As a retailer, public library or specialized e-distributor, you are distributing EPUB and PDF files and you want them protected against oversharing by the Readium LCP DRM. Your distribution platform already handles publications, users and the purchases / loans and you can develop a REST interface between this platform and a License server. If you are in this situation, the open-source codebase is what you need.
Using the Readium LCP Server you can:
- Encrypt your entire catalog of EPUB and PDF files and make these files ready for download from any LCP compliant user agents;
- Generate LCP licenses on the fly from your distribution platform, which will deliver them to the proper users and user agents;
- Let users request a loan extension or make an early loan return;
- Cancel a license in case a user has declared he wasn't able to user it (usually because he does not use an LCP compliant reading application);
- Revoke a license in case a user has overshared it.
Detailed documentation can be found in the Wiki pages of the project.
No binaries are currently pre-built, so you need to get a working Golang installation. Please refer to the official documentation for installation procedures at https://golang.org/.
Install go 1.13 or higher; go 1.9 is not supported anymore by some modules.
The servers require the setup of an SQL Database.
- SQLite is sufficient for most needs. If the "database" property of each server defines a sqlite3 driver, the db setup is dynamically achieved when the server runs for the first time. SQLite database creation scripts are provided in the "dbmodel" folder in case they are useful.
- MySQL database creation scripts are provided as well in the "dbmodel" folder. These scripts should be run before launching the servers for the first time.
We expect other drivers (PostgresQL ...) to be provided by the community. Some developers have deployed MS SQL Server, but the corresponding scripts were not provided so far.
A major revision of the software will feature an ORM (Object Realtional Mapper), but it is still unsufficiently tested to be moved to the master branch.
Your platform must be able to handle:
1/ the license server, active in your intranet, not accessible from the Web, only accessible from you frontend server via its REST API.
2/ the license status server, accessible from the Web via its REST API.
3/ a large storage volume for encrypted publications, accessible in read mode from the Web via HTTP URLs (publications are encrypted once, every license generated for such publication is pointing at the same encrypted file.
You must obtain a X.509 certificate and confidential crypto information through EDRLab in order for your licenses to be accepted by Readium LCP compliant Reading Systems.
A folder publicly accessible from the Web must be made available for the server to store encrypted files.
The server software is composed of three independant parts:
A command line utility for content encryption. This utility can be included in any processing pipeline.
lcpencrypt:
- Takes an unprotected publication as input and generates an encrypted file as output.
- Notifies the License server of the generation of the encrypted file.
A License server, which implements Readium Licensed Content Protection 1.0.
Private functionalities (authentication needed):
- Store the data resulting from an external encryption
- Generate a license
- Generate a protected publication
- Update the rights associated with a license
- Get a set of licenses
- Get a license
A License Status server, which implements Readium License Status Document 1.0.
Public functionalities (accessible from the web):
- Return a license status document
- Process a device registration
- Process a lending return
- Process a lending renewal
Private functionalities (authentication needed):
- Create a license status document
- Filter licenses
- List all registered devices for a given licence
- Revoke/cancel a license
A Test Frontend server, which mimics your own frontend platform (e.g. bookselling website), with a GUI and its own REST API. Its sole goal is to help you test the License and License status servers.
Public functionalities (accessible from the web):
- Fetch a license from its id
- Fetch a licensed publication from the license id
Assuming a working Go installation, the following will install the three executables that constitute a complete Readium LCP Server.
On Linux and MacOS:
If you want to use the master branch:
# from the go workspace
cd $GOPATH
# fetch, build and install the different packages and their dependencies
go get -v github.com/readium/readium-lcp-server/...
Alternatively, if you want to use a feature/F branch:
# from the go workspace
cd $GOPATH
# clone the repo, selecting the feature/F branch
git clone -b feature/F https://github.com/readium/readium-lcp-server.git src/github.com/readium/readium-lcp-server
# then fetch, build and install the different packages and their dependencies
go get -v github.com/readium/readium-lcp-server/...
You may prefer to install only some of the three executables. In such a case, the "go get" command should be called once for each package, e.g. for the lcpserver from the master branch:
cd $GOPATH
go get -v github.com/readium/readium-lcp-server/lcpserver
To install properly the Test Frontend Server, you must also install several npm packages.
