-
-
Notifications
You must be signed in to change notification settings - Fork 3
/
Copy pathdocker-compose.yml
81 lines (81 loc) · 3.13 KB
/
docker-compose.yml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
services:
ldap1:
image: bitnami/openldap:2.6.8
# important so our TLS certificate includes our hostname
container_name: ldap1
hostname: ldap1
volumes:
# bootstrap our users
- ./ldif/bootstrap/bitnami/data-template-type1-static.ldif:/ldifs/50-bootstrap.ldif
# enable memberOf
- ./ldif/schema/bitnami/memberOf.ldif:/schemas/60-memberOf.ldif
# add certificates
- ./tls/certs/cert.crt:/opt/bitnami/openldap/certs/openldap.crt
- ./tls/certs/tls.key:/opt/bitnami/openldap/certs/openldap.key
- ./tls/certs/ca.crt:/opt/bitnami/openldap/certs/openldapCA.crt
ports:
- 30389:1389
- 30636:1636
environment:
#BITNAMI_DEBUG: true
LDAP_ROOT: dc=example,dc=org
LDAP_ADMIN_USER: admin
#LDAP_SKIP_DEFAULT_TREE: yes
# ADMIN user will be: cn=admin,LDAP_DOMAN_AS_BASE_DN, so e.g.: cn=admin,dc=kontextwork-test,dc=de
LDAP_ADMIN_PASSWORD: admin
# keeping the default here
# LDAP_CUSTOM_LDIF_DIR: /ldifs
# for now we use the unprivileged port 1389 / 1636
# LDAP_PORT_NUMBER: 389
# LDAP_LDAPS_PORT_NUMBER: 636
LDAP_ENABLE_TLS: "yes"
LDAP_REQUIRE_TLS: "no"
LDAP_TLS_VERIFY_CLIENTS: never
LDAP_TLS_CERT_FILE: /opt/bitnami/openldap/certs/openldap.crt
LDAP_TLS_KEY_FILE: /opt/bitnami/openldap/certs/openldap.key
LDAP_TLS_CA_FILE: /opt/bitnami/openldap/certs/openldapCA.crt
LDAP_ALLOW_ANON_BINDING: no
LDAP_USER_DC: ''
LDAP_USERS: 'readonly'
LDAP_PASSWORDS: 'readonly'
LDAP_CONFIG_ADMIN_ENABLED: "yes"
BITNAMI_DEBUG: true
# LDAP_ENABLE_PROXYPROTO: "yes"
# LDAP_PROXYPROTO_PORT_NUMBER: 30389
# LDAP_PROXYPROTO_LDAPS_PORT_NUMBER: 30636
ldap2:
image: bitnami/openldap:2.6.8
# important so our TLS certificate includes our hostname
container_name: ldap2
hostname: ldap2
volumes:
# bootstrap our users
- ./ldif/bootstrap/bitnami/data-template-type2-static.ldif:/ldifs/50-bootstrap.ldif
# enable memberOf
- ./ldif/schema/bitnami/memberOf.ldif:/schemas/60-memberOf.ldif
# add certificates
- ./tls/certs/cert.crt:/opt/bitnami/openldap/certs/openldap.crt
- ./tls/certs/tls.key:/opt/bitnami/openldap/certs/openldap.key
- ./tls/certs/ca.crt:/opt/bitnami/openldap/certs/openldapCA.crt
ports:
- 40389:1389
- 40636:1636
environment:
#BITNAMI_DEBUG: true
LDAP_ROOT: dc=kontextwork-test,dc=de
LDAP_ADMIN_USER: admin
#LDAP_SKIP_DEFAULT_TREE: yes
# ADMIN user will be: cn=admin,LDAP_DOMAN_AS_BASE_DN, so e.g.: cn=admin,dc=kontextwork-test,dc=de
LDAP_ADMIN_PASSWORD: admin
# keeping the default here
# LDAP_CUSTOM_LDIF_DIR: /ldifs
# for now we use the unprivileged port 1389 / 1636
# LDAP_PORT_NUMBER: 389
# LDAP_LDAPS_PORT_NUMBER: 636
LDAP_ENABLE_TLS: yes
LDAP_REQUIRE_TLS: yes
LDAP_TLS_VERIFY_CLIENTS: never
LDAP_TLS_CERT_FILE: /opt/bitnami/openldap/certs/openldap.crt
LDAP_TLS_KEY_FILE: /opt/bitnami/openldap/certs/openldap.key
LDAP_TLS_CA_FILE: /opt/bitnami/openldap/certs/openldapCA.crt
BITNAMI_DEBUG: true