ood_portal.yml

Relying on the default build is fine for a demo deployment, but it is not recommended for a production environment. Options can be configured by default under the file /etc/ood/config/ood_portal.yml.

The RPMs copy this file from /opt/ood/ood-portal-generator/ood_portal_example.yml during the installation.

All the default options are listed in this configuration file. Feel free to read it through before continuing on.

Configure General Options

listen_addr_port (String, Array<String>, null)

the address and port server listens on for connections

Default

Don’t add a Listen directive in this Apache config (typically it exists in another config)

listen_addr_port: null
Example

Explicitly listen on port 443

listen_addr_port: "443"
servername (String, null)

the host name used to access the Open OnDemand portal

Default

Access website through IP address only

servername: null
Example

Access website through the host name www.example.com

servername: "www.example.com"
proxy_server (String, null)

The proxy server, if one exists. Used when you have a proxy in front of the Open OnDemand server(s).

Default

No proxy server

proxy_server: null
Example

Access website through the proxy name www.example-proxy.com

proxy_server: "www.example-proxy.com"
port (Integer, null)

the port used to access the Open OnDemand portal (if different than 80 or 443)

Default

Use port 80 or port 443 if SSL is enabled

port: null
Example

Use a higher numbered port to access the website

port: 8080
ssl (Array<String>, null)

a list of Apache directives that enable SSL support

Default

Disable SSL support

ssl: null

Example

ssl:
   - SSLCertificateFile /etc/letsencrypt/live/change-me/cert.pem
   - SSLCertificateKeyFile /etc/letsencrypt/live/change-me/privkey.pem
   - SSLCertificateChainFile /etc/letsencrypt/live/change-me/chain.pem
logroot (String)

the root directory where log files are stored (can be relative to ServerRoot)

Default

Store logs in $ServerRoot/logs directory

logroot: "logs"
Example

Store logs in a different directory

logroot: "/path/to/my/logs"
errorlog (String, 'error.log')

The Error log filename

Default

“error.log”

errorlog: "error.log"
Example

“my.site.error.log”

errorlog: "my.site.error.log"
accesslog (String, 'access.log')

The Access log filename

Default

“access.log”

accesslog: "access.log"
Example

“my.site.access.log”

accesslog: "my.site.access.log"
logformat (String, apache conbined format)

The log format.

Default

apache combined format

logformat: null
Example

Change the error and access log format.

logformat: '"%v %h \"%r\" %>s %O \"%{Referer}i\" \"%{User-Agent}i\" %{SSL_PROTOCOL}x %T"'
use_rewrites (Boolean)

Should RewriteEngine be used

Default

Use RewriteEngine

use_rewrites: true
Example

Disable RewriteEngine usage

use_rewrites: false
use_maintenance (Boolean)

Enable Rewrite rules for supporting maintenance mode of OnDemand Requires use_rewrites to be true

Default

Support maintenance mode support

use_maintenance: true
Example

Disable maintenance mode support

use_maintenance: false
maintenance_ip_whitelist (Array<String>)

List of IP regular expressions to be allowed to access OnDemand when maintenance is enabled

Default

No IPs are whitelisted

maintenance_ip_whitelist: []
Example

Allow 192.168.1.0/24 and 10.0.0.1 to access OnDemand during maintenance

maintenance_ip_whitelist:
  - '192.168.1..*'
  - '10.0.0.1'
security_csp_frame_ancestors (Boolean)

Set Header Content-Security-Policy frame-ancestors.

Default

Set Content-Security-Policy frame-ancestors to servername

security_csp_frame_ancestors: https://ondemand.example.com
Example

Disable Content-Security-Policy header

security_csp_frame_ancestors: false
security_strict_transport (Boolean)

Set Header Strict-Transport-Security to help enforce SSL

Default

Set Strict-Transport-Security if SSL is defined for OnDemand

security_strict_transport: true
Example

Disable Strict-Transport-Security header

security_strict_transport: false
lua_root (String)

the root directory where the Lua handler code resides

Default

Point to the install location of the ood_mod_proxy lua library

lua_root: "/opt/ood/mod_ood_proxy/lib"
Example

Point to a different directory

lua_root: "/path/to/lua/handlers"
lua_log_level (String, null)

the verbosity of the Lua module in the logs

Default

Use default log level of info

lua_log_level: null
Example

Decrease verbosity

lua_log_level: "warn"
user_map_cmd (String)

the system command used to map authenticated user name to a system user name

Default

Since 2.0 there is no provided user map command.

user_map_cmd: null
Example

Capture system user name from regular expression

user_map_cmd: "/opt/site/site_mapper.sh"
user_map_match (String)

The lua pattern to map authenticated user name to a system user name.

user_map_match was added in 2.0 to be a simpler replacement for user_map_cmd above. match has precedence over cmd if they’re both configured.

