Skip to content

Commit d66e0b1

Browse files
committed
Merge branch 'hotfix-1.1.8' into stable
2 parents 64d6bc3 + 6163e40 commit d66e0b1

File tree

9 files changed

+38
-29
lines changed

9 files changed

+38
-29
lines changed

CHANGELOG.md

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,10 @@
11
# Changelog
22

3+
## 1.1.8
4+
Fix :
5+
- LDAP_ENFORCE_TLS is not working correctly #107
6+
- Unable to reuse volumes after LDAP_TLS_ENFORCE is true #92
7+
38
## 1.1.7
49
Update to light-baseimage:0.2.6
510

Makefile

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
NAME = osixia/openldap
2-
VERSION = 1.1.7
2+
VERSION = 1.1.8
33

44
.PHONY: all build build-nocache test tag_latest release
55

README.md

Lines changed: 21 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@
55
[![](https://images.microbadger.com/badges/image/osixia/openldap.svg)](http://microbadger.com/images/osixia/openldap "Get your own image badge on microbadger.com")
66
[hub]: https://hub.docker.com/r/osixia/openldap/
77

8-
Latest release: 1.1.7 - OpenLDAP 2.4.40 - [Changelog](CHANGELOG.md) | [Docker Hub](https://hub.docker.com/r/osixia/openldap/) 
8+
Latest release: 1.1.8 - OpenLDAP 2.4.40 - [Changelog](CHANGELOG.md) | [Docker Hub](https://hub.docker.com/r/osixia/openldap/) 
99

1010
**A docker image to run OpenLDAP.**
1111

@@ -39,7 +39,7 @@ Note:
3939
- [Link environment file](#link-environment-file)
4040
- [Make your own image or extend this image](#make-your-own-image-or-extend-this-image)
4141
- [Advanced User Guide](#advanced-user-guide)
42-
- [Extend osixia/openldap:1.1.7 image](#extend-osixiaopenldap117-image)
42+
- [Extend osixia/openldap:1.1.8 image](#extend-osixiaopenldap118-image)
4343
- [Make your own openldap image](#make-your-own-openldap-image)
4444
- [Tests](#tests)
4545
- [Kubernetes](#kubernetes)
@@ -57,7 +57,7 @@ If you find this image useful here's how you can help:
5757
## Quick Start
5858
Run OpenLDAP docker image:
5959

60-
docker run --name my-openldap-container --detach osixia/openldap:1.1.7
60+
docker run --name my-openldap-container --detach osixia/openldap:1.1.8
6161

6262
This start a new container with OpenLDAP running inside. Let's make the first search in our LDAP container:
6363

@@ -93,7 +93,7 @@ It will create an empty ldap for the company **Example Inc.** and the domain **e
9393
By default the admin has the password **admin**. All those default settings can be changed at the docker command line, for example:
9494

9595
docker run --env LDAP_ORGANISATION="My Company" --env LDAP_DOMAIN="my-company.com" \
96-
--env LDAP_ADMIN_PASSWORD="JonSn0w" --detach osixia/openldap:1.1.7
96+
--env LDAP_ADMIN_PASSWORD="JonSn0w" --detach osixia/openldap:1.1.8
9797

9898
#### Data persistence
9999

@@ -118,7 +118,7 @@ simply mount this directories as a volume to `/var/lib/ldap` and `/etc/ldap/slap
118118

119119
docker run --volume /data/slapd/database:/var/lib/ldap \
120120
--volume /data/slapd/config:/etc/ldap/slapd.d
121-
--detach osixia/openldap:1.1.7
121+
--detach osixia/openldap:1.1.8
122122

123123
You can also use data volume containers. Please refer to:
124124
> [https://docs.docker.com/engine/tutorials/dockervolumes/](https://docs.docker.com/engine/tutorials/dockervolumes/)
@@ -138,7 +138,7 @@ If you are looking for a simple solution to administrate your ldap server you ca
138138
#### Use auto-generated certificate
139139
By default TLS is enable, a certificate is created with the container hostname (it can be set by docker run --hostname option eg: ldap.example.org).
140140

141-
docker run --hostname ldap.my-company.com --detach osixia/openldap:1.1.7
141+
docker run --hostname ldap.my-company.com --detach osixia/openldap:1.1.8
142142

143143
#### Use your own certificate
144144

@@ -148,24 +148,24 @@ You can set your custom certificate at run time, by mounting a directory contain
148148
--env LDAP_TLS_CRT_FILENAME=my-ldap.crt \
149149
--env LDAP_TLS_KEY_FILENAME=my-ldap.key \
150150
--env LDAP_TLS_CA_CRT_FILENAME=the-ca.crt \
151-
--detach osixia/openldap:1.1.7
151+
--detach osixia/openldap:1.1.8
152152

153153
Other solutions are available please refer to the [Advanced User Guide](#advanced-user-guide)
154154

155155
#### Disable TLS
156156
Add --env LDAP_TLS=false to the run command:
157157

158-
docker run --env LDAP_TLS=false --detach osixia/openldap:1.1.7
158+
docker run --env LDAP_TLS=false --detach osixia/openldap:1.1.8
159159

160160
### Multi master replication
161161
Quick example, with the default config.
162162

163163
#Create the first ldap server, save the container id in LDAP_CID and get its IP:
164-
LDAP_CID=$(docker run --hostname ldap.example.org --env LDAP_REPLICATION=true --detach osixia/openldap:1.1.7)
164+
LDAP_CID=$(docker run --hostname ldap.example.org --env LDAP_REPLICATION=true --detach osixia/openldap:1.1.8)
165165
LDAP_IP=$(docker inspect -f "{{ .NetworkSettings.IPAddress }}" $LDAP_CID)
166166

167167
#Create the second ldap server, save the container id in LDAP2_CID and get its IP:
168-
LDAP2_CID=$(docker run --hostname ldap2.example.org --env LDAP_REPLICATION=true --detach osixia/openldap:1.1.7)
168+
LDAP2_CID=$(docker run --hostname ldap2.example.org --env LDAP_REPLICATION=true --detach osixia/openldap:1.1.8)
169169
LDAP2_IP=$(docker inspect -f "{{ .NetworkSettings.IPAddress }}" $LDAP2_CID)
170170

171171
#Add the pair "ip hostname" to /etc/hosts on each containers,
@@ -201,7 +201,7 @@ You may have some problems with mounted files on some systems. The startup scrip
201201

202202
To fix that run the container with `--copy-service` argument :
203203

204-
docker run [your options] osixia/openldap:1.1.7 --copy-service
204+
docker run [your options] osixia/openldap:1.1.8 --copy-service
205205

206206
### Debug
207207

@@ -210,11 +210,11 @@ Available levels are: `none`, `error`, `warning`, `info`, `debug` and `trace`.
210210

211211
Example command to run the container in `debug` mode:
212212

213-
docker run --detach osixia/openldap:1.1.7 --loglevel debug
213+
docker run --detach osixia/openldap:1.1.8 --loglevel debug
214214

215215
See all command line options:
216216

217-
docker run osixia/openldap:1.1.7 --help
217+
docker run osixia/openldap:1.1.8 --help
218218

219219

220220
## Environment Variables
@@ -256,7 +256,7 @@ TLS options:
256256
- **LDAP_TLS_CRT_FILENAME**: Ldap ssl certificate filename. Defaults to `ldap.crt`
257257
- **LDAP_TLS_KEY_FILENAME**: Ldap ssl certificate private key filename. Defaults to `ldap.key`
258258
- **LDAP_TLS_CA_CRT_FILENAME**: Ldap ssl CA certificate filename. Defaults to `ca.crt`
259-
- **LDAP_TLS_ENFORCE**: Enforce TLS. Can't be disabled once set to true. Defaults to `false`.
259+
- **LDAP_TLS_ENFORCE**: Enforce TLS but except ldapi connections. Can't be disabled once set to true. Defaults to `false`.
260260
- **LDAP_TLS_CIPHER_SUITE**: TLS cipher suite. Defaults to `SECURE256:+SECURE128:-VERS-TLS-ALL:+VERS-TLS1.2:-RSA:-DHE-DSS:-CAMELLIA-128-CBC:-CAMELLIA-256-CBC`, based on Red Hat's [TLS hardening guide](https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/7/html/Security_Guide/sec-Hardening_TLS_Configuration.html)
261261
- **LDAP_TLS_VERIFY_CLIENT**: TLS verify client. Defaults to `demand`
262262

@@ -277,7 +277,7 @@ Replication options:
277277

278278
If you want to set this variable at docker run command add the tag `#PYTHON2BASH:` and convert the yaml in python:
279279

280-
docker run --env LDAP_REPLICATION_HOSTS="#PYTHON2BASH:['ldap://ldap.example.org','ldap://ldap2.example.org']" --detach osixia/openldap:1.1.7
280+
docker run --env LDAP_REPLICATION_HOSTS="#PYTHON2BASH:['ldap://ldap.example.org','ldap://ldap2.example.org']" --detach osixia/openldap:1.1.8
281281

