-
Notifications
You must be signed in to change notification settings - Fork 85
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add py3-ldap3 to Docker image #162
Comments
Hi @unmacaque , I am unsure about adding a dependency in this image. It can make it brittle and a bit heavier. Can you consider extending the image using https://github.com/tomsquest/docker-radicale?tab=readme-ov-file#extending-the-image ? |
Closing for now. Re-open if needed, or better upvote the issue. |
I'd ask to reopen this again, maybe the extended option is no necessary anymore for LDAP auth, but then I'm not sure how to configure it. I used the radicale-extended option including the radicale3-auth-ldap library for LDAP auth, but builiding the extended image after 3.3 update results in app not working anymore:
It stills works building with the 3.2 version. |
Hi @alceasan , Hard to diagnose without a LDAP system. Could it be related to the |
Hey there 👋 Just chiming in since I stumbled over the same problem. I can totally understand that adding LDAP as a dependency might not be needed in 90% of cases and adds dead weight. However, the option of manually building a docker image requires users to housekeep it which might work fine with Docker (-compose) but is a nightmare when running Kubernetes which quite a few homelabs, including mine, do. A possible solution — if you would be willing to take in the LDAP dependency from a maintenance standpoint that is — could be to publish a secondary image either tagged or suffixed with Oh and a big thank you for maintaining this project, it made getting started with Radicale trivial <3 |
Created a proof-of-concept over here which adds another layer to the Dockerfile containing the LDAP dependency. It also adapts the pipeline to run for both targets and pushes them to Docker Hub independently as two tags of the same image:
Let me know if this is something you would be interested in 🙂 One open question is whether the tests should run on the base image, the LDAP one, or both. At the moment they just use the entire Dockerfile and thus include LDAP. This could also cause confusion for users that are extending the image. Might be an argument for a separate Dockerfile? |
Thanks for your suggestions. You totally made the point: maintenance, what to test, what about security, release tag, how to document, what if there is another variant with oauth (should it include ldap or not?)... Still, for now, we are talking about adding 1 or 2 dependencies for LDAP. Questions:
|
I added |
Hi @TilBlechschmidt , I created a PR at #169 (just adding ldap3). Can you build it to validate it's working in your use case? I will then merge and release it. Thanks |
Just tested it, works like a charm 🙂 Thank you @tomsquest ! |
Since Radicale 3.3.0.0, authentication with LDAP is supported - again.
References:
This does not yet work with this image yet, as Radicale will fail to start up, because Python module
ldap3
is missing.Would it be possible to pre-bundle py3-ldap3 with this image, so LDAP support works out of the box?
The text was updated successfully, but these errors were encountered: