 7f8a93a commit e4df8b2

File tree

10 files changed

+74
-58
lines changed

10 files changed

+74
-58
lines changed

CHANGELOG.md

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,11 @@
11
# Changelog
22

3+
## 1.1.11
4+
- Add krb5-kdc-ldap with doc examples #171
5+
- Fix NFS issue #169
6+
- Add support of readonly user in custom bootstrap ldif #162
7+
- Create schemas in a consistent order. #174
8+
39
## 1.1.10
410
Fix:
511
- Readme #145 #148

Makefile

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
NAME = osixia/openldap
2-
VERSION = 1.1.10
2+
VERSION = 1.1.11
33

44
.PHONY: build build-nocache test tag-latest push push-latest release git-tag-version
55

README.md

Lines changed: 36 additions & 25 deletions
Original file line numberDiff line numberDiff line change
@@ -4,9 +4,9 @@
44
![Docker Stars](https://img.shields.io/docker/stars/osixia/openldap.svg)
55
![](https://images.microbadger.com/badges/image/osixia/openldap.svg)
66

7-
Latest release: 1.1.10 - OpenLDAP 2.4.44 - [Changelog](CHANGELOG.md) | [Docker Hub](https://hub.docker.com/r/osixia/openldap/) 
7+
Latest release: 1.1.11 - OpenLDAP 2.4.44 - [Changelog](CHANGELOG.md) | [Docker Hub](https://hub.docker.com/r/osixia/openldap/) 
88

9-
/!\ Security warning: Databases created with image version up to 1.1.10 creates two admin users with the same password, if you changed admin password after bootstrap you may be concerned by [issue #161](https://github.com/osixia/docker-openldap/issues/161).
9+
/!\ Security warning: Databases created with image version up to 1.1.11 creates two admin users with the same password, if you changed admin password after bootstrap you may be concerned by [issue #161](https://github.com/osixia/docker-openldap/issues/161).
1010

1111
**A docker image to run OpenLDAP.**
1212

@@ -37,11 +37,12 @@ Latest release: 1.1.10 - OpenLDAP 2.4.44 - [Changelog](CHANGELOG.md) | [Docker
3737
- [Link environment file](#link-environment-file)
3838
- [Make your own image or extend this image](#make-your-own-image-or-extend-this-image)
3939
- [Advanced User Guide](#advanced-user-guide)
40-
- [Extend osixia/openldap:1.1.10 image](#extend-osixiaopenldap1110-image)
40+
- [Extend osixia/openldap:1.1.11 image](#extend-osixiaopenldap1111-image)
4141
- [Make your own openldap image](#make-your-own-openldap-image)
4242
- [Tests](#tests)
4343
- [Kubernetes](#kubernetes)
4444
- [Under the hood: osixia/light-baseimage](#under-the-hood-osixialight-baseimage)
45+
- [Security](#security)
4546
- [Changelog](#changelog)
4647

4748
## Contributing
@@ -55,7 +56,7 @@ If you find this image useful here's how you can help:
5556
## Quick Start
5657
Run OpenLDAP docker image:
5758

58-
docker run --name my-openldap-container --detach osixia/openldap:1.1.10
59+
docker run --name my-openldap-container --detach osixia/openldap:1.1.11
5960

6061
This start a new container with OpenLDAP running inside. Let's make the first search in our LDAP container:
6162

@@ -91,7 +92,7 @@ It will create an empty ldap for the company **Example Inc.** and the domain **e
9192
By default the admin has the password **admin**. All those default settings can be changed at the docker command line, for example:
9293

9394
docker run --env LDAP_ORGANISATION="My Company" --env LDAP_DOMAIN="my-company.com" \
94-
--env LDAP_ADMIN_PASSWORD="JonSn0w" --detach osixia/openldap:1.1.10
95+
--env LDAP_ADMIN_PASSWORD="JonSn0w" --detach osixia/openldap:1.1.11
9596

9697
#### Data persistence
9798

@@ -125,9 +126,14 @@ Mount `.ldif` in `/container/service/slapd/assets/config/bootstrap/ldif` directo
125126

