| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292 |
- #!/bin/bash -e
- FIRST_START_DONE="/etc/docker-openldap-first-start-done"
- WAS_STARTED_WITH_TLS="/etc/ldap/slapd.d/docker-openldap-was-started-with-tls"
- WAS_STARTED_WITH_REPLICATION="/etc/ldap/slapd.d/docker-openldap-was-started-with-replication"
- # Reduce maximum number of number of open file descriptors to 1024
- # otherwise slapd consumes two orders of magnitude more of RAM
- # see https://github.com/docker/docker/issues/8231
- ulimit -n 1024
- # fix file permissions
- chown -R openldap:openldap /var/lib/ldap
- chown -R openldap:openldap /etc/ldap
- chown -R openldap:openldap /container/service/slapd
- # container first start
- if [ ! -e "$FIRST_START_DONE" ]; then
- function get_ldap_base_dn() {
- LDAP_BASE_DN=""
- IFS='.' read -ra LDAP_BASE_DN_TABLE <<< "$LDAP_DOMAIN"
- for i in "${LDAP_BASE_DN_TABLE[@]}"; do
- EXT="dc=$i,"
- LDAP_BASE_DN=$LDAP_BASE_DN$EXT
- done
- LDAP_BASE_DN=${LDAP_BASE_DN::-1}
- }
- function is_new_schema() {
- local COUNT=$(ldapsearch -Q -Y EXTERNAL -H ldapi:/// -b cn=schema,cn=config cn | grep -c $1)
- if [ "$COUNT" -eq 0 ]; then
- echo 1
- else
- echo 0
- fi
- }
- function check_tls_files() {
- local CA_CRT=$1
- local LDAP_CRT=$2
- local LDAP_KEY=$3
- # check certificat and key or create it
- /sbin/ssl-helper "/container/service/slapd/assets/certs/$LDAP_CRT" "/container/service/slapd/assets/certs/$LDAP_KEY" --ca-crt=/container/service/slapd/assets/certs/$CA_CRT --gnutls
- # create DHParamFile if not found
- [ -f /container/service/slapd/assets/certs/dhparam.pem ] || certtool --generate-dh-param --sec-param=high --outfile=/container/service/slapd/assets/certs/dhparam.pem
- chmod 600 /container/service/slapd/assets/certs/dhparam.pem
- # fix file permissions
- chown -R openldap:openldap /container/service/slapd
- }
- BOOTSTRAP=false
- # database and config directory are empty -> set bootstrap config
- if [ -z "$(ls -A /var/lib/ldap)" ] && [ -z "$(ls -A /etc/ldap/slapd.d)" ]; then
- BOOTSTRAP=true
- echo "database and config directory are empty"
- echo "-> set bootstrap config"
- cat <<EOF | debconf-set-selections
- slapd slapd/internal/generated_adminpw password ${LDAP_ADMIN_PASSWORD}
- slapd slapd/internal/adminpw password ${LDAP_ADMIN_PASSWORD}
- slapd slapd/password2 password ${LDAP_ADMIN_PASSWORD}
- slapd slapd/password1 password ${LDAP_ADMIN_PASSWORD}
- slapd slapd/dump_database_destdir string /var/backups/slapd-VERSION
- slapd slapd/domain string ${LDAP_DOMAIN}
- slapd shared/organization string ${LDAP_ORGANISATION}
- slapd slapd/backend string HDB
- slapd slapd/purge_database boolean true
- slapd slapd/move_old_database boolean true
- slapd slapd/allow_ldap_v2 boolean false
- slapd slapd/no_configuration boolean false
- slapd slapd/dump_database select when needed
- EOF
- dpkg-reconfigure -f noninteractive slapd
- elif [ -z "$(ls -A /var/lib/ldap)" ] && [ ! -z "$(ls -A /etc/ldap/slapd.d)" ]; then
- echo "Error: the database directory (/var/lib/ldap) is empty but not the config directory (/etc/ldap/slapd.d)"
- exit 1
- elif [ ! -z "$(ls -A /var/lib/ldap)" ] && [ -z "$(ls -A /etc/ldap/slapd.d)" ]; then
- echo "the config directory (/etc/ldap/slapd.d) is empty but not the database directory (/var/lib/ldap)"
- exit 1
- else
- # there is an existing database and config
- # if the config was bootstraped with TLS
- # to avoid error (#6) we check tls files
- if [ -e "$WAS_STARTED_WITH_TLS" ]; then
- . $WAS_STARTED_WITH_TLS
- check_tls_files $PREVIOUS_LDAP_TLS_CA_CRT_FILENAME $PREVIOUS_LDAP_TLS_CRT_FILENAME $PREVIOUS_LDAP_TLS_KEY_FILENAME
- fi
- fi
- # start OpenLDAP
- echo "Starting openldap..."
