ZOO-Kernel configuration¶
Main configuration file¶
ZOO-Kernel general settings are defined in a configuration file called
main.cfg
. This file is stored in the same directory as ZOO-Kernel
(/usr/lib/cgi-bin/
in most cases). It provides usefull metadata information on your ZOO-Kernel installation.
Warning
ZOO-Kernel (/usr/lib/cgi-bin/zoo_loader.cgi
) and its
configuration file (/usr/lib/cgi-bin/main.cfg
) must be in the
same directory.
Note
Information contained by /usr/lib/cgi-bin/main.cfg
is accessible from WPS Services at runtime, so when Execute requests are used.
Default main.cfg¶
An example main.cfg file is given here as reference.
1[headers]
2X-Powered-By=ZOO@ZOO-Project
3
4[main]
5version=1.0.0
6encoding=utf-8
7dataPath=/var/data
8tmpPath=/var/www/temp
9cacheDir=/var/www/cache
10sessPath=/tmp
11serverAddress=http://localhost/cgi-bin/zoo_loader.cgi
12lang=fr-FR,ja-JP
13language=en-US
14mapserverAddress=http://localhost/cgi-bin/mapserv.cgi
15msOgcVersion=1.0.0
16tmpUrl=http:/localhost/temp/
17cors=false
18
19[identification]
20keywords=t,ZOO-Project, ZOO-Kernel,WPS,GIS
21title=ZOO-Project demo instance
22abstract= This is ZOO-Project, the Open WPS platform.
23accessConstraints=none
24fees=None
25
26[provider]
27positionName=Developer
28providerName=GeoLabs SARL
29addressAdministrativeArea=False
30addressDeliveryPoint=1280, avenue des Platanes
31addressCountry=fr
32phoneVoice=+33467430995
33addressPostalCode=34970
34role=Dev
35providerSite=http://geolabs.fr
36phoneFacsimile=False
37addressElectronicMailAddress=gerald@geolabs.fr
38addressCity=Lattes
39individualName=Gerald FENOY
Main section¶
The main.cfg [main]
section parameters are explained bellow.
version
: Supported WPS version.
encoding
: Default encoding of WPS Responses.
dataPath
: Path to the directory where data files are stored (used to store mapfiles and data when MapServer support is activated).
tmpPath
: Path to the directory where temporary files are stored (such as ExecuteResponse when storeExecuteResponse is set to true).
tmpUrl
: URL to access the temporary files directory (cf.tmpPath
).
cacheDir
: Path to the directory where cached request files [1] are stored (optional).
serverAddress
: URL to the ZOO-Kernel instance.
mapservAddress
: URL to the MapServer instance (optional).
msOgcVersion
: Version of all supported OGC Web Services output [2] (optional).
lang
: Supported natural languages separated by a coma (the first is the default one),
cors
: Define if the ZOO-Kernel should support Cross-Origin Resource Sharing. If this parameter is not defined, then the ZOO-Kernel won’t support CORS.
servicePath
: Define a specific location to search for services rather than using the ZOO-Kernel directory. If this parameter is not defined, then the ZOO-Kernel will search for services using its directory.
libPath
: (Optional) Path to a directory where the ZOO-kernel should search for service providers, e.g., shared libraries with service implementations (theserviceProvider
parameter in the service configuration (.zcfg) file).
memory
: (Optional) can take the valueload
to ensure that the value field of the inputs data will be filled by the ZOO-Kernel orprotected
to have only thecache_file
filled.
handleText
: (Optional) set it totrue
to get your Complex data nodes containing text not requiring a single CDATA node. Be aware that in case you use any HTML or XML there, you will then need to rebuild the string to get the original format of the text from your service code. In case you do not add handleText or set its value to true, you will simply need to use the value as it was provided in a single CDATA node provided in the Execute request.
extra_supported_codes
: if this parameter is present in the main section, then the response codes list given will be considered as valid response code when downloading input data (sample value:404,400
).
Warning
The libPath
parameter is currently only recognized by services implemented
in C/C++ or PHP, and may be moved to another section in future versions.
