This is the primary interface for arXiv users to submit e-prints to arXiv. It is comprised of a Flask application built around the submission core events package.
The Submission UI requires the File Management service and optionally requires the Compiler service when working with articles that must be compiled from TeX sources. The Compiler service is not required when working with PDF-only submissions.
The Compiler service's converter image currently includes the complete set of all arXiv TeX trees used by arXiv over the years. This image is rather large (17G) and takes more effort to download and install so we supply a mock compiler service for cases where you are not focused on the compilation aspects of the 'process' step within the submission workflow.
The mock compilation configuration will run with Docker's default setting of 2GB memory. If you have the resources available, it's recommended to increase to 4GB now, to avoid later issues: add memory for Docker on a Mac.
Submission involves several back-end services, worker processes and the UI application itself. The easiest way to spin up all of this stuff with correct wiring is to use the provided docker-compose configuration.
mkdir /tmp/foo # Mock compiler service will use this.
export DIND_SOURCE_ROOT=/tmp/foo
export AWS_ACCESS_KEY_ID=fookey AWS_SECRET_ACCESS_KEY=foosecretkey
cd /path/to/arxiv-submission-ui
docker-compose -f docker-compose-mock-compiler.yml pull # Pulls in images that you might not have already.
docker-compose -f docker-compose-mock-compiler.yml build # Builds the submission UI
docker-compose -f docker-compose-mock-compiler.yml up
After starting the "up" command, scroll down past about 400 lines of log messages. A bootstrap process will generate a bunch of users who are authorized to submit things. Cut and paste one of those JWTs. It will look something like this:
arxiv-submission-ui | 1 picoline2058@gmail.com _JWT_STARTS_HERE_AND_GOES_ON_FOR_SEVERAL_LINES_
You will need to pass the JWT in the Authorization
header.
This is a valid session so you can use the submission UI.
For Chrome, try the Requestly plugin, where you:
- Create a rule to modify headers
- Add a request header of "Authorization", with a value as the JWT you found in the logs.
- Add a value for "request url contains" as localhost:8000.
You should be able to access the UI at http://localhost:8000. If you don't get a response right away, the UI is probably still waiting for something to come up. If you are redirected to the production ArXiv.org login page, then your browser is not sending a valid JWT to localhost.
To stop the service, and remove the docker compose containers, you can Ctrl-C or "stop", and then "rm". To remove images so they will be rebuilt, use prune or 'docker rmi':
docker-compose -f docker-compose-mock-compiler.yml stop
docker-compose -f docker-compose-mock-compiler.yml rm -v
docker system prune
- If localhost is not working:
- You may have a local process running on a port. E.g.: With docker compose stopped, check for a running mysql with 'brew services' or 'lsof -i :3306' or 'ps aux | grep mysqld'.
- Increase the memory, up to 4GB.
- If you are redirected from localhost to arxiv.org, check your JWT configuration.
The mock compiler service simulates responses from the compilation service. The primary deliverables of the compiler service are the PDF and logs generated from compiling the submission's TeX source. The mock compiler service simply returns a fixed PDF and compilation log.
Use the 'docker-compose-mock-compiler.yml' configuration file to enable the mock compiler service. You will need to add the '-f ' argument to all docker-compose commands. Another option is to replace the 'docker-compose.yml' with the 'docker-compose-mock-compiler.yml' in the event you do not want to bother with adding the '-f' argument. Be careful not to commit this overwrite of the default configuration file.
You may see the following errors when running docker-compose -f docker-compose-mock-compiler.yml pull
,
and you can ignore them:
ERROR: for submission-ui manifest for arxiv/submission-ui:latest not found: manifest unknown: manifest unknown
ERROR: for mock-compiler-api pull access denied for arxiv/mock-compiler, repository does not exist or may require
'docker login': denied: requested access to the resource is denied
ERROR: for mock-classifier pull access denied for arxiv/mock-classifier, repository does not exist or may require
'docker login': denied: requested access to the resource is denied
ERROR: pull access denied for arxiv/mock-classifier, repository does not exist or may require
'docker login': denied: requested access to the resource is denied
In the event you do not want to install the compiler yet want to see what a specific compilation product looks like you may grab the PDF and compilation log from the production arXiv system and install these files as data for the mock compiler service.
