You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -185,7 +185,7 @@ If you are looking for a simple solution to administrate your ldap server you ca
185
185
#### Use auto-generated certificate
186
186
By default, TLS is already configured and enabled, certificate is created using container hostname (it can be set by docker run --hostname option eg: ldap.example.org).
187
187
188
-
docker run --hostname ldap.my-company.com --detach osixia/openldap:1.2.5
188
+
docker run --hostname ldap.my-company.com --detach osixia/openldap:1.3.0
189
189
190
190
#### Use your own certificate
191
191
@@ -195,24 +195,24 @@ You can set your custom certificate at run time, by mounting a directory contain
195
195
--env LDAP_TLS_CRT_FILENAME=my-ldap.crt \
196
196
--env LDAP_TLS_KEY_FILENAME=my-ldap.key \
197
197
--env LDAP_TLS_CA_CRT_FILENAME=the-ca.crt \
198
-
--detach osixia/openldap:1.2.5
198
+
--detach osixia/openldap:1.3.0
199
199
200
200
Other solutions are available please refer to the [Advanced User Guide](#advanced-user-guide)
201
201
202
202
#### Disable TLS
203
203
Add --env LDAP_TLS=false to the run command:
204
204
205
-
docker run --env LDAP_TLS=false --detach osixia/openldap:1.2.5
205
+
docker run --env LDAP_TLS=false --detach osixia/openldap:1.3.0
206
206
207
207
### Multi master replication
208
208
Quick example, with the default config.
209
209
210
210
#Create the first ldap server, save the container id in LDAP_CID and get its IP:
211
-
LDAP_CID=$(docker run --hostname ldap.example.org --env LDAP_REPLICATION=true --detach osixia/openldap:1.2.5)
211
+
LDAP_CID=$(docker run --hostname ldap.example.org --env LDAP_REPLICATION=true --detach osixia/openldap:1.3.0)
Be aware that environment variable added in command line will be available at any time
354
354
in the container. In this example if someone manage to open a terminal in this container
@@ -359,14 +359,14 @@ he will be able to read the admin password in clear text from environment variab
359
359
For example if your environment files **my-env.yaml** and **my-env.startup.yaml** are in /data/ldap/environment
360
360
361
361
docker run --volume /data/ldap/environment:/container/environment/01-custom \
362
-
--detach osixia/openldap:1.2.5
362
+
--detach osixia/openldap:1.3.0
363
363
364
364
Take care to link your environment files folder to `/container/environment/XX-somedir` (with XX < 99 so they will be processed before default environment files) and not directly to `/container/environment` because this directory contains predefined baseimage environment files to fix container environment (INITRD, LANG, LANGUAGE and LC_CTYPE).
365
365
366
366
Note: the container will try to delete the **\*.startup.yaml** file after the end of startup files so the file will also be deleted on the docker host. To prevent that : use --volume /data/ldap/environment:/container/environment/01-custom**:ro** or set all variables in **\*.yaml** file and don't use **\*.startup.yaml**:
367
367
368
368
docker run --volume /data/ldap/environment/my-env.yaml:/container/environment/01-custom/env.yaml \
369
-
--detach osixia/openldap:1.2.5
369
+
--detach osixia/openldap:1.3.0
370
370
371
371
#### Docker Secrets
372
372
@@ -385,13 +385,13 @@ This is the best solution if you have a private registry. Please refer to the [A
385
385
386
386
## Advanced User Guide
387
387
388
-
### Extend osixia/openldap:1.2.5 image
388
+
### Extend osixia/openldap:1.3.0 image
389
389
390
390
If you need to add your custom TLS certificate, bootstrap config or environment files the easiest way is to extends this image.
0 commit comments