mirror of
https://github.com/lldap/lldap.git
synced 2026-04-25 00:05:50 +03:00
[GH-ISSUE #1340] [FEATURE REQUEST] Allow reading db url by parts and from file #470
Labels
No labels
backend
blocked
bug
cleanup
dependencies
docker
documentation
duplicate
enhancement
enhancement
frontend
github_actions
good first issue
help wanted
help wanted
integration
invalid
ldap
pull-request
question
rust
rust
tests
wontfix
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/lldap-lldap#470
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @ykhrustalev on GitHub (Oct 25, 2025).
Original GitHub issue: https://github.com/lldap/lldap/issues/1340
Motivation
When using a randomly generated password for a database, the url has to be escaped, it adds extra complexity to prepare it in a particular way for the app.
Describe the solution you'd like
I see there are 2 options:
Describe alternatives you've considered
Currently I craft a string in a separate python script before injecting it in the systemd env
Additional context
none
@nitnelave commented on GitHub (Oct 25, 2025):
It seems like a lot of work to avoid calling "url_encode".
You could make the password not contain any of the characters to escape, and make it longer to make up for the deceased complexity.
You can write the entire DB url to a file instead of putting it in the env.
I don't think that the problem justifies an extra parameter and the accompanying (product) complexity. I want to avoid having more things for users to read to configure LLDAP, and save them from ambiguity in how the DB url is specified. The URL format is clear and standard enough.