The Service Information System (SIS) is a CMDB alternative designed with collaboration and customizability in mind. Access to all data is strictly via the familiar principles of REST over HTTP.
The SIS API allows you to interact with SIS data using anything that can issue an HTTP request and parse JSON. The API allows clients to do a variety of operations including:
- CRUD object definitions. SIS refers to these as
schemas
and map to concepts like DB Tables or object classes. - CRUD instances of objects of a
schema
. These are referred to asentities
in SIS. - Register for notifications when any SIS object is created, modified, or deleted.
In SIS terms, these are called
hooks
. - Retrieve the state of a SIS object at a particular moment in time.
- Control access to objects and ensure the right users can manage them.
- Access the API from any website using a browser that supports CORS.
More details can be found in the API Documentation
The following are required to build and run SIS:
Grunt is used to build SIS. Mocha is used for testing.
- Ensure a local mongodb instance is running on port 27017.
mongod --dbpath=/data --port 27017
will launch a mongo server listening on 27017 and writing data to/data
- Ensure grunt is installed via:
npm install -g grunt-cli
- From the root directory, run
npm install
. - Run
grunt
to build a distribution and run unit tests. - The main file is
server.js
. Simply runnode server.js
to start the server.
The configuration is represented in conf/config.json and overrides can be supplied via conf/config.json. An annotated config.json looks like:
{
// database specific configuration
"db": {
// a mongo db connection string
"url" : "mongodb://localhost/sis"
},
// server specific config
"server" : {
// the tcp port to listen on
"port" : 3000
},
// application specific settings
"app" : {
// whether Role Based Access Control is enabled. Defaults to true
"auth" : true
// authentication backend config. See below
// defaults to a sis backend.
"auth_config" : {
// specific info per backend
},
// whether the app only serves read requests (GET). Defaults to false
"readonly" : false,
// whether to enable custom scripts support
"scripts_enabled" : false,
// minimum workers to run scripts in pool
"scripts_min" : 1,
// maximum workers to run scripts in pool
"scripts_max" : 2,
// time that a worker can remain idle before being collected
"script_worker_idle_time_ms" : 300000,
// use the cluster module
"use_cluster" : true,
// optional read preference to use on GET requests
"get_read_pref" : "nearest"
},
// default logger options - see bunyan configuration
"logger" : {
"options" : {
"name" : "SIS",
"level" : "debug",
"streams" : [{
"path" : "./sis.log"
}]
}
},
}
The default backend authenticates a user against a password stored with the user object. Password hashes are stored in SIS if this backend is used. Configure using:
"auth_config" : {
"type" : "sis"
}
The LDAP authentication backend authenticates users belonging to a particular user domain via Active Directory. When a user successfully authenticates for the first time, the backend creates an empty User object with no privileges.
Configure the backend using:
"auth_config" : {
"type" : "ldap",
"url" : "<url of the LDAP endpoint>",
"user_domain" : "<the user domain to authenticate against>",
"email_domain" : "<the domain to append as the email address for the user>",
"client_opts" " {
"option_1" : "option_1_value",
// etc. These are options used when creating the [ldapjs client](http://ldapjs.org/client.html)
}
}
As an example, with the following config:
"auth_config" : {
"type" : "ldap",
"url" : "ldap://10.1.1.1",
"user_domain" : "ad.corp.com",
"email_domain" : "company.com"
}
An authentication request for user1
will attempt to authenticate [email protected]
and create the user user1
with email [email protected]
if successful and does not already exist.
This section documents some tools provided in the source.
After SIS is up and running, creating an initial super user is the next logical step. The initial user must be created via command line as there are no users who are permitted to use the REST API. To create a super user, create a json file that looks like the following:
{
"name" : "a_super_user",
"pw" : "super_user_pw",
"email" : "[email protected]",
"super_user" : true
}
Then run node tools/useradmin.js update /path/to/json/file
Similar to creating a user, create a JSON file with the following contents
{
"name" : "user_to_delete"
}
Then run node tools/useradmin.js delete /path/to/json/file
This software is licensed under the BSD 3-Clause license. Please refer to the LICENSE for more information.
Detailed documentation can be found in the docs folder.