2021-07-24 17:35:09 -04:00
|
|
|
# pyceo
|
|
|
|
work in progress
|
|
|
|
|
|
|
|
## Development
|
|
|
|
First, make sure that you have installed the
|
|
|
|
[syscom dev environment](https://git.uwaterloo.ca/csc/syscom-dev-environment).
|
|
|
|
This will setup all of the services needed for ceo to work. You should clone
|
|
|
|
this repo in one of the dev environment containers.
|
|
|
|
|
|
|
|
Next, install and activate a virtualenv:
|
|
|
|
```sh
|
2021-08-18 15:39:14 -04:00
|
|
|
sudo apt install libkrb5-dev libsasl2-dev python3-dev
|
2021-07-24 17:35:09 -04:00
|
|
|
python3 -m venv venv
|
|
|
|
. venv/bin/activate
|
|
|
|
pip install -r requirements.txt
|
|
|
|
pip install -r dev-requirements.txt
|
|
|
|
```
|
|
|
|
|
2021-08-18 15:39:14 -04:00
|
|
|
## C bindings
|
|
|
|
Due to the lack of a decent Python library for Kerberos we ended up
|
|
|
|
writing our own C bindings using [cffi](https://cffi.readthedocs.io).
|
|
|
|
Make sure you compile the bindings:
|
|
|
|
```sh
|
|
|
|
cd ceo_common/krb5
|
|
|
|
python krb5_build.py
|
|
|
|
```
|
|
|
|
This should create a file named '_krb5.cpython-37m-x86_64-linux-gnu.so'.
|
|
|
|
This will be imported by other modules in ceo.
|
|
|
|
|
|
|
|
## Running the application
|
2021-07-24 17:35:09 -04:00
|
|
|
ceod is essentially a distributed application, with instances on different
|
|
|
|
hosts offering different services. For example, the ceod instance on mail
|
|
|
|
offers a service to subscribe people to mailing lists, and
|
|
|
|
the ceod instance on phosphoric-acid offers a service to create new members.
|
|
|
|
Therefore, you will need to run ceod on multiple hosts. Currently, those are
|
|
|
|
phosphoric-acid, mail and caffeine (in the dev environment, caffeine is
|
|
|
|
replaced by coffee).
|
|
|
|
|
|
|
|
To run ceod on a single host:
|
|
|
|
```sh
|
|
|
|
export FLASK_APP=ceod.api
|
|
|
|
export FLASK_ENV=development
|
|
|
|
flask run -h 0.0.0.0 -p 9987
|
|
|
|
```
|
|
|
|
|
|
|
|
Sometimes changes you make in the source code don't show up while Flask
|
|
|
|
is running. Stop the flask app (Ctrl-C), run `clear_cache.sh`, then
|
|
|
|
restart the app.
|
|
|
|
|
2021-08-18 15:39:14 -04:00
|
|
|
## Interacting with the application
|
2021-07-24 17:35:09 -04:00
|
|
|
The client part of ceo hasn't been written yet, so we'll use curl to
|
|
|
|
interact with ceod for now.
|
|
|
|
|
|
|
|
ceod uses [SPNEGO](https://en.wikipedia.org/wiki/SPNEGO) for authentication,
|
|
|
|
and TLS for confidentiality and integrity. In development mode, TLS can be
|
|
|
|
disabled.
|
2021-08-18 15:39:14 -04:00
|
|
|
|
2021-07-24 17:35:09 -04:00
|
|
|
First, make sure that your version of curl has been compiled with SPNEGO
|
|
|
|
support:
|
|
|
|
```sh
|
|
|
|
curl -V
|
|
|
|
```
|
|
|
|
Your should see 'SPNEGO' in the 'Features' section.
|
|
|
|
|
2021-08-18 15:39:14 -04:00
|
|
|
The API also uses unconstrained Kerberos delegation when interacting with
|
|
|
|
the LDAP database. This means that the client obtains a forwarded TGT, then
|
|
|
|
sends that to ceod, which then uses it to interact with LDAP on the client's
|
|
|
|
behalf. There is a script called `gen_cred.py` which can generate this
|
|
|
|
ticket for you.
|
|
|
|
|
|
|
|
|
|
|
|
Here's an example of making a request to an endpoint which writes to LDAP:
|
2021-07-24 17:35:09 -04:00
|
|
|
```sh
|
|
|
|
# Get a Kerberos TGT first
|
|
|
|
kinit
|
2021-08-18 15:39:14 -04:00
|
|
|
# Obtain a forwarded TGT
|
|
|
|
./gen_cred.py phosphoric-acid
|
|
|
|
# Make the request
|
|
|
|
curl --negotiate -u : --service-name ceod \
|
|
|
|
-H "X-KRB5-CRED: $(cat cred)" \
|
|
|
|
-d '{"uid":"test_1","cn":"Test One","program":"Math","terms":["s2021"]}' \
|
|
|
|
-X POST http://phosphoric-acid:9987/api/members
|
2021-07-24 17:35:09 -04:00
|
|
|
```
|