Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

LDAP authorization for homer and grafana in docker-compose #126

Closed
perrfect opened this issue Jul 26, 2022 · 7 comments
Closed

LDAP authorization for homer and grafana in docker-compose #126

perrfect opened this issue Jul 26, 2022 · 7 comments
Labels
enhancement New feature or request question Further information is requested

Comments

@perrfect
Copy link

Hello.
Is it possible to enable LDAP authorization for homer and grafana in docker-compose?
And which parameters for docker-compose should I use?

@lmangani
Copy link
Member

lmangani commented Jul 26, 2022

Hello @perrfect no the docker-compose doesn't include any variables for enabling LDAP so the options are:

  1. create a PR to extend the entrypoint and config template behaviour
  2. map your own custom JSON config with the desired settings off your filesystem

@lmangani lmangani added question Further information is requested enhancement New feature or request labels Jul 26, 2022
@perrfect
Copy link
Author

Hello @perrfect no the docker-compose doesn't include any variables for enabling LDAP so the options are:

1. create a PR to extend the [entrypoint](https://github.com/sipcapture/homer-app/blob/master/docker/docker-entrypoint.d/1) and [config template](https://github.com/sipcapture/homer-app/blob/master/docker/webapp_config.json#L57) behaviour

2. map your own custom JSON config with the desired settings off your filesystem

Hello. Thank you for your reply.
I've checked and seems parameters from the endpoint work fine.
But I didn't find how to create mapping for my LDAP groups and groups in homer.
Is it possible mapping separate groups for admins and users?

@lmangani
Copy link
Member

perhaps @adubovikov and his team might have a suggestion here

@lmangani
Copy link
Member

@perrfect I would start by extending the template config with a variable for any fields you need to be configurable through ENV like you see for the other supported dynamic parameters, and then add it to the entrypoint. It's a copy-paste job using the examples already available - feel free to do a PR and we will correct if needed.

@perrfect
Copy link
Author

@perrfect I would start by extending the template config with a variable for any fields you need to be configurable through ENV like you see for the other supported dynamic parameters, and then add it to the entrypoint. It's a copy-paste job using the examples already available - feel free to do a PR and we will correct if needed.

First of all I need understand why LDAP group mapping not working and then create a PR, because now I have not full working LDAP configuration(

@lmangani
Copy link
Member

Sure. Unfortunately we can't help with that part but feel free to share any observations.

@perrfect
Copy link
Author

Works fine for FreeIPA in this configuration in docker-compose:

      - "AUTH_TYPE=ldap"
      - "LDAP_BASE=dc=ipa,dc=example,dc=com"
      - "LDAP_HOST=ipa-1.example.com"
      - "LDAP_PORT=636"
      - "LDAP_SSL=true"
      - "LDAP_SKIP_TLS=false"
      - "LDAP_SKIP_VERIFY=true"
      - "LDAP_ANONYMOUS=false"
      - "LDAP_BIND_DN=uid=homer,cn=users,cn=accounts,dc=ipa,dc=example,dc=com"
      - "LDAP_BIND_PASS=PASSWORD"
      - "LDAP_USER_FILTER=(\\&(objectClass=person)(uid=%s))"
      - "LDAP_GROUP_FILTER=(member=%s)"
      - "LDAP_USER_DN=uid=%s,cn=users,cn=accounts,dc=ipa,dc=example,dc=com"
      - "LDAP_ADMINGROUP=admin"
      - "LDAP_USERGROUP=sec_homer_users"
      - "LDAP_USERMODE=false"
      - "LDAP_ADMINMODE=false"

Still only the problem described in this issue 127

Thank you.
This issue can close.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request question Further information is requested
Projects
None yet
Development

No branches or pull requests

2 participants