Warning
Depending on the memory
parameter the WPS Service will receive
different fields (value
or cache_file
).
In case you have activated the MapServer support, please refer to this specific section.
Identification and Provider¶
The [identification]
and [provider]
sections are not ZOO-Project
specific. They provide OGC metadata [3] and should be set according
to the XML Schema Document which
encodes the parts of ISO 19115 used by the common
ServiceIdentification and ServiceProvider sections of the
GetCapabilities operation response, known as the service metadata
XML document.
Details of the common OWS 1.1.0 ServiceIdentification section can be found in this XML Schema Document.
Details of the common OWS 1.1.0 ServiceProvider section can be found in this XML Schema Document.
Additional sections¶
All the additional sections discribed in the following section are optional.
Headers section¶
The [headers]
section can be set in order to define a specific HTTP
Response header, which will be used for every response. As an example,
you can check http://zoo-project.org using curl command line tool
and notice the specific header X-Powered-By: Zoo-Project@Trac.
In case you want to allow CORS support for POST requests coming from
myhost.net
, then you should define the following minimal
parameters in this section:
1Access-Control-Allow-Origin=myhost.net
2Access-Control-Allow-Methods=POST
3Access-Control-Allow-Headers=content-type
curl section¶
The [curl] section is used on windows platform to specify, using the cainfo parameter, where is located the cacert.pem file on your machine. An example bellow is provided to illustrate sur a setting.
1[curl]
2cainfo=./cacert.pem
env section¶
The [env]
section can be used to store specific environment
variables to be set prior the loading of Services Provider and Service execution.
A typical example is when a Service requires the access to a X server running on framebuffer, which takes to set the DISPLAY environnement variable, as follow:
1[env]
2DISPLAY=:1
In case you have activated the OTB support, please refer to this specific section.
lenv section¶
The lenv
section is used by the ZOO-Kernel to store runtime informations
before the execution of a WPS service, it contains the following
parameters:
sid
(r): The WPS Service unique identifier,
status
(rw): The current progress value ( a value between 0 and 100 in percent (%) ),
cwd
(r): The current working directory of ZOO-Kernel,
message
(rw): An error message used whenSERVICE_FAILED
is returned (optional),
cookie
(rw): The cookie to be returned to the client (for example for authentication purpose).
file.pid
(r): The file used by the ZOO-Kernel to store process identifier.
file.sid
(r): The file used by the ZOO-Kernel to store service identifier.
file.responseInit
(r): The file used by the ZOO-Kernel to store the initial (then final) WPS response.
file.responseFinal
(r): The file used by the ZOO-Kernel to temporary store the final WPS response.
renv section¶
The renv
section is automatically created by the ZOO-Kernel before
the execution of a WPS service, it contains all the environment
variables available at runtime (so including the header fields in case
it is used through http, refer to [https://tools.ietf.org/html/rfc3875
rfc3875] for more details).
senv section¶
The senv
section can be used to store sessions information on the
server side. Such information can then be accessed automatically from
the Service if the server is requested using a valid cookie (as
defined in lenv
section). ZOO-Kernel will store the values set in the
senv
maps on disk, load it and dynamically replace its content to
the one in the main.cfg
. The senv
section must contain the
following parameter at least:
XXX
: The session unique identifier whereXXX
is the name included in the cookie which is returned.
conf["lenv"]["cookie"]="XXX=XXX1000000; path=/"
conf["senv"]={"XXX": "XXX1000000","login": "demoUser"}
means that ZOO-Kernel will create a file named sess_XXX1000000.cfg
in the cacheDir
directory, and will return the specified cookie to the client. Each time the client will
request ZOO-Kernel using this cookie, it will automatically load the
value stored before the Service execution.
Security section¶
The [security]
section can be used to define what headers, the
ZOO-Kernel has initially received in the request, should be passed
to other servers for accessing resources (such as WMS, WFS, WCS
or any other file passed as a reference). This section contains two
parameters:
attributes
: The header to pass to other servers (such as Authorization, Cookie, User-Agent …),
hosts
: The host for wich the restriction apply (can be “*” to forward header to every server or a coma separated list of host names, domain, IP).