126127
Files containing `changeType:` attributes will be loaded with `ldapmodify`.
127128

128-
The startup script provide some substitution in bootstrap ldif files:
129-
`{{LDAP_BASE_DN }}` and `{{ LDAP_BACKEND }}` values are supported. Other `{{ * }}`
130-
substitution are left as is.
129+
The startup script provides some substitutions in bootstrap ldif files. Following substitutions are supported:
130+
131+
- `{{ LDAP_BASE_DN }}`
132+
- `{{ LDAP_BACKEND }}`
133+
- `{{ LDAP_READONLY_USER_USERNAME }}`
134+
- `{{ LDAP_READONLY_USER_PASSWORD_ENCRYPTED }}`
135+
136+
Other `{{ * }}` substitutions are left unchanged.
131137

132138
Since startup script modifies `ldif` files, you **must** add `--copy-service`
133139
argument to entrypoint if you don't want to overwrite them.
@@ -136,12 +142,12 @@ argument to entrypoint if you don't want to overwrite them.
136142
# single file example:
137143
docker run \
138144
--volume ./bootstrap.ldif:/container/service/slapd/assets/config/bootstrap/ldif/50-bootstrap.ldif \
139-
osixia/openldap:1.1.10 --copy-service
145+
osixia/openldap:1.1.11 --copy-service
140146

141147
#directory example:
142148
docker run \
143149
--volume ./lidf:/container/service/slapd/assets/config/bootstrap/ldif/custom \
144-
osixia/openldap:1.1.10 --copy-service
150+
osixia/openldap:1.1.11 --copy-service
145151

146152
### Use an existing ldap database
147153

@@ -152,7 +158,7 @@ simply mount this directories as a volume to `/var/lib/ldap` and `/etc/ldap/slap
152158

153159
docker run --volume /data/slapd/database:/var/lib/ldap \
154160
--volume /data/slapd/config:/etc/ldap/slapd.d \
155-
--detach osixia/openldap:1.1.10
161+
--detach osixia/openldap:1.1.11
156162

157163
You can also use data volume containers. Please refer to:
158164
> [https://docs.docker.com/engine/tutorials/dockervolumes/](https://docs.docker.com/engine/tutorials/dockervolumes/)
@@ -172,7 +178,7 @@ If you are looking for a simple solution to administrate your ldap server you ca
172178
#### Use auto-generated certificate
173179
By default, TLS is already configured and enabled, certificate is created using container hostname (it can be set by docker run --hostname option eg: ldap.example.org).
174180

175-
docker run --hostname ldap.my-company.com --detach osixia/openldap:1.1.10
181+
docker run --hostname ldap.my-company.com --detach osixia/openldap:1.1.11
176182

177183
#### Use your own certificate
178184

@@ -182,24 +188,24 @@ You can set your custom certificate at run time, by mounting a directory contain
182188
--env LDAP_TLS_CRT_FILENAME=my-ldap.crt \
183189
--env LDAP_TLS_KEY_FILENAME=my-ldap.key \
184190
--env LDAP_TLS_CA_CRT_FILENAME=the-ca.crt \
185-
--detach osixia/openldap:1.1.10
191+
--detach osixia/openldap:1.1.11
186192

187193
Other solutions are available please refer to the [Advanced User Guide](#advanced-user-guide)
188194

189195
#### Disable TLS
190196
Add --env LDAP_TLS=false to the run command:
191197

192-
docker run --env LDAP_TLS=false --detach osixia/openldap:1.1.10
198+
docker run --env LDAP_TLS=false --detach osixia/openldap:1.1.11
193199

194200
### Multi master replication
195201
Quick example, with the default config.
196202

197203
#Create the first ldap server, save the container id in LDAP_CID and get its IP:
198-
LDAP_CID=$(docker run --hostname ldap.example.org --env LDAP_REPLICATION=true --detach osixia/openldap:1.1.10)
204+
LDAP_CID=$(docker run --hostname ldap.example.org --env LDAP_REPLICATION=true --detach osixia/openldap:1.1.11)
199205
LDAP_IP=$(docker inspect -f "{{ .NetworkSettings.IPAddress }}" $LDAP_CID)
200206

201207
#Create the second ldap server, save the container id in LDAP2_CID and get its IP:
202-
LDAP2_CID=$(docker run --hostname ldap2.example.org --env LDAP_REPLICATION=true --detach osixia/openldap:1.1.10)
208+
LDAP2_CID=$(docker run --hostname ldap2.example.org --env LDAP_REPLICATION=true --detach osixia/openldap:1.1.11)
203209
LDAP2_IP=$(docker inspect -f "{{ .NetworkSettings.IPAddress }}" $LDAP2_CID)
204210

