-
-
Notifications
You must be signed in to change notification settings - Fork 224
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support LDAP over IPC (unix domain sockets) #701
Comments
More information can be found here, including motivation and implementation considerations. This would seem to fit perfectly with the goal of lldap as a light LDAP implementation for authentication. |
This feature request also extends to HTTP. Reverse proxies such as HAProxy support connecting to unix domain sockets. |
That feature sounds potentially useful. The bulk of the change would have to be in How do you propose to handle the configuration? We'd have to support a socket for LDAP, LDAPS and HTTP. Currently, we have the However, we'll need something more for LDAPS if going this way. |
My two cents for LDAP with backwards compatibility in mind:
For HTTP:
|
See #700 (comment) for my thoughts on this, I believe it to be relevant |
Another addition to my previous comments: Unix socket support for creating database connections would also be welcome. This is also supported by other services (Authelia, Nextcloud, ...). |
Connecting to the DB over UDS should be already possible: See launchbadge/sqlx#449 and launchbadge/sqlx#144 for the syntax. |
Thanks for notifying me of that, @nitnelave. I'll test it soon. |
I tested MariaDB over IPC support. Running the following works on an empty database:
Configured with:
lldap outputs:
Tested with Arch Linux and MariaDB. This makes me assume that MySQL/MariaDB over IPC is not fully supported by lldap. |
@Zepmann That's very strange. Can you open a new issue and post some more details, including the verbose LLDAP logs? |
It's not a bug in LLDAP, but a result of a too strict systemd service file provided in AUR:
Override the value to add AF_UNIX, and everything works as expected. Sorry about that. This feature request still remains open for unix socket support for LDAP and HTTP protocols. If support for that is added, the noted problem (and solution) would also apply for these protocols over unix sockets. If support is added, I'll contact the package maintainer to also add AF_UNIX to the default service file. Having support for unix sockets for the database backend, LDAP and HTTP is a better motivation compared to only support for the database backend. |
I didn't know we had an AUR package. Maybe you can ask for that patch to be included, so the next person doesn't trip over the same problem? |
There are two! There is I'll contact them on AUR and ask them to add AF_UNIX to the list of supported address families, since it can already be used with lldap (with a real world use case). By the way, how should lldap be stylized? Is it lldap, LLDAP, ...? I see it written in different ways in different locations. |
In terms of style, I usually use LLDAP in prose, and lldap in code. |
if you want use socket with postgresql :
replace :
|
For servers which host everything locally, it is unnecessary to use the TCP/IP stack for local client-server connections. Many services which support LDAP for authentication support unix domain sockets. Examples include but are not limited to Authelia, Docker Mailserver and Nextcloud.
To check if your favorite LDAP authenticating software supports LDAP over IPC, see if the ldapi:// URI scheme is supported.
The text was updated successfully, but these errors were encountered: