SlideShare une entreprise Scribd logo
1  sur  36
WebYaST
Remote Web Based System Management
Ladislav Slezák
lslezak@suse.cz
SUSE Linux s.r.o.
© Novell Inc. All rights reserved2
Content
• YaST
• WebYaST features
• WebYaST demo
• Implementation details, solved problems
• Installation, customization
• Questions
YaST
© Novell Inc. All rights reserved4
YaST – Yet another Setup Tool
• System management tool for Linux
• System installer
• Open source (GPLv2+)
• Included in openSUSE, SUSE Linux Enterprise
• Desktop application, administration account needed
© Novell Inc. All rights reserved5
YaST – Installation
© Novell Inc. All rights reserved6
YaST – Control Center
© Novell Inc. All rights reserved7
YaST – Package Manager
© Novell Inc. All rights reserved8
YaST – Package Manager
WebYaST
© Novell Inc. All rights reserved10
WebYaST Features
• Successor to YaST
• Access via a web browser
• Open source (GPLv2 and LGPLv2)
© Novell Inc. All rights reserved11
WebYaST – Target Users
• Beginner users
• Experts (remote system monitoring)
• Appliance (virtual machine) management
– e.g. SUSE Lifecycle Management Server (SLMS)
© Novell Inc. All rights reserved12
Comparing YaST and WebYaST
YaST
SSH
VNC
HTTPS
• Remote access
WebYaST
• No special SW needed,
just a web browser
• OS/HW independent
© Novell Inc. All rights reserved13
Comparing YaST and WebYaST
• Authorization and security
YaST WebYaST
• No password sharing
• Access control
• Role based access
Admin
Password
User administrator SW administrator
?
Linux System
User administrator SW administrator
User's
password
User's
password
Access
rights
Access
rights
Linux System
WebYaST Demo
© Novell Inc. All rights reserved15
WebYaST
© Novell Inc. All rights reserved16
WebYaST
© Novell Inc. All rights reserved17
WebYaST
© Novell Inc. All rights reserved18
WebYaST
© Novell Inc. All rights reserved19
WebYaST
WebYaST in Details
© Novell Inc. All rights reserved21
YaST Architecture
UI
(Qt, Gtk, ncurses)
Application Logic
Low Level
Access
System Privilegeduser(root)
YaST
© Novell Inc. All rights reserved22
WebYaST Architecture – Overview
Web browser
Web client
HTML/HTTPS
XML/HTTP
Web service
(REST service)
System
Non-privileged
user
Non-privileged
user
WebYaST
?
© Novell Inc. All rights reserved23
WebYaST Architecture – Details
Web browser
Web client
HTML/HTTPS
XML/HTTP
Web service
(REST service)
YaST DBus
service PackageKit
System
Non-privileged
user
Non-privileged
user
Privileged
user
DBus
Directnon-privilegedaccess
...
RESTServiceWeb
Client
WebYaST
© Novell Inc. All rights reserved24
WebYaST – Details
• WebYaST uses Ruby on Rails framework
• Reusing existing YaST code
UI
(Qt, Gtk, ncurses)
Application Logic
Low Level
Access
System
Privilegeduser(root)
DBus
Wrapper
DBus
Access control
PolicyKit
DBusservice
LegacyYaST
© Novell Inc. All rights reserved25
REST Service
• The backend which actually configures system
• XML or JSON format over HTTP
• Can be also used by 3rd
party software
– or from commadline (via curl, wget)
© Novell Inc. All rights reserved26
REST Service
• Key components/features
– Small privileged part – DBus service
– Access control – using PolicyKit
– Reusing existing YaST components
© Novell Inc. All rights reserved27
Web Client
• HTML output over HTTPS
• Key features
– XML communication with REST – Rails ActiveResource
– Cross-browser compatibility – jQuery JavaScript library
– Localization support – GetText
© Novell Inc. All rights reserved28
Web Client – Customization
• First boot mode – first time configuration
– Set of modules started before the main application
– Started just once
– Example: license agreement, root password, registration
• Custom icon/link in the control panel, custom label
• Custom CSS (layout, colors, ...)
© Novell Inc. All rights reserved29
WebYaST – Customization
© Novell Inc. All rights reserved30
WebYaST – Plugins
• Plugin design
– Similar to legacy YaST
– Basic and shared functionality in base packages
– Plugins implement the actual functionality
> Decrease package dependencies
> Install only the needed modules (security)
• Plugins make WebYaST easily extensible
Installing WebYaST
© Novell Inc. All rights reserved32
WebYast – Installation
• Already preinstalled
– WebYaST in an appliance
• Installing from RPM packages
– http://download.opensuse.org/repositories/YaST:/Web/
– Start yastws and yastwc system services
– Open webyast-ui firewall port (optional for remote access)
– Open https://localhost:54984 in your browser
• Running directly from sources (GIT)
– The latest version for developers
– See http://en.opensuse.org/YaST/Web/Installation
© Novell Inc. All rights reserved33
WebYaST – Development
• Interested in WebYaST development?
• Open source (GPLv2 and LGPLv2)
• Contact:
– yast-devel@opensuse.org
– IRC freenode.net #yast
• Bug reporting
– http://bugzilla.novell.com, product: WebYaST
© Novell Inc. All rights reserved34
Resources
• WebYaST Documentation
– http://en.opensuse.org/WebYaST
• User and Vendor Guide
– http://www.novell.com/documentation/webyast/
book_webyast_use/data/cha_webyast_user_overview.html
– http://www.novell.com/documentation/webyast/
book_webyast_vendor/data/cha_webyast_vendor_overview.html
• General Terms
– REST: http://en.wikipedia.org/wiki/Representational_State_Transfer
Questions?
WebYaST (openSUSE conference 2010)

