WebAuth to OAuth2 shim
This repository contains a Django project which implements a "shim" allowing services expecting to use the legacy University of Cambridge "WebAuth" protocol to be authenticated with an OAuth2 identity provider.
Guidebook - Quickstart and Testing
To know how to get started with this project visit our Guidebook.
To view notes on how to get the project working locally visit the getting started section of the Guidebook.
To get started with Testing visit our testing section of the Guidebook.
Unique features of this development environment
When launched via ./compose.sh {development,production} up
a test client
making use of mod_ucamwebauth is available at http://localhost:8001/. Visiting
this in a browser allows you to exercise the various WebAuth options.
"Interactive" authentication
Google, when acting as an OAuth2 provider, does not directly have means to request users re-enter their sign in credentials. One can force them to re-select their account or sign into another. This is the best we can do with Google's current OAuth2 offering to implement the "force interactive authentication" flag in the WebAuth protocol.
Loading secrets at runtime
If the EXTRA_SETTINGS_URLS
environment variable is non-empty it is interpreted
as a comma-separated set of URLs from which to fetch settings. Settings are
fetched and applied in the order they are listed.
The settings should be in the form of a YAML document which is fetched, parsed and interpolated into the Django settings when the server starts.
EXTRA_SETTINGS_URLS
currently understands the following URL schemes:
- file://... URLs are loaded from the local file system. If the URL lacks any scheme, it is assumed to be a file URL.
- https://... URLs are fetched using HTTP over TLS.
- gs://BUCKET/LOCATION formatted URLs specify a Google Cloud Storage bucket and a location within that bucket of an object to load settings from.
- sm://PROJECT/SECRET#VERSION formatted URLs specify a Google Secret Manager secret to load settings from. If the version is omitted, the latest version is used.
For Google Cloud Storage and Secret Manager URLs, application default credentials are used to authenticate to Google.
Settings which can be loaded from external YAML documents can also be specified in environment variables. A variable of the form EXTERNAL_SETTING_[NAME] is imported as the setting "NAME" and the value of the variable is interpreted as a YAML formatted value for the setting.
Notes on debugging
The Full-screen console debugger pudb
has been included to allow you to run a debug in the
docker-compose environment. To use, simply set the breakpoint using import pdb; pdb.set_trace()
and attach to the container using:
docker attach wls2oauth2_development_app_1
For a fuller description of how to debug follow the
guide to debugging with pdb and Docker
(it works just as well for pudb
).
CI configuration
The project is configured with Gitlab AutoDevOps via Gitlab CI using the .gitlab-ci.yml file.
Copyright License
See the LICENSE file for details.