Skip to content

Commit

Permalink
docs: add SLURMRESTD_SECURITY=disable_user_check
Browse files Browse the repository at this point in the history
Mention requirement of SLURMRESTD_SECURITY=disable_user_check
environment variable definition in slurmrestd service drop-in
configuration override.

fix #320
  • Loading branch information
rezib committed Aug 26, 2024
1 parent 4f1d5df commit 2c68070
Show file tree
Hide file tree
Showing 2 changed files with 13 additions and 1 deletion.
3 changes: 3 additions & 0 deletions CHANGELOG.md
Original file line number Diff line number Diff line change
Expand Up @@ -40,6 +40,9 @@ and this project adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0
reservations page (#336).
- Hide users disclosure from jobs filters panel when authentication is
disabled (#330).
- docs: Mention requirement of `SLURMRESTD_SECURITY=disable_user_check`
environment variable definition in `slurmrestd` service drop-in configuration
override (#320).

## [3.1.0] - 2024-07-03

Expand Down
11 changes: 10 additions & 1 deletion docs/modules/install/pages/quickstart.adoc
Original file line number Diff line number Diff line change
Expand Up @@ -97,6 +97,8 @@ drop-in configuration override for `slurmrestd` daemon:
# Unset vendor unit ExecStart to avoid cumulative definition
ExecStart=
Environment=
# Disable slurm user security check
Environment=SLURMRESTD_SECURITY=disable_user_check
ExecStart=/usr/sbin/slurmrestd $SLURMRESTD_OPTIONS unix:/run/slurmrestd/slurmrestd.socket
RuntimeDirectory=slurmrestd
RuntimeDirectoryMode=0755
Expand All @@ -105,7 +107,14 @@ Group=slurm
----

NOTE: This configuration file makes `slurmrestd` listen for incoming connections
on Unix socket accessible by Slurm-web.
on Unix socket accessible by Slurm-web. In this configuration `slurmrestd` is
executed with special `slurm` user to get more permissions on Slurm cluster.
This is normally not permitted by `slurmrestd` unless
`SLURMRESTD_SECURITY=disable_user_check` environment variable is defined. This
is a security measure that is relevant in many use-cases but not for Slurm-web.
Indeed, Slurm-web has its own internal security
xref:conf:policy.adoc[autorization policy] to control users permissions and
enforce security.

Make `systemd` reload units changes on disk:

Expand Down

0 comments on commit 2c68070

Please sign in to comment.