The PDF and log returned by the mock compiler service are stored in the 'mock-services/data/compiler' directory.
Simply install your new data files, rebuild the mock compiler service, and bring up the submission-ui.
When using the mock-compiler service you will get the same PDF and compilation log for every submission. The idea behind the mock compiler service is to let you work through the entire submission process workflow without the hassle of installing the compiler service.
This builds on the "Quick start with mock compilation" steps above.
How to chose the option that's right for you: If you are not concerned with TeX compilation, or you have limited disk space, you will want the mock compiler option. If you are concerned with evaluating TeX compilation output and/or the submission 'process' step under normal operating conditions you will want to install the actual Compiler service's converter image.
One of the back-end services we run is 'localstack' which is a fully functional local AWS stack. While this local AWS stack implementation doesn't actually check credentials you must have the environment variables set for the service to work properly.
First, you will need credentials to AWS ECR to get the converter docker image. You should only need to do this once. If it seems your quick start is not running the compiler it is probably because it cannot access this docker image on AWS ECR.
To do this,
-
log on to Cornell's AWS single sign-on http://signin.aws.cucloud.net
-
On the AWS console, got to IAM
-
Click "users: on the left, click the button "Add user"
-
Add a name like YOURNETID-dev, click "Programmatic access", click "next: permissions"
-
Click "Copy permissions from existing user"
-
Select radio button for "arxiv-ecr-test", Click on the bottom "Next: tags"
-
Click on bottom "next: review", click on bottom "create user", Click "Download.csv"
-
Install awscli, on linux you can do "pip install awscli" or "pipenv install awscli" or look up how to do this on your OS. Instructions for CLI install from AWS
-
On the command line run
aws configure
and enter the AWS access key ID, AWS secret access key and us-east-1 for region when prompted. Format can be 'json' 'text' or 'table' and is your preference.
To test if you have access to ECR run:
aws ecr list-images --repository-name arxiv/converter
You should get a response of no error and a list of docker images.
- You can install your credentials in ~/.aws/ with
aws configure
. - You may need to remove the fake credentials from above, in your shell, for example:
unset AWS_ACCESS_KEY_ID AWS_SECRET_ACCESS_KEY
There are now multiple converter images that may be configured to compile TeX source. Most converter images contain a single TeX tree (to reduce size) along with one very large converter image that contains the complete set of all arXiv TeX trees (14.5G). At the current time you may configure a single converter image to compile TeX sources.
The following TeX trees are available: TeX Live 2016 (most recent); TeX Live 2011; TeX Live 2009; teTeX 2; and teTeX 3. The teTeX 2 tree contains multiple local trees.
Set the CONVERTER_DOCKER_IMAGE environment variable to indicate the converter image you would like to select.
Please check arXiv's AWS ECR repository for the current list of images.
All Trees: (14.5G) Contains all trees, submissions uses latest tree. 626657773168.dkr.ecr.us-east-1.amazonaws.com/arxiv/converter
TL2016: (7.9G) 2017-02-09 626657773168.dkr.ecr.us-east-1.amazonaws.com/arxiv/converter-2016
TL2011: (5.8G) 2011-12-06 626657773168.dkr.ecr.us-east-1.amazonaws.com/arxiv/converter-2011
TL2009: (4.9G) 2009-12-31 626657773168.dkr.ecr.us-east-1.amazonaws.com/arxiv/converter-2009
teTeX 3: (3.1G) 2006-11-02 626657773168.dkr.ecr.us-east-1.amazonaws.com/arxiv/converter-tetex-3
teTeX 2: (3.2G) Uses different binaries and texmf (local tree) versions: 2002-09-01, 2003-01-01, 2004-01-01 626657773168.dkr.ecr.us-east-1.amazonaws.com/arxiv/converter-tetex-2
There are two ways to download and install the converter image: manual and automatic.
