You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
/!\ Security warning: Databases created with image version up to 1.1.10 creates two admin users with the same password, if you changed admin password after bootstrap you may be concerned by [issue #161](https://github.com/osixia/docker-openldap/issues/161).
9
+
/!\ Security warning: Databases created with image version up to 1.1.11 creates two admin users with the same password, if you changed admin password after bootstrap you may be concerned by [issue #161](https://github.com/osixia/docker-openldap/issues/161).
@@ -172,7 +178,7 @@ If you are looking for a simple solution to administrate your ldap server you ca
172
178
#### Use auto-generated certificate
173
179
By default, TLS is already configured and enabled, certificate is created using container hostname (it can be set by docker run --hostname option eg: ldap.example.org).
174
180
175
-
docker run --hostname ldap.my-company.com --detach osixia/openldap:1.1.10
181
+
docker run --hostname ldap.my-company.com --detach osixia/openldap:1.1.11
176
182
177
183
#### Use your own certificate
178
184
@@ -182,24 +188,24 @@ You can set your custom certificate at run time, by mounting a directory contain
182
188
--env LDAP_TLS_CRT_FILENAME=my-ldap.crt \
183
189
--env LDAP_TLS_KEY_FILENAME=my-ldap.key \
184
190
--env LDAP_TLS_CA_CRT_FILENAME=the-ca.crt \
185
-
--detach osixia/openldap:1.1.10
191
+
--detach osixia/openldap:1.1.11
186
192
187
193
Other solutions are available please refer to the [Advanced User Guide](#advanced-user-guide)
188
194
189
195
#### Disable TLS
190
196
Add --env LDAP_TLS=false to the run command:
191
197
192
-
docker run --env LDAP_TLS=false --detach osixia/openldap:1.1.10
198
+
docker run --env LDAP_TLS=false --detach osixia/openldap:1.1.11
193
199
194
200
### Multi master replication
195
201
Quick example, with the default config.
196
202
197
203
#Create the first ldap server, save the container id in LDAP_CID and get its IP:
198
-
LDAP_CID=$(docker run --hostname ldap.example.org --env LDAP_REPLICATION=true --detach osixia/openldap:1.1.10)
204
+
LDAP_CID=$(docker run --hostname ldap.example.org --env LDAP_REPLICATION=true --detach osixia/openldap:1.1.11)
Be aware that environment variable added in command line will be available at any time
339
345
in the container. In this example if someone manage to open a terminal in this container
@@ -344,28 +350,28 @@ he will be able to read the admin password in clear text from environment variab
344
350
For example if your environment files **my-env.yaml** and **my-env.startup.yaml** are in /data/ldap/environment
345
351
346
352
docker run --volume /data/ldap/environment:/container/environment/01-custom \
347
-
--detach osixia/openldap:1.1.10
353
+
--detach osixia/openldap:1.1.11
348
354
349
355
Take care to link your environment files folder to `/container/environment/XX-somedir` (with XX < 99 so they will be processed before default environment files) and not directly to `/container/environment` because this directory contains predefined baseimage environment files to fix container environment (INITRD, LANG, LANGUAGE and LC_CTYPE).
350
356
351
357
Note: the container will try to delete the **\*.startup.yaml** file after the end of startup files so the file will also be deleted on the docker host. To prevent that : use --volume /data/ldap/environment:/container/environment/01-custom**:ro** or set all variables in **\*.yaml** file and don't use **\*.startup.yaml**:
352
358
353
359
docker run --volume /data/ldap/environment/my-env.yaml:/container/environment/01-custom/env.yaml \
354
-
--detach osixia/openldap:1.1.10
360
+
--detach osixia/openldap:1.1.11
355
361
356
362
#### Make your own image or extend this image
357
363
358
364
This is the best solution if you have a private registry. Please refer to the [Advanced User Guide](#advanced-user-guide) just below.
359
365
360
366
## Advanced User Guide
361
367
362
-
### Extend osixia/openldap:1.1.10 image
368
+
### Extend osixia/openldap:1.1.11 image
363
369
364
370
If you need to add your custom TLS certificate, bootstrap config or environment files the easiest way is to extends this image.
@@ -435,6 +441,11 @@ It uses the following features:
435
441
To fully understand how this image works take a look at:
436
442
https://github.com/osixia/docker-light-baseimage
437
443
444
+
## Security
445
+
If you discover a security vulnerability within this docker image, please send an email to the Osixia! team at [email protected]. For minor vulnerabilities feel free to add an issue here on github.
sed -i "s|{{ LDAP_READONLY_USER_USERNAME }}|${LDAP_READONLY_USER_USERNAME}|g"${CONTAINER_SERVICE_DIR}/slapd/assets/config/bootstrap/ldif/readonly-user/readonly-user.ldif
257
-
sed -i "s|{{ LDAP_READONLY_USER_PASSWORD_ENCRYPTED }}|${LDAP_READONLY_USER_PASSWORD_ENCRYPTED}|g"${CONTAINER_SERVICE_DIR}/slapd/assets/config/bootstrap/ldif/readonly-user/readonly-user.ldif
258
-
sed -i "s|{{ LDAP_BASE_DN }}|${LDAP_BASE_DN}|g"${CONTAINER_SERVICE_DIR}/slapd/assets/config/bootstrap/ldif/readonly-user/readonly-user.ldif
259
255
260
-
sed -i "s|{{ LDAP_READONLY_USER_USERNAME }}|${LDAP_READONLY_USER_USERNAME}|g"${CONTAINER_SERVICE_DIR}/slapd/assets/config/bootstrap/ldif/readonly-user/readonly-user-acl.ldif
261
-
sed -i "s|{{ LDAP_BASE_DN }}|${LDAP_BASE_DN}|g"${CONTAINER_SERVICE_DIR}/slapd/assets/config/bootstrap/ldif/readonly-user/readonly-user-acl.ldif
262
-
263
-
sed -i "s|{{ LDAP_BACKEND }}|${LDAP_BACKEND}|g"${CONTAINER_SERVICE_DIR}/slapd/assets/config/bootstrap/ldif/readonly-user/readonly-user-acl.ldif
0 commit comments