commit | f2bc6f58ba42cd983ecfacc8441cfbd2f94ec1d0 | [log] [tgz] |
---|---|---|
author | Marc Kupietz <kupietz@ids-mannheim.de> | Mon Nov 14 22:33:09 2022 +0100 |
committer | Marc Kupietz <kupietz@ids-mannheim.de> | Tue Nov 15 17:39:43 2022 +0100 |
tree | ac773df9c89f5b62e5d026cb0aa52d571c895bb8 | |
parent | da3be51b2d0d10e39af6b1ab62eb202e57216754 [diff] |
Update dependabot to Java 11 and Jersey 2 Change-Id: Ia3ddbe12c24fe6a99002cb66c4758910eceb364c
Kustvakt is a user and policy management component for KorAP (Diewald et al., 2016). It manages user access to resources (i.e. corpus data) typically bound with some licensing schemes. The licensing schemes of IDS resources provided through KorAP (DeReKo) are very complex involving the user access location and purposes (Kupietz & Lüngen, 2014). To manage user access to resources, Kustvakt performs query rewriting with document restrictions (Bański et al., 2014).
Kustvakt acts as a middleware in KorAP binding other components, such as Koral a query serializer and Krill a search component, together. As the KorAP's API provider, it provides services, e.g. searching and retrieving annotation data of a match/hit, that can be used by a KorAP client, e.g. Kalamar (a KorAP web user interface) and KorapSRU (the CLARIN FCS endpoint for KorAP).
Kustvakt lite version
provides basic services including search, match info, statistic and annotation services, without user and policy management.
Kustvakt full version
provides user and policy management and extended services, in addition to the basic services. This version requires a database (Sqlite is provided) and an LDAP system (UnboundID InMemoryDirectoryServer is provided) for user authentication.
Recent changes on the project are described in the change logs (Changes files).
Web-services including their usage examples are described in the wiki.
Prerequisites: Jdk 11, Git, Maven 3
Clone the latest version of Kustvakt
Since Kustvakt requires Krill and Koral, please install Krill and Koral in your maven local repository according to the required versions specified in Kustvakt/core/pom.xml
.
Install Kustvakt-core in your maven local repository
Package Kustvakt full version
The jar file is located in the target/
folder.
Package Kustvakt lite version
The jar file is located in the target/
folder.
Copy the default Kustvakt configuration file (e.g. full/src/main/resources/kustvakt.conf
or lite/src/main/resources/kustvakt-lite.conf
), to the same folder as the Kustvakt jar files (/target
). Please do not change the name of the configuration file.
Set krill.indexDir in the configuration file to the location of your Krill index (relative path to the jar). In Kustvakt's root directory, there is a sample index, e.g.
Set the location of the LDAP configuration file for Kustvakt full version. The file must contain all necessary information to access the LDAP system and to authenticate and authorize users (see example LDAP config below).
ldap.config = path-to-ldap-config
To find, authenticate and authorize users, the ldap filter expression specified in searchFilter
is used. Within this expression all occurrences of the placeholders ${login}
and ${password}
are replaced with the name and password the user has entered for logging in.
If searchFilter
does not contain any occurrence of ${password}
the user DN found via the filter expression will be authenticated via a regular LDAP bind operation, using the entered password. In this case, depending on the LDAP server, also hashed passwords are supported.
Optionally, the two filters authFilter
and userNotBlockedFilter
can be specified, in addition. The first should be used to check whether a known user has also signed the necessary EULA, for example, and the second to check that the known user is not blocked. This will be reflected in the error messages for failed logins.
host=ldap.example.org # use LDAP over SSL (LDAPS) if the server supports it useSSL=true port=636 # to trust all certs, leave trustStore empty trustStore=truststore.jks # add ssl cipher suites if required as csv, e.g. TLS_RSA_WITH_AES_256_GCM_SHA384 additionalCipherSuites= searchBase=dc=example,dc=org # DN of a user with full read access sLoginDN=cn=admin,dc=example,dc=org pwd=adminpassword # search for user with uid or email matching login, and signed EULA searchFilter=(&(|(uid=${login})(mail=${login}))(signedeula=TRUE))
Instead of you own LDAP server, you can also use Kustvakt-full's embedded in-memory LDAP server which uses UnboundID LDAP SDK for this purpose. In order to do so, the following additional settings are required in your ldap.conf
:
useEmbeddedServer=true ldifFile=path-to-users-directory.ldif # port=1234
Note that currently the embedded server ignores the host
and useSSL
settings, and only listens on the localhost
interface. The port
setting, on the other hand, is used.
