6 KiB
Devicehub
Devicehub is a distributed IT Asset Management System focused in reusing devices, created under the project eReuse.org
This README explains how to install and use Devicehub. The documentation explains the concepts and the API.
Devicehub is built with Teal and Flask.
Installing
The requirements are:
- Required
- python3.9
- PostgreSQL 11 or higher.
- Weasyprint dependencie
- Generate a clone of the repository.
git clone git@github.com:eReuse/devicehub-teal.git
cd devicehub-teal
- Create a virtual environment and install Devicehub with pip.
python3.9 -m venv env
source env/bin/activate
pip3 install -U -r requirements.txt -e .
pip3 install Authlib==1.2.1
- Create a PostgreSQL database called devicehub by running create-db:
-
In Linux, execute the following two commands (adapt them to your distro):
sudo su - postgres
.bash examples/create-db.sh devicehub dhub
, and passwordereuse
.
-
In MacOS:
bash examples/create-db.sh devicehub dhub
, and passwordereuse
.
Configure project using environment file (you can use provided example as quickstart):
$ cp examples/env.example .env
- Running alembic from oidc module.y
alembic -x inventory=dbtest upgrade head
- Running alembic from oidc module.y
cd ereuse_devicehub/modules/oidc
alembic -x inventory=dbtest upgrade head
- Running alembic from dpp module.
cd ereuse_devicehub/modules/dpp/
alembic -x inventory=dbtest upgrade head
- Add a suitable app.py file.
cp examples/app.py .
- Generate a minimal data structure.
flask initdata
- Add a new server to the 'api resolver' to be able to integrate it into the federation. The domain name for this new server has to be unique. When installing two instances their domain name must differ: e.g. dpp.mydomain1.cxm, dpp.mydomain2.cxm. If your domain is dpp.mydomain.cxm:
flask dlt_insert_members http://dpp.mydomain.cxm
modify the .env file as indicated in point 3.
Add the corresponding 'DH' in ID_FEDERATED.
example: ID_FEDERATED='DH10'
- Do a rsync api resolve.
flask dlt_rsync_members
- Register a new user in devicehub.
flask adduser email@cxm.cxm password
- Register a new user to the DLT.
flask dlt_register_user email@cxm.cxm password Operator
- Finally, run the app:
$ flask run --debugger
The error ‘bdist_wheel’ can happen when you work with a virtual environment.
To fix it, install in the virtual environment wheel
package. pip3 install wheel
Testing
git clone
this project.- Create a database for testing executing
create-db.sh
like the normal installation but changing the first parameter fromdevicehub
todh_test
:create-db.sh dh_test dhub
and passwordereuse
. - Execute at the root folder of the project
python3 setup.py test
.
Upgrade a deployment
For upgrade an instance of devicehub you need to do:
$ cd $PATH_TO_DEVIHUBTEAL
$ source venv/bin/activate
$ git pull
$ alembic -x inventory=dbtest upgrade head
If all migrations pass successfully, then it is necessary restart the devicehub. Normaly you can use a little script for restart or run.
# systemctl stop gunicorn_devicehub.socket
# systemctl stop gunicorn_devicehub.service
# systemctl start gunicorn_devicehub.service
OpenId Connect:
We want to interconnect two devicehub instances already installed. One has a set of devices (OIDC client), the other has a set of users (OIDC identity server). Let's assume their domains are: dpp.mydomain1.cxm, dpp.mydomain2.cxm 20. In order to connect the two devicehub instances, it is necessary: * 20.1. Register a user in the devicehub instance acting as OIDC identity server. * 20.2. Fill in the openid connect form. * 20.3. Add in the OIDC client inventory the data of client_id, client_secret.
For 20.1. This can be achieved on the terminal on the devicehub instance acting as OIDC identity server.
flask adduser email@cxm.cxm password
* 20.2. This is an example of how to fill in the form.
In the web interface of the OIDC identity service, click on the profile of the just added user, select "My Profile" and click on "OpenID Connect":
Then we can go to the "OpenID Connect" panel and fill out the form:
The important thing about this form is:
* "Client URL" The URL of the OIDC Client instance, as registered in point 12. dpp.mydomain1.cxm in our example.
* "Allowed Scope" has to have these three words:
```
openid profile rols
```
* "Redirect URIs" it has to be the URL that was put in "Client URL" plus "/allow_code"
* "Allowed Grant Types" has to be "authorization_code"
* "Allowed Response Types" has to be "code"
* "Token Endpoint Auth Method" has to be "Client Secret Basic"
After clicking on "Submit" the "OpenID Connect" tab of the user profile should now include details for "client_id" and "client_secret".
* 20.3. In the OIDC client inventory run: (in our example: url_domain is dpp.mydomain2.cxm, client_id and client_secret as resulting from the previous step)
```
flask add_client_oidc url_domain client_id client_secret
```
After this step, both servers must be connected. Opening one DPP page on dpp.mydomain1.cxm (OIDC Client) the user can choose to authenticate using dpp.mydomain2.cxm (OIDC Server).
Generating the docs
git clone
this project.- Install plantuml. In Debian 9 is
# apt install plantuml
. - Execute
pip3 install -e .[docs]
in the project root folder. - Go to
<project root folder>/docs
and executemake html
. Repeat this step to generate new docs.
To auto-generate the docs do pip3 install -e .[docs-auto]
, then execute, in the root folder of the project sphinx-autobuild docs docs/_build/html
.