Both parameters are mandatory.
Suppose you need to share Authorization, Cookie and User-Agent to every server for accessing ressources, then yo ucan use the following section definition:
[security]
attributes=Authorization,Cookie,User-Agent
hosts=*
In case only local servers require such header forwarding, you may use the following definition:
[security]
attributes=Authorization,Cookie,User-Agent
hosts=localhost,127.0.0.1
Optionaly, you can also define the shared url(s), meaning that even if
the ressource requires authentication to be accessed, this
authentifcation won’t be used to define the name for storing the
file. Hence, two user with different authentication will use the same
file as it is considerated as shared. You can find bellow a sample
security section containing the shared parameter. In this example,
every requests to access the coverage using the url defined in the
shared parameter (myHost/cgi-bin/WCS_Server
) will be shared
between users.
[security]
attributes=Authorization,Cookie,User-Agent
hosts=localhost,127.0.0.1
shared=myHost/cgi-bin/WCS_Server
Database section¶
The database section allows to configure the ZOO-Kernel optional database support.
[database]
dbname=zoo_project
port=5432
user=username
host=127.0.0.1
type=PG
schema=public
This will generate strings to be passed to GDAL to connect the database server:
<type>:host=<host> port=<port> user=<user> dbname=<dbname>
With the previous database section, it will give the following:
PG:"dbname=zoo_project host=127.0.0.1 port=5432 user=username"
Please refer to this section to learn how to setup the database.
Metadb section¶
The metadb section allows to configure the ZOO-Kernel to access the metadata information about WPS Services by using a PostgreSQL database in addition to the zcfg files.
[metadb]
dbname=zoo_metadb
port=5432
user=username
host=127.0.0.1
type=PG
This will generate strings to be passed to GDAL to connect the database server:
<type>:host=<host> port=<port> user=<user> dbname=<dbname>
With the previous database section, it will give the following:
PG:"dbname=zoo_metadb host=127.0.0.1 port=5432 user=username"
Please refer to this section to learn how to setup the database.
Include section¶
The [include]
section (optional) lists explicitely a set of service configuration files
the the ZOO-Kernel should parse, e.g.,
1[include]
2servicename1 = /my/service/repository/service1.zcfg
3servicename2 = /my/service/repository/service2.zcfg
The [include]
section may be used to control which services are exposed to particular user groups.
While service configuration files (.zcfg) may be located in a common repository or in arbitrary folders,
main.cfg files at different URLs may include different subsets of services.
When the ZOO-Kernel handles a request, it will first check if there is an [include]
section in main.cfg and then search for other .zcfg files in the current working directory (CWD) and
subdirectories. If an included service happens to be located in a CWD (sub)directory,
it will be published by its name in the [include]
section. For example, the service
/[CWD]/name/space/myService.zcfg
would normally be published as name.space.myService, but if it is listed in the [include]
section
it will be published simply as myService:
1[include]
2myService = /[CWD]/name/space/myService.zcfg
On the other hand, with
1[include]
2myService = /some/other/dir/myService.zcfg
there would be two distinct services published as myService and name.space.myService, respectively, with two different zcfg files.
Note
As currently implemented, the ZOO-Kernel searches the CWD for the library files of
included services if the libPath
parameter is not set.
RabbitMQ section¶
The [rabbitmq]
section may be used to configure how to access the
RabbitMQ server used for communication between the ZOO-Kernel and the
ZOO-Kernel Fast Process Manager.
This optional section is used only in case you have build your
ZOO-Kernel with the following configure option:
--with-rabbitmq=yes
.
The available parameters are the following:
host
: the hostname or IP adddess of the server
port
: the port used to connect
user
: the user name
passwd
: the password
exchange
: the exchange
routingkey
: the routing key
queue
: the ‘queue <https://www.rabbitmq.com/queues.html>’__ name
Server section¶
The [server]
section is used by the ZOO-Kernel Fast Process
Manager which handle execution of services should know how much
instances you are willing to create to execute services.
async_worker
: the number of instances
To start the ZOO-Kernel Fast Process Manager you can use the following commands.
