Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Build Olog with LDAP #3

Open
chenxin6 opened this issue Oct 15, 2019 · 0 comments
Open

Build Olog with LDAP #3

chenxin6 opened this issue Oct 15, 2019 · 0 comments

Comments

@chenxin6
Copy link

chenxin6 commented Oct 15, 2019

I want to build Olog with LDAP, so I have changed the file docker-compose.yml. Here is my docker-compose.yml.

docker-compose.yml
  
version: '3'
services:
    olog-server:
        container_name: olog-server
        image: lnlscon/olog-server:latest
        hostname: olog-server
        environment:
            - ADMIN_PASSWORD=controle
            - CERTIFICATE_PASSWORD=controle
            - DB_USER=lnls_olog_user
            - DB_PASSWORD=controle
            - DB_NAME=olog
#            - REALM_SEARCH_BIND_DN=CN=***bind_dn***
#            - REALM_SEARCH_BIND_PASS=***bind_dn_passwd***
#            - REALM_GROUP_FILTER="memberUid=%s"
            - REALM_SEARCH_FILTER="\"sAMAccountName=%s\""
            - REALM_BASE_DN="\"ou=People,dc=nscl,dc=msu,dc=edu\""
            - REALM_URL="\"ldap://openldap:389\""
        ports:
            - "4848:4848"
            - "8181:8181"
            - "1527:1527"
        networks:
            olog-network:
                ipv4_address: 192.168.7.2
        dns:
            - 10.0.0.71
            - 10.0.0.72
        depends_on:
            - olog-mysql-db
            - openldap
        volumes:
            - /hals/applications/olog/storage/olog-server/jackrabbit/:/glassfish4/glassfish/domains/domain1/config/jackrabbit/
phpldapadmin:
    container_name: phpldapadmin
    image: osixia/phpldapadmin
    hostname: phpldapadmin
    environment:
        PHPLDAPADMIN_LDAP_HOSTS: openldap
    links:
        - openldap
    ports:
        - 6443:443
    networks:
        olog-network:
            ipv4_address: 192.168.7.3
    depends_on:
        - openldap

openldap:
    container_name: openldap
    image: osixia/openldap
    hostname: openldap
    environment:
        LDAP_ORGANISATION: "example"
        LDAP_DOMAIN: nscl.msu.edu
        LDAP_ADMIN_PASSWORD: admin
    ports:
        - 389:389
        - 689:689
    networks:
        olog-network:
            ipv4_address: 192.168.7.4
    volumes:
        - /hals/applications/olog/storage/openldap/database:/var/lib/ldap
        - /hals/applications/olog/storage/openldap/config:/etc/ldap/slapd.d

olog-mysql-db:
    container_name: olog-mysql-db
    image: lnlscon/olog-mysql-db:latest
    hostname: olog-mysql-db
    environment:
        - MYSQL_USER=lnls_olog_user
        - MYSQL_ROOT_PASSWORD=controle
        - MYSQL_PASSWORD=controle
        - MYSQL_DATABASE=olog
        - PGDATA=/var/lib/postgresql/data/olog-db
    networks:
        olog-network:
            ipv4_address: 192.168.7.5
    dns:
        - 10.0.0.71
        - 10.0.0.72
    volumes:
        - /hals/applications/olog/storage/olog-mysql-db/db:/var/lib/mysql

networks:
olog-network:
ipam:
config:
- subnet: 192.168.7.0/24

And here is my LDAP configuration.

LDAP configuration
  
dn: dc=nscl,dc=msu,dc=edu
objectclass: dcObject
objectClass: organization
objectClass: top
dc: nscl
o: NSCL Olog Test

dn: ou=Group,dc=nscl,dc=msu,dc=edu
objectclass: organizationalUnit
ou: Group
description: groups branch

dn: ou=People,dc=nscl,dc=msu,dc=edu
objectclass: organizationalUnit
ou: People
description: people branch

dn: uid=taggy,ou=People,dc=nscl,dc=msu,dc=edu
uid: taggy
objectClass: account
objectClass: posixAccount
description: User with tag role
cn: Taggy
userPassword: taggy
uidNumber: 23001
gidNumber: 23001
homeDirectory: /dev/null

