A Java EE 8 web application for beam authorization at Jefferson Lab built with the Smoothness web template.
The Beam Authorization application allows the Director of Operations (or a delegate) to clearly communicate and document the maximum current and beam mode ("permissions") that are authorized for a given beam destination. This information is stored in a database and presented via the web for easy access. There are three machines, each with their own set of beam destinations and beam modes: CEBAF, LERF, UITF. In addition to director authorization, the app also tracks Credited Controls and their verification. Each beam destination is assigned a set of controls and each control is assigned to a particular responsible group. A beam desintation is ready for beam only if all the controls assigned are verified by their responsible group. Both group verifications and director permissions have expirations. Emails and Jefferson Lab logbook entires are created to aid communication of new director permissions, responsible group verifications (upgrades and downgrades), and verification and permissions expirations.
- Operations Director - Responsible for authorizing beam
- Operability / Admin - Responsible for process administration and continuous improvement
- Operator - Must honor permissions set by the Director when running the machines
- Group Leader - Responsible for verifying Credited Control readiness and assigning expiration dates for when new checks are required
- Grab project
git clone https://github.com/JeffersonLab/bam
cd bam
- Launch Compose
docker compose up
- Navigate to page
http://localhost:8080/bam
Note: Login with demo username "tbrown" and password "password".
This application requires a Java 11+ JVM and standard library to run, plus a Java EE 8+ application server (developed with Wildfly).
- Install service dependencies
- Download Wildfly 26.1.3
- Configure Wildfly and start it
- Download bam.war and deploy it to Wildfly
- Navigate your web browser to localhost:8080/bam
Wildfly must be pre-configured before the first deployment of the app. The wildfly bash scripts can be used to accomplish this. See the Dockerfile for an example.
Uses the Smoothness Environment Variables plus the following application specific:
Name | Description |
---|---|
BAM_BOOKS_CSV | Comma separated list of Jefferson Lab Logbook names to log to when permissions are updated or controls are downgraded |
BAM_PERMISSIONS_EMAIL_CSV | Comma separated list of email recipients of permissions updated email |
BAM_UPCOMING_EXPIRATION_EMAIL_CSV | Comma separated list of email recipients of both expired and upcoming expirations (admin heads-up email) |
BAM_EXPIRED_EMAIL_CSV | Comma separated list of email recipients of expired permissions and control verifications (ops semi-synchronous notification of expiration) |
BAM_DOWNGRADED_EMAIL_CSV | Comma separated list of email recipients for control verifications downgrades |
BAM_PERMISSIONS_SUBJECT | Subject of log entries and emails indicating permissions updated |
BAM_UPCOMING_EXPIRATION_SUBJECT | Subject of emails indicating both expired and upcoming expiration of permissions and control verifications (admin heads-up email) |
BAM_EXPIRED_SUBJECT | Subject of emails indicating expiration of permissions and control verifications (ops semi-synchrounous notification of expiration) |
BAM_DOWNGRADED_SUBJECT | Subject of emails indicating downgrade of control verifications |
BAM_EMAIL_SENDER | Sender (and from address) of emails |
This application requires an Oracle 18+ database with the following schema installed. The application server hosting this app must also be configured with a JNDI datasource.
This project is built with Java 17 (compiled to Java 11 bytecode), and uses the Gradle 7 build tool to automatically download dependencies and build the project from source:
git clone https://github.com/JeffersonLab/bam
cd bam
gradlew build
Note: If you do not already have Gradle installed, it will be installed automatically by the wrapper script included in the source
Note for JLab On-Site Users: Jefferson Lab has an intercepting proxy
See: Docker Development Quick Reference
In order to iterate rapidly when making changes it's often useful to run the app directly on the local workstation, perhaps leveraging an IDE. In this scenario run the service dependencies with:
docker compose -f deps.yaml up
Note: The local install of Wildfly should be configured to proxy connections to services via localhost and therefore the environment variables should contain:
KEYCLOAK_BACKEND_SERVER_URL=http://localhost:8081
FRONTEND_SERVER_URL=https://localhost:8443
Further, the local DataSource must also leverage localhost port forwarding so the standalone.xml
connection-url field should be: jdbc:oracle:thin:@//localhost:1521/xepdb1
.
The server and app setup scripts can be used to setup a local instance of Wildfly.
- Bump the version number in the VERSION file and commit and push to GitHub (using Semantic Versioning).
- The CD GitHub Action should run automatically invoking:
- The Create release GitHub Action to tag the source and create release notes summarizing any pull requests. Edit the release notes to add any missing details. A war file artifact is attached to the release.
- The Publish docker image GitHub Action to create a new demo Docker image.
- The Deploy to JLab GitHub Action to deploy to the JLab test environment.
The deploy to JLab's acctest is handled automatically via the release workflow.
At JLab this app is found at ace.jlab.org/bam and internally at acctest.acc.jlab.org/bam. However, those servers are proxies for wildfly5.acc.jlab.org
and wildflytest5.acc.jlab.org
respectively. A deploy script is provided on each server to automate wget and deploy. Example:
/root/setup/deploy.sh bam v1.2.3
JLab Internal Docs: InstallGuideWildflyRHEL9