205211
#Add the pair "ip hostname" to /etc/hosts on each containers,
@@ -235,7 +241,7 @@ You may have some problems with mounted files on some systems. The startup scrip
235241

236242
To fix that run the container with `--copy-service` argument :
237243

238-
docker run [your options] osixia/openldap:1.1.10 --copy-service
244+
docker run [your options] osixia/openldap:1.1.11 --copy-service
239245

240246
### Debug
241247

@@ -244,11 +250,11 @@ Available levels are: `none`, `error`, `warning`, `info`, `debug` and `trace`.
244250

245251
Example command to run the container in `debug` mode:
246252

247-
docker run --detach osixia/openldap:1.1.10 --loglevel debug
253+
docker run --detach osixia/openldap:1.1.11 --loglevel debug
248254

249255
See all command line options:
250256

251-
docker run osixia/openldap:1.1.10 --help
257+
docker run osixia/openldap:1.1.11 --help
252258

253259

254260
## Environment Variables
@@ -313,7 +319,7 @@ Replication options:
313319

314320
If you want to set this variable at docker run command add the tag `#PYTHON2BASH:` and convert the yaml in python:
315321

316-
docker run --env LDAP_REPLICATION_HOSTS="#PYTHON2BASH:['ldap://ldap.example.org','ldap://ldap2.example.org']" --detach osixia/openldap:1.1.10
322+
docker run --env LDAP_REPLICATION_HOSTS="#PYTHON2BASH:['ldap://ldap.example.org','ldap://ldap2.example.org']" --detach osixia/openldap:1.1.11
317323

318324
To convert yaml to python online: http://yaml-online-parser.appspot.com/
319325

@@ -333,7 +339,7 @@ Other environment variables:
333339
Environment variables can be set by adding the --env argument in the command line, for example:
334340

335341
docker run --env LDAP_ORGANISATION="My company" --env LDAP_DOMAIN="my-company.com" \
336-
--env LDAP_ADMIN_PASSWORD="JonSn0w" --detach osixia/openldap:1.1.10
342+
--env LDAP_ADMIN_PASSWORD="JonSn0w" --detach osixia/openldap:1.1.11
337343

338344
Be aware that environment variable added in command line will be available at any time
339345
in the container. In this example if someone manage to open a terminal in this container
@@ -344,28 +350,28 @@ he will be able to read the admin password in clear text from environment variab
344350
For example if your environment files **my-env.yaml** and **my-env.startup.yaml** are in /data/ldap/environment
345351

346352
docker run --volume /data/ldap/environment:/container/environment/01-custom \
347-
--detach osixia/openldap:1.1.10
353+
--detach osixia/openldap:1.1.11
348354

349355
Take care to link your environment files folder to `/container/environment/XX-somedir` (with XX < 99 so they will be processed before default environment files) and not directly to `/container/environment` because this directory contains predefined baseimage environment files to fix container environment (INITRD, LANG, LANGUAGE and LC_CTYPE).
350356

351357
Note: the container will try to delete the **\*.startup.yaml** file after the end of startup files so the file will also be deleted on the docker host. To prevent that : use --volume /data/ldap/environment:/container/environment/01-custom**:ro** or set all variables in **\*.yaml** file and don't use **\*.startup.yaml**:
352358

353359
docker run --volume /data/ldap/environment/my-env.yaml:/container/environment/01-custom/env.yaml \
354-
--detach osixia/openldap:1.1.10
360+
--detach osixia/openldap:1.1.11
355361

356362
#### Make your own image or extend this image
357363

358364
This is the best solution if you have a private registry. Please refer to the [Advanced User Guide](#advanced-user-guide) just below.
359365

360366
## Advanced User Guide
361367

362-
### Extend osixia/openldap:1.1.10 image
368+
### Extend osixia/openldap:1.1.11 image
363369

364370
If you need to add your custom TLS certificate, bootstrap config or environment files the easiest way is to extends this image.
365371