- # start OpenLDAP with previous replication configuration
- if [ -e "$WAS_STARTED_WITH_REPLICATION" ]; then
- . $WAS_STARTED_WITH_REPLICATION
- echo "127.0.0.2 $PREVIOUS_HOSTNAME" >> /etc/hosts
- slapd -h "ldap://$HOSTNAME ldap://$PREVIOUS_HOSTNAME ldap://localhost ldapi:///" -u openldap -g openldap
- else
- #start openldap normaly
- slapd -h "ldap://$HOSTNAME ldap://localhost ldapi:///" -u openldap -g openldap
- fi
- echo "[ok]"
- # set bootstrap config part 2
- if $BOOTSTRAP; then
- # add ppolicy schema
- ldapadd -c -Y EXTERNAL -Q -H ldapi:/// -f /etc/ldap/schema/ppolicy.ldif
- # convert schemas to ldif
- SCHEMAS=""
- for f in $(find /container/service/slapd/assets/config/bootstrap/schema -name \*.schema -type f); do
- SCHEMAS="$SCHEMAS ${f}"
- done
- /container/service/slapd/assets/schema-to-ldif.sh "$SCHEMAS"
- # add schemas
- for f in $(find /container/service/slapd/assets/config/bootstrap/schema -name \*.ldif -type f); do
- echo "Processing file ${f}"
- # add schema if not already exists
- SCHEMA=$(basename "${f}" .ldif)
- ADD_SCHEMA=$(is_new_schema $SCHEMA)
- if [ "$ADD_SCHEMA" -eq 1 ]; then
- echo "add schema ${SCHEMA}"
- ldapadd -c -Y EXTERNAL -Q -H ldapi:/// -f $f
- else
- echo "schema ${f} already exists"
- fi
- done
- # set config password
- LDAP_CONFIG_PASSWORD_ENCRYPTED=$(slappasswd -s $LDAP_CONFIG_PASSWORD)
- sed -i "s|{{ LDAP_CONFIG_PASSWORD_ENCRYPTED }}|${LDAP_CONFIG_PASSWORD_ENCRYPTED}|g" /container/service/slapd/assets/config/bootstrap/ldif/01-config-password.ldif
- # adapt security config file
- get_ldap_base_dn
- sed -i "s|{{ LDAP_BASE_DN }}|${LDAP_BASE_DN}|g" /container/service/slapd/assets/config/bootstrap/ldif/02-security.ldif
- # process config files in bootstrap directory (do no process files in subdirectories)
- for f in $(find /container/service/slapd/assets/config/bootstrap/ldif -name \*.ldif -mindepth 1 -maxdepth 1 -type f | sort); do
- echo "Processing file ${f}"
- ldapmodify -Y EXTERNAL -Q -H ldapi:/// -f $f
- done
- # read only user
- if [ "${LDAP_READONLY_USER,,}" == "true" ]; then
- echo "Add read only user"
- LDAP_READONLY_USER_PASSWORD_ENCRYPTED=$(slappasswd -s $LDAP_READONLY_USER_PASSWORD)
- sed -i "s|{{ LDAP_READONLY_USER_USERNAME }}|${LDAP_READONLY_USER_USERNAME}|g" /container/service/slapd/assets/config/bootstrap/ldif/readonly-user/readonly-user.ldif
- sed -i "s|{{ LDAP_READONLY_USER_PASSWORD_ENCRYPTED }}|${LDAP_READONLY_USER_PASSWORD_ENCRYPTED}|g" /container/service/slapd/assets/config/bootstrap/ldif/readonly-user/readonly-user.ldif
- sed -i "s|{{ LDAP_BASE_DN }}|${LDAP_BASE_DN}|g" /container/service/slapd/assets/config/bootstrap/ldif/readonly-user/readonly-user.ldif
- sed -i "s|{{ LDAP_READONLY_USER_USERNAME }}|${LDAP_READONLY_USER_USERNAME}|g" /container/service/slapd/assets/config/bootstrap/ldif/readonly-user/readonly-user-acl.ldif
