Services (original) (raw)

Definition of a Service#

When working with JupyterHub, a Service is defined as something (usually a process) that can interact with the Hub’s REST API. A Service may perform a specific action or task. For example, the following tasks can each be a unique Service:

Two key features help differentiate Services:

Currently, these characteristics distinguish two types of Services:

Properties of a Service#

A Service may have the following properties:

If a service is also to be managed by the Hub, it has a few extra options:

Hub-Managed Services#

A Hub-Managed Service is started by the Hub, and the Hub is responsible for the Service’s operation. A Hub-Managed Service can only be a local subprocess of the Hub. The Hub will take care of starting the process and restart the service if the service stops.

While Hub-Managed Services share some similarities with single-user server Spawners, there are no plans for Hub-Managed Services to support the same spawning abstractions as a Spawner.

If you wish to run a Service in a Docker container or other deployment environments, the Service can be registered as anExternally-Managed Service, as described below.

Launching a Hub-Managed Service#

A Hub-Managed Service is characterized by its specified command for launching the Service. For example, a ‘cull idle’ notebook server task configured as a Hub-Managed Service would include:

This example would be configured as follows in jupyterhub_config.py:

c.JupyterHub.load_roles = [ { "name": "idle-culler", "scopes": [ "read:users:activity", # read user last_activity "servers", # start and stop servers # 'admin:users' # needed if culling idle users as well ] } ]

c.JupyterHub.services = [ { 'name': 'idle-culler', 'command': [sys.executable, '-m', 'jupyterhub_idle_culler', '--timeout=3600'] } ]

A Hub-Managed Service may also be configured with additional optional parameters, which describe the environment needed to start the Service process:

The Hub will pass the following environment variables to launch the Service:

JUPYTERHUB_SERVICE_NAME: The name of the service JUPYTERHUB_API_TOKEN: API token assigned to the service JUPYTERHUB_API_URL: URL for the JupyterHub API (default, http://127.0.0.1:8080/hub/api) JUPYTERHUB_BASE_URL: Base URL of the Hub (https://mydomain[:port]/) JUPYTERHUB_SERVICE_PREFIX: URL path prefix of this service (/services/:service-name/) JUPYTERHUB_SERVICE_URL: Local URL where the service is expected to be listening. Only for proxied web services. JUPYTERHUB_OAUTH_SCOPES: JSON-serialized list of scopes to use for allowing access to the service (deprecated in 3.0, use JUPYTERHUB_OAUTH_ACCESS_SCOPES). JUPYTERHUB_OAUTH_ACCESS_SCOPES: JSON-serialized list of scopes to use for allowing access to the service (new in 3.0). JUPYTERHUB_OAUTH_CLIENT_ALLOWED_SCOPES: JSON-serialized list of scopes that can be requested by the oauth client on behalf of users (new in 3.0). JUPYTERHUB_PUBLIC_URL: the public URL of the service, e.g. https://jupyterhub.example.org/services/name/. Empty if no public URL is specified (default). Will be available if subdomains are configured. JUPYTERHUB_PUBLIC_HUB_URL: the public URL of JupyterHub as a whole, e.g. https://jupyterhub.example.org/. Empty if no public URL is specified (default). Will be available if subdomains are configured.

For the previous ‘cull idle’ Service example, these environment variables would be passed to the Service when the Hub starts the ‘cull idle’ Service:

JUPYTERHUB_SERVICE_NAME: 'idle-culler' JUPYTERHUB_API_TOKEN: API token assigned to the service JUPYTERHUB_API_URL: http://127.0.0.1:8080/hub/api JUPYTERHUB_BASE_URL: https://mydomain[:port] JUPYTERHUB_SERVICE_PREFIX: /services/idle-culler/

See the GitHub repo for additional information about the jupyterhub_idle_culler.

Externally-Managed Services#

You may prefer to use your own service management tools, such as Docker or systemd, to manage a JupyterHub Service. These Externally-Managed Services, unlike Hub-Managed Services, are not subprocesses of the Hub. You must tell JupyterHub which API token the Externally-Managed Service is using to perform its API requests. Each Externally-Managed Service will need a unique API token, because the Hub authenticates each API request and the API token is used to identify the originating Service or user.

A configuration example of an Externally-Managed Service running its own web server is:

c.JupyterHub.services = [ { 'name': 'my-web-service', 'url': 'https://10.0.1.1:1984', # any secret >8 characters, you'll use api_token to # authenticate api requests to the hub from your service 'api_token': 'super-secret', } ]

In this case, the url field will be passed along to the Service asJUPYTERHUB_SERVICE_URL.