dn: uid=logbooky,ou=People,dc=nscl,dc=msu,dc=edu
uid: logbooky
objectClass: account
objectClass: posixAccount
description: User with logbook role
cn: Logbooky
userPassword: logbooky
uidNumber: 23002
gidNumber: 23002
homeDirectory: /dev/null

dn: uid=loggy,ou=People,dc=nscl,dc=msu,dc=edu
uid: loggy
objectClass: account
objectClass: posixAccount
description: User with log role
cn: Loggy
userPassword: loggy
uidNumber: 23003
gidNumber: 23003
homeDirectory: /dev/null

dn: uid=boss,ou=People,dc=nscl,dc=msu,dc=edu
uid: boss
objectClass: account
objectClass: posixAccount
description: User with admin role
cn: Boss
userPassword: boss
uidNumber: 23004
gidNumber: 23004
homeDirectory: /dev/null

dn: uid=logbooky2,ou=People,dc=nscl,dc=msu,dc=edu
uid: logbooky2
objectClass: account
objectClass: posixAccount
description: User with logbook role
cn: Logbooky2
userPassword: logbooky2
uidNumber: 23005
gidNumber: 23005
homeDirectory: /dev/null

dn: uid=loggy2,ou=People,dc=nscl,dc=msu,dc=edu
uid: loggy2
objectClass: account
objectClass: posixAccount
description: User with log role
cn: Loggy2
userPassword: loggy2
uidNumber: 23006
gidNumber: 23006
homeDirectory: /dev/null

dn: uid=loggy3,ou=People,dc=nscl,dc=msu,dc=edu
uid: loggy3
objectClass: account
objectClass: posixAccount
description: User with log role
cn: Loggy3
userPassword: loggy3
uidNumber: 23007
gidNumber: 23007
homeDirectory: /dev/null

dn: cn=testt,ou=Group,dc=nscl,dc=msu,dc=edu
cn: testt
objectClass: posixGroup
description: testt group
gidNumber: 24001
memberUid: taggy
memberUid: logbooky
memberUid: logbooky2
memberUid: loggy
memberUid: loggy3

dn: cn=testp,ou=Group,dc=nscl,dc=msu,dc=edu
cn: testp
objectClass: posixGroup
description: testp group
gidNumber: 24002
memberUid: logbooky
memberUid: loggy
memberUid: loggy2
memberUid: loggy3

dn: cn=testc,ou=Group,dc=nscl,dc=msu,dc=edu
cn: testc
objectClass: posixGroup
description: testc group
gidNumber: 24003
memberUid: loggy
memberUid: loggy2
memberUid: loggy3

dn: cn=xxxx,ou=Group,dc=nscl,dc=msu,dc=edu
cn: xxxx
objectClass: posixGroup
description: xxxx group
gidNumber: 24004
memberUid: taggy
memberUid: logbooky
memberUid: loggy

dn: cn=testx,ou=Group,dc=nscl,dc=msu,dc=edu
cn: testx
objectClass: posixGroup
description: testxx group
gidNumber: 24005
memberUid: taggy
memberUid: logbooky
memberUid: loggy

dn: cn=olog-tags,ou=Group,dc=nscl,dc=msu,dc=edu
cn: olog-tags
objectClass: posixGroup
description: olog-tags group
gidNumber: 24004
memberUid: taggy

dn: cn=olog-logbooks,ou=Group,dc=nscl,dc=msu,dc=edu
cn: olog-logbooks
objectClass: posixGroup
description: olog-logbooks group
gidNumber: 24005
memberUid: logbooky
memberUid: logbooky2

dn: cn=olog-logs,ou=Group,dc=nscl,dc=msu,dc=edu
cn: olog-logs
objectClass: posixGroup
description: olog-logs group
gidNumber: 24006
memberUid: loggy
memberUid: loggy2
memberUid: loggy3

dn: cn=olog-admins,ou=Group,dc=nscl,dc=msu,dc=edu
cn: olog-admins
objectClass: posixGroup
description: olog-admins group
gidNumber: 24007
memberUid: boss

Now, LDAP can work.
QQ图片20191015175626
But I can't log in through the browser and client. Is there a problem with the configuration of olog-server in my docker-compose.yml?
QQ截图20191015174632

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant