You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Search on the second ldap server, and billy should show up!
179
179
@@ -197,7 +197,7 @@ You may have some problems with mounted files on some systems. The startup scrip
197
197
198
198
To fix that run the container with `--copy-service` argument :
199
199
200
-
docker run [your options] osixia/openldap:1.1.3 --copy-service
200
+
docker run [your options] osixia/openldap:1.1.4 --copy-service
201
201
202
202
### Debug
203
203
@@ -206,11 +206,11 @@ Available levels are: `none`, `error`, `warning`, `info`, `debug` and `trace`.
206
206
207
207
Example command to run the container in `debug` mode:
208
208
209
-
docker run --detach osixia/openldap:1.1.3 --loglevel debug
209
+
docker run --detach osixia/openldap:1.1.4 --loglevel debug
210
210
211
211
See all command line options:
212
212
213
-
docker run osixia/openldap:1.1.3 --help
213
+
docker run osixia/openldap:1.1.4 --help
214
214
215
215
216
216
## Environment Variables
@@ -253,8 +253,7 @@ TLS options:
253
253
-**LDAP_TLS_KEY_FILENAME**: Ldap ssl certificate private key filename. Defaults to `ldap.key`
254
254
-**LDAP_TLS_CA_CRT_FILENAME**: Ldap ssl CA certificate filename. Defaults to `ca.crt`
255
255
-**LDAP_TLS_ENFORCE**: Enforce TLS. Defaults to `false`
256
-
-**LDAP_TLS_CIPHER_SUITE**: TLS cipher suite. Defaults to `SECURE256:-VERS-SSL3.0`
257
-
-**LDAP_TLS_PROTOCOL_MIN**: TLS min protocol. Defaults to `3.1`
256
+
-**LDAP_TLS_CIPHER_SUITE**: TLS cipher suite. Defaults to `SECURE256:+SECURE128:-VERS-TLS-ALL:+VERS-TLS1.2:-RSA:-DHE-DSS:-CAMELLIA-128-CBC:-CAMELLIA-256-CBC`, based on Red Hat's [TLS hardening guide](https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/7/html/Security_Guide/sec-Hardening_TLS_Configuration.html)
258
257
-**LDAP_TLS_VERIFY_CLIENT**: TLS verify client. Defaults to `demand`
Be aware that environment variable added in command line will be available at any time
295
294
in the container. In this example if someone manage to open a terminal in this container
@@ -300,28 +299,28 @@ he will be able to read the admin password in clear text from environment variab
300
299
For example if your environment files **my-env.yaml** and **my-env.yaml.startup** are in /data/ldap/environment
301
300
302
301
docker run --volume /data/ldap/environment:/container/environment/01-custom \
303
-
--detach osixia/openldap:1.1.3
302
+
--detach osixia/openldap:1.1.4
304
303
305
304
Take care to link your environment files folder to `/container/environment/XX-somedir` (with XX < 99 so they will be processed before default environment files) and not directly to `/container/environment` because this directory contains predefined baseimage environment files to fix container environment (INITRD, LANG, LANGUAGE and LC_CTYPE).
306
305
307
306
Note: the container will try to delete the **\*.yaml.startup** file after the end of startup files so the file will also be deleted on the docker host. To prevent that : use --volume /data/ldap/environment:/container/environment/01-custom**:ro** or set all variables in **\*.yaml** file and don't use **\*.yaml.startup**:
308
307
309
308
docker run --volume /data/ldap/environment/my-env.yaml:/container/environment/01-custom/env.yaml \
310
-
--detach osixia/openldap:1.1.3
309
+
--detach osixia/openldap:1.1.4
311
310
312
311
#### Make your own image or extend this image
313
312
314
313
This is the best solution if you have a private registry. Please refer to the [Advanced User Guide](#advanced-user-guide) just below.
315
314
316
315
## Advanced User Guide
317
316
318
-
### Extend osixia/openldap:1.1.3 image
317
+
### Extend osixia/openldap:1.1.4 image
319
318
320
319
If you need to add your custom TLS certificate, bootstrap config or environment files the easiest way is to extends this image.
0 commit comments