Commit 7b657940 authored by Vitali Stupin's avatar Vitali Stupin

Adding Readme

parent 72292547
# Rights service for X-tee self service portal
This simple service is used by X-tee self service portal to store user rights. You can use Docker to [test service locally](local/
## Install dependencies
Python virtual environment is an easy way to manage application dependencies. You will need to install support for python venv:
sudo apt-get install python3-venv
Application uses PostgreSQL as a database and Nginx for securing connections with TLS. Install them with a command:
sudo apt-get install postgresql nginx
## Create application user
sudo useradd xtss-rights
## Prepare application files
Create an application directory `/opt/xtss-rights`:
sudo mkdir -p /opt/xtss-rights
sudo chown -R xtss-rights:xtss-rights /opt/xtss-rights
Copy application files ``, ``, `db.sql`, `db_user.sql` to directory `/opt/xtss-rights`.
Create a directory for logs:
sudo mkdir -p /var/log/xtss-rights
sudo chown -R xtss-rights:xtss-rights /var/log/xtss-rights
## Installing python venv
Install required python modules into venv using user `xtss-rights`:
sudo su - xtss-rights
cd /opt/xtss-rights
python3 -m venv venv
source venv/bin/activate
pip install -r requirements.txt
## Configuration
Create a configuration file `/opt/xtss-rights/config.json` using an example configuration file: [example-config.json](example-config.json).
Configuration parameters:
* `db_host` - database address;
* `db_port` - database port;
* `db_db` - database name;
* `db_user` - database user name;
* `db_pass` - database user password;
* `allow_all` - if "true" then disable certificate DN check, default value: "false";
* `allowed` - list of allowed certificate DN's.
## DB initialization
Create database:
......@@ -10,9 +70,66 @@ sudo -u postgres createdb rights
Run DB initialization SQL:
sudo -u postgres psql -f db.sql rights
sudo -u postgres psql -f db_user.sql rights
Create a password for "rights_app"
sudo -u postgres psql -c "ALTER USER rights_app WITH PASSWORD '<PASSWORD>'" rights
## Configuring Systemd
Add service description `systemd/xtss-rights.service` to `/lib/systemd/system/xtss-rights.service`.
Then start service and enable automatic startup:
sudo systemctl daemon-reload
sudo systemctl start xtss-rights
sudo systemctl enable xtss-rights
## Configuring Nginx
Copy `nginx/xtss-rights.conf` under `/etc/nginx/sites-available/`
Create a certificate for Nginx:
sudo mkdir -p /etc/nginx/xtss-rights
cd /etc/nginx/xtss-rights
sudo openssl req -x509 -nodes -days 365 -newkey rsa:2048 -keyout rights.key -out rights.crt
Make sure key is accessible to nginx:
sudo chmod 640 /etc/nginx/xtss-rights/rights.key
sudo chgrp www-data /etc/nginx/xtss-rights/rights.key
On client side (XTSS app):
openssl req -x509 -nodes -days 365 -newkey rsa:2048 -keyout client.key -out client.crt
Note that client DN should be added to the list of `allowed` DN's in the `/opt/xtss-rights/config.json` configuration file.
Copy client.crt to Rights service machine: `/etc/nginx/xtss-rights/client.crt`
Note that you can allow multiple clients (or nodes) by creating certificate bundle. That can be done by concatenating multiple client certificates into single `client.crt` file.
And restart Nginx:
sudo systemctl start
## Testing service
Copy nginx `rights.crt` to client machine. Then issue command to add sample data:
curl --cert client.crt --key client.key --cacert rights.crt -i -XPOST -d '{"organization":{"code":"00000000","name":"Org 0"},"person":{"code":"12345678901","first_name":"Firstname","last_name":"Lastname"},"right":{"right_type":"RIGHT1"}}' https://<xtss-rights.hostname>:5443/set-right
And then to read sample data:
curl --cert client.crt --key client.key --cacert rights.crt -i -XPOST -d '{}' https://<xtss-rights.hostname>:5443/rights
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment