-
Notifications
You must be signed in to change notification settings - Fork 45
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Bind Dex static admin user to a Grafana Admin role automatically #2743
Bind Dex static admin user to a Grafana Admin role automatically #2743
Conversation
Hello ebaneck,My role is to assist you with the merge of this Status report is not available. |
ConflictA conflict has been raised during the creation of I have not created the integration branch. Here are the steps to resolve this conflict: $ git fetch
$ git checkout -B w/2.6/bugfix/2653-map-Dex-static-admin-user-as-Grafana-admin-automatically origin/development/2.6
$ git merge origin/bugfix/2653-map-Dex-static-admin-user-as-Grafana-admin-automatically
$ # <intense conflict resolution>
$ git commit
$ git push -u origin w/2.6/bugfix/2653-map-Dex-static-admin-user-as-Grafana-admin-automatically |
590e2fd
to
61ae66a
Compare
…spaces In the Prometheus-operator charts, we need to map the OIDC user in Dex to a Grafana admin user. This fix ensures we can import and render service configs while specifying their corresponding namespaces using the following arguments. `--service-config service_name service_configmap_name service_namespace`
To map the OIDC default admin user `admin@metalk8s.invalid` to a Grafana admin role, we need to make use of Grafana role attributes. This commit attaches an OIDC admin user using role_attribute_path for generic oauth to a Grafana admin role.
This chart is rendered using: ``` ./charts/render.py prometheus-operator --namespace metalk8s-monitoring \ charts/prometheus-operator.yaml charts/prometheus-operator/ \ --service-config grafana metalk8s-grafana-config metalk8s/addons/prometheus-operator/config/grafana.yaml metalk8s-monitoring \ --service-config prometheus metalk8s-prometheus-config metalk8s/addons/prometheus-operator/config/prometheus.yaml metalk8s-monitoring \ --service-config alertmanager metalk8s-alertmanager-config metalk8s/addons/prometheus-operator/config/alertmanager.yaml metalk8s-monitoring \ --service-config dex metalk8s-dex-config metalk8s/addons/dex/config/dex.yaml metalk8s-auth \ > salt/metalk8s/addons/prometheus-operator/deployed/chart.sls ``` Closes: #2653
This commit updates the Changelog entry to include a fix for mapping the OIDC static admin user to a Grafana Admin role. This commit also fixes the PR number for bumping K8s version to 1.16.13 which was previously wrongly specified.
61ae66a
to
787d692
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM
/approve |
Build failedThe build for commit did not succeed in branch w/2.6/bugfix/2653-map-Dex-static-admin-user-as-Grafana-admin-automatically. The following options are set: approve |
In the queueThe changeset has received all authorizations and has been added to the The changeset will be merged in:
The following branches will NOT be impacted:
There is no action required on your side. You will be notified here once IMPORTANT Please do not attempt to modify this pull request.
If you need this pull request to be removed from the queue, please contact a The following options are set: approve |
I have successfully merged the changeset of this pull request
The following branches have NOT changed:
Please check the status of the associated issue None. Goodbye ebaneck. |
Component:
'salt', 'prometheus-operator', 'charts', 'grafana'
Context:
See: #2653
Summary:
When logging into Grafana, with the default admin@metalk8s.invalid Dex static user, we should automatically get full access permissions in Grafana. This is possible since we now make use of the Grafana role attribute to map the Dex user to a Grafana Admin role.
Acceptance criteria:
admin@metalk8s.invalid
user possessing Admin role attributes in Grafana.Closes: #2653