@@ -36,7 +36,7 @@ must be configured:
36
36
3. Cylc must be configured with user permissions.
37
37
38
38
This configuration can all be performed in the same Jupyter / Cylc UI Server
39
- configuration file see :ref: `UI_Server_config ` for more details.
39
+ configuration file. See :ref: `UI_Server_config ` for more details.
40
40
41
41
.. rubric :: Quick Example:
42
42
@@ -46,7 +46,7 @@ configuration file see :ref:`UI_Server_config` for more details.
46
46
47
47
# 1. Jupyter Hub
48
48
# Allow all authenticated users to access, start and stop
49
- # eachothers servers
49
+ # each other's servers
50
50
c.JupyterHub.load_roles = [
51
51
{
52
52
" name" : " user" ,
@@ -67,7 +67,7 @@ configuration file see :ref:`UI_Server_config` for more details.
67
67
# 3. Cylc
68
68
# Delegate permissions to users
69
69
c.CylcUIServer.user_authorization = {
70
- # proivide all authenticated users with read-only access to eachothers
70
+ # provide all authenticated users with read-only access to each other's
71
71
# servers
72
72
" *" : [" READ" ],
73
73
}
@@ -83,12 +83,12 @@ Jupyter Hub Authorisation
83
83
84
84
By default, `Jupyter Hub `_ only allows users to access their own servers.
85
85
86
- In order to allow access to other users servers, two scopes must be configured:
86
+ In order to allow access to other users' servers, two scopes must be configured:
87
87
88
88
``access:servers ``
89
- Permits us to connect to another users server.
89
+ Permits us to connect to another user's server.
90
90
``servers ``
91
- Permits us to start another users server.
91
+ Permits us to start another user's server.
92
92
93
93
This is done using the
94
94
:py:attr: `c.JupyterHub.load_roles <jupyterhub.app.JupyterHub.load_roles> `
@@ -105,7 +105,7 @@ Example:
105
105
c.JupyterHub.load_roles = [
106
106
{
107
107
# allow all authenticated users to access, start and stop
108
- # eachother 's servers
108
+ # each other 's servers
109
109
" name" : " user" ,
110
110
" scopes" : [" self" , " access:servers" , " servers" ],
111
111
}
@@ -137,7 +137,7 @@ not on a per-workflow basis.
137
137
138
138
By default users can only see and interact with their own workflows.
139
139
140
- Sites can restrict the permissions which users are allowed to delegate to each
140
+ Sites can restrict the permissions that users are allowed to grant each
141
141
other and can configure default permissions (see :ref: `site_configuration `).
142
142
143
143
Authorization is configured by these two configurations:
@@ -170,7 +170,7 @@ Users
170
170
There are three methods of identifying a user to grant access to:
171
171
172
172
``<username> ``
173
- Configures permissions for a singe user.
173
+ Configures permissions for a single user.
174
174
``group:<groupname> ``
175
175
Configures a user group. For more information, see :ref: `group_support `.
176
176
``* ``
@@ -180,7 +180,7 @@ There are three methods of identifying a user to grant access to:
180
180
181
181
.. note ::
182
182
183
- Using glob patterns (e.g. `` * ``) to pattern match user and group names is
183
+ Using glob patterns to match user and group names is
184
184
not currently supported.
185
185
186
186
@@ -190,7 +190,7 @@ Permissions
190
190
.. TODO: autogenerate this permission list
191
191
https://github.com/cylc/cylc-uiserver/issues/466
192
192
193
- Permissions can be granted for each Cylc command individually, for convenience
193
+ Permissions can be granted for each Cylc command individually. For convenience,
194
194
commands are arranged into groups to avoid having to list them individually:
195
195
196
196
``READ `` (i.e. read-only access)
@@ -238,11 +238,11 @@ commands are arranged into groups to avoid having to list them individually:
238
238
239
239
To find out more about a command, see the GraphQL or CLI documentation.
240
240
241
- By default, users have `` ALL `` permissions for their own workflows and no
242
- permissions to other users workflows.
241
+ By default, users have full permissions (`` READ ``, `` CONTROL `` and `` ALL ``) for their own workflows and no
242
+ permissions for other users' workflows.
243
243
244
- Permissions are additive, so delegating both ``READ `` and ``CONTROL `` would
245
- provide all permission in both groups.
244
+ Permissions are additive, so for example, granting ``READ `` and ``CONTROL ``
245
+ would provide all of the permissions from those two groups.
246
246
247
247
The ``! `` character can be used to subtract permissions, e.g. delegating
248
248
``CONTROL `` and ``!Stop `` would provide all control permissions except stop.
@@ -271,10 +271,10 @@ Examples
271
271
In this scenario:
272
272
273
273
- ``"*" `` represents any authenticated user. They have permission to view all
274
- workflows, and view them on the GUI.
274
+ workflows on the GUI.
275
275
- ``"group:groupA" `` applies ``CONTROL `` permissions to any member of system
276
276
``groupA ``.
277
- Note that, since permissions are additive , these users will gain ``READ `` access
277
+ Note that, since permissions are inherited , these users will gain ``READ `` access
278
278
from the ``"*":["READ"] `` assignment.
279
279
- ``"user1" `` will have permission to view workflows, ``pause `` but not ``play ``
280
280
workflows, even if ``user1 `` is a member of the system ``groupA ``. This is due
@@ -287,10 +287,10 @@ In this scenario:
287
287
Cylc Site Configuration
288
288
-----------------------
289
289
290
- The :py:attr: `c.CylcUIServer.site authorization
290
+ The :py:attr: `c.CylcUIServer.site_authorization
291
291
<cylc.uiserver.app.CylcUIServer.site_authorization> ` configuration allows sites
292
292
to configure sensible defaults and limits for the permissions users can
293
- delegate .
293
+ grant .
294
294
295
295
It takes the form:
296
296
@@ -300,7 +300,7 @@ It takes the form:
300
300
" <owner>" : {
301
301
" <user>" : {
302
302
" default" : [],
303
- " limit" , []
303
+ " limit" : []
304
304
}
305
305
}
306
306
}
0 commit comments