ldap: Use hashed passwords in the test

We should lead with good example and when users copy code from this repo
it should not incentivize them to use plain text passwords.
This commit is contained in:
Andreas Rammhold 2020-10-12 17:16:51 +02:00
parent 656b0c27b3
commit 458b0ceb85
No known key found for this signature in database
GPG key ID: E432E410B5E48C86

View file

@ -366,9 +366,14 @@
rootpw = "notapassword"; rootpw = "notapassword";
database = "bdb"; database = "bdb";
dataDir = "/var/lib/openldap"; dataDir = "/var/lib/openldap";
extraConfig = ''
moduleload pw-sha2
'';
extraDatabaseConfig = '' extraDatabaseConfig = ''
''; '';
# userPassword generated via `slappasswd -o module-load=pw-sha2 -h '{SSHA256}'`
# The admin user has the password `password and `user` has the password `foobar`.
declarativeContents = '' declarativeContents = ''
dn: dc=example dn: dc=example
dc: example dc: example
@ -401,7 +406,7 @@
sn: user sn: user
cn: user cn: user
mail: user@example mail: user@example
userPassword: foobar userPassword: {SSHA256}B9rfUbNgv8nIGn1Hm5qbVQdv6AIQb012ORJwegqELB0DWCzoMCY+4A==
dn: cn=admin,ou=users,dc=example dn: cn=admin,ou=users,dc=example
objectClass: organizationalPerson objectClass: organizationalPerson
@ -409,7 +414,7 @@
sn: admin sn: admin
cn: admin cn: admin
mail: admin@example mail: admin@example
userPassword: password userPassword: {SSHA256}meKP7fSWhkzXFC1f8RWRb8V8ssmN/VQJp7xJrUFFcNUDuwP1PbitMg==
''; '';
}; };
systemd.services.hdyra-server.environment.CATALYST_DEBUG = "1"; systemd.services.hdyra-server.environment.CATALYST_DEBUG = "1";