Skip to content

Commit c7cdcbb

Browse files
committed
Remove LDAP_TLS_PROTOCOL_MIN as it does not take effect
1 parent aa8d557 commit c7cdcbb

File tree

8 files changed

+4
-10
lines changed

8 files changed

+4
-10
lines changed

CHANGELOG.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,9 @@
11
# Changelog
22

3+
## 1.1.4
4+
Remove TLS environment variable LDAP_TLS_PROTOCOL_MIN, see #69
5+
6+
37
## 1.1.3
48
Merge pull request :
59
- Use mdb over hdb #50

README.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -254,7 +254,6 @@ TLS options:
254254
- **LDAP_TLS_CA_CRT_FILENAME**: Ldap ssl CA certificate filename. Defaults to `ca.crt`
255255
- **LDAP_TLS_ENFORCE**: Enforce TLS. Defaults to `false`
256256
- **LDAP_TLS_CIPHER_SUITE**: TLS cipher suite. Defaults to `SECURE256:-VERS-SSL3.0`
257-
- **LDAP_TLS_PROTOCOL_MIN**: TLS min protocol. Defaults to `3.1`
258257
- **LDAP_TLS_VERIFY_CLIENT**: TLS verify client. Defaults to `demand`
259258

260259
Help: http://www.openldap.org/doc/admin24/tls.html

example/extend-osixia-openldap/environment/my-env.yaml.startup

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,6 @@ LDAP_TLS_CA_CRT_FILENAME: ca.crt
2424

2525
LDAP_TLS_ENFORCE: false
2626
LDAP_TLS_CIPHER_SUITE: SECURE256:-VERS-SSL3.0
27-
LDAP_TLS_PROTOCOL_MIN: 3.1
2827
LDAP_TLS_VERIFY_CLIENT: never
2928

3029
# Replication

example/kubernetes/simple/ldap-rc.yaml

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -55,8 +55,6 @@ spec:
5555
value: "false"
5656
- name: LDAP_TLS_CIPHER_SUITE
5757
value: "SECURE256:-VERS-SSL3.0"
58-
- name: LDAP_TLS_PROTOCOL_MIN
59-
value: "3.1"
6058
- name: LDAP_TLS_VERIFY_CLIENT
6159
value: "demand"
6260
- name: LDAP_REPLICATION

example/kubernetes/using-secrets/environment/my-env.yaml.startup

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,6 @@ LDAP_TLS_CA_CRT_FILENAME: ca.crt
2424

2525
LDAP_TLS_ENFORCE: false
2626
LDAP_TLS_CIPHER_SUITE: SECURE256:-VERS-SSL3.0
27-
LDAP_TLS_PROTOCOL_MIN: 3.1
2827
LDAP_TLS_VERIFY_CLIENT: never
2928

3029
# Replication

image/environment/default.yaml.startup

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,6 @@ LDAP_TLS_CA_CRT_FILENAME: ca.crt
2929

3030
LDAP_TLS_ENFORCE: false
3131
LDAP_TLS_CIPHER_SUITE: SECURE256:-VERS-SSL3.0
32-
LDAP_TLS_PROTOCOL_MIN: 3.1
3332
LDAP_TLS_VERIFY_CLIENT: demand
3433

3534
# Replication

image/service/slapd/assets/config/tls/tls-enable.ldif

Lines changed: 0 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -3,9 +3,6 @@ changetype: modify
33
replace: olcTLSCipherSuite
44
olcTLSCipherSuite: {{ LDAP_TLS_CIPHER_SUITE }}
55
-
6-
replace: olcTLSProtocolMin
7-
olcTLSProtocolMin: {{ LDAP_TLS_PROTOCOL_MIN }}
8-
-
96
replace: olcTLSCACertificateFile
107
olcTLSCACertificateFile: {{ LDAP_TLS_CA_CRT_PATH }}
118
-

image/service/slapd/startup.sh

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -242,7 +242,6 @@ EOF
242242
sed -i "s|{{ LDAP_TLS_DH_PARAM_PATH }}|${LDAP_TLS_DH_PARAM_PATH}|g" ${CONTAINER_SERVICE_DIR}/slapd/assets/config/tls/tls-enable.ldif
243243

244244
sed -i "s|{{ LDAP_TLS_CIPHER_SUITE }}|${LDAP_TLS_CIPHER_SUITE}|g" ${CONTAINER_SERVICE_DIR}/slapd/assets/config/tls/tls-enable.ldif
245-
sed -i "s|{{ LDAP_TLS_PROTOCOL_MIN }}|${LDAP_TLS_PROTOCOL_MIN}|g" ${CONTAINER_SERVICE_DIR}/slapd/assets/config/tls/tls-enable.ldif
246245
sed -i "s|{{ LDAP_TLS_VERIFY_CLIENT }}|${LDAP_TLS_VERIFY_CLIENT}|g" ${CONTAINER_SERVICE_DIR}/slapd/assets/config/tls/tls-enable.ldif
247246

248247
ldapmodify -Y EXTERNAL -Q -H ldapi:/// -f ${CONTAINER_SERVICE_DIR}/slapd/assets/config/tls/tls-enable.ldif 2>&1 | log-helper debug

0 commit comments

Comments
 (0)