Move to $GOPATH/src/github.com/readium/readium-lcp-server/frontend/manage To install the packages and test your install, type
cd $GOPATH/src/github.com/readium/readium-lcp-server/frontend/manage
npm install
npm start
If this gives no error, your install is ready; type Ctrl-C to move out of the test mode. In case of errors, read Readme.md in the "manage" directory to get more details.
On Windows 10:
You must first install a GCC compiler in order to compile the SQLite module and to move later to "production mode". TDM-GCC gives great results.
Also, in the previous instructions, replace:
- $GOPATH with %GOPATH%
- forward slashes with backslashes in paths.
The server is controlled by a yaml configuration file (e.g. "config.yaml").
The License Server, License Status Server and Frontend test server will search their configuration file in the bin directory by default; but the path to this file can be changed using the environment variable:
READIUM_LCPSERVER_CONFIG
for the License serverREADIUM_LSDSERVER_CONFIG
for the License Status serverREADIUM_FRONTEND_CONFIG
for the Frontend test server
The value of the three global variables must be of the form /path/to/lcpconfig.yaml.
The three servers may share the same configuration file (if they are both executed on the same server) or they may have their own configuration file.
The LCP and LSD servers also require authenticated API requests for some of their functionalities. A password file named htpasswd
must therefore be created to handle such authentication data, for each module. Like the configuration file, the htpasswd file may be shared between the two modules.
An example of password file generator is found here. The htpasswd file format is e.g.:
User1:$apr1$OMWGq53X$Qf17b.ezwEM947Vrr/oTh0
User2:$apr1$lldfYQA5$8fVeTVyKsiPeqcBWrjBKMT
A quick-start configuration meant only for test purposes is available in test/config.yaml
. This file includes a default configuration for the the LCP, LSD and frontend servers.
- Create a LCP_HOME folder, eg.
/usr/local/var/lcp
- Create the sub-folders
db
,files
,files/encrypted
andfiles/master
in LCP_HOME - Copy the folder
test/cert
and the newly generatedhtpasswd
files to LCP_HOME - Copy the
test/config.yaml
file into$GOPATH/bin
, or setup theREADIUM_*_CONFIG
env variables - Replace any occurrence of
<LCP_HOME>
in config.yaml by the absolute path to the LCP_HOME folder
Here are the details about the configuration properties of each server. In the samples, replace <LCP_HOME>
with the absolute path to the folder containing encrypted files, database and certificates.
profile
: value of the LCP profile; values are:
basic
(default value, as described in the Readium LCP specification, used for tests only);1.0
(i.e. the current production profile, managed by EDRLab).
lcp
section: parameters associated with the License Server.
host
: the public server hostname,hostname
by defaultport
: the listening port,8989
by defaultpublic_base_url
: the public base URL, used by the license status server and the frontend test server to communicate with this server; combination of the host and port values on http by default, which is sufficient as the license server should not be visible from the Web.database
: the URI formatted connection string to the database,sqlite3://file:lcp.sqlite?cache=shared&mode=rwc
by defaultauth_file
: mandatory; the authentication file (an .htpasswd). Passwords must be encrypted using MD5.
Note: It may be practical to put the authentication file in the configuration folder ("lcpconfig" in the samples below).
storage
section: parameters related to the storage of encrypted publications.
mode
: optional. If its value is "s3",bucket
andregion
are required, otherwisefilesystem
is required.filesystem
: subsection, not used ifmode
is "s3": parameters related to a file system storage.directory
: absolute path to the directory in which the encrypted publications are stored. In production, this directory must be accessible from the Web via the URL defined inlicense/links/publication
(see below) This storage must be accessible from the Web via a simple URL, specified via thelicense/publication
parameter.
bucket
: only used ifmode
is "s3": value of the s3 bucket.region
: only used ifmode
is "s3": value of the AWS region.access_id
: only used ifmode
is "s3" and aws credentials are static: value of the AWS AccessKeyID.secret
: only used ifmode
is "s3" and aws credentials are static: value of the AWS SecretAccessKey.token
: only used ifmode
is "s3" and aws credentials are static: value of the AWS SessionToken.
certificate
section: parameters related to the signature of licenses:
cert
: the provider certificate file (.pem or .crt). It will be inserted in the licenses and used by clients for checking the signature. A test certificate is provided in the test/cert directory of the project (cert-edrlab-test.pem
).private_key
: the private key (.pem). It will be used for signing licenses. A test private key is provided in the test/cert directory of the project (privkey-edrlab-test.pem
).
