@@ -223,7 +223,9 @@ conf:
223223 OIDCXForwardedHeaders X-Forwarded-Host X-Forwarded-Proto X-Forwarded-Port
224224
225225 # OIDC provider's .well-known/configuration URL
226- OIDCProviderMetadataURL {{ tuple "dex" "internal" "dex" $ | include "helm-toolkit.endpoints.keystone_endpoint_uri_lookup" }}
226+ OIDCProviderMetadataURL {{ tuple "dex" "internal" "dex" $ | include "helm-toolkit.endpoints.keystone_endpoint_uri_lookup" }}/.well-known/openid-configuration
227+ # this is so that in the OAuth 2.0 flows we can validate the JWT token
228+ OIDCOAuthVerifyJwksUri {{ tuple "dex" "internal" "dex" $ | include "helm-toolkit.endpoints.keystone_endpoint_uri_lookup" }}/keys
227229 # Client / Application Identifier and Secret
228230 OIDCClientID keystone
229231 OIDCClientSecret "exec:/bin/cat /etc/keystone-sso/client-secret"
@@ -237,6 +239,7 @@ conf:
237239
238240 # set the REMOTE_USER to the value of preferred_username
239241 OIDCRemoteUserClaim preferred_username
242+ OIDCOAuthRemoteUserClaim preferred_username
240243 # scopes that we want to request
241244 OIDCScope "openid email profile groups"
242245
@@ -271,6 +274,13 @@ conf:
271274 Require valid-user
272275 AuthType openid-connect
273276 </Location>
277+ # add OAuth 2.0 support for the identity provider 'sso' using the 'mapped' protocol
278+ <Location /v3/OS-FEDERATION/identity_providers/sso/protocols/mapped/auth>
279+ Require valid-user
280+ AuthType oauth20
281+ # TODO: variablize this better
282+ OIDCPathAuthRequestParams connector_id=machine
283+ </Location>
274284 </VirtualHost>
275285
276286
@@ -317,7 +327,7 @@ endpoints:
317327 dex :
318328 # override this when full deployment
319329 default : 5556
320- path : ' /.well-known/openid-configuration '
330+ path : ' '
321331
322332manifests :
323333 job_credential_cleanup : false
0 commit comments