Wiki source for LDAPDevelopmentEnvironment
======LDAP Development Server Setup======
These instructions are to setup the OpenNIC object schemas in slapd. This will only work on systems that use the cn=config type of configuration(not slapd.conf). It has been tested on Debian 8.
=====1) Install OpenLDAP(slapd)=====
Follow documentation for your specific distribution to install slapd.
Copy the provided ##courier.schema## and ##dnsdomain2.schema## to ##/etc/ldap/schema/##. Start slapd afterwards. New object schemas should now be available but the config has to be regenerated.
====Debian====
If you are not prompted for initial configuration, you can reconfigure the package with the following command.
%%(Bash)
dpkg-reconfigure slapd
%%
**NOTE**: Initial configuration must be set with a baseDN of ##dc=opennic,dc=glue##.
=====2) Test Connection and Base Schema=====
If everything has been setup correctly, the following should work. You will be prompted for the administrator password.
%%(Bash)
ldapsearch -h localhost -D "cn=admin,dc=opennic,dc=glue" -W -b "dc=opennic,dc=glue" -s "base" "(objectclass=*)"
%%
=====3) Create dnsschema.conf=====
Create ##/tmp/dnsschema.conf## with the schemas you would like to use. As an example:
%%(text)
include /etc/ldap/schema/core.schema
include /etc/ldap/schema/cosine.schema
include /etc/ldap/schema/nis.schema
include /etc/ldap/schema/courier.schema
include /etc/ldap/schema/inetorgperson.schema
include /etc/ldap/schema/dnsdomain2.schema
%%
=====4) Create Temp Config Directory=====
Create a directory to create the new LDAP configuration.
%%(Bash)
mkdir /tmp/dnsschema.d
%%
=====5) Generate Temporary Config=====
Populate the test directory with a base config.
%%(Bash)
slaptest -f /tmp/dnsschema.conf -F /tmp/dnsschema.d/
%%
=====6) Verify Config=====
Check and make sure the ##/tmp/dnsschema.d/## directory has ##cn=config##, which should suggest that the config has been created successfully.
=====7) Make Necessary Changes to LDIFs=====
Edit the new ##dnsdomain2.ldif##(should be at ##/tmp/dnsschema.d/cn\=config/cn\=schema/cn\=\{*\}dnsdomain2.ldif##) in the temporary config. Change the first few lines so it looks something like the following:
%%(text)
dn: cn=dnsdomain2,cn=schema,cn=config
objectClass: olcSchemaConfig
cn: dnsdomain2
%%
Edit ##courier.ldif## in a similar fashion to look something like this.
%%(text)
dn: cn=courier,cn=schema,cn=config
objectClass: olcSchemaConfig
cn: courier
%%
For both files, remove everything below the last olcObjectClasses entry as it is superfluous and possibly conflicting.
=====8) Merge New Schema=====
Now, we need to merge the new object schemas into the config.
%%
ldapadd -Y EXTERNAL -H ldapi:/// -f /tmp/dnsschema.d/cn\=config/cn\=schema/cn\=\{3\}courier.ldif
ldapadd -Y EXTERNAL -H ldapi:/// -f /tmp/dnsschema.d/cn\=config/cn\=schema/cn\=\{5\}dnsdomain2.ldif
%%
If all goes well, you should see output along the lines of:
%%(text)
SASL/EXTERNAL authentication started
SASL username: gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth
SASL SSF: 0
adding new entry "cn=dnsdomain2,cn=schema,cn=config"
%%
=====9) Add Test Data=====
%%(Bash)
ldapadd -D "cn=admin,dc=opennic,dc=glue" -W -x -f opennic_glue.ldif
ldapadd -D "cn=admin,dc=opennic,dc=glue" -W -x -f test_zone.ldif
ldapadd -D "cn=admin,dc=opennic,dc=glue" -W -x -f users.ldif
%%
A complete test environment should now be setup and ready to go.