282282
To convert yaml to python online: http://yaml-online-parser.appspot.com/
283283

@@ -292,7 +292,7 @@ Other environment variables:
292292
Environment variables can be set by adding the --env argument in the command line, for example:
293293

294294
docker run --env LDAP_ORGANISATION="My company" --env LDAP_DOMAIN="my-company.com" \
295-
--env LDAP_ADMIN_PASSWORD="JonSn0w" --detach osixia/openldap:1.1.7
295+
--env LDAP_ADMIN_PASSWORD="JonSn0w" --detach osixia/openldap:1.1.8
296296

297297
Be aware that environment variable added in command line will be available at any time
298298
in the container. In this example if someone manage to open a terminal in this container
@@ -303,28 +303,28 @@ he will be able to read the admin password in clear text from environment variab
303303
For example if your environment files **my-env.yaml** and **my-env.startup.yaml** are in /data/ldap/environment
304304

305305
docker run --volume /data/ldap/environment:/container/environment/01-custom \
306-
--detach osixia/openldap:1.1.7
306+
--detach osixia/openldap:1.1.8
307307

308308
Take care to link your environment files folder to `/container/environment/XX-somedir` (with XX < 99 so they will be processed before default environment files) and not directly to `/container/environment` because this directory contains predefined baseimage environment files to fix container environment (INITRD, LANG, LANGUAGE and LC_CTYPE).
309309

310310
Note: the container will try to delete the **\*.startup.yaml** file after the end of startup files so the file will also be deleted on the docker host. To prevent that : use --volume /data/ldap/environment:/container/environment/01-custom**:ro** or set all variables in **\*.yaml** file and don't use **\*.startup.yaml**:
311311

312312
docker run --volume /data/ldap/environment/my-env.yaml:/container/environment/01-custom/env.yaml \
313-
--detach osixia/openldap:1.1.7
313+
--detach osixia/openldap:1.1.8
314314

315315
#### Make your own image or extend this image
316316

317317
This is the best solution if you have a private registry. Please refer to the [Advanced User Guide](#advanced-user-guide) just below.
318318

319319
## Advanced User Guide
320320

321-
### Extend osixia/openldap:1.1.7 image
321+
### Extend osixia/openldap:1.1.8 image
322322

323323
If you need to add your custom TLS certificate, bootstrap config or environment files the easiest way is to extends this image.
324324

325325
Dockerfile example:
326326

327-
FROM osixia/openldap:1.1.7
327+
FROM osixia/openldap:1.1.8
328328
MAINTAINER Your Name <[email protected]>
329329

330330
ADD bootstrap /container/service/slapd/assets/config/bootstrap
@@ -346,7 +346,7 @@ Clone this project:
346346
Adapt Makefile, set your image NAME and VERSION, for example:
347347

348348
NAME = osixia/openldap
349-
VERSION = 1.1.7
349+
VERSION = 1.1.8
350350

351351
become:
352352
NAME = cool-guy/openldap

example/docker-compose.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
version: '2'
22
services:
33
openldap:
4-
image: osixia/openldap:1.1.7
4+
image: osixia/openldap:1.1.8
55
container_name: openldap
66
environment:
77
LDAP_LOG_LEVEL: "256"

example/extend-osixia-openldap/Dockerfile

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
FROM osixia/openldap:1.1.7
1+
FROM osixia/openldap:1.1.8
22
MAINTAINER Your Name <[email protected]>
33

44
ADD bootstrap /container/service/slapd/assets/config/bootstrap

example/kubernetes/simple/ldap-deployment.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ spec:
1313
spec:
1414
containers:
1515
- name: ldap
16-
image: osixia/openldap:1.1.7
16+
image: osixia/openldap:1.1.8
1717
volumeMounts:
1818
- name: ldap-data
1919
mountPath: /var/lib/ldap

example/kubernetes/using-secrets/ldap-deployment.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ spec:
1313
spec:
1414
containers:
1515
- name: ldap
16-
image: osixia/openldap:1.1.7
16+
image: osixia/openldap:1.1.8
1717
args: ["--copy-service"]
1818
volumeMounts:
1919
- name: ldap-data
Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,5 @@
11
dn: cn=config
22
changetype: modify
33
delete: olcSecurity
4-
olcSecurity: tls=1
4+
-
5+
delete: olcLocalSSF
Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,7 @@
11
dn: cn=config
22
changetype: modify
3-
add: olcSecurity
4-
olcSecurity: tls=1
3+
replace: olcSecurity
4+
olcSecurity: ssf=128
5+
-
6+
replace: olcLocalSSF
7+
olcLocalSSF: 128

0 commit comments

Comments
 (0)