-
Notifications
You must be signed in to change notification settings - Fork 155
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Set the ldap certificate value properly. #139
Conversation
Set the ldap certificate value properly. Also added a few comments to clarify the group attributes.
Added DCO |
@@ -11,7 +11,8 @@ | |||
# Skip certificate verification. Default: false | |||
insecure_skip_verify: ((ldap_insecure_skip_verify)) | |||
# The CA certificate for the LDAP auth provider’s endpoints. | |||
ca_cert: ((ldap_ca_cert)) | |||
ca_cert: | |||
certificate: ((ldap_ca_cert)) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
i don't think this is actually proper - it seems like the current ops file expects ldap_ca_cert
to be a certificate
typed variable
@brightzheng100 is that right?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@brightzheng100 @vito Then you cannot read the certificate from a file, rather you would have to set the variable in a file and interpolate it. Both work but I believe reading the certificate from a file is a better solution.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This is an interesting thing while working with For demonstration purposes, I've tested out with 3 scenarios: Option 1In
Deployment:
It works. Option 2In
Deployment:
It works too. Option 3ldap.yml:
Deployment:
It also works. Frankly, I'd say the way @vito highlighted is more precise. Meanwhile, I'll reach out further to some other teams to get back the "best practice". More feedback? |
@brightzheng100 Thanks for the investigation! Come to think of it, I think
At least, I remember that working with @sandyg1 Does the above work for you? |
I am working with a customer right now who is looking to set up Concourse w/ LDAP Auth. We ran into this same challenges as Vito above. Having only the I came across this PR and we tested and validated that this indeed is the culprit. After adding the It's been a while since this PR has received any activity, so I thought I'd help others out. It'd be great if this could get merged in for those who want to configure ldap in the future. |
@marijenk Thanks for the update. I feel like this is a documentation issue, though, and we shouldn't merge this PR. We've actually received a couple other similar PRs in the past which have been closed with the same reasoning: These ops files expect typed variables to be specified for these properties, as the BOSH property specifies it as This allows the value to be specified using a generated var or provided by a certificate-typed credential in CredHub. If we hardcode This has come up three times now in the past couple of weeks, though, so I think something should change. It feels like we're using the BOSH abstractions correctly, so I guess we just need to update documentation...somewhere. I'm not sure where. 😕 Is there anywhere you would have looked to see that kind of thing? Closing; I've opened an issue for updating documentation here: #163 Thanks! |
Set the ldap certificate value properly. Also added a few comments to clarify the group attributes.