=====Files=====
{{files}}
----
CategoryRegistry
These instructions are to setup the OpenNIC object schemas in slapd. This will only work on systems that use the cn=config type of configuration(not slapd.conf). It has been tested on Debian 8.
=====1) Install OpenLDAP(slapd)=====
Follow documentation for your specific distribution to install slapd.
Copy the provided ##courier.schema## and ##dnsdomain2.schema## to ##/etc/ldap/schema/##. Start slapd afterwards. New object schemas should now be available but the config has to be regenerated.
====Debian====
If you are not prompted for initial configuration, you can reconfigure the package with the following command.
%%(Bash)
dpkg-reconfigure slapd
%%
**NOTE**: Initial configuration must be set with a baseDN of ##dc=opennic,dc=glue##.
=====2) Test Connection and Base Schema=====
If everything has been setup correctly, the following should work. You will be prompted for the administrator password.
%%(Bash)
ldapsearch -h localhost -D "cn=admin,dc=opennic,dc=glue" -W -b "dc=opennic,dc=glue" -s "base" "(objectclass=*)"
%%
=====3) Create dnsschema.conf=====
Create ##/tmp/dnsschema.conf## with the schemas you would like to use. As an example:
%%(text)
include /etc/ldap/schema/core.schema
include /etc/ldap/schema/cosine.schema
include /etc/ldap/schema/nis.schema
include /etc/ldap/schema/courier.schema
include /etc/ldap/schema/inetorgperson.schema
include /etc/ldap/schema/dnsdomain2.schema
%%
=====4) Create Temp Config Directory=====
Create a directory to create the new LDAP configuration.
%%(Bash)
mkdir /tmp/dnsschema.d
%%
=====5) Generate Temporary Config=====
Populate the test directory with a base config.
%%(Bash)
slaptest -f /tmp/dnsschema.conf -F /tmp/dnsschema.d/
%%
=====6) Verify Config=====
Check and make sure the ##/tmp/dnsschema.d/## directory has ##cn=config##, which should suggest that the config has been created successfully.
=====7) Make Necessary Changes to LDIFs=====
Edit the new ##dnsdomain2.ldif##(should be at ##/tmp/dnsschema.d/cn\=config/cn\=schema/cn\=\{*\}dnsdomain2.ldif##) in the temporary config. Change the first few lines so it looks something like the following:
%%(text)
dn: cn=dnsdomain2,cn=schema,cn=config
objectClass: olcSchemaConfig
cn: dnsdomain2
%%
Edit ##courier.ldif## in a similar fashion to look something like this.
%%(text)
dn: cn=courier,cn=schema,cn=config
objectClass: olcSchemaConfig
cn: courier
%%
For both files, remove everything below the last olcObjectClasses entry as it is superfluous and possibly conflicting.
=====8) Merge New Schema=====
Now, we need to merge the new object schemas into the config.
%%
ldapadd -Y EXTERNAL -H ldapi:/// -f /tmp/dnsschema.d/cn\=config/cn\=schema/cn\=\{3\}courier.ldif
ldapadd -Y EXTERNAL -H ldapi:/// -f /tmp/dnsschema.d/cn\=config/cn\=schema/cn\=\{5\}dnsdomain2.ldif
%%
If all goes well, you should see output along the lines of:
%%(text)
SASL/EXTERNAL authentication started
SASL username: gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth
SASL SSF: 0
adding new entry "cn=dnsdomain2,cn=schema,cn=config"
%%
=====9) Add Test Data=====
%%(Bash)
ldapadd -D "cn=admin,dc=opennic,dc=glue" -W -x -f opennic_glue.ldif
ldapadd -D "cn=admin,dc=opennic,dc=glue" -W -x -f test_zone.ldif
ldapadd -D "cn=admin,dc=opennic,dc=glue" -W -x -f users.ldif
%%
A complete test environment should now be setup and ready to go.
=====Files=====
{{files}}
----
CategoryRegistry