You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardexpand all lines: CHANGELOG.md
+8
Original file line number
Diff line number
Diff line change
@@ -4,6 +4,14 @@ All notable changes to this project will be documented in this file.
4
4
The format is based on [Keep a Changelog](http://keepachangelog.com/en/1.0.0/)
5
5
and this project adheres to [Semantic Versioning](http://semver.org/spec/v2.0.0.html).
6
6
7
+
## [1.2.1] - 2018-05-14
8
+
### Security
9
+
- The default "write" access to "*" by "self" in the file "config/bootstrap/ldif/02-security.ldif" allowed anyone to change all the data about himself. This includes the gid and uid numbers what could lead to serious security issues.
10
+
11
+
This has been changed to ```olcAccess: to * by self read by dn="cn=admin,{{ LDAP_BASE_DN }}" write by * none"```
@@ -177,7 +177,7 @@ If you are looking for a simple solution to administrate your ldap server you ca
177
177
#### Use auto-generated certificate
178
178
By default, TLS is already configured and enabled, certificate is created using container hostname (it can be set by docker run --hostname option eg: ldap.example.org).
179
179
180
-
docker run --hostname ldap.my-company.com --detach osixia/openldap:1.2.0
180
+
docker run --hostname ldap.my-company.com --detach osixia/openldap:1.2.1
181
181
182
182
#### Use your own certificate
183
183
@@ -187,24 +187,24 @@ You can set your custom certificate at run time, by mounting a directory contain
187
187
--env LDAP_TLS_CRT_FILENAME=my-ldap.crt \
188
188
--env LDAP_TLS_KEY_FILENAME=my-ldap.key \
189
189
--env LDAP_TLS_CA_CRT_FILENAME=the-ca.crt \
190
-
--detach osixia/openldap:1.2.0
190
+
--detach osixia/openldap:1.2.1
191
191
192
192
Other solutions are available please refer to the [Advanced User Guide](#advanced-user-guide)
193
193
194
194
#### Disable TLS
195
195
Add --env LDAP_TLS=false to the run command:
196
196
197
-
docker run --env LDAP_TLS=false --detach osixia/openldap:1.2.0
197
+
docker run --env LDAP_TLS=false --detach osixia/openldap:1.2.1
198
198
199
199
### Multi master replication
200
200
Quick example, with the default config.
201
201
202
202
#Create the first ldap server, save the container id in LDAP_CID and get its IP:
203
-
LDAP_CID=$(docker run --hostname ldap.example.org --env LDAP_REPLICATION=true --detach osixia/openldap:1.2.0)
203
+
LDAP_CID=$(docker run --hostname ldap.example.org --env LDAP_REPLICATION=true --detach osixia/openldap:1.2.1)
Be aware that environment variable added in command line will be available at any time
344
344
in the container. In this example if someone manage to open a terminal in this container
@@ -349,28 +349,28 @@ he will be able to read the admin password in clear text from environment variab
349
349
For example if your environment files **my-env.yaml** and **my-env.startup.yaml** are in /data/ldap/environment
350
350
351
351
docker run --volume /data/ldap/environment:/container/environment/01-custom \
352
-
--detach osixia/openldap:1.2.0
352
+
--detach osixia/openldap:1.2.1
353
353
354
354
Take care to link your environment files folder to `/container/environment/XX-somedir` (with XX < 99 so they will be processed before default environment files) and not directly to `/container/environment` because this directory contains predefined baseimage environment files to fix container environment (INITRD, LANG, LANGUAGE and LC_CTYPE).
355
355
356
356
Note: the container will try to delete the **\*.startup.yaml** file after the end of startup files so the file will also be deleted on the docker host. To prevent that : use --volume /data/ldap/environment:/container/environment/01-custom**:ro** or set all variables in **\*.yaml** file and don't use **\*.startup.yaml**:
357
357
358
358
docker run --volume /data/ldap/environment/my-env.yaml:/container/environment/01-custom/env.yaml \
359
-
--detach osixia/openldap:1.2.0
359
+
--detach osixia/openldap:1.2.1
360
360
361
361
#### Make your own image or extend this image
362
362
363
363
This is the best solution if you have a private registry. Please refer to the [Advanced User Guide](#advanced-user-guide) just below.
364
364
365
365
## Advanced User Guide
366
366
367
-
### Extend osixia/openldap:1.2.0 image
367
+
### Extend osixia/openldap:1.2.1 image
368
368
369
369
If you need to add your custom TLS certificate, bootstrap config or environment files the easiest way is to extends this image.
0 commit comments