Skip to content

CMSgov/bcda-ssas-app

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

System-to-System Authentication Service (SSAS)

The SSAS can be run as a standalone web service or embedded as a library.

About the Project

SSAS (System-to-System Authentication Service) is a component in the CMS ecosystem, providing secure authentication and authorization for third-party systems to access protected APIs like BCDA (Beneficiary Claims Data API).

Core Team

A list of core team members responsible for the code and documentation in this repository can be found in COMMUNITY.md.

Repository Structure

The outline below shows the physical directory structure of the code, with package names highlighted. The service package contains a standalone http service that presents the authorization library via two http servers, one for admin tasks and one for authorization tasks.

Imports always go up the directory tree from leaves; that is, parents do not import from their children. Children may import from their siblings. In short, the ssas and cfg packages must not import from packages in the service directory.

  • ssas
    • cfg
      • configuration management; cfg should not import from ssas packages
    • service
      • admin
        • contains the REST API for managing the service implementation
      • main
        • cli for running servers and some admin tasks
      • public
        • contains the rest API for authorization services

Configuration

Values below are either indicated by Required, SSAS, BCDA, or a combination.

  • Required values must be present in the docker-compose.*.yml files.
  • Some values are primarily for the use of the BCDA API, and are only used by SSAS for testing purposes.
  • Some values are only used by the BCDA API; they are listed for reference.

Very long keys have been split across two rows for formatting purposes.

Some variables below have a note indicating their name should be changed. These changes serve to make the names consistent with established naming patterns and/or to clarify their purpose. They should be made after we complete the initial deployments to AWS envs so that we don't have to change all of our existing deployment checklists in a short timeframe.

Key Required SSAS BCDA Purpose
BCDA_AUTH_PROVIDER Yes X Tells BCDA API which auth provider to use
BCDA_CA_FILE Yes X Tells BCDA API the certificate file with which to validate its TLS connection to SSAS. When setting vars for AWS envs, you must include a var for the key material
BCDA_SSAS_CLIENT_ID Yes X Tells BCDA API the client_id to use with the SSAS REST API.
BCDA_SSAS_SECRET Yes X Tells BCDA API the secret to use with the SSAS REST API.
SSAS_USE_TLS Yes X Should be renamed to BCDA_SSAS_USE_TLS
SSAS_URL Yes X The url of the SSAS admin server. Should be renamed to BCDA_SSAS_URL
SSAS_PUBLIC_URL Yes X The url of the SSAS public server (auth endpoints). Should be renamed to BCDA_SSAS_URL_PUBLIC
DATABASE_URL Yes X Provides the database url
DEBUG Depends X Flag to indicate that the system is running in a development environments. Generally not used outside of docker.
HTTP_ONLY Depends X Flag to operation of the system. By default, the servers will use https. When HTTP_ONLY is present and set to true, they will use http. Generally not used outside of docker.
SSAS_DEFAULT_SYSTEM_SCOPE Yes X Used to set the scope on systems that do not specify their scope. Must be set or runtime failures will occur.
SSAS_HASH_ITERATIONS Yes X Controls how many iterations our secure hashing mechanism performs. Service will panic if this key does not have a value.
SSAS_HASH_KEY_LENGTH Yes X Controls the key length used by our secure hashing mechanism. Service will panic if this key does not have a value.
SSAS_HASH_SALT_SIZE Yes X Controls salt size used by our secure hashing mechanism performs. Service will panic if this key does not have a value.
SSASMFA_CHALLENGE
REQUEST_MILLISECONDS
No X Minimum execution time for RequestFactorChallenge(). If not present, defaults to 1500. In production, this should always be set longer than the longest expected execution time. (Actual execution time is logged.)
SSASMFA_TOKEN
TIMEOUT_MINUTES
No X Token lifetime for self-registration (MFA tokens and Registration tokens). Defaults to 60 (minutes).
SSAS_READ_TIMEOUT No X Sets the read timeout on server requests
SSAS_WRITE_TIMEOUT No X Sets the write timeout on server responses
SSAS_IDLE_TIMEOUT No X Sets how long the server will keep idle connections open
SSAS_LOG No X Directs all ssas logging to a named file
SSAS_ADMIN_PORT
SSAS_PUBLIC_PORT
SSAS_HTTP_TO_HTTPS_PORT
No X X These values are not yet used by code. Intended to allow changing port assignments. If used, will affect BCDA SSAS URL vars.
SSAS_ADMIN_SIGNING_KEY
or
SSAS_ADMIN_SIGNING_KEY_PATH
Yes X Provides the plaintext/path of the admin server signing key. When setting vars for AWS envs, you must include a var for the key material. Set either the key or the path but not both.
SSAS_PUBLIC_SIGNING_KEY
or
SSAS_PUBLIC_SIGNING_KEY_PATH
Yes X Provides the plaintext/path of the public server signing key. When setting vars for AWS envs, you must include a var for the key material. Set either the key or the path but not both.
SSASTOKEN_BLACKLIST_CACHE
CLEANUP_MINUTES
No X Tunes the frequency that expired entries are cleared from the token blacklist cache. Defaults to 15 minutes.
SSASTOKEN_BLACKLIST_CACHE
TIMEOUT_MINUTES
No X Sets the lifetime of token blacklist cache entries. Defaults to 24 hours.
SSASTOKEN_BLACKLIST_CACHE
REFRESH_MINUTES
No X Configures the number of minutes between times the token blacklist cache is refreshed from the database.
BCDA_TLS_CERT Depends X The cert used when the SSAS service is running in secure mode. When setting vars for AWS envs, you must include a var for the cert material. This var should be renamed to SSAS_TLS_CERT.
BCDA_TLS_KEY Depends X The private key used when the SSAS service is running in secure mode. When setting vars for AWS envs, you must include a var for the key material. This var should be renamed to SSAS_TLS_KEY.
SSAS_CLIENT_ASSERTION_AUD Yes X The audience (aud) claim value required when authenticating using client assertion tokens (v2/token).
SSAS_CRED_TIMEOUT_DAYS No X Setting for timeout of SSAS Credentials. Utilized in CLI command —list-exp-creds to show credentials that shows credentials about to timeout or expire. Defaults to 60 days.
SSAS_CRED_EXPIRATION_DAYS No X Setting for expiration of SSAS Credentials. Utilized in (1) setting ExpiresAt value during inital token creation, (2) app logic checks to see if a presented token is expired, and (3) in CLI command —list-exp-creds to show credentials about to timeout or expire. Defaults to 90 days.
SSAS_CRED_WARNING_DAYS No X Setting for warning of SSAS Credentials. Utilized in CLI command —list-exp-creds to show credentials about to timeout or expire. Defaults to 7 days.