1cd /usr/lib/cgi-bin
2./zoo_loader_fpm main.cfg
OpenAPI Specification configuration file¶
Since revision 949 of the ZOO-Kernel, you can now activate the OGC
API - Processing support. In such a case you will need to have an
oas.cfg
file located in the same directory where the main.cfg
is.
This oas.cfg
file gets the same syntactic rules than the
main.cfg
. The ZOO-Kernel uses this file to produce information
about the open API specification it is referring to.
The first section to be found in the oas.cfg
file should be the
[openapi]
. It contains the following parameters:
rootUrl
: the URL to access the ZOO-Kernel using OGC API - Processing (in case therootHost
androotPath
are defined, this value will automatically be updated at runtime)
rootHost
: the host (ie. http://localhost)
rootPath
: the root path to the service (ie. ogc-api)
links
: the links provided from the root
paths
: the full paths list
parameters
: the parameters list defined in paths
header_parameters
: the parameters list client applications can send as header
version
: the Open API Specification version
license_name
: the license name for the service
license_url
: the license URL
full_html_support
: set it to true to activate support of the Accept header to choose between text/html or application/json format
partial_html_support
: set it to true in case you have the display service from the open-api directory and you want to aknowledge the text/html format in links
wsUrl
: the WebSocket URL to subscribe client to redis
publisherUrl
: the URL used to publish status updates
link_href
: the url to the links.json schematags
: tags lits in the order they will be defined in the OpenAPIexamplesPath
: the full path to the examples files, if anyexamplesUrl
: the corresponding URL to access the examples files to be exposed within the OpenAPIexceptionsUrl
: root URL to the exceptionensure_type_validation
: set it to true to not allow passing literal value to a complex input, a complex data in place of a literal, respectivelyensure_type_validation_but_ets
: set it to true to have the type validation as with the previous parameter but on for the literal data (not accepting complex data)default_result_as_document
: set it to true in case you want to use raw as the default value for the response parameter.use_problem_exception
: set any value only in case you are willing to use application/problem+json (see. RFC7807).
For any links and paths /A
defined, you will have a corresponding
[/A]
and [A]
sections. In the [/A]
section you will define
the rel, type and title used from the root URL to produce the links
list and the paths object
from. In the corresponding [A]
section, you will define the
following parameters:
method
: the HTTP method to use to access this resource
title
: resource title
abstract
: resource description
tags
: tags to classify this resource
tags_description
: the tag description
schema
: the schema specifying the resource
In case you want to define multiple methods to access a resource, you
can then use the length parameter to define the number of parameters
group to parse, then use method_1
, title_1
, abstract_1
,
tags_1
, tags_description_1
and schema_1
and so on to add
one or more access method (and other attributes) to this resource.
When declaring resource access you may want to add a parameter to your
request. In such a case, you can add a parameter named “parameters”
which contain the supported parameters list. All parameters defined
should be rooted in the components field. Parameters which can be used
in the path will be identified by {NAME}
and will get a specific
section for its definition:
type
: nature of the parameter (i.e. string)
title
: parameter title
abstract
: parameter description
in
: where the parameter can be used (ie. path, header, query)
required
: define if the parameter is optional (false) or not (true)
example
: (optional) provide an example value / URL
In addition to the sections defined previously, there are three other sections that we did not cover yet. Theses sections are:
[requestBody]
: defining the request body abstract (description), type (application/json) and schema (reference).
[exception]
: defining the exception bastract (description), type (application/json) and schema (reference).
[conformTo]
: referring to links list of the requirements classes the server implements and conforms to
In case you have set partial_html_support
or
partial_html_support
set to true, then you can add a corresponding
[A.html]
section providing the link informations. Also, it means
that you are willing to let the client choose in between
application/json and text/html format by providing the corresponding
Accept header in its request, when full_html_support
is set to
true or by using the .html
extension in the URL, in case
partial_html_support
was set true. Also, the user interface
provided in the open-api directory
will let the client goes untill the execution of a job. In case you
want this functionality to be working correctly we invite you to use a
.htaccess
equivalent to the one provided here. Also
the WebSocket can be started using websocketd in combinaison with the
subscriber.py
script, finally you will need to add the publish.py
script in the cgi-bin directory of your web server.