The 'automated' method lets the compiler service download the converter image for you. If you set the environment variable 'CONVERTER_IMAGE_PULL' to 1 in the docker-compose.yml file under both the compiler-api: and the compiler-worker: sections, and then rebuild/up the compiler service, the compiler service will attempt to download the image from AWS in the event it does not find it locally. There will be a delay during startup while the converter image is being downloaded.
The second method is to manually download the converter image(s) you need prior to starting up the submission UI. This will save time during startup.
The 'CONVERTER_IMAGE_PULL' environment variables are now set to 1 (enabled) by default. You may still want to manually download the image to speed up startup. In the event you accidently remove the converter image the compiler service will simply download a fresh copy. This seems like a useful safety feature.
In both cases you will need to configure your AWS credentials prior to attempting converter image download.
In order to let the compiler service download a converter image simply set (including version number**):
export CONVERTER_DOCKER_IMAGE=626657773168.dkr.ecr.us-east-1.amazonaws.com/arxiv/converter-2009:0.1.0
Login to the AWS ECR server using the AWS CLI version 1 or 2:
aws ecr get-login --no-include-email --region us-east-1 # aws-cli/1.x
aws ecr get-login-password | docker login --username AWS --password-stdin https://626657773168.dkr.ecr.us-east-1.amazonaws.com # aws-cli/2.x
To download manually execute the pull command with the appropriate converter image specification:
$ docker pull $CONVERTER_DOCKER_IMAGE
** Compiler service seems to get confused when version number is not included. This will be fixed in a subsequent ticket whe time permits.
Make sure you have your AWS settings configured properly before proceeding (see above).
mkdir /tmp/foo # Compiler service will use this.
export DIND_SOURCE_ROOT=/tmp/foo
export CONVERTER_DOCKER_IMAGE=626657773168.dkr.ecr.us-east-1.amazonaws.com/arxiv/converter:0.9
export AWS_ACCESS_KEY_ID=fookey AWS_SECRET_ACCESS_KEY=foosecretkey
cd /path/to/arxiv-submission-ui
docker-compose pull # Pulls in images that you might not have already.
docker-compose build # Builds the submission UI
docker-compose up
You may see the following errors when running docker-compose pull
,
and you can ignore them:
ERROR: for mock-classifier pull access denied for arxiv/mock-classifier, repository does not exist or may require 'docker login'
ERROR: for submission-ui manifest for arxiv/submission-ui:latest not found
ERROR: for mock-vault pull access denied for arxiv/mock-vault, repository does not exist or may require 'docker login'
ERROR: for submission-bootstrap manifest for arxiv/submission-ui:latest not found
ERROR: pull access denied for arxiv/mock-vault, repository does not exist or may require 'docker login'
Keep in mind that it can take a little while for everything to spin up -- each service checks for all of its upstreams to be available, and provisions any necessary AWS resources (in localstack).
Some of the last things you should see are the submission agent spooling through some test messages.
arxiv-submission-agent | application 29/May/2019:15:20:24 +0000 - __main__ - None - [arxiv:null] - INFO: "Processing record 49596144802018655118071366264305326833780872579347644418"
arxiv-submission-agent | application 29/May/2019:15:20:24 +0000 - __main__ - None - [arxiv:null] - INFO: "Skipping record 49596144802018655118071366264305326833780872579347644418"
arxiv-submission-agent | application 29/May/2019:15:20:24 +0000 - __main__ - None - [arxiv:null] - INFO: "Processing record 49596144802018655118071366264306535759600487208522350594"
arxiv-submission-agent | application 29/May/2019:15:20:24 +0000 - __main__ - None - [arxiv:null] - INFO: "Skipping record 49596144802018655118071366264306535759600487208522350594"
arxiv-submission-agent | application 29/May/2019:15:20:24 +0000 - __main__ - None - [arxiv:null] - INFO: "Processing record 49596144802018655118071366264307744685420103555683975170"
arxiv-submission-agent | application 29/May/2019:15:20:24 +0000 - __main__ - None - [arxiv:null] - INFO: "Skipping record 49596144802018655118071366264307744685420103555683975170"
arxiv-submission-agent | application 29/May/2019:15:20:24 +0000 - __main__ - None - [arxiv:null] - INFO: "Processing record 49596144802018655118071366264308953611239718184858681346"
arxiv-submission-agent | application 29/May/2019:15:20:24 +0000 - __main__ - None - [arxiv:null] - INFO: "Skipping record 49596144802018655118071366264308953611239718184858681346"
You should be able to access the UI at http://localhost:8000. If you don't get a response right away, the UI is probably still waiting for something to come up.
