.. Copyright 2017 OpenPassPhrase All Rights Reserved. Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at http://www.apache.org/licenses/LICENSE-2.0 Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License. ============ Installation ============ OpenPassPhrase API backend is written entirely in Python. Thus, it can theoretically be deployed on any platform with a modern Python interpreter. However, at the moment it is only officially tested on Ubuntu and CentOS Linux distributions. This guide presupposes the use of one of these platforms. More platforms will probably be added in the future. In addition, the possibility of deploying OpenPassPhrase on a PaaS hosted system such as `Heroku `_ and `Google App Engine `_ will be explored in the future. Since the backend is intended to run as a web service, a Web Server Gateway Interface (WSGI) server is typically required to route requests to the application from the web server. Among the most popular WSGI servers are: .. |mod_wsgi| raw:: html .. |gunicorn| raw:: html .. |cherrypy| raw:: html .. |uwsgi| raw:: html * **mod_wsgi** |mod_wsgi| - an Apache module that implements a WSGI compliant interface for hosting Python based web applications on top of the Apache web server. * **Green Unicorn** |gunicorn| - a Python WSGI HTTP Server for UNIX. It’s a pre-fork worker model ported from Ruby’s Unicorn project. * **CherryPy** |cherrypy| - a pythonic, object-oriented HTTP framework, which includes a WSGI server. * **uWSGI** |uwsgi| - a full stack for building hosting services, wchich includes a plugin for Python support. This guide only covers deployment using **mod_wsgi**. Stay tuned for additional deployment options in the future. Deploying with mod_wsgi ~~~~~~~~~~~~~~~~~~~~~~~ The following steps assume an aptly configured Linux system with the following minimal set of packages installed: * *python 3.5* * *git* * *virtualenv* * *pip* * *tox* (optional for running tests and doc builds) Get the source code: -------------------- :: git clone https://github.com/openpassphrase/opp.git A typical place to put the repository is in: ``/var/www/``, so that after running above command, you will have the following path: ``/var/www/openpassphrase`` Setup the virtual environment: ------------------------------- To avoid having to install all of the OpenPassPhrase dependencies system-wide, it is advisable to use a virtual environment:: cd /var/www/openpassphrase virtualenv venv source venv/bin/activate pip install -r requirements.txt .. Note:: The ``venv/bin/activate`` is a bash shell script, if using csh or tcsh, use the ``venv/bin/activate.csh`` script. Setup the database: ------------------- OpenPassPhrase uses an RDBMS for storing data. It is currently only tested with SQLite and MySQL databases, but others such as Postgresql, Oracle, MS-SQL, Firebird, and Sybase may be used at user's discretion. To setup the database run the provided utility:: opp-db init This tool will use the ``sql_connect`` config option to connect to the database and create the schema. For more information refer to the :ref:`configuration` section. User management is also accomplished by the opp-db utility. This a deliberate design decision not to expose user creation capabilities externally. To add/delete users, run the following commands:: opp-db add-user -u -p --phrase opp-db del-user -u -p .. Note:: The last argument to the ``add-user`` CLI is the passphrase that the user has chosen to use as the master key for data encryption. It is not stored anywhere! Rather, it is only used by the ``opp-db`` tool to encrypt and store a known value in the ``users`` table. Every API request that requires a passphrase will attempt to decrypt this value with the supplied passphrase and only proceed with servicing the request upon successful decryption. This mechanism prevents the user from creating entries with different passphrases, either intentionally or accidentally. While the latter obviously avoids a horrible UX, one could argue that the ability to do the former would be a useful feature. However, in the opinionated opinion of the originators of this project, having multiple passphrases defeats the purpose of a centralized password manager and one who wishes to do that might as well remember the secrets directly. Configure mod_wsgi: ------------------- Make sure the ``mod_wsgi`` Apache module is installed (``sudo apt-get install libapache2-mod-wsgi-py3`` on Ubuntu. Or follow the `mod_wsgi Quick Installation Guide `_ of the **mod_wsgi** documentation. The following is a sample Apache config file to enable routing of requests to the OpenPassPhrase API:: LoadModule wsgi_module WSGISocketPrefix run/wsgi ServerName SSLEngine on SSLHonorCipherOrder on SSLCipherSuite SSLCertificateKeyFile "" SSLCertificateFile "" SSLCertificateChainFile "" WSGIScriptAlias WSGIDaemonProcess processes=2 threads=15 display-name=%{GROUP} WSGIProcessGroup Order deny,allow Allow from all # Redirect all HTTP requests to the openpassphrase endpoint to HTTPS ServerName ServerAlias Redirect permanent https:// .. Note:: The values inside the <> brackets must be set specifically for your environment. Also note the WSGIScriptAlias setting which points to ``mod_wsgi.run`` file, which resides in the top level of the repository. The contents of this file need to be altered based on your particular directory structure setup. Place the above conf file in the Apache config directory (e.g. ``/etc/httpd/conf.d``) and restart your Apache server.