Note: It may be practical to put these files in the configuration folder ("lcpconfig" in the samples below).
license
section: parameters related to static information to be included in all licenses generated by the License Server:
links
: subsection: links that will be included in all licenses.hint
andpublication
links are required in a Readium LCP license. If no such link exists in the partial license passed from the frontend when a new license his requested, these link values will be inserted in the partial license.
If no value is present in the configuration file and no value is inserted in the partial license, the License server will reply with a 500 Server Error at license creation. The sub-properties of thelinks
section are:hint
: required; location where a Reading System can redirect a User looking for additional information about the User Passphrase.publication
: optional, templated URL; location where the encrypted Publication associated with the License Document will be downloaded from the Web. This access point corresponds to the directory where encrypted publications are stored by the License Server (seestorage/filesystem/directory
). To expose this storage directory on the Web, the provider may decide to install a reverse-proxy, use a Web drive, use a CDN etc. This is a deployment choice which has nothing to do with this open-source projet.
During initial tests (before the License Server is hidden from the Web), this URL may simply be the one described described here. The publication (alias content) identifier is inserted in the URL via the variable {publication_id}. Note that this is working because the file name of the stored encrypted publications is simply their publication identifier.status
: optional, templated URL; location of the Status Document associated with a License Document. The license identifier is inserted via the variable {license_id}.
lsd_notify_auth
section: authentication parameters used by the License Server for notifying the License Status Server
of a license generation. The notification endpoint is configured in the lsd
section.
username
: mandatory, authentication usernamepassword
: mandatory, authentication password
Here is a License Server sample config (assuming the License Status Server is using the 'basic' LCP profile, is active on http://127.0.0.1:8990 and the Frontend Server is active on http://127.0.0.1:8991):
profile: "basic"
lcp:
host: "127.0.0.1"
port: 8989
public_base_url: "http://127.0.0.1:8989"
database: "sqlite3://file:<LCP_HOME>/db/lcp.sqlite?cache=shared&mode=rwc"
auth_file: "<LCP_HOME>/htpasswd"
storage:
filesystem:
directory: "<LCP_HOME>/files/storage"
certificate:
cert: "<LCP_HOME>/cert/cert.pem"
private_key: "<LCP_HOME>/cert/privkey.pem"
license:
links:
status: "http://127.0.0.1:8990/licenses/{license_id}/status"
hint: "http://127.0.0.1:8991/static/hint.html"
publication: "http://127.0.0.1:8989/contents/{publication_id}"
lsd:
public_base_url: "http://127.0.0.1:8990"
lsd_notify_auth:
username: "adm_username"
password: "adm_password"
lsd
section: parameters associated with the License Status Server.
-
host
: the public server hostname,hostname
by default -
port
: the listening port,8990
by default -
public_base_url
: the public base URL, used by the license server and the frontend test server to communicate with this server; combination of the host and port values on http by default; as this server is exposed on the Web in production, a domain name should be present in the URL. -
database
: the URI formatted connection string to the database,sqlite3://file:lsd.sqlite?cache=shared&mode=rwc
by default -
auth_file
: mandatory; the authentication file (an .htpasswd). Passwords must be encrypted using MD5. -
license_link_url
: mandatory; the url template representing the url from which a license can be fetched from the provider's frontend server. This url will be inserted in the 'license' link of every status document. It must be the url of a server acting as a proxy between the user request and the License Server. Such proxy is mandatory, as the License Server does not possess user information needed to craft a license from its identifier. If the test frontend server is used as a proxy, the url must be of the form "http:///api/v1/licenses/{license_id}" (note the /api/v1 section).
license_status
section: parameters related to the interactions implemented by the License Status server, if any:
renting_days
: maximum number of days allowed for a loan, from the date the loan starts. If set to 0 or absent, no loan renewal is possible.renew
: boolean; iftrue
, the renewal of a loan is possible.renew_days
: default number of additional days allowed during a renewal.return
: boolean; iftrue
, an early return is possible.register
: boolean; iftrue
, registering a device is possible.renew_page_url
: URL; if set, the renew feature is implemented as an HTML page, using this URL. This is mostly useful for testing client applications.
lcp_update_auth
section: authentication parameters used by the License Status Server for updating a license via the License Server. The notification endpoint is configured in the lcp
section.
username
: mandatory, authentication usernamepassword
: mandatory, authentication password
goofy_mode
property: it is really useful to test client apps for their resilience to errors issued by a License server, e.g. a registration error. This boolean property (true/false) (false by default) will trigger the License Status Server to a mode where errors occure. Currently, only the registration error use case is programmed; other errors will be added later.
