diff --git a/site/profiles/manifests/jupyter/jupyterhub.pp b/site/profiles/manifests/jupyter/jupyterhub.pp index af3bb7f..b551d27 100644 --- a/site/profiles/manifests/jupyter/jupyterhub.pp +++ b/site/profiles/manifests/jupyter/jupyterhub.pp @@ -17,7 +17,9 @@ class profiles::jupyter::jupyterhub ( String $ldap_bind_dn_template = 'cn={username},ou=people,ou=users,dc=main,dc=unkin,dc=net', Boolean $ldap_use_ssl = false, Array $ldap_allowed_groups = ['ou=jupyterhub_user,ou=groups,dc=main,dc=unkin,dc=net'], - Array $ldap_admin_groups = ['ou=jupyterhub_admin,ou=groups,dc=main,dc=unkin,dc=net'], + Array $ldap_admin_users = [], + String $docker_image = 'git.query.consul/unkin/almalinux8-jupyterinstance:latest', + String $docker_network = 'jupyterhub', ){ # ensure nodejs:20 is installed diff --git a/site/profiles/templates/jupyterhub/config.py.erb b/site/profiles/templates/jupyterhub/config.py.erb index d4f964b..acda6e5 100644 --- a/site/profiles/templates/jupyterhub/config.py.erb +++ b/site/profiles/templates/jupyterhub/config.py.erb @@ -39,5 +39,5 @@ c.LDAPAuthenticator.use_ssl = <%= @ldap_use_ssl ? 'True' : 'False' %> # Restrict access to a specific LDAP group c.LDAPAuthenticator.allowed_groups = <%= @ldap_allowed_groups.to_s %> -# Set an LDAP group as admins -c.LDAPAuthenticator.admin_groups = <%= @ldap_admin_groups.to_s %> +# List LDAP users as admins +c.LDAPAuthenticator.admin_users = <%= @ldap_admin_users.to_s %>