Note that lua patterns are not regular expressions. So boolean OR matches like | for example are not supported. See the documentation on lua patterns for details more.

You can test your configuration out in a lua shell like so:

> string.match('ktrout@example.edu', '^([^@]+)@example.edu$')
ktrout
Default

Match any characters 0 or more times.

user_map_match: '.*'
Example

Capture system user name from email pattern.

user_map_match: '^([^@]+)@example.edu$'
user_env (String, null)

the CGI environment variable that holds the authenticated user name used as the argument for the user mapping command

Default

Use REMOTE_USER if not defined

user_env: null
Example

Use a custom environment variable instead

user_env: "OIDC_CLAIM_preferred_username"
map_fail_uri (String, null)

the URI a user is redirected to if we fail to map the authenticated user name to a system user name

Default

Don’t redirect the user and just display an error message

map_fail_uri: null
Example

Redirect the user to a registration page you set up beforehand

map_fail_uri: "/register"
pun_stage_cmd (String)

the system command used to launch the nginx stage command with sudo privileges

Default

Use default install location

pun_stage_cmd: "sudo /opt/ood/nginx_stage/sbin/nginx_stage"
Example

Use a different install location

pun_stage_cmd: "sudo /path/to/nginx_stage"
auth (Array<String>)

the list of Apache directives defining how authentication is handled for various protected resources on the website

Default

Use basic authentication with a plain-text password file.

auth:
  - "AuthType Basic"
  - "AuthName \"private\""
  - "AuthUserFile \"/opt/rh/httpd24/root/etc/httpd/.htpasswd\""
  - "RequestHeader unset Authorization"
  - "Require valid-user"
Example

See:

root_uri (String)

the URI a user is redirected to when they access the root of the website (e.g., https://www.example.com/)

Default

Redirect the user to the Dashboard App

root_uri: "/pun/sys/dashboard"
Example

Redirect to a different URI

root_uri: "/my_uri"
analytics (Hash, null)

the object describing how to track server-side analytics with a Google Analytics account and property

Default

Do not track analytics

analytics: null
Example

See Analytics

Configure Public Assets

This is a location where files can be served without a user being authenticated. Useful to serve favicon, images, or user documentation. If either of these properties are null then users won’t be able to access public assets through the website.

public_uri (String, null)

the URI used to access public assets (no authentication needed)

Default

Access as http://www.example.com/public

public_uri: "/public"
Example

Access under a different URI

public_uri: "/assets"
public_root (String, null)

the root directory where the public assets are served from

Default

Using a default installation

public_root: "/var/www/ood/public"
Example

Serve files under a different directory

public_root: "/path/to/public/files"

Configure Logout Redirect

The Dashboard App will send the user to this URI when they click the Logout button. This URI will then redirect the user to the logout mechanism for your corresponding authentication mechanism. If either of these properties are null then users will get an error when they try to logout from the Dashboard App.

logout_uri (String, null)

the URI used to logout from an Apache session

Default

Access as http://www.example.com/logout

logout_uri: "/logout"
Example

Access under a different URI

logout_uri: "/log_me_out"
logout_redirect (String, null)

the URI the user is redirected to when accessing the logout URI above

Default

Fallback to the Dashboard App log out page

logout_redirect: "/pun/sys/dashboard/logout"
Example

See:

Configure Reverse Proxy

The reverse proxy will proxy a request to any specified host and port through IP sockets. This is different than what is used for proxying to per-user NGINX processes through Unix domain sockets. This can be used to connect to Jupyter notebook servers, RStudio servers, VNC servers, and more… This is disabled by default as it can be security risk if not properly setup using a good host_regex.

A URL request to the node_uri will reverse proxy to the given host and port using the full URI path. So a request to the frontend Apache proxy that looks like:

GET /<node_uri>/<host>/<port>/... HTTP/1.1
Host: ondemand.example.edu

will be reverse proxied to the backend server with the following request format:

GET /<node_uri>/<host>/<port>/... HTTP/1.1
Host: <host>:<port>

A URL request to the rnode_uri will reverse proxy to the given host and port using the relative URI path. So a request to the frontend Apache proxy that looks like:

GET /<rnode_uri>/<host>/<port>/... HTTP/1.1
Host: ondemand.example.edu

will be reverse proxied to the backend server with the following request format:

GET /... HTTP/1.1
Host: <host>:<port>

Notice that we strip off the portion of the URI request path that is used to determine the backend web server.