Contenu connexe

En vedette

Elswit petrified
Elswit petrifiedElswit petrified
Elswit petrifiedalma
 
Websitebuilder
WebsitebuilderWebsitebuilder
Websitebuilderpremondo
 
Asdfghj
AsdfghjAsdfghj
AsdfghjAngel
 
Fustel de coulanges
Fustel de coulangesFustel de coulanges
Fustel de coulangesalma
 
Photo resizing tutorial
Photo resizing tutorialPhoto resizing tutorial
Photo resizing tutorialadraria
 

En vedette (7)

Elswit petrified
Elswit petrifiedElswit petrified
Elswit petrified
 
Websitebuilder
WebsitebuilderWebsitebuilder
Websitebuilder
 
Daily quote1
Daily quote1Daily quote1
Daily quote1
 
Paradigm
ParadigmParadigm
Paradigm
 
Asdfghj
AsdfghjAsdfghj
Asdfghj
 
Fustel de coulanges
Fustel de coulangesFustel de coulanges
Fustel de coulanges
 
Photo resizing tutorial
Photo resizing tutorialPhoto resizing tutorial
Photo resizing tutorial
 

Similaire à WebYaST (openSUSE conference 2010)

WebYaST presentation at LinuxTag 2010
WebYaST presentation at LinuxTag 2010WebYaST presentation at LinuxTag 2010
WebYaST presentation at LinuxTag 2010lslezak
 
Hackweek 20 Open Door - Support Windows clients in Uyuni/SUSE Manager
Hackweek 20 Open Door - Support Windows clients in Uyuni/SUSE ManagerHackweek 20 Open Door - Support Windows clients in Uyuni/SUSE Manager
Hackweek 20 Open Door - Support Windows clients in Uyuni/SUSE ManagerPau Garcia Quiles
 
MySQL for Oracle DBAs
MySQL for Oracle DBAsMySQL for Oracle DBAs
MySQL for Oracle DBAsBen Krug
 
20191201 kubernetes managed weblogic revival - part 1
20191201 kubernetes managed weblogic revival - part 120191201 kubernetes managed weblogic revival - part 1
20191201 kubernetes managed weblogic revival - part 1makker_nl
 
IWMW 1999: Browser management
IWMW 1999: Browser managementIWMW 1999: Browser management
IWMW 1999: Browser managementIWMW
 
The Kubernetes WebLogic revival (part 1)
The Kubernetes WebLogic revival (part 1)The Kubernetes WebLogic revival (part 1)
The Kubernetes WebLogic revival (part 1)Simon Haslam
 
Lenovo xClarity - Presentacion - ITALTEL.pptx
Lenovo xClarity - Presentacion - ITALTEL.pptxLenovo xClarity - Presentacion - ITALTEL.pptx
Lenovo xClarity - Presentacion - ITALTEL.pptxJairVelasquezParraga
 
Chuck willis-owaspbwa-beyond-1.0-app secusa-2013-11-21
Chuck willis-owaspbwa-beyond-1.0-app secusa-2013-11-21Chuck willis-owaspbwa-beyond-1.0-app secusa-2013-11-21
Chuck willis-owaspbwa-beyond-1.0-app secusa-2013-11-21drewz lin
 
Get Rapid Right-sized and Recent with the Liberty Repository
Get Rapid Right-sized and Recent with the Liberty RepositoryGet Rapid Right-sized and Recent with the Liberty Repository
Get Rapid Right-sized and Recent with the Liberty RepositoryGraham Charters
 
Ch 8: Desktop and Server OS Vulnerabilites
Ch 8: Desktop and Server OS VulnerabilitesCh 8: Desktop and Server OS Vulnerabilites
Ch 8: Desktop and Server OS VulnerabilitesSam Bowne
 
Application Streaming is dead. A smart way to choose an alternative
Application Streaming is dead. A smart way to choose an alternativeApplication Streaming is dead. A smart way to choose an alternative
Application Streaming is dead. A smart way to choose an alternativeDenis Gundarev
 
CNIT 123: 8: Desktop and Server OS Vulnerabilites
CNIT 123: 8: Desktop and Server OS VulnerabilitesCNIT 123: 8: Desktop and Server OS Vulnerabilites
CNIT 123: 8: Desktop and Server OS VulnerabilitesSam Bowne
 
The State of Rootless Containers
The State of Rootless ContainersThe State of Rootless Containers
The State of Rootless ContainersAkihiro Suda
 
DevOps Supercharged with Docker on Exadata
DevOps Supercharged with Docker on ExadataDevOps Supercharged with Docker on Exadata
DevOps Supercharged with Docker on ExadataMarketingArrowECS_CZ
 
Liferay Portal Introduction
Liferay Portal IntroductionLiferay Portal Introduction
Liferay Portal IntroductionNguyen Tung
 
OpenStack - JobShop @Iași, 2016
OpenStack - JobShop @Iași, 2016OpenStack - JobShop @Iași, 2016
OpenStack - JobShop @Iași, 2016Alexandru Coman
 
OpenStack Summit 2013 Hong Kong - OpenStack and Windows
OpenStack Summit 2013 Hong Kong - OpenStack and WindowsOpenStack Summit 2013 Hong Kong - OpenStack and Windows
OpenStack Summit 2013 Hong Kong - OpenStack and WindowsAlessandro Pilotti
 
GWAVACon 2013: Novell Open Enterprise Server - Roadmap and Future
GWAVACon 2013: Novell Open Enterprise Server - Roadmap and FutureGWAVACon 2013: Novell Open Enterprise Server - Roadmap and Future
GWAVACon 2013: Novell Open Enterprise Server - Roadmap and FutureGWAVA
 

Similaire à WebYaST (openSUSE conference 2010) (20)

WebYaST presentation at LinuxTag 2010
WebYaST presentation at LinuxTag 2010WebYaST presentation at LinuxTag 2010
WebYaST presentation at LinuxTag 2010
 
Hackweek 20 Open Door - Support Windows clients in Uyuni/SUSE Manager
Hackweek 20 Open Door - Support Windows clients in Uyuni/SUSE ManagerHackweek 20 Open Door - Support Windows clients in Uyuni/SUSE Manager
Hackweek 20 Open Door - Support Windows clients in Uyuni/SUSE Manager
 
