CIS is the Mozilla IAM Change Integration Service.
See PersonAPI docs for querying the API.
Available environment/stages are: development
, testing
, production
(see below for more information)
$ make build STAGE=development
$ make release STAGE=development
Or you can deploy a single function as such, instead of running make release
(note that you may still want to run
make build
which both builds and upload the Lambda layers:
$ make -C serverless deploy-ldap-publisher
Note that the build & release process happens automatically on the GitHub repository. The above steps are for manual deploys.
This will take care of starting dynalite and other tools, then run tests in tox and clean itself up.
If you get issues with node packages missing simply install them with npm install <package>
prior to running this.
$ cd python-modules
$ make test-tox
Each module can also be individually tested:
$ cd python-modules/cis_profile
$ make test-tox
Other good-to-know testing options:
$ cd python-modules/cis_profile
$ tox -r # recreates the Python environment
$ tox -- ./tests/test_profile.py # runs a single test file instead of all tests
The tox test environment is stored in python-modules/.cis-env
by default
$ cd e2e
$ make test-tox
- e2e contains the end to end tests for CIS. These are a good source of examples on how to use the CIS API.
- python-modules contains several libraries which can be called on their own. Many are inter-dependent.
- serverless-functions are serverless.com lambda functions which load some of the python-modules into AWS Lambda.
- well-known-endpoint contains the Mozilla IAM Well Known endpoint data and it's deployment methods (this endpoint can only be manually deployed)
- buildspec.yml contains the AWS Codebuild CD scripts.
- .travis.yml contains the Travis CI scripts.
Note that many directories contain their own README.md, which has more detailed information.
These are the general docs for the concepts behind CIS.
- CIS Security
- User Profiles
- AuthenticatorAssuranceIndicator
- AccessFile apps.yml
- [Well-known endpoint](docs/Well-known Endpoint.md)
- Webhook Notifications
This is what you expect. Tagged releases (SemVer, e.g. 1.2.3) from this repository are what run in production. It uses a specific set of signing and verifications keys. This is the environment you will get access to if you request API access to CIS. This is also the environment that DinoPark and DinoPark Beta access.
URLs:
- https://change.api.sso.mozilla.com
- https://person.api.sso.mozilla.com
- https://auth.mozilla.com/.well-known/mozilla-iam (contains all necessary information, URLs, audience, keys, etc.)
Audience:
- api.sso.mozilla.com
This is what is usually called staging. It contains code and data similar to production and is used to ensure that the production deployment will work. It uses the same set of keys as production. This environment contains real data and is not guaranteed to persistent. In practice this means the data is reset periodically. This environment is meant for general QA.
Tagged releases (SemVer pre-releases, e.g. 1.2.3-pre) from this repository are what run in testing.
URLs:
- https://change.api.test.sso.allizom.org
- https://person.api.test.sso.allizom.org
- https://auth.allizom.org/.well-known/mozilla-iam (contains all necessary information, URLs, audience, keys, etc.)
Audience:
- api.test.sso.allizom.org
This is for local testing and development. This is also what is in the master
branch of this repository.
It uses a development set of keys for signing and verification. This environment contains fake data and is neither persistent neither guaranteed to be stable, though it should be almost always functional.
Access to this environment may be granted temporarily to diagnose specific issues, features, etc. as they're being developed, but is not meant for general QA.
URLs:
- https://change.api.dev.sso.allizom.org
- https://person.api.dev.sso.allizom.org
- https://auth.allizom.org/.well-known/mozilla-iam (contains all necessary information, URLs, audience, keys, etc.)
Audience:
- api.dev.sso.allizom.org