diff --git a/.gitignore b/.gitignore index 0846fa5..1b91eec 100644 --- a/.gitignore +++ b/.gitignore @@ -1,6 +1,6 @@ ##Ignore site configuration .gitmodules -site-config +site-config/* ## Ignore site configuration config/**/* @@ -8,3 +8,5 @@ config/**/* landing/* docker-compose.override.yml site.conf +auth/* +certs/* \ No newline at end of file diff --git a/.gitmodules b/.gitmodules new file mode 100644 index