MySQL for Oracle DBAs
MySQL for Oracle DBAsMySQL for Oracle DBAs
MySQL for Oracle DBAs
 
20191201 kubernetes managed weblogic revival - part 1
20191201 kubernetes managed weblogic revival - part 120191201 kubernetes managed weblogic revival - part 1
20191201 kubernetes managed weblogic revival - part 1
 
IWMW 1999: Browser management
IWMW 1999: Browser managementIWMW 1999: Browser management
IWMW 1999: Browser management
 
The Kubernetes WebLogic revival (part 1)
The Kubernetes WebLogic revival (part 1)The Kubernetes WebLogic revival (part 1)
The Kubernetes WebLogic revival (part 1)
 
Lenovo xClarity - Presentacion - ITALTEL.pptx
Lenovo xClarity - Presentacion - ITALTEL.pptxLenovo xClarity - Presentacion - ITALTEL.pptx
Lenovo xClarity - Presentacion - ITALTEL.pptx
 
Chuck willis-owaspbwa-beyond-1.0-app secusa-2013-11-21
Chuck willis-owaspbwa-beyond-1.0-app secusa-2013-11-21Chuck willis-owaspbwa-beyond-1.0-app secusa-2013-11-21
Chuck willis-owaspbwa-beyond-1.0-app secusa-2013-11-21
 
Get Rapid Right-sized and Recent with the Liberty Repository
Get Rapid Right-sized and Recent with the Liberty RepositoryGet Rapid Right-sized and Recent with the Liberty Repository
Get Rapid Right-sized and Recent with the Liberty Repository
 
Ch 8: Desktop and Server OS Vulnerabilites
Ch 8: Desktop and Server OS VulnerabilitesCh 8: Desktop and Server OS Vulnerabilites
Ch 8: Desktop and Server OS Vulnerabilites
 
Application Streaming is dead. A smart way to choose an alternative
Application Streaming is dead. A smart way to choose an alternativeApplication Streaming is dead. A smart way to choose an alternative
Application Streaming is dead. A smart way to choose an alternative
 
CNIT 123: 8: Desktop and Server OS Vulnerabilites
CNIT 123: 8: Desktop and Server OS VulnerabilitesCNIT 123: 8: Desktop and Server OS Vulnerabilites
CNIT 123: 8: Desktop and Server OS Vulnerabilites
 
The State of Rootless Containers
The State of Rootless ContainersThe State of Rootless Containers
The State of Rootless Containers
 
DevOps Supercharged with Docker on Exadata
DevOps Supercharged with Docker on ExadataDevOps Supercharged with Docker on Exadata
DevOps Supercharged with Docker on Exadata
 
ElasTest Webinar
ElasTest WebinarElasTest Webinar
ElasTest Webinar
 
Liferay Portal Introduction
Liferay Portal IntroductionLiferay Portal Introduction
Liferay Portal Introduction
 
OpenStack - JobShop @Iași, 2016
OpenStack - JobShop @Iași, 2016OpenStack - JobShop @Iași, 2016
OpenStack - JobShop @Iași, 2016
 
OpenStack Summit 2013 Hong Kong - OpenStack and Windows
OpenStack Summit 2013 Hong Kong - OpenStack and WindowsOpenStack Summit 2013 Hong Kong - OpenStack and Windows
OpenStack Summit 2013 Hong Kong - OpenStack and Windows
 
Database Firewall with Snort
Database Firewall with SnortDatabase Firewall with Snort
Database Firewall with Snort
 
GWAVACon 2013: Novell Open Enterprise Server - Roadmap and Future
GWAVACon 2013: Novell Open Enterprise Server - Roadmap and FutureGWAVACon 2013: Novell Open Enterprise Server - Roadmap and Future
GWAVACon 2013: Novell Open Enterprise Server - Roadmap and Future
 