Service credentials#

A service has direct access to the Hub API via its api_token. Exactly what actions the service can take are governed by the service’s role assignments:

c.JupyterHub.services = [ { "name": "user-lister", "command": ["python3", "/path/to/user-lister"], } ]

c.JupyterHub.load_roles = [ { "name": "list-users", "scopes": ["list:users", "read:users"], "services": ["user-lister"] } ]

When a service has a configured URL or explicit oauth_client_id or oauth_redirect_uri, it can operate as an OAuth client. When a user visits an oauth-authenticated service, completion of authentication results in issuing an oauth token.

This token is:

This token enables the service to act on behalf of the user.

When an oauthenticated service makes a request to the Hub (or other Hub-authenticated service), it has two credentials available to authenticate the request:

Choosing which one to use depends on “who” should be considered taking the action represented by the request.

A service’s own permissions governs how it can act without any involvement of a user. The service’s oauth_client_allowed_scopes configuration allows individual users to delegate permission for the service to act on their behalf. This allows services to have little to no permissions of their own, but allow users to take actions via the service, using their own credentials.

An example of such a service would be a web application for instructors, presenting a dashboard of actions which can be taken for students in their courses. The service would need no permission to do anything with the JupyterHub API on its own, but it could employ the user’s oauth credentials to list users, manage student servers, etc.

This service might look like:

c.JupyterHub.services = [ { "name": "grader-dashboard", "command": ["python3", "/path/to/grader-dashboard"], "url": "http://127.0.0.1:12345", "oauth_client_allowed_scopes": [ "list:users", "read:users", ] } ]

c.JupyterHub.load_roles = [ { "name": "grader", "scopes": [ "list:users!group=class-a", "read:users!group=class-a", "servers!group=class-a", "access:servers!group=class-a", "access:services", ], "groups": ["graders"] } ]

In this example, the grader-dashboard service does not have permission to take any actions with the Hub API on its own because it has not been assigned any role. But when a grader accesses the service, the dashboard will have a token with permission to list and read information about any users that the grader can access. The dashboard will not have permission to do additional things as the grader.

The dashboard will be able to:

The dashboard will not be able to:

Adding or removing services at runtime#

Only externally-managed services can be added at runtime by using JupyterHub’s REST API.

Add a new service#

To add a new service, send a POST request to this endpoint

POST /hub/api/services/:servicename

Required scope: admin:services

Payload: The payload should contain the definition of the service to be created. The endpoint supports the same properties as externally-managed services defined in the config file.

Possible responses

Remove an existing service#

To remove an existing service, send a DELETE request to this endpoint

DELETE /hub/api/services/:servicename

Required scope: admin:services

Payload: None

Possible responses

Writing your own Services#

When writing your own services, you have a few decisions to make (in addition to what your service does!):

  1. Does my service need a public URL?
  2. Do I want JupyterHub to start/stop the service?
  3. Does my service need to authenticate users?

When a Service is managed by JupyterHub, the Hub will pass the necessary information to the Service via the environment variables described above. A flexible Service, whether managed by the Hub or not, can make use of these same environment variables.

When you run a service that has a URL, it will be accessible under a/services/ prefix, such as https://myhub.horse/services/my-service/. For your service to route proxied requests properly, it must takeJUPYTERHUB_SERVICE_PREFIX into account when routing requests. For example, a web service would normally service its root handler at '/', but the proxied service would need to serve JUPYTERHUB_SERVICE_PREFIX.

Note that JUPYTERHUB_SERVICE_PREFIX will contain a trailing slash. This must be taken into consideration when creating the service routes. If you include an extra slash you might get unexpected behavior. For example if your service has a/foo endpoint, the route would be JUPYTERHUB_SERVICE_PREFIX + foo, and/foo/bar would be JUPYTERHUB_SERVICE_PREFIX + foo/bar.

Hub Authentication and Services#

JupyterHub provides some utilities for using the Hub’s authentication mechanism to govern access to your service.

Requests to all JupyterHub services are made with OAuth tokens. These can either be requests with a token in the Authorization header, or url parameter ?token=..., or browser requests which must complete the OAuth authorization code flow, which results in a token that should be persisted for future requests (persistence is up to the service, but an encrypted cookie confined to the service path is appropriate, and provided by default).

Changed in version 2.0: The shared jupyterhub-services cookie is removed. OAuth must be used to authenticate browser requests with services.

JupyterHub includes a reference implementation of Hub authentication that can be used by services. You may go beyond this reference implementation and create custom hub-authenticating clients and services. We describe the process below.