366372
Dockerfile example:
367373

368-
FROM osixia/openldap:1.1.10
374+
FROM osixia/openldap:1.1.11
369375
MAINTAINER Your Name <[email protected]>
370376

371377
ADD bootstrap /container/service/slapd/assets/config/bootstrap
@@ -435,6 +441,11 @@ It uses the following features:
435441
To fully understand how this image works take a look at:
436442
https://github.com/osixia/docker-light-baseimage
437443

444+
## Security
445+
If you discover a security vulnerability within this docker image, please send an email to the Osixia! team at [email protected]. For minor vulnerabilities feel free to add an issue here on github.
446+
447+
Please include as many details as possible.
448+
438449
## Changelog
439450

440451
Please refer to: [CHANGELOG.md](CHANGELOG.md)

example/docker-compose.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
version: '2'
22
services:
33
openldap:
4-
image: osixia/openldap:1.1.10
4+
image: osixia/openldap:1.1.11
55
container_name: openldap
66
environment:
77
LDAP_LOG_LEVEL: "256"

example/extend-osixia-openldap/Dockerfile

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
FROM osixia/openldap:1.1.10
1+
FROM osixia/openldap:1.1.11
22
MAINTAINER Your Name <[email protected]>
33

44
ADD bootstrap /container/service/slapd/assets/config/bootstrap

example/kubernetes/simple/ldap-deployment.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ spec:
1313
spec:
1414
containers:
1515
- name: ldap
16-
image: osixia/openldap:1.1.10
16+
image: osixia/openldap:1.1.11
1717
volumeMounts:
1818
- name: ldap-data
1919
mountPath: /var/lib/ldap

example/kubernetes/using-secrets/ldap-deployment.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ spec:
1313
spec:
1414
containers:
1515
- name: ldap
16-
image: osixia/openldap:1.1.10
16+
image: osixia/openldap:1.1.11
1717
args: ["--copy-service"]
1818
volumeMounts:
1919
- name: ldap-data

image/Dockerfile

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ RUN if [ -z "${LDAP_OPENLDAP_GID}" ]; then groupadd -r openldap; else groupadd -
1414
# Install OpenLDAP, ldap-utils and ssl-tools from baseimage and clean apt-get files
1515
# sources: https://github.com/osixia/docker-light-baseimage/blob/stable/image/tool/add-service-available
1616
#  https://github.com/osixia/docker-light-baseimage/blob/stable/image/service-available/:ssl-tools/download.sh
17-
RUN apt-get -y update \
17+
RUN echo "path-include /usr/share/doc/krb5*" >> /etc/dpkg/dpkg.cfg.d/docker && apt-get -y update \
1818
&& /container/tool/add-service-available :ssl-tools \
1919
&& LC_ALL=C DEBIAN_FRONTEND=noninteractive apt-get install -y --no-install-recommends \
2020
ldap-utils \
@@ -26,6 +26,7 @@ RUN apt-get -y update \
2626
libsasl2-modules-sql \
2727
openssl \
2828
slapd \
29+
krb5-kdc-ldap \
2930
&& apt-get clean \
3031
&& rm -rf /var/lib/apt/lists/* /tmp/* /var/tmp/*
3132

Lines changed: 8 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,14 @@
11
Add your custom ldif files here if you don't want to overwrite image default boostrap ldif.
22
at run time you can also mount a data volume with your ldif files to /container/service/slapd/assets/config/bootstrap/ldif/custom
33

4-
The startup script provide some substitution in bootstrap ldif files:
5-
`{{LDAP_BASE_DN }}` and `{{ LDAP_BACKEND }}` values are supported.
6-
Other `{{ * }}` substitution are left as is.
4+
The startup script provides some substitutions in bootstrap ldif files. Following substitutions are supported:
5+
6+
- `{{ LDAP_BASE_DN }}`
7+
- `{{ LDAP_BACKEND }}`
8+
- `{{ LDAP_READONLY_USER_USERNAME }}`
9+
- `{{ LDAP_READONLY_USER_PASSWORD_ENCRYPTED }}`
10+
11+
Other `{{ * }}` substitutions are left unchanged.
712

813
Since startup script modifies `ldif` files,
914
you **must** add `--copy-service` argument to entrypoint if you don't want to overwrite them.

