Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feat: AzureAAD groups support #26

Merged
merged 4 commits into from
Mar 28, 2024
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 2 additions & 0 deletions components/09-nautobot/base/nautobot/templates/configmap.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -29,6 +29,8 @@ data:
NAUTOBOT_REDIS_SSL: "False"
NAUTOBOT_SUPERUSER_EMAIL: "[email protected]"
NAUTOBOT_SUPERUSER_NAME: "admin"
RAX_SUPERUSER_GROUPS: undercloud-dev
RAX_STAFF_GROUPS: undercloud-dev
---
# Source: nautobot/templates/configmap.yaml
apiVersion: v1
Expand Down
17 changes: 8 additions & 9 deletions components/13-dexidp/values.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -14,8 +14,9 @@ config:
config:
inCluster: true

# Enable at least one connector
# See https://dexidp.io/docs/connectors/ for more options
oauth2:
skipApprovalScreen: true

enablePasswordDB: false
connectors:
- type: keystone
Expand All @@ -31,7 +32,7 @@ config:
keystoneUsername: demo
keystonePassword: DEMO_PASS
- type: oidc
name: azure
name: Azure
id: azure
config:
issuer: $AZURE_ISSUER
Expand All @@ -41,14 +42,12 @@ config:
scopes:
- openid
- email
- offline_access
insecureSkipEmailVerified: true
# enabling insecureEnableGroups adds the list of group UUIDs to the
# access token, which in turn results in a HTTP headers for requests to
# https://dexidp.local/userinfo being way too large for Ingress
# controller and python requests library. Even after adjusting ingress
# controlloer, the Nautobot still cannot handle token that large.
insecureEnableGroups: false
insecureEnableGroups: true
getUserInfo: true
claimMapping:
groups: "roles"
logger:
level: info

Expand Down
Loading