|
|
|
@@ -0,0 +1,61 @@
|
|
|
|
|
## Installing the quadlet lldap user service
|
|
|
|
|
|
|
|
|
|
The following assumes you have a working Podman installation and that you want to install lldap as a user service.
|
|
|
|
|
|
|
|
|
|
It will create a systemd service for each of the quadlet files. As the files are supplied, the resulting services are:
|
|
|
|
|
- lldap.service
|
|
|
|
|
- lldap-db.service
|
|
|
|
|
- lldap-db-volume.service
|
|
|
|
|
- lldap-frontend-network.service
|
|
|
|
|
- lldap-backend-network.service
|
|
|
|
|
|
|
|
|
|
Starting lldap.service and lldap-db.service always creates a fresh container. Stopping destroys the container.
|
|
|
|
|
Stopping the volume or network service **does not** destroy the associated volume or network.
|
|
|
|
|
If you want to customize the network, we suggest uncommenting the `NetworkDeleteOnStop` line in the network file before starting the lldap service for the first time. Once you have done so, stopping the network's services will allow you to modify the network properties. Otherwise, you must remove the network(s) manually with Podman. If you erase the volume, you will loose your database of users and will need to bootstrap lldap again.
|
|
|
|
|
|
|
|
|
|
Starting `lldap.service` will start all the other services, but stopping it will not stop the other services.
|
|
|
|
|
|
|
|
|
|
### Instructions
|
|
|
|
|
|
|
|
|
|
- Copy `lldap-db.container`, `lldap.container`, `lldap-db.volume`, `lldap-frontend.network`, and `lldap-backend.network` to `~/.config/containers/systemd/`
|
|
|
|
|
- Adjust the line `Environment=LLDAP_LDAP_BASE_DN=dc=example,dc=com` in `lldap.container` to match your domain name.
|
|
|
|
|
- The default value assumes your domain is "example.com"
|
|
|
|
|
- Create the necessary secrets: `lldap-jwt-secret`, `lldap-key-seed`, and `lldap-ldap-user-pass`.
|
|
|
|
|
- Podman allows several different methods to create secrets; here, it will be done purely from the command line. Don't forget to replace the secret values with something actually secret.
|
|
|
|
|
```bash
|
|
|
|
|
$ LC_ALL=C tr -dc 'A-Za-z0-9!#%&'\''()*+,-./:;<=>?@[\\]^_{|}~' </dev/urandom | head -c 32 | podman secret create lldap-jwt-secret -
|
|
|
|
|
$ LC_ALL=C tr -dc 'A-Za-z0-9!#%&'\''()*+,-./:;<=>?@[\\]^_{|}~' </dev/urandom | head -c 32 | podman secret create lldap-key-seed -
|
|
|
|
|
$ echo 'your-admin-password' | podman secret create lldap-ldap-user-pass -
|
|
|
|
|
```
|
|
|
|
|
- If later on you need to query any of those secrets, you can do so with `podman secret inspect <name of the secret> --showsecret`. The value of the secret is in the output's "SecretData" field.
|
|
|
|
|
- At this point, you should be able to start the container.
|
|
|
|
|
- Test this with:
|
|
|
|
|
```bash
|
|
|
|
|
$ podman --user daemon-reload
|
|
|
|
|
$ podman --user start lldap
|
|
|
|
|
$ podman --user status lldap
|
|
|
|
|
```
|
|
|
|
|
- Assuming it launched correctly, you should now stop it again.
|
|
|
|
|
```bash
|
|
|
|
|
$ podman --user stop lldap
|
|
|
|
|
```
|
|
|
|
|
- Make any adjustments you feel are necessary to the network files.
|
|
|
|
|
- Now all that's left to do is the [bootstrapping process](../bootstrap/bootstrap.md#docker-compose):
|
|
|
|
|
- Prepare your bootstrapping config as for the docker-compose case in `~/containers/lldap`.
|
|
|
|
|
- Toward the end of the container section, uncomment the lines in `lldap.container` regarding the bootstrap process.
|
|
|
|
|
- Start the container:
|
|
|
|
|
```bash
|
|
|
|
|
$ podman --user daemon-reload
|
|
|
|
|
$ podman --user start lldap
|
|
|
|
|
```
|
|
|
|
|
- Attach a terminal to the container, and run `bootstrap.sh`:
|
|
|
|
|
```bash
|
|
|
|
|
$ podman exec -ti lldap bash
|
|
|
|
|
$ ./bootstrap.sh
|
|
|
|
|
```
|
|
|
|
|
- Once the bootstrapping is done, remove or comment out the lines you uncommented in the previous step, stop the unit, reload the daemon, and start it again.
|
|
|
|
|
- LLDAP should be available to any unit that includes the lldap-frontend network.
|
|
|
|
|
- If your outside-facing web server is in a quadlet or a podman container too, make sure they share a network, e.g., by adding `Network=lldap-frontend.network` in its quadlet file and making the necessary adjustments to the server configs.
|
|
|
|
|
- Your web server should then manage access to LLDAP from the outside world.
|
|
|
|
|
- If your web server is not running in a Podman container/quadlet, then you should publish a port to access LLDAP on localhost. For example, `PublishPort=127.0.0.1:17170:17170` will make the default port that LLDAP binds to inside the container available from the outside.
|
|
|
|
|
- There is no real reason to modify the port inside the container, but you might need to adjust the outside one if another service already binds it on your host system.
|