- sed -i "s|{{ LDAP_BASE_DN }}|${LDAP_BASE_DN}|g" /container/service/slapd/assets/config/bootstrap/ldif/readonly-user/readonly-user-acl.ldif
- echo "Processing file /container/service/slapd/assets/config/bootstrap/ldif/readonly-user/readonly-user.ldif"
- ldapmodify -h localhost -p 389 -D cn=admin,$LDAP_BASE_DN -w $LDAP_ADMIN_PASSWORD -f /container/service/slapd/assets/config/bootstrap/ldif/readonly-user/readonly-user.ldif
- echo "Processing file /container/service/slapd/assets/config/bootstrap/ldif/readonly-user/readonly-user-acl.ldif"
- ldapmodify -Y EXTERNAL -Q -H ldapi:/// -f /container/service/slapd/assets/config/bootstrap/ldif/readonly-user/readonly-user-acl.ldif
- fi
- fi
- # tls config
- if [ "${LDAP_TLS,,}" == "true" ]; then
- echo "Use TLS"
- check_tls_files $LDAP_TLS_CA_CRT_FILENAME $LDAP_TLS_CRT_FILENAME $LDAP_TLS_KEY_FILENAME
- # adapt tls ldif
- sed -i "s|{{ LDAP_TLS_CA_CRT_FILENAME }}|${LDAP_TLS_CA_CRT_FILENAME}|g" /container/service/slapd/assets/config/tls/tls-enable.ldif
- sed -i "s|{{ LDAP_TLS_CRT_FILENAME }}|${LDAP_TLS_CRT_FILENAME}|g" /container/service/slapd/assets/config/tls/tls-enable.ldif
- sed -i "s|{{ LDAP_TLS_KEY_FILENAME }}|${LDAP_TLS_KEY_FILENAME}|g" /container/service/slapd/assets/config/tls/tls-enable.ldif
- sed -i "s|{{ LDAP_TLS_CIPHER_SUITE }}|${LDAP_TLS_CIPHER_SUITE}|g" /container/service/slapd/assets/config/tls/tls-enable.ldif
- sed -i "s|{{ LDAP_TLS_PROTOCOL_MIN }}|${LDAP_TLS_PROTOCOL_MIN}|g" /container/service/slapd/assets/config/tls/tls-enable.ldif
- sed -i "s|{{ LDAP_TLS_VERIFY_CLIENT }}|${LDAP_TLS_VERIFY_CLIENT}|g" /container/service/slapd/assets/config/tls/tls-enable.ldif
- ldapmodify -Y EXTERNAL -Q -H ldapi:/// -f /container/service/slapd/assets/config/tls/tls-enable.ldif
- [[ -f "$WAS_STARTED_WITH_TLS" ]] && rm -f "$WAS_STARTED_WITH_TLS"
- touch $WAS_STARTED_WITH_TLS
- echo "export PREVIOUS_LDAP_TLS_CA_CRT_FILENAME=${LDAP_TLS_CA_CRT_FILENAME}" >> $WAS_STARTED_WITH_TLS
- echo "export PREVIOUS_LDAP_TLS_CRT_FILENAME=${LDAP_TLS_CRT_FILENAME}" >> $WAS_STARTED_WITH_TLS
- echo "export PREVIOUS_LDAP_TLS_KEY_FILENAME=${LDAP_TLS_KEY_FILENAME}" >> $WAS_STARTED_WITH_TLS
- chmod +x $WAS_STARTED_WITH_TLS
- # ldap client config
- sed -i "s,TLS_CACERT.*,TLS_CACERT /container/service/slapd/assets/certs/${LDAP_TLS_CA_CRT_FILENAME},g" /etc/ldap/ldap.conf
- echo "TLS_REQCERT demand" >> /etc/ldap/ldap.conf
- [[ -f "$HOME/.ldaprc" ]] && rm -f $HOME/.ldaprc
- touch $HOME/.ldaprc
- echo "TLS_CERT /container/service/slapd/assets/certs/${LDAP_TLS_CRT_FILENAME}" >> $HOME/.ldaprc
- echo "TLS_KEY /container/service/slapd/assets/certs/${LDAP_TLS_KEY_FILENAME}" >> $HOME/.ldaprc
- else
- echo "Don't use TLS"
- ldapmodify -c -Y EXTERNAL -Q -H ldapi:/// -f /container/service/slapd/assets/config/tls/tls-disable.ldif || true