image/service/slapd/startup.sh

Lines changed: 17 additions & 24 deletions
Original file line numberDiff line numberDiff line change
@@ -64,8 +64,13 @@ if [ ! -e "$FIRST_START_DONE" ]; then
6464

6565
function ldap_add_or_modify (){
6666
local LDIF_FILE=$1
67+
log-helper debug "Processing file ${LDIF_FILE}"
6768
sed -i "s|{{ LDAP_BASE_DN }}|${LDAP_BASE_DN}|g" $LDIF_FILE
6869
sed -i "s|{{ LDAP_BACKEND }}|${LDAP_BACKEND}|g" $LDIF_FILE
70+
if [ "${LDAP_READONLY_USER,,}" == "true" ]; then
71+
sed -i "s|{{ LDAP_READONLY_USER_USERNAME }}|${LDAP_READONLY_USER_USERNAME}|g" $LDIF_FILE
72+
sed -i "s|{{ LDAP_READONLY_USER_PASSWORD_ENCRYPTED }}|${LDAP_READONLY_USER_PASSWORD_ENCRYPTED}|g" $LDIF_FILE
73+
fi
6974
if grep -iq changetype $LDIF_FILE ; then
7075
ldapmodify -Y EXTERNAL -Q -H ldapi:/// -f $LDIF_FILE 2>&1 | log-helper debug || ldapmodify -h localhost -p 389 -D cn=admin,$LDAP_BASE_DN -w $LDAP_ADMIN_PASSWORD -f $LDIF_FILE 2>&1 | log-helper debug
7176
else
@@ -82,7 +87,8 @@ if [ ! -e "$FIRST_START_DONE" ]; then
8287
# database and config directory are empty
8388
# setup bootstrap config - Part 1
8489
#
85-
if [ -z "$(ls -A -I lost+found /var/lib/ldap)" ] && [ -z "$(ls -A -I lost+found /etc/ldap/slapd.d)" ]; then
90+
if [ -z "$(ls -A -I lost+found -I .rmtab -I .gitignore /var/lib/ldap)" ] && \
91+
[ -z "$(ls -A -I lost+found -I .rmtab -I .gitignore /etc/ldap/slapd.d)" ]; then
8692

8793
BOOTSTRAP=true
8894
log-helper info "Database and config directory are empty..."
@@ -127,14 +133,14 @@ EOF
127133
#
128134
# Error: the database directory (/var/lib/ldap) is empty but not the config directory (/etc/ldap/slapd.d)
129135
#
130-
elif [ -z "$(ls -A -I lost+found /var/lib/ldap)" ] && [ ! -z "$(ls -A -I lost+found /etc/ldap/slapd.d)" ]; then
136+
elif [ -z "$(ls -A -I lost+found -I .rmtab /var/lib/ldap)" ] && [ ! -z "$(ls -A -I lost+found -I .rmtab /etc/ldap/slapd.d)" ]; then
131137
log-helper error "Error: the database directory (/var/lib/ldap) is empty but not the config directory (/etc/ldap/slapd.d)"
132138
exit 1
133139

134140
#
135141
# Error: the config directory (/etc/ldap/slapd.d) is empty but not the database directory (/var/lib/ldap)
136142
#
137-
elif [ ! -z "$(ls -A -I lost+found /var/lib/ldap)" ] && [ -z "$(ls -A -I lost+found /etc/ldap/slapd.d)" ]; then
143+
elif [ ! -z "$(ls -A -I lost+found -I .rmtab /var/lib/ldap)" ] && [ -z "$(ls -A -I lost+found -I .rmtab /etc/ldap/slapd.d)" ]; then
138144
log-helper error "Error: the config directory (/etc/ldap/slapd.d) is empty but not the database directory (/var/lib/ldap)"
139145
exit 1
140146
fi
@@ -214,7 +220,7 @@ EOF
214220
${CONTAINER_SERVICE_DIR}/slapd/assets/schema-to-ldif.sh "$SCHEMAS"
215221

216222
# add converted schemas
217-
for f in $(find ${CONTAINER_SERVICE_DIR}/slapd/assets/config/bootstrap/schema -name \*.ldif -type f); do
223+
for f in $(find ${CONTAINER_SERVICE_DIR}/slapd/assets/config/bootstrap/schema -name \*.ldif -type f|sort); do
218224
log-helper debug "Processing file ${f}"
219225
# add schema if not already exists
220226
SCHEMA=$(basename "${f}" .ldif)
@@ -241,34 +247,21 @@ EOF
241247
ldap_add_or_modify "$f"
242248
done
243249