Both formats are provided to better support the varying capabilities for the multitude of web application servers. For the case of using node_uri the developer will need to modify the web server to accommodate requests with a sub-URI that follows the dynamic formatting of /<node_uri>/<host>/<port>. For the case of using rnode_uri the developer needs to confirm that all assets and links supplied by the web server are relative and not absolute.

host_regex (String)

the regular expression used as a whitelist for allowing a user to reverse proxy to a given host

Default

Allow proxying to all hosts in the world (please change this if you enable this feature)

host_regex: "[^/]+"
Example

Restrict access to only within internal network

host_regex: "[\\w.-]+\\.example\\.com"
node_uri (String, null)

the URI used to reverse proxy a user to a server running on a given host and port that knows the full URI path

Default

This feature is disabled by default

node_uri: null
Example

Use the recommended URI by our team

node_uri: "/node"
rnode_uri (String, null)

the URI used to reverse proxy a user to a server running on a given host and port that knows the relative URI path

Default

This feature is disabled by default

rnode_uri: null
Example

Use the recommended URI by our team

rnode_uri: "/rnode"

Configure per-user NGINX

The reverse proxy will proxy a request under the pun_uri URI to the user’s per-user NGINX (PUN) process through Unix domain sockets. It will send process signals to the user’s PUN through the nginx_uri URI. If either of these properties are null then PUN access will be disabled.

nginx_uri (String, null)

the URI used to control the PUN process

Default

User’s can send signals to PUN through http://www.example.com/nginx

nginx_uri: "/nginx"
Example

Use a different URI

node_uri: "/my_pun_controller"
pun_uri (String, null)

the URI used to access the PUN process

Default

User’s access their PUN through http://www.example.com/pun

pun_uri: "/pun"
Example

Use a different URI

pun_uri: "/my_pun_apps"
pun_socket_root (String)

the root directory that contains the socket files for the running PUNs

Default

Using a default installation

pun_socket_root: "/var/run/ondemand-nginx"
Example

Socket files are located in a different directory

pun_socket_root: "/path/to/pun/sockets"
pun_max_retries (Integer)

the number of times the proxy attempt to connect to the PUN before giving up and displaying an error to the user

Default

Only try 5 times

pun_max_retries: 5
Example

Try 25 times

pun_max_retries: 25

PUN Pre Hook command is functionality to initialize things as root before the PUN starts up.

Authentication information like OIDC tokens are not passed to OnDemand apps like the dashboard. This feature is useful when you need to use things like OIDC tokens in some initialization process before the PUN starts. For example, you can configure your ~/.kube/config with OIDC information with this feature.

There is currently only one thing passed into this command and that is the username. It’s passed as a named argument like so: --user USERNAME.

You may pass in environment variables from apache to this command, though they are prefixed with OOD_. For example if you configure this to pass OIDC_ACCESS_TOKEN to the pre hook command, you can read the variable as OOD_OIDC_ACCESS_TOKEN.

Additionally you may add entries to /etc/ood/config/hook.env and source this file for additional environment variables. For example environment specific information for your test and production environments.

pun_pre_hook_root_cmd (String, null)

Run a hook command as root before the the PUN starts up.

Default

No pun pre hook.

pun_pre_hook_root_cmd: null
Example

Run a pre hook called “my_site_hook.sh”.

pun_pre_hook_root_cmd: "/path/to/my_site_hook.sh"
pun_pre_hook_exports (String, null)

A comma seperated list of environment variables to export to the pun_pre_hook_root_cmd.

Default

Don’t pass any environment variables.

pun_pre_hook_exports: null
Example

Export OIDC_ACCESS_TOKEN and OIDC_CLAIM_EMAIL environment variables to the pun_pre_hook_root_cmd.

pun_pre_hook_exports: "OIDC_ACCESS_TOKEN,OIDC_CLAIM_EMAIL"

Configure OpenID Connect

If using OpenID Connect for authentication, these are a few properties you will need to tweak. For a better understanding of these options you should read more on mod_auth_openidc.

oidc_uri (String, null)

the redirect URI used by mod_auth_openidc for authentication

Default

This is disabled by default

oidc_uri: null
Example

Enable it on a recommended URI

oidc_uri: "/oidc"
oidc_discover_uri (String, null)

the URI a user is redirected to if they are not authenticated by mod_auth_openidc and is used to discover the ID provider the user will use to login through

Default

This is disabled by default

oidc_discover_uri: null
Example

Enable it to a recommended URI

oidc_discover_uri: "/discover"
oidc_discover_root (String, null)

the root directory on the file system that serves the HTML code used for the discovery page

Default

This is disabled by default

oidc_discover_root: null
Example

Enable it to the recommended path

oidc_discover_root: "/var/www/ood/discover"

Configure User Registration

If you are using a grid-mapfile to map the authenticated user name to a system user name, then this will be used to generate mappings in the file for a user’s first time accessing your website. Setting either property below to null will disable this feature.