To get a fresh deployment (e.g. after significant changes to backend
stuff), you may need to blow away the whole service group. Be sure to
use the -v
flag to drop old volumes.
docker-compose rm -v
Add the '-f' flag when using the mock compiler service:
docker-compose -f docker-compose-mock-compiler.yml rm -v
In addition, the compose config maps ports for backend services and data stores to your local machine. So you can also start the UI via the Flask development server for quicker cycles.
Service | Env var | Endpoint |
---|---|---|
File manager | FILEMANAGER_ENDPOINT |
http://localhost:8001/filemanager/api |
Compiler | COMPILER_ENDPOINT |
http://localhost:8100/ |
Redis | SUBMISSION_BROKER_URL |
redis://localhost:6380 |
Legacy DB | CLASSIC_DATABASE_URI |
mysql+mysqldb://foouser:foopass@127.0.0.1:3307/submission?charset=utf8mb4 |
So you can start the submission UI in dev mode with something like:
cd arxiv-submission-ui
# Check out branch you are evaluating and be sure to pull recent changes
git pull
pipenv install --dev
export VAULT_ENABLED="0"
export NAMESPACE="development"
export LOGLEVEL=10
export JWT_SECRET=foosecret
export SESSION_COOKIE_SECURE=0
export CLASSIC_DATABASE_URI="mysql+mysqldb://foouser:foopass@127.0.0.1:3307/submission?charset=utf8mb4"
export WAIT_FOR_SERVICES=0
export WAIT_ON_STARTUP=0
export FILEMANAGER_ENDPOINT="http://localhost:8001/filemanager/api"
export FILEMANAGER_CONTENT_PATH="/{source_id}/content"
export COMPILER_ENDPOINT="http://localhost:8100/"
export COMPILER_VERIFY=0
export PREVIEW_ENDPOINT='http://localhost:9001/'
export PREVIEW_VERIFY=0
export KINESIS_STREAM="SubmissionEvents"
export KINESIS_VERIFY=0
export KINESIS_ENDPOINT="https://localhost:4568"
export KINESIS_START_TYPE="TRIM_HORIZON"
export FLASK_APP=app.py
export FLASK_DEBUG=1
pipenv run flask run
And access it at http://localhost:5000.
You MUST create a valid token to run the UI/FM development environment. The easiest way to do this is use the generate-token script in arxiv-auth. Adjust the defaults for 'Endorsement categories' and 'Authorization scope', and add the JWT to requestly for localhost:5000:
$ cd arxiv-auth
$ git pull
$ pipenv install ./users
$ JWT_SECRET=foosecret pipenv run python users/bin/generate-token
Numeric user ID: 1234
Email address: jdoe@cornell.edu
Username: Jane Doe
First name [Jane]:
Last name [Doe]:
Name suffix [IV]:
Affiliation [Cornell University]:
Numeric rank [3]:
Alpha-2 country code [us]:
Default category [astro-ph.GA]:
Submission groups (comma delim) [grp_physics]:
Endorsement categories (comma delim) [astro-ph.CO,astro-ph.GA]:
Authorization scope (space delim) [public:read submission:create submission:update submission:read upload:create upload:update upload:read upload:delete upload:read_logs]:
eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9.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.9-bVljfCz4jwaJLTq1sXhgawlB5H0qrmYtwl60PC4aE
This application uses arxiv.users.auth
to enforce authorization rules
at submission endpoints. To create an auth token for use in development or
testing, you need to:
- Define a
arxiv.users.domain.Session
with the desired characteristics, and - Use the
arxiv.users.auth.tokens
module to generate a token.