The reference, or base, implementation is the HubAuth class, which implements the API requests to the Hub that resolve a token to a User model.

There are two levels of authentication with the Hub:

To use HubAuth, you must set the .api_token instance variable. This can be done via the HubAuth constructor, direct assignment to a HubAuth object, or via theJUPYTERHUB_API_TOKEN environment variable. A number of the examples in the root of the jupyterhub git repository set the JUPYTERHUB_API_TOKEN variable so consider having a look at those for further reading (cull-idle,external-oauth,service-notebookand service-whoami)

Most of the logic for authentication implementation is found in theHubAuth.user_for_token() methods, which makes a request of the Hub, and returns:

You are then free to use the returned user information to take appropriate action.

HubAuth also caches the Hub’s response for a number of seconds, configurable by the cookie_cache_max_age setting (default: five minutes).

If your service would like to make further requests on behalf of users, it should use the token issued by this OAuth process. If you are using tornado, you can access the token authenticating the current request with HubAuth.get_token().

Changed in version 2.2: HubAuth.get_token() adds support for retrieving tokens stored in tornado cookies after the completion of OAuth. Previously, it only retrieved tokens from URL parameters or the Authorization header. Passing get_token(handler, in_cookie=False) preserves this behavior.

Flask Example#

For example, you have a Flask service that returns information about a user. JupyterHub’s HubAuth class can be used to authenticate requests to the Flask service. See the service-whoami-flask example in theJupyterHub GitHub repofor more details.

Authenticating tornado services with JupyterHub#

Since most Jupyter services are written with tornado, we include a mixin class, HubOAuthenticated, for quickly authenticating your own tornado services with JupyterHub.

Tornado’s authenticated() decorator calls a Handler’s get_current_user()method to identify the user. Mixing in HubAuthenticated definesget_current_user() to use HubAuth. If you want to configure the HubAuth instance beyond the default, you’ll want to define an initialize() method, such as:

class MyHandler(HubOAuthenticated, web.RequestHandler):

def initialize(self, hub_auth):
    self.hub_auth = hub_auth

@web.authenticated
def get(self):
    ...

The HubAuth class will automatically load the desired configuration from the Serviceenvironment variables.

Changed in version 2.0: Access scopes are used to govern access to services. Prior to 2.0, sets of users and groups could be used to grant access by defining .hub_groups or .hub_users on the authenticated handler. These are ignored if the 2.0 .hub_scopes is defined.

Implementing your own Authentication with JupyterHub#

If you don’t want to use the reference implementation (e.g. you find the implementation a poor fit for your Flask app), you can implement authentication via the Hub yourself. JupyterHub is a standard OAuth2 provider, so you can use any OAuth 2 client implementation appropriate for your toolkit. See the FastAPI example for an example of using JupyterHub as an OAuth provider with FastAPI, without using any code imported from JupyterHub.

On completion of OAuth, you will have an access token for JupyterHub, which can be used to identify the user and the permissions (scopes) the user has authorized for your service.

You will only get to this stage if the user has the required access:services!service=$service-name scope.

To retrieve the user model for the token, make a request to GET /hub/api/user with the token in the Authorization header. For example, using flask:

We recommend looking at the HubOAuth class implementation for reference, and taking note of the following process:

  1. retrieve the token from the request.
  2. Make an API request GET /hub/api/user, with the token in the Authorization header.
    For example, with requests:
    r = requests.get(
    "http://127.0.0.1:8081/hub/api/user",
    headers = {
    'Authorization' : f'token {api_token}',
    },
    )
    r.raise_for_status()
    user = r.json()
  3. On success, the reply will be a JSON model describing the user:
    {
    "name": "inara",

groups may be omitted, depending on permissions

"groups": ["serenity", "guild"],

scopes is new in JupyterHub 2.0

"scopes": [
"access:services",
"read:users:name",
"read:users!user=inara",
"..."
]
}

The scopes field can be used to manage access. Note: a user will have access to a service to complete oauth access to the service for the first time. Individual permissions may be revoked at any later point without revoking the token, in which case the scopes field in this model should be checked on each access. The default required scopes for access are available from hub_auth.oauth_scopes or $JUPYTERHUB_OAUTH_ACCESS_SCOPES.

An example of using an Externally-Managed Service and authentication is in the nbviewer README section on securing the notebook viewer, and an example of its configuration is found here. nbviewer can also be run as a Hub-Managed Service as described nbviewer READMEsection on securing the notebook viewer.