Skip to content

Commit 2b16636

Browse files
committed
docs: add images sources links
1 parent f16a681 commit 2b16636

File tree

2 files changed

+10
-10
lines changed

2 files changed

+10
-10
lines changed

docs/source/AdministratorGuide/Introduction/diraccomponents.rst

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -50,5 +50,5 @@ Each *System* and *Setup* instance has a distinct name. The mapping of *Systems*
5050
section.
5151

5252
.. image:: ../../_static/setup_structure.png
53-
:alt: DIRAC setup structure illustration
53+
:alt: DIRAC setup structure illustration (source https://github.com/TaykYoku/DIRACIMGS/raw/main/DIRAC_Setup_structure.ai)
5454
:align: center

docs/source/DeveloperGuide/OAuth2Authorization/index.rst

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -25,12 +25,12 @@ There are already many articles to familiarize yourself with this framework, for
2525
The following diagram shows the main OAuth 2.0 roles in DIRAC.
2626

2727
.. image:: /_static/Systems/FS/OAuth2/OAuth2Roles.png
28-
:alt: OAuth 2.0 roles in DIRAC.
28+
:alt: OAuth 2.0 roles in DIRAC (source https://github.com/TaykYoku/DIRACIMGS/raw/main/OAuth2_Roles.ai)
2929

3030
A feature of DIRAC is the ability to perform user tasks asynchronously on behalf of the user, i.e. using their access token or proxy certificate.
3131

3232
.. image:: /_static/Systems/FS/OAuth2/DIRACComponentsInteractionRoles.png
33-
:alt: OAuth 2.0 roles in context of the DIRAC components interation.
33+
:alt: OAuth 2.0 roles in context of the DIRAC components interation (source https://github.com/TaykYoku/DIRACIMGS/raw/main/OAuth2_Roles_ServiceAsClient.ai)
3434

3535
As shown in the figure, DIRAC server components, such as service or agent, may have sufficient privileges to request a user access token (or proxy). Upon receiving it, the component can access the protected resource on behalf of the user.
3636

@@ -81,7 +81,7 @@ This component is based on the popular `authlib <https://docs.authlib.org/en/lat
8181
The necessary components for DIRAC Authorization Server to work are collected in a :py:mod:`~DIRAC.FrameworkSystem.private.authorization` subpackage.
8282

8383
.. image:: /_static/Systems/FS/OAuth2/AuthorizationServerPackage.png
84-
:alt: DIRAC Authorization Server structure in a subpackage.
84+
:alt: DIRAC Authorization Server structure in a subpackage (source https://github.com/TaykYoku/DIRACIMGS/raw/main/Authorization_server_structure.ai)
8585

8686
Components
8787
----------
@@ -184,7 +184,7 @@ The ``dirac-login`` command will help us with this. There are three main ways to
184184
Using ``dirac-login my_group --use-certificate``:
185185

186186
.. image:: /_static/Systems/FS/OAuth2/certificateFlow.png
187-
:alt: DIRAC CLI login with certificate flow.
187+
:alt: DIRAC CLI login with certificate flow (source https://raw.githubusercontent.com/TaykYoku/DIRACIMGS/main/component_schema_flows.drawio)
188188

189189
Using the local certificate ``dirac-login`` makes a similar algorithm as :ref:`dirac-proxy-init`:
190190
1) Generate a proxy certificate locally on the user's machine from a locally installed user certificate.
@@ -195,7 +195,7 @@ Using the local certificate ``dirac-login`` makes a similar algorithm as :ref:`d
195195
Using ``dirac-login my_group --use-diracas --token``:
196196

197197
.. image:: /_static/Systems/FS/OAuth2/diracasTokenFlow.png
198-
:alt: DIRAC CLI login DIRAC AS flow and obtaining an access token.
198+
:alt: DIRAC CLI login DIRAC AS flow and obtaining an access token (source https://raw.githubusercontent.com/TaykYoku/DIRACIMGS/main/component_schema_flows.drawio)
199199

200200
User do not need to have a locally installed certificate if logging in through DIRAC AS.
201201

@@ -226,7 +226,7 @@ User do not need to have a locally installed certificate if logging in through D
226226
Using ``dirac-login my_group --use-diracas --proxy``:
227227

228228
.. image:: /_static/Systems/FS/OAuth2/diracasProxyFlow.png
229-
:alt: DIRAC CLI login DIRAC AS flow and obtaining a proxy.
229+
:alt: DIRAC CLI login DIRAC AS flow and obtaining a proxy (source https://raw.githubusercontent.com/TaykYoku/DIRACIMGS/main/component_schema_flows.drawio)
230230

231231
In this case, the process differs only in that when the user successfully completes the browser flow path, DIRAC AS responds with a proxy:
232232
11) Upon receipt of a request for a proxy, DIRAC AS requests :py:class:`~DIRAC.FrameworkSystem.Service.ProxyManagerHandler.ProxyManagerHandler` to provide a proxy to the requested user and group.
@@ -239,7 +239,7 @@ Web portal
239239
==========
240240

241241
.. image:: /_static/Systems/FS/OAuth2/WebAppLoginFlow.png
242-
:alt: DIRAC web login flow.
242+
:alt: DIRAC web login flow (source https://raw.githubusercontent.com/TaykYoku/DIRACIMGS/main/component_schema_flows.drawio)
243243

244244
The diagram shows the following steps:
245245
1) The user selects an identity provider for authorization in the web portal.
@@ -263,7 +263,7 @@ DIRAC CLI
263263
Using ``dirac-logout``:
264264

265265
.. image:: /_static/Systems/FS/OAuth2/revokeToken.png
266-
:alt: DIRAC logout flow.
266+
:alt: DIRAC logout flow (source https://raw.githubusercontent.com/TaykYoku/DIRACIMGS/main/component_schema_flows.drawio)
267267

268268
If it is a long session, i.e. with a refresh token, which allows you to update the access token and thus continue the working session, then to end the session it is necessary to revoke the refresh token:
269269
1) :ref:`dirac-logout` sends a revoke request to DIRAC AS.
@@ -280,6 +280,6 @@ Web portal
280280
Click on the username to select "Log out".
281281

282282
.. image:: /_static/Systems/FS/OAuth2/revokeTokenWeb.png
283-
:alt: DIRAC web logout flow.
283+
:alt: DIRAC web logout flow (source https://raw.githubusercontent.com/TaykYoku/DIRACIMGS/main/component_schema_flows.drawio)
284284

285285
The web server receives a request from the user's browser to end the session and made revoke refresh token request to DIRAC AS. After that cleans cookies.

0 commit comments

Comments
 (0)