Here is a License Status Server sample config (assuming the License Status Server is active on http://127.0.0.1:8990 and the Frontend Server is active on http://127.0.0.1:8991):
lsd:
host: "127.0.0.1"
port: 8990
public_base_url: "http://127.0.0.1:8990"
database: "sqlite3://file:<LCP_HOME>/db/lsd.sqlite?cache=shared&mode=rwc"
auth_file: "<LCP_HOME>/htpasswd"
license_link_url: "http://127.0.0.1:8991/api/v1/licenses/{license_id}"
license_status:
register: true
renew: true
return: true
renting_days: 60
renew_days: 7
lcp:
public_base_url: "http://127.0.0.1:8989"
lcp_update_auth:
username: "adm_username"
password: "adm_password"
frontend
section: parameters associated with the Test Frontend Server.
host
: the public server hostname,hostname
by defaultport
: the listening port,8991
by defaultpublic_base_url
: the public base URL, used to access the frontend UI; combination of the host and port values on http by defaultdatabase
: the URI formatted connection string to the database,sqlite3://file:frontend.sqlite?cache=shared&mode=rwc
by defaultmaster_repository
: repository where the uploaded EPUB files are stored before encryption.encrypted_repository
: repository where the encrypted EPUB files are stored after upload. The LCP server must have access to the path declared here, as it will move each encrypted file to its final storage folder on notification of encryption from the Frontend Server.directory
: the directory containing the client web app; by default $GOPATH/src/github.com/readium/readium-lcp-server/frontend/manage.provider_uri
: provider uri, which will be inserted in all licenses produced via this test frontend.right_print
: allowed number of printed pages, which will be inserted in all licenses produced via this test frontend.right_copy
: allowed number of copied characters, which will be inserted in all licenses produced via this test frontend.
The config file of a Test Frontend Server must define a lcp
public_base_url
, lsd
public_base_url
, lcp_update_auth
username
and password
, and lsd_notify_auth
username
and password
.
Here is a Test Frontend Server sample config:
frontend:
host: "127.0.0.1"
port: 8991
database: "sqlite3://file:<LCP_HOME>/db/frontend.sqlite?cache=shared&mode=rwc"
master_repository: "<LCP_HOME>/files/master"
encrypted_repository: "<LCP_HOME>/files/encrypted"
provider_uri: "https://www.myprovidername.org"
right_print: 10
right_copy: 2000
lcp:
public_base_url: "http://127.0.0.1:8989"
lsd:
public_base_url: "http://127.0.0.1:8990"
lcp_update_auth:
username: "adm_username"
password: "adm_password"
lsd_notify_auth:
username: "adm_username"
password: "adm_password"
localization
section: parameters related to the localization of the messages sent by all three servers.
languages
: array of supported localization languagesfolder
: point to localization file (a .json)default_language
: default language for localization
NOTE: the localization file names (ex: 'en-US.json, de-DE.json') must match the set of supported localization languages.
NOTE: a CBC / GCM configurable property has been DISABLED, see readium#109 "aes256_cbc_or_gcm": either "GCM" or "CBC" (which is the default value). This is used only for encrypting publication resources, not the content key, not the user key check, not the LCP license fields.
each server must be launched in a different context (i.e. a different shell for local use), from
$GOPATH/bin
Each server is executed with no parameter:
./lcpserver
./lsdserver
./frontend
After the frontend server is launched, you can access to the server GUI via its base url, e.g. http://127.0.0.1:8991
NOTE: even if you deploy the server locally, using 127.0.0.1 is not recommended, as you won't be able to access the modules from e.g. a mobile app. It's much better to use the WiFi IPv4 address to your computer, and access the server from your mobile device via WiFi.
Please make a Pull Request with tests at github.com/readium/readium-lcp-server