Development and Software Delivery Lifecycle

Local Development

Go Modules

The project uses Go Modules allowing you to clone the repo outside of the $GOPATH. This also means that running go get inside the repo will add the dependency to the project, not globally.

Build

Build all the code and containers with make docker-bootstrap. Alternatively, docker compose up ssas will build and run the SSAS by itself. Note that SSAS needs the db container to be running as well.

Bootstrapping CLI

SSAS currently has a simple CLI intended to make bootstrapping tasks and manual testing easier to accomplish. The CLI will only run one command at a time; commands do not chain.

The sequence of commands needed to bootstrap the SSAS into a new environment is as follows:

  1. migrate, which will build or update the tables
  2. add-fixture-data, which adds the admin group and seeds minimal data for smoke Testing
  3. new-admin-system, which adds an admin system and returns its client_id
  4. reset-secret, which replaces the secret associated with a client_id and returns that new secret
  5. start, which starts the servers and the token blacklist cache

You will need the admin client_id and secret to use the service's admin endpoints.

Note that to initialize our docker container, we use migrate-and-start, which combines the first three of the steps above with some conditional logic to make sure we're running in a development environment. This command should most likely not be used elsewhere.

Test

The SSAS can be tested by running make unit-test. You can also use the repo-wide command make test, which will run tests against the entire repo, including the SSAS code. Some tests are designed to be only run as needed, and are excluded from make by a build tag. To include one of these test suites, follow the instructions at the top of the test file.

Running Single / Single-file Unit Tests

This step assumes that the user has installed VSCode, the Go language extension available here, and has successfully imported test data to their local database.

To run tests from within VSCode: In a FILENAME_test.go file, there will be a green arrow to the left of the method name, and clicking this arrow will run a single test locally. Tests should not be dependent upon other tests, but if a known-good test is failing, the user can run all tests in a given file by going to View -> Command Palette -> Go: Test Package, which will run all tests in a given file. Alternatively, in some instances, the init() method can be commented out to enable testing of single functions.