Plus de lslezak

openSUSE Conference 2017 - YaST News
openSUSE Conference 2017 - YaST NewsopenSUSE Conference 2017 - YaST News
openSUSE Conference 2017 - YaST Newslslezak
 
openSUSE Conference 2017 - The Docker at Travis Presentation
openSUSE Conference 2017 - The Docker at Travis PresentationopenSUSE Conference 2017 - The Docker at Travis Presentation
openSUSE Conference 2017 - The Docker at Travis Presentationlslezak
 
openSUSE Conference 2017 - The Atom Presentation
openSUSE Conference 2017 - The Atom PresentationopenSUSE Conference 2017 - The Atom Presentation
openSUSE Conference 2017 - The Atom Presentationlslezak
 
Integrating the Ruby Debugger into YaST
Integrating the Ruby Debugger into YaSTIntegrating the Ruby Debugger into YaST
Integrating the Ruby Debugger into YaSTlslezak
 
YaST Debugging
YaST DebuggingYaST Debugging
YaST Debugginglslezak
 
DBus PolicyKit and YaST
DBus PolicyKit and YaSTDBus PolicyKit and YaST
DBus PolicyKit and YaSTlslezak
 

Plus de lslezak (6)

openSUSE Conference 2017 - YaST News
openSUSE Conference 2017 - YaST NewsopenSUSE Conference 2017 - YaST News
openSUSE Conference 2017 - YaST News
 
openSUSE Conference 2017 - The Docker at Travis Presentation
openSUSE Conference 2017 - The Docker at Travis PresentationopenSUSE Conference 2017 - The Docker at Travis Presentation
openSUSE Conference 2017 - The Docker at Travis Presentation
 
openSUSE Conference 2017 - The Atom Presentation
openSUSE Conference 2017 - The Atom PresentationopenSUSE Conference 2017 - The Atom Presentation
openSUSE Conference 2017 - The Atom Presentation
 
Integrating the Ruby Debugger into YaST
Integrating the Ruby Debugger into YaSTIntegrating the Ruby Debugger into YaST
Integrating the Ruby Debugger into YaST
 
YaST Debugging
YaST DebuggingYaST Debugging
YaST Debugging
 
DBus PolicyKit and YaST
DBus PolicyKit and YaSTDBus PolicyKit and YaST
DBus PolicyKit and YaST
 

Dernier

Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 

Dernier (20)

Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 

WebYaST (openSUSE conference 2010)