Note

This is unnecessary if you use regular expressions for mapping the authenticated user name to a system user name.

register_uri (String, null)

the URI a user is redirected to if no mapping exists between an authenticated user name and a system user name

Default

This is disabled by default. An error is displayed the user if mapping fails.

register_uri: null
Example

Enable it to a recommended URI

register_uri: "/register"
register_root (String, null)

the root directory on the file system that serves the HTML code used for the registration page

Default

This is disabled by default. An error is displayed the user if mapping fails.

register_root: null
Example

Enable it to the recommended path

register_root: "/var/www/ood/register"
oidc_provider_metadata_url (String, null)

Refer to OIDCProviderMetadataURL in auth_openidc.conf.

Default

This is disabled by default, and no OIDC configurations will be added.

oidc_provider_metadata_url: null
Example

Set OIDCProviderMetadataURL

oidc_provider_metadata_url: "https://example.com:5554/.well-known/openid-configuration"
oidc_client_id (String, null)

Refer to OIDCClientID in auth_openidc.conf.

Default

This is disabled by default, and no OIDC configurations will be added.

oidc_client_id: null
Example

Set OIDCClientID

oidc_client_id: "ondemand.example.com"
oidc_client_secret (String, null)

Refer to OIDCClientSecret in auth_openidc.conf.

Default

This is disabled by default.

oidc_client_secret: null
Example

Set OIDCClientSecret

oidc_client_secret: "ondemand.example.com"
oidc_remote_user_claim (String)

Refer to OIDCRemoteUserClaim in auth_openidc.conf.

Default

The default value is email if no Dex connectors are defined. If connectors are defined the default is preferred_username

oidc_remote_user_claim: "email"
Example

Set OIDCRemoteUserClaim

oidc_remote_user_claim: "preferred_username"
oidc_scope (String)

Refer to OIDCScope in auth_openidc.conf.

Default

The default value is openid profile email.

oidc_scope: "openid profile email"
Example

Set OIDCScope

oidc_scope: "openid profile email groups"
oidc_session_inactivity_timeout (Integer)

Refer to OIDCSessionInactivityTimeout in auth_openidc.conf.

Default

The default value is 28800.

oidc_session_inactivity_timeout: 28800
Example

Set OIDCSessionInactivityTimeout

oidc_session_inactivity_timeout: 57600
oidc_session_max_duration (Integer)

Refer to OIDCSessionMaxDuration in auth_openidc.conf.

Default

The default value is 28800.

oidc_session_max_duration: 28800
Example

Set OIDCSessionMaxDuration

oidc_session_max_duration: 57600
oidc_state_max_number_of_cookies (String)

Refer to OIDCStateMaxNumberOfCookies in auth_openidc.conf.

Default

The default value is 10 true.

oidc_state_max_number_of_cookies: "10 true"
Example

Set OIDCStateMaxNumberOfCookies

oidc_state_max_number_of_cookies: "20 true"
oidc_cookie_same_site (String)

Refer to OIDCCookieSameSite in auth_openidc.conf.

Default

The default value is On when SSL is disabled or Off when SSL is enabled.

oidc_cookie_same_site: "On"
Example

Set OIDCCookieSameSite

oidc_cookie_same_site: "Off"
oidc_settings (Hash, {})

A Hash to supply additional OIDC settings.

Default

The default value is an empty Hash.

oidc_settings: {}
Example

Set OIDCStateMaxNumberOfCookies

oidc_settings:
  OIDCPassIDTokenAs: serialized
  OIDCPassRefreshToken: On
dex_uri (String, null, false)

The Dex URI used behind the Apache reverse proxy. Setting this value to some path will result in Dex listening on local host as well as only using HTTP for proxied communication.

Default

The default value is null

dex_uri: null
Example

Enable Dex URI and Dex behind a reverse proxy

dex_uri: /dex
dex (Hash, null, false)

The Hash to define Dex configurations. A value of false or null will disable Dex configuration generation. Refer to OnDemand Dex configuration reference for details.

Default

The default value is an empty Hash.

dex: {}
Example

Disable Dex configuration management

dex: false