244-
log-helper info "Add custom bootstrap ldif..."
245-
for f in $(find ${CONTAINER_SERVICE_DIR}/slapd/assets/config/bootstrap/ldif/custom -type f -name \*.ldif | sort); do
246-
log-helper debug "Processing file ${f}"
247-
ldap_add_or_modify "$f"
248-
done
249-
250250
# read only user
251251
if [ "${LDAP_READONLY_USER,,}" == "true" ]; then
252-
253252
log-helper info "Add read only user..."
254253

255254
LDAP_READONLY_USER_PASSWORD_ENCRYPTED=$(slappasswd -s $LDAP_READONLY_USER_PASSWORD)
256-
sed -i "s|{{ LDAP_READONLY_USER_USERNAME }}|${LDAP_READONLY_USER_USERNAME}|g" ${CONTAINER_SERVICE_DIR}/slapd/assets/config/bootstrap/ldif/readonly-user/readonly-user.ldif
257-
sed -i "s|{{ LDAP_READONLY_USER_PASSWORD_ENCRYPTED }}|${LDAP_READONLY_USER_PASSWORD_ENCRYPTED}|g" ${CONTAINER_SERVICE_DIR}/slapd/assets/config/bootstrap/ldif/readonly-user/readonly-user.ldif
258-
sed -i "s|{{ LDAP_BASE_DN }}|${LDAP_BASE_DN}|g" ${CONTAINER_SERVICE_DIR}/slapd/assets/config/bootstrap/ldif/readonly-user/readonly-user.ldif
259255

260-
sed -i "s|{{ LDAP_READONLY_USER_USERNAME }}|${LDAP_READONLY_USER_USERNAME}|g" ${CONTAINER_SERVICE_DIR}/slapd/assets/config/bootstrap/ldif/readonly-user/readonly-user-acl.ldif
261-
sed -i "s|{{ LDAP_BASE_DN }}|${LDAP_BASE_DN}|g" ${CONTAINER_SERVICE_DIR}/slapd/assets/config/bootstrap/ldif/readonly-user/readonly-user-acl.ldif
262-
263-
sed -i "s|{{ LDAP_BACKEND }}|${LDAP_BACKEND}|g" ${CONTAINER_SERVICE_DIR}/slapd/assets/config/bootstrap/ldif/readonly-user/readonly-user-acl.ldif
264-
265-
log-helper debug "Processing file ${CONTAINER_SERVICE_DIR}/slapd/assets/config/bootstrap/ldif/readonly-user/readonly-user.ldif"
266-
ldapmodify -h localhost -p 389 -D cn=admin,$LDAP_BASE_DN -w $LDAP_ADMIN_PASSWORD -f ${CONTAINER_SERVICE_DIR}/slapd/assets/config/bootstrap/ldif/readonly-user/readonly-user.ldif 2>&1 | log-helper debug
256+
ldap_add_or_modify "${CONTAINER_SERVICE_DIR}/slapd/assets/config/bootstrap/ldif/readonly-user/readonly-user.ldif"
257+
ldap_add_or_modify "${CONTAINER_SERVICE_DIR}/slapd/assets/config/bootstrap/ldif/readonly-user/readonly-user-acl.ldif"
258+
fi
267259

268-
log-helper debug "Processing file ${CONTAINER_SERVICE_DIR}/slapd/assets/config/bootstrap/ldif/readonly-user/readonly-user-acl.ldif"
269-
ldapmodify -Y EXTERNAL -Q -H ldapi:/// -f ${CONTAINER_SERVICE_DIR}/slapd/assets/config/bootstrap/ldif/readonly-user/readonly-user-acl.ldif 2>&1 | log-helper debug
260+
log-helper info "Add custom bootstrap ldif..."
261+
for f in $(find ${CONTAINER_SERVICE_DIR}/slapd/assets/config/bootstrap/ldif/custom -type f -name \*.ldif | sort); do
262+
ldap_add_or_modify "$f"
263+
done
270264

271-
fi
272265
fi
273266

274267
#

0 commit comments

Comments
 (0)