Skip to content

Microservice responsible for user management and authentication on the OCARIoT platform.

License

Notifications You must be signed in to change notification settings

ocariot/account

Repository files navigation

OCARIoT Account Service

License Node Travis Coverage Dependencies DependenciesDev Vulnerabilities Commit Releases Contributors Swagger

Microservice responsible for user management and authentication on the OCARIoT platform.

Main features:

  • Authentication of users;
  • Registration and management of admin, child, family, health professional, educator and application;
  • Registration and management of institution;
  • Creation of groups of children.

See the documentation for more information.

Prerequisites


Set the environment variables

Application settings are defined by environment variables.. To define the settings, make a copy of the .env.example file, naming for .env. After that, open and edit the settings as needed. The following environments variables are available:

VARIABLE DESCRIPTION DEFAULT
NODE_ENV Defines the environment in which the application runs. You can set: test (in this environment, the database defined in MONGODB_URI_TEST is used and the logs are disabled for better visualization of the test output), development (in this environment, all log levels are enabled) and production (in this environment, only the warning and error logs are enabled). development
PORT_HTTP Port used to listen for HTTP requests. Any request received on this port is redirected to the HTTPS port. 3000
PORT_HTTPS Port used to listen for HTTPS requests. Do not forget to provide the private key and the SSL/TLS certificate. See the topic generate certificates. 3001
SSL_KEY_PATH SSL/TLS certificate private key. .certs/server.key
SSL_CERT_PATH SSL/TLS certificate. .certs/server.crt
JWT_PRIVATE_KEY_PATH Private key used to generate and validate JSON Web Token (JWT). .certs/jwt.key
JWT_PUBLIC_KEY_PATH Public key used to generate and validate JSON Web Token (JWT). .certs/jwt.key.pub
ISSUER Used to generate the JWT token. Usually it is the name of the platform. ocariot
ADMIN_USERNAME The default user name of type administrator created automatically when the application is initialized and the database has no administrator user. admin
ADMIN_PASSWORD The default user password of the administrator type created automatically when the application is initialized and the database has no administrator user. admin
ENCRYPT_SECRET_KEY Secret key used in symmetric encryption applied to username. s3cr3tk3y
RABBITMQ_URI URI containing the parameters for connection to the message channel RabbitMQ. The URI specifications defined by RabbitMQ are accepted. For example: amqp://user:pass@host:port. amqp://guest:guest
@127.0.0.1:5672
RABBITMQ_CA_PATH RabbitMQ CA file location. Must always be provided when using amqps protocol. .certs/rabbitmqca.crt
MONGODB_URI Database connection URI used if the application is running in development or production environment. The URI specifications defined by MongoDB are accepted. For example: mongodb://user:pass@host:port/database?options. mongodb://127.0.0.1:27017
/ocariot-account
MONGODB_URI_TEST Database connection URI used if the application is running in test environment. The URI specifications defined by MongoDB are accepted. For example: mongodb://user:pass@host:port/database?options. mongodb://127.0.0.1:27017
/ocariot-account-test

Generate Certificates

For development and testing environments the easiest and fastest way is to generate your own self-signed certificates. These certificates can be used to encrypt data as well as certificates signed by a CA, but users will receive a warning that the certificate is not trusted for their computer or browser. Therefore, self-signed certificates should only be used in non-production environments, that is, development and testing environments. To do this, run the create-self-signed-certs.sh script in the root of the repository.

chmod +x ./create-self-signed-certs.sh
./create-self-signed-certs.sh

The following files will be created: ca.crt, jwt.key, jwt.key.pub, server.crt and server.key.

In production environments its highly recommended to always use valid certificates and provided by a certificate authority (CA). A good option is Let's Encrypt which is a CA that provides free certificates. The service is provided by the Internet Security Research Group (ISRG). The process to obtain the certificate is extremely simple, as it is only required to provide a valid domain and prove control over it. With Let's Encrypt, you do this by using software that uses the ACME protocol, which typically runs on your host. If you prefer, you can use the service provided by the SSL For Free website and follow the walkthrough. The service is free because the certificates are provided by Let's Encrypt, and it makes the process of obtaining the certificates less painful.

Installation and Execution

1. Install dependencies

npm install    

2. Build

Build the project. The build artifacts will be stored in the dist/ directory.

npm run build    

3. Run Server

npm start

Build the project and initialize the microservice. Useful for production/deployment.

npm run build && npm start

Running the tests

All tests

Run unit testing, integration and coverage by Mocha and Instanbul.

npm test

Unit test

npm run test:unit

Integration test

npm run test:integration

Coverage test

npm run test:cov

Navigate to the coverage directory and open the index.html file in the browser to see the result. Some statistics are also displayed in the terminal.

Generating code documentation

npm run build:doc

The html documentation will be generated in the /docs directory by typedoc.

Using Docker

In the Docker Hub, you can find the image of the most recent version of this repository. With this image it is easy to create your own containers.

docker run ocariot/account

This command will download the latest image and create a container with the default settings.

You can also create the container by passing the settings that are desired by the environment variables. The supported settings are the same as those defined in "Set the environment variables". See the following example:

docker run -d --rm \
  -e NODE_ENV=development \
  -e PORT_HTTP=3000 \
  -e PORT_HTTPS=3001 \
  -v $(pwd)/.certs:/etc \
  -e SSL_KEY_PATH=/etc/server.key \
  -e SSL_CERT_PATH=/etc/server.crt \
  -e JWT_PRIVATE_KEY_PATH=/etc/jwt.key \
  -e JWT_PUBLIC_KEY_PATH=/etc/jwt.key.pub \
  -e ISSUER=ocariot \
  -e ADMIN_USERNAME=admin \
  -e ADMIN_PASSWORD=admin \
  -e ENCRYPT_SECRET_KEY=s3cr3tk3y \
  -e RABBITMQ_URI="amqp://guest:[email protected]:5672" \
  -e MONGODB_URI="mongodb://127.0.0.1:27017/ocariot-account" \
  --name ocariot-account \
  ocariot/account

If the MongoDB or RabbitMQ instance is in the host local, add the --net=host statement when creating the container, this will cause the docker container to communicate with its local host.

docker run --rm \
  --net=host \
  ...

To generate your own docker image, run the following command:

docker build -t image_name:tag .