Integration Testing

To run postman tests locally:

Build and startup the required containers. Building with docker compose up first will significantly improve the performance of the following steps.

docker compose up
docker compose stop
docker compose up -d db
docker compose up ssas

If this is the first time you've started the containers, set up your database tables and seed them with sample group and systems:

make load-fixtures

point your browser at one of the following ports, or use the postman test collection in tests.

  • public server: 3103
  • admin server: 3104
  • forwarding server: 3105

Goland IDE

To run a test suite inside of Goland IDE, edit its configuration from the Run menu and add values for all necessary environmental variables. It is also possible to run individual tests, but that may require configurations for each test.

Docker Fun

To get postgres dump of schema (replace PASSHERE with password)

docker run --rm --network bcda-ssas-app_default -e PGPASSWORD=PASSHERE -it postgres pg_dump -s -h bcda-ssas-app_db_1 -d bcda -U postgres > schema.sql

To reset a secret by client id (can be found in Makefile):

docker compose run --rm ssas sh -c 'ssas --reset-secret --client-id=[client_id]'

To list all active IPs from the connected database:

docker compose run --rm ssas sh -c 'ssas --list-ips'

Swagger Documentation

The admin server has Swagger documentation. To access:

  1. Make sure it's been built (the container will stop after a few seconds when the documentation is ready)

    docker compose up documentation

  2. Make sure the ssas container is running

    docker compose up ssas

  3. Access Swagger in your browser: http://localhost:3104/swagger

Coding Style and Linters

Branching Model

Contributing

Thank you for considering contributing to an Open Source project of the US Government! For more information about our contribution guidelines, see CONTRIBUTING.md.

Installing and Using Pre-commit

Anyone committing to this repo must use the pre-commit hook to lower the likelihood that secrets will be exposed.

Step 1: Install pre-commit

You can install pre-commit using the MacOS package manager Homebrew:

brew install pre-commit

Other installation options can be found in the pre-commit documentation.

Step 2: Install the hooks

Run the following command to install the gitleaks hook:

pre-commit install

This will download and install the pre-commit hooks specified in .pre-commit-config.yaml.

Community

The BCDA team is taking a community-first and open source approach to the product development of this tool. We believe government software should be made in the open and be built and licensed such that anyone can download the code, run it themselves without paying money to third parties or using proprietary software, and use it as they will.

We know that we can learn from a wide variety of communities, including those who will use or will be impacted by the tool, who are experts in technology, or who have experience with similar technologies deployed in other spaces. We are dedicated to creating forums for continuous conversation and feedback to help shape the design and development of the tool.

We also recognize capacity building as a key part of involving a diverse open source community. We are doing our best to use accessible language, provide technical and process documents, and offer support to community members with a wide variety of backgrounds and skillsets.

Community Guidelines

Principles and guidelines for participating in our open source community are can be found in COMMUNITY.md. Please read them before joining or starting a conversation in this repo or one of the channels listed below. All community members and participants are expected to adhere to the community guidelines and code of conduct when participating in community spaces including: code repositories, communication channels and venues, and events.

Feedback

If you have ideas for how we can improve or add to our capacity building efforts and methods for welcoming people into our community, please let us know at [email protected]. If you would like to comment on the tool itself, please let us know by filing an issue on our GitHub repository.

Policies

Open Source Policy

We adhere to the CMS Open Source Policy. If you have any questions, just shoot us an email.

Security and Responsible Disclosure Policy

Submit a vulnerability: Vulnerability reports can be submitted through Bugcrowd. Reports may be submitted anonymously. If you share contact information, we will acknowledge receipt of your report within 3 business days.

For more information about our Security, Vulnerability, and Responsible Disclosure Policies, see SECURITY.md.

Software Bill of Materials (SBOM)

A Software Bill of Materials (SBOM) is a formal record containing the details and supply chain relationships of various components used in building software.

In the spirit of Executive Order 14028 - Improving the Nation’s Cyber Security, a SBOM for this repository is provided here: https://github.com/{{ cookiecutter.project_org }}/{{ cookiecutter.project_repo_name }}/network/dependencies.

For more information and resources about SBOMs, visit: https://www.cisa.gov/sbom.

Public domain

This project is in the public domain within the United States, and copyright and related rights in the work worldwide are waived through the CC0 1.0 Universal public domain dedication as indicated in LICENSE.

All contributions to this project will be released under the CC0 dedication. By submitting a pull request or issue, you are agreeing to comply with this waiver of copyright interest.

About

SSAS component of BCDA application

Resources

License

Code of conduct

Security policy

Stars

Watchers

Forks

Packages

No packages published

Contributors 38