- [[ -f "$WAS_STARTED_WITH_TLS" ]] && rm -f "$WAS_STARTED_WITH_TLS"
- fi
- function disableReplication() {
- echo "Try to disable replication if needed"
- ldapmodify -c -Y EXTERNAL -Q -H ldapi:/// -f /container/service/slapd/assets/config/replication/replication-disable.ldif || true
- [[ -f "$WAS_STARTED_WITH_REPLICATION" ]] && rm -f "$WAS_STARTED_WITH_REPLICATION"
- }
- # replication config
- if [ "${LDAP_REPLICATION,,}" == "true" ]; then
- echo "Use replication"
- disableReplication || true
- LDAP_REPLICATION_HOSTS=($LDAP_REPLICATION_HOSTS)
- i=1
- for host in "${LDAP_REPLICATION_HOSTS[@]}"
- do
- # host var contain a variable name, we access to the variable value
- host=${!host}
- sed -i "s|{{ LDAP_REPLICATION_HOSTS }}|olcServerID: $i ${host}\n{{ LDAP_REPLICATION_HOSTS }}|g" /container/service/slapd/assets/config/replication/replication-enable.ldif
- sed -i "s|{{ LDAP_REPLICATION_HOSTS_CONFIG_SYNC_REPL }}|olcSyncRepl: rid=00$i provider=${host} ${LDAP_REPLICATION_CONFIG_SYNCPROV}\n{{ LDAP_REPLICATION_HOSTS_CONFIG_SYNC_REPL }}|g" /container/service/slapd/assets/config/replication/replication-enable.ldif
- sed -i "s|{{ LDAP_REPLICATION_HOSTS_HDB_SYNC_REPL }}|olcSyncRepl: rid=10$i provider=${host} ${LDAP_REPLICATION_HDB_SYNCPROV}\n{{ LDAP_REPLICATION_HOSTS_HDB_SYNC_REPL }}|g" /container/service/slapd/assets/config/replication/replication-enable.ldif
- ((i++))
- done
- get_ldap_base_dn
- sed -i "s|\$LDAP_BASE_DN|$LDAP_BASE_DN|g" /container/service/slapd/assets/config/replication/replication-enable.ldif
- sed -i "s|\$LDAP_ADMIN_PASSWORD|$LDAP_ADMIN_PASSWORD|g" /container/service/slapd/assets/config/replication/replication-enable.ldif
- sed -i "s|\$LDAP_CONFIG_PASSWORD|$LDAP_CONFIG_PASSWORD|g" /container/service/slapd/assets/config/replication/replication-enable.ldif
- sed -i "/{{ LDAP_REPLICATION_HOSTS }}/d" /container/service/slapd/assets/config/replication/replication-enable.ldif
- sed -i "/{{ LDAP_REPLICATION_HOSTS_CONFIG_SYNC_REPL }}/d" /container/service/slapd/assets/config/replication/replication-enable.ldif
- sed -i "/{{ LDAP_REPLICATION_HOSTS_HDB_SYNC_REPL }}/d" /container/service/slapd/assets/config/replication/replication-enable.ldif
- echo "Enable replication"
- ldapmodify -c -Y EXTERNAL -Q -H ldapi:/// -f /container/service/slapd/assets/config/replication/replication-enable.ldif || true
- [[ -f "$WAS_STARTED_WITH_REPLICATION" ]] && rm -f "$WAS_STARTED_WITH_REPLICATION"
- touch $WAS_STARTED_WITH_REPLICATION
- echo "export PREVIOUS_HOSTNAME=${HOSTNAME}" >> $WAS_STARTED_WITH_REPLICATION
- chmod +x $WAS_STARTED_WITH_REPLICATION
- else
- echo "Don't use replication"
- disableReplication || true
- fi
- # stop OpenLDAP
- SLAPD_PID=$(cat /run/slapd/slapd.pid)
- echo "Kill slapd, pid: $SLAPD_PID"
- kill -9 $SLAPD_PID
- echo "[ok]"
- sleep 3
- touch $FIRST_START_DONE
- fi
- exit 0
|