For more information on how to interact with this WPS REST Binding, please refer to this page or use the Swagger UI. A live instance is available here.
OpenAPI Security¶
OpenAPI permits the definition of security restrictions to access a given path using a specific request method. For more details, please consult the OpenAPI Authentication and Authorization section.
Since revision ae34767, the ZOO-Kernel supports OGC API - Processes request filtering. It can invoke the execution of other services before and after handling a request. So, you can implement your service for security or other purposes.
To support security from your OpenAPI, you can add an optional section
osecurity
to the oas.cfg
file. It should contain the following keys:
name
: the name used in the components’ security schemes
module_path
: the full path to the location of the service metadata files and processes (can be stored somewhere else to be hidden from the services list)
module_name_in
: the process to use before handling the request
module_name_out
: the process to use after having handled the request
type
: the scheme type (http, apiKey, …)
scheme
: the scheme name (Basic, Bearer) list of possible values
format
: bearer format (used only in case scheme is set to Bearer, can be JWT, optional)
realm
: the realm to use when returning 401 WWW-Authenticate response header (optional)
passwd
: the htpassword file used to authenticate users (only used for Basic scheme, optional)
Associated with this osecurity
section, you can add two optional
sections, filter_in
and filter_out
, to define one or more
filters to be applied before handling the request and after, respectively.
You can use an array of filters if you need to execute more than a
single service before or after the request treatment. The ZOO-Kernel
will invoke the services in the same order as they are in the array.
In both filter_in
and filter_out
section, you should add the
path
and service
keys used to define the location of the
service to run.
Then to secure an operation (meaning a path and request method couple), you should add
the optional secured
key and set it to the name used in the
components’ security schemes.
Below is an example of oas.cfg
file for securing the execution of
the HelloPy processes.
[processes/HelloPy/execution]
rel=http://www.opengis.net/def/rel/ogc/1.0/execute
length=1
method=post
secured=BasicAuth
title=execute a job
abstract=An execute endpoint.
tags=ExecuteEndpoint
tags_description=
schema=http://schemas.opengis.net/ogcapi/processes/part1/1.0/openapi/responses/ExecuteSync.yaml
parameters=/components/parameters/processID,/components/parameters/oas-header1
ecode=400,404,500
eschema=http://schemas.opengis.net/ogcapi/processes/part1/1.0/openapi/responses/ExecuteAsync.yaml
[osecurity]
type=http
scheme=basic
realm=Secured section
charset=utf-8
passwd=/tmp/htpasswords
[filter_in]
path=/opt/securityServices
service=securityIn
[filter_out]
path=/opt/securityServices
service=securityOut
In the example, we used the demonstration securityIn and securityOut services for handling HTTP Basic Authentication.
filter_in and filter_out¶
One can use the filter_in
service to secure an endpoint by verifying that authentication is valid.
If a service in filter_in
returns SERVICE_SUCCEEDED
, the authentication succeeded, and the request handling can continue (ie. jwt); if SERVICE_FAILED
, it didn’t, the handling should stop (ie. jwt).
If endpoints do not require authentication, the sections filter_in
and filter_out
can still be activated.
The services are invoked the same way.
The only difference is that the ZOO-Kernel won’t consider the value returned by the service when deciding whether to continue handling the request.
At runtime, the ZOO-Kernel invokes the filter_in
services, if any, before handling the request in any way.
This means that the service can stop the request from being processed.
To achieve this, the service should define in the lenv
section a response
key containing the response body to be returned (ie. eoapi-proxy) or a response_generated_file
key specifying the full path to the file where the response is stored (ie. eoapi-proxy).
On the other hand, the filter_out
is invoked just before returning the produced response back to the client.
The service can modify the response to return to the client.
From the filter_out
service, the developer can access the current response as a string using the json_response_object
key from the lenv
section (ie. eoapi-proxy).
One can use this key to update the response’s content.
Footnotes