Here's an example:
from pytz import timezone
from datetime import timedelta, datetime
from arxiv.users import auth, domain
# Specify the validity period for the session.
start = datetime.now(tz=timezone('US/Eastern'))
end = start + timedelta(seconds=36000) # Make this as long as you want.
# Create a user with endorsements in astro-ph.CO and .GA.
session = domain.Session(
session_id='123-session-abc',
start_time=start, end_time=end,
user=domain.User(
user_id='235678',
email='foo@foo.com',
username='foouser',
name=domain.UserFullName("Jane", "Bloggs", "III"),
profile=domain.UserProfile(
affiliation="FSU",
rank=3,
country="de",
default_category=domain.Category('astro-ph.GA'),
submission_groups=['grp_physics']
)
),
authorizations=domain.Authorizations(
scopes=[auth.scopes.CREATE_SUBMISSION,
auth.scopes.EDIT_SUBMISSION,
auth.scopes.VIEW_SUBMISSION],
endorsements=[domain.Category('astro-ph.CO'),
domain.Category('astro-ph.GA')]
)
)
secret = 'foosecret' # Note this secret.
token = auth.tokens.encode(session, secret)
The resulting token should look something like:
'eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9.eyJzZXNzaW9uX2lkIjoiZm9vaWQiLCJzdGFydF90aW1lIjoiMjAxOC0wNy0xNlQxMDoxNjozMy43NjA3NzMtMDQ6MDAiLCJ1c2VyIjp7InVzZXJuYW1lIjoiZm9vdXNlciIsImVtYWlsIjoiZm9vQGZvby5jb20iLCJ1c2VyX2lkIjoiMjM1Njc4IiwibmFtZSI6bnVsbCwicHJvZmlsZSI6bnVsbH0sImNsaWVudCI6bnVsbCwiZW5kX3RpbWUiOm51bGwsImF1dGhvcml6YXRpb25zIjp7ImNsYXNzaWMiOjAsImVuZG9yc2VtZW50cyI6W10sInNjb3BlcyI6WyJzdWJtaXNzaW9uOnJlYWQiXX0sImlwX2FkZHJlc3MiOm51bGwsInJlbW90ZV9ob3N0IjpudWxsLCJub25jZSI6bnVsbH0.FBMgmyByH7hA-IxwOOGTzZPLtbxE17Q1Wj5RkDBgXt8'
You will need to add an Authorization
header to your requests. There are
apps that will do this for you. For Chrome, try Requestly
or ModHeader.
Run the application with (note that JWT_SECRET must match above):
JWT_SECRET=foosecret \
CLASSIC_DATABASE_URI='sqlite:///db.sqlite' \
LOGLEVEL=10 \
FLASK_APP=app.py \
FLASK_DEBUG=1 \
pipenv run flask run
Pylint should pass at 9/10 or greater, given
the .pylintrc
config in this repo.
$ pipenv run pylint submit
Using config file /Users/brp53/projects/arxiv-submission-ui/.pylintrc
************* Module submit.routes.ui
submit/routes/ui.py:9: [W0511(fixme), ] TODO: might be refactored into a series of macros and fewer single-page
-----------------------------------
Your code has been rated at 9.88/10
Pydocstyle should pass without errors, using NumPy style docstrings.
$ pipenv run pydocstyle --convention=numpy --add-ignore=D401
$
Use type annotations
throughout this project (except in tests). Mypy should
pass with no errors or warnings, given the mypy.ini
configuration in this
repo and excluding "defined here" messages.
$ pipenv run mypy submit | grep -v "test.*" | grep -v "defined here"
$
If mypy complains about something that is verifiably not an error (e.g. a
known limitation of mypy), use inline # type: ignore
comments to suppress
the message. You should also add a comment describing why you're suppressing
the error, including any relevant context (e.g. GitHub issues, SO threads,
etc).