The embedded server currently supports the following password encodings: clear passwords (prefix {CLEAR}
or empty), {HEX}
, {BASE64}
, {SHA}
, {SHA256}
.
Note that none of these are safe against brute force attacks.
You can try Kustvakt-full with embedded LDAP server using the example configuration provided in embedded-ldap-example.conf and users defined in example-users.ldif like this:
$ cp src/main/resources/kustvakt.conf . $ java -jar target/Kustvakt-full-*.jar
The example-users.ldif defines the following login:password combinations: user:password, user1:password1, …, user4:password4, with differently encoded passwords.
To try it out together with KorAP's web user interface Kalamar, add "Auth"
to the loaded plugins in kalamar.conf
:
plugins => ["Auth"],
For testing, you can use/activate BasicAuthentication, see Spring XML configuration file for testing at /full/src/test/resources/test-config.xml
. BasicAuthentication uses a dummy UserDao allowing all users to be authenticated users. You can implement UserDao by connecting it to a user table in a database and checking username and password for authentication.
<bean id="basic_auth" class="de.ids_mannheim.korap.authentication.BasicAuthentication" /> <util:list id="kustvakt_authproviders" value-type="de.ids_mannheim.korap.interfaces.AuthenticationIface"> <ref bean="basic_auth" /> ... </util:list>
server.port = 8089 server.host = localhost
The following properties define the default foundries used for specific layers. For instance in a rewrite, a default foundry may be added to a Koral query missing a foundry.
default.foundry.partOfSpeech = tt default.foundry.lemma = tt default.foundry.orthography = opennlp default.foundry.dependency = malt default.foundry.constituent = corenlp default.foundry.morphology = marmot default.foundry.surface = base
Requires kustvakt.conf
or kustvakt-lite.conf
in the same folder as the jar file. Otherwise assuming sample-index located in the parent directory of the jar file.
Kustvakt full version requires an LDAP configuration file containing an admin password to access an LDAP system. You can still run Kustvakt full version without an LDAP system, but user authentication functions and services cannot be used. Only services for guest/demo user would be available.
To run Kustvakt with a custom spring XML configuration file, it must be included in the classpath. For instance: custom-spring-config.xml
is located in config
folder. The config
folder must be included in the classpath with -cp
command.
Kustvakt server can be shut down by sending a POST request with a shutdown token. When Kustvakt server is started, a shutdown token is automatically generated and written to a shutdownToken
file with the following format:
A shutdown request can be sent as follows.
Advanced setup such as setting database properties and configuring mail settings for email notifications, are described in the wiki.
Kustvakt is published under the BSD-2 License. It is developed as part of KorAP, the Corpus Analysis Platform at the Leibniz Institute for the German Language (IDS), member of the Leibniz Association.
Contributions to Kustvakt are very welcome!
Ideally, any contributions should be committed via KorAP Gerrit server to facilitate code reviewing (see Gerrit Code Review - A Quick Introduction). However, we are also happy to accept comments and pull requests via GitHub.
Please note that unless you explicitly state otherwise any contribution intentionally submitted for inclusion into Kustvakt shall – as Kustvakt itself – be under the BSD-2 License.
Diewald, Nils/Hanl, Michael/Margaretha, Eliza/Bingel, Joachim/Kupietz, Marc/Bański, Piotr/Witt, Andreas (2016): KorAP Architecture – Diving in the Deep Sea of Corpus Data. In: Calzolari, Nicoletta/Choukri, Khalid/Declerck, Thierry/Goggi, Sara/Grobelnik, Marko/Maegaard, Bente/Mariani, Joseph/Mazo, Helene/Moreno, Asuncion/Odijk, Jan/Piperidis, Stelios (Hrsg.): Proceedings of the Tenth International Conference on Language Resources and Evaluation (LREC 2016), Portorož, Slovenia. Paris: European Language Resources Association (ELRA), 2016. S. 3586-3591.
Bański, Piotr/Diewald, Nils/Hanl, Michael/Kupietz, Marc/Witt, Andreas (2014): Access Control by Query Rewriting. The Case of KorAP. In: Proceedings of the Ninth Conference on International Language Resources and Evaluation (LREC’14). European Language Resources Association (ELRA), 2014. S. 3817-3822.
Kupietz, Marc/Lüngen, Harald (2014): Recent Developments in DeReKo. In: Calzolari, Nicoletta et al. (eds.): Proceedings of the Ninth International Conference on Language Resources and Evaluation (LREC'14). Reykjavik: ELRA, 2378-2385.