  • 1. WebYaST Remote Web Based System Management Ladislav Slezák lslezak@suse.cz SUSE Linux s.r.o.
  • 2. © Novell Inc. All rights reserved2 Content • YaST • WebYaST features • WebYaST demo • Implementation details, solved problems • Installation, customization • Questions
  • 4. © Novell Inc. All rights reserved4 YaST – Yet another Setup Tool • System management tool for Linux • System installer • Open source (GPLv2+) • Included in openSUSE, SUSE Linux Enterprise • Desktop application, administration account needed
  • 5. © Novell Inc. All rights reserved5 YaST – Installation
  • 6. © Novell Inc. All rights reserved6 YaST – Control Center
  • 7. © Novell Inc. All rights reserved7 YaST – Package Manager
  • 8. © Novell Inc. All rights reserved8 YaST – Package Manager
  • 10. © Novell Inc. All rights reserved10 WebYaST Features • Successor to YaST • Access via a web browser • Open source (GPLv2 and LGPLv2)
  • 11. © Novell Inc. All rights reserved11 WebYaST – Target Users • Beginner users • Experts (remote system monitoring) • Appliance (virtual machine) management – e.g. SUSE Lifecycle Management Server (SLMS)
  • 12. © Novell Inc. All rights reserved12 Comparing YaST and WebYaST YaST SSH VNC HTTPS • Remote access WebYaST • No special SW needed, just a web browser • OS/HW independent
  • 13. © Novell Inc. All rights reserved13 Comparing YaST and WebYaST • Authorization and security YaST WebYaST • No password sharing • Access control • Role based access Admin Password User administrator SW administrator ? Linux System User administrator SW administrator User's password User's password Access rights Access rights Linux System
  • 15. © Novell Inc. All rights reserved15 WebYaST
  • 16. © Novell Inc. All rights reserved16 WebYaST
  • 17. © Novell Inc. All rights reserved17 WebYaST
  • 18. © Novell Inc. All rights reserved18 WebYaST
  • 19. © Novell Inc. All rights reserved19 WebYaST
  • 21. © Novell Inc. All rights reserved21 YaST Architecture UI (Qt, Gtk, ncurses) Application Logic Low Level Access System Privilegeduser(root) YaST
  • 22. © Novell Inc. All rights reserved22 WebYaST Architecture – Overview Web browser Web client HTML/HTTPS XML/HTTP Web service (REST service) System Non-privileged user Non-privileged user WebYaST ?
  • 23. © Novell Inc. All rights reserved23 WebYaST Architecture – Details Web browser Web client HTML/HTTPS XML/HTTP Web service (REST service) YaST DBus service PackageKit System Non-privileged user Non-privileged user Privileged user DBus Directnon-privilegedaccess ... RESTServiceWeb Client WebYaST
  • 24. © Novell Inc. All rights reserved24 WebYaST – Details • WebYaST uses Ruby on Rails framework • Reusing existing YaST code UI (Qt, Gtk, ncurses) Application Logic Low Level Access System Privilegeduser(root) DBus Wrapper DBus Access control PolicyKit DBusservice LegacyYaST
  • 25. © Novell Inc. All rights reserved25 REST Service • The backend which actually configures system • XML or JSON format over HTTP • Can be also used by 3rd party software – or from commadline (via curl, wget)
  • 26. © Novell Inc. All rights reserved26 REST Service • Key components/features – Small privileged part – DBus service – Access control – using PolicyKit – Reusing existing YaST components
  • 27. © Novell Inc. All rights reserved27 Web Client • HTML output over HTTPS • Key features – XML communication with REST – Rails ActiveResource – Cross-browser compatibility – jQuery JavaScript library – Localization support – GetText
  • 28. © Novell Inc. All rights reserved28 Web Client – Customization • First boot mode – first time configuration – Set of modules started before the main application – Started just once – Example: license agreement, root password, registration • Custom icon/link in the control panel, custom label • Custom CSS (layout, colors, ...)
  • 29. © Novell Inc. All rights reserved29 WebYaST – Customization
  • 30. © Novell Inc. All rights reserved30 WebYaST – Plugins • Plugin design – Similar to legacy YaST – Basic and shared functionality in base packages – Plugins implement the actual functionality > Decrease package dependencies > Install only the needed modules (security) • Plugins make WebYaST easily extensible
  • 32. © Novell Inc. All rights reserved32 WebYast – Installation • Already preinstalled – WebYaST in an appliance • Installing from RPM packages – http://download.opensuse.org/repositories/YaST:/Web/ – Start yastws and yastwc system services – Open webyast-ui firewall port (optional for remote access) – Open https://localhost:54984 in your browser • Running directly from sources (GIT) – The latest version for developers – See http://en.opensuse.org/YaST/Web/Installation
  • 33. © Novell Inc. All rights reserved33 WebYaST – Development • Interested in WebYaST development? • Open source (GPLv2 and LGPLv2) • Contact: – yast-devel@opensuse.org – IRC freenode.net #yast • Bug reporting – http://bugzilla.novell.com, product: WebYaST
  • 34. © Novell Inc. All rights reserved34 Resources • WebYaST Documentation – http://en.opensuse.org/WebYaST • User and Vendor Guide – http://www.novell.com/documentation/webyast/ book_webyast_use/data/cha_webyast_user_overview.html – http://www.novell.com/documentation/webyast/ book_webyast_vendor/data/cha_webyast_vendor_overview.html • General Terms – REST: http://en.wikipedia.org/wiki/Representational_State_Transfer