Skip to content

fixup notes around enabling & disabling #1129

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 5 commits into from
May 27, 2025
Merged

fixup notes around enabling & disabling #1129

merged 5 commits into from
May 27, 2025

Conversation

johrstrom
Copy link
Contributor

@johrstrom johrstrom requested a review from moffatsadeghi May 13, 2025 14:54
@johrstrom
Copy link
Contributor Author

@moffatsadeghi please advise - you opened #1072, so here's the potential fix for it.

Copy link
Contributor

@moffatsadeghi moffatsadeghi left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Left some feedback on these changes. I think you are on a great path and maybe we can put our heads together to land in a good middle spot with the customizations.rst file

@@ -32,6 +32,9 @@ to only members in the Unix group ``staff``, you would simply apply the
applicable file permission such that anonymous users cannot access the
directory while members of the ``staff`` Unix group can.

Conversely, if the directory is already ``700`` just reverse the process to
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I really like where you are coming from - adding more information to this second to make it clearer and adding examples. I wonder if we need to step back and analyze this section as a whole because reading through it, I get confused with some of the organization and wording.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

OK - I added a little bit above, kind of like a TLDR. LMK what you think.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

How about this?:

Disabling or Limiting Access to System Applications

Open OnDemand includes several system applications that are installed by default and located in the following directory:
/var/www/ood/apps/sys/

If you want to disable a specific application or limit who can access it, you can do so by adjusting the file permissions on that application's directory.

Disabling an Application

To completely disable an application, such as the File Browser, you can restrict read and execute permissions so that only root (or administrators) can access it. This effectively hides the application from regular users in the web interface.

Example:

sudo chmod 700 /var/www/ood/apps/sys/files

This command makes the files application (the File Browser) inaccessible to anyone who is not the root user.

Limiting Access by Group

If you prefer to limit access to a specific group of users instead of disabling the application entirely, you can do so using Unix group permissions.

Example: To allow access only to users in the staff group:

sudo chmod 750 /var/www/ood/apps/sys/files
sudo chown root:staff /var/www/ood/apps/sys/files

This ensures:

  • The application is readable and executable by the staff group.
  • All other users (not in staff) will not see or access it through the OnDemand interface.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I've updated this section to have headings. Should get published to the URL below in a few minutes.

https://osc.github.io/ood-documentation-test/40-rn-updates/customizations.html

Copy link
Contributor

@moffatsadeghi moffatsadeghi left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thoughts on these two additions?

@@ -32,6 +32,9 @@ to only members in the Unix group ``staff``, you would simply apply the
applicable file permission such that anonymous users cannot access the
directory while members of the ``staff`` Unix group can.

Conversely, if the directory is already ``700`` just reverse the process to
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

How about this?:

Disabling or Limiting Access to System Applications

Open OnDemand includes several system applications that are installed by default and located in the following directory:
/var/www/ood/apps/sys/

If you want to disable a specific application or limit who can access it, you can do so by adjusting the file permissions on that application's directory.

Disabling an Application

To completely disable an application, such as the File Browser, you can restrict read and execute permissions so that only root (or administrators) can access it. This effectively hides the application from regular users in the web interface.

Example:

sudo chmod 700 /var/www/ood/apps/sys/files

This command makes the files application (the File Browser) inaccessible to anyone who is not the root user.

Limiting Access by Group

If you prefer to limit access to a specific group of users instead of disabling the application entirely, you can do so using Unix group permissions.

Example: To allow access only to users in the staff group:

sudo chmod 750 /var/www/ood/apps/sys/files
sudo chown root:staff /var/www/ood/apps/sys/files

This ensures:

  • The application is readable and executable by the staff group.
  • All other users (not in staff) will not see or access it through the OnDemand interface.

To enable the Project Manager, simply follow the instructions in :ref:`disabling_applications`
to enable this application.
To enable the Project Manager, refer to the instructions in the
:ref:`disabling_applications` section.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Looks great! I guess to go above and beyond, how do you feel about these additions?

Introducing the Project Manager (Job Composer Replacement Preview)

The Open OnDemand development team is actively working on a new application designed to eventually replace the existing Job Composer. This new tool is called the Project Manager.

A preview version of the Project Manager was first included in version 3.1, and we've continued to make improvements since then. However, it's still under active development and does not yet have full feature parity with the current Job Composer. For that reason, the Project Manager remains disabled by default in this release.

That said, if you're interested in testing it—perhaps within your team or among a small group of early adopters—you can manually enable it.

How to Enable the Project Manager

The Project Manager is installed along with other system applications in:

/var/www/ood/apps/sys/project_manager

To enable it for specific users or groups, follow the same approach described in the Disabling Applications section by adjusting file permissions.

For example, to make it visible only to users in the staff group:

sudo chmod 750 /var/www/ood/apps/sys/project_manager
sudo chown root:staff /var/www/ood/apps/sys/project_manager

This gives access to members of the staff Unix group, while keeping it hidden from other users.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Instead of having the same documentation in 2 places - I've updated the link to point directly to the enabling applications section in the customizations page.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Sounds great!

@johrstrom
Copy link
Contributor Author

Yea we could likely benefit from headings. I'll fix that up soon.

Copy link
Contributor

@moffatsadeghi moffatsadeghi left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Changes look fantastic! This is much more clear and the layout is much easier to follow. Great teamwork, Jeff! Really appreciate it!

@johrstrom johrstrom merged commit 626cd6d into latest May 27, 2025
1 check passed
@johrstrom johrstrom deleted the 40-rn-updates branch May 27, 2025 13:34
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Fix up PM sentence in the 4.0 RN and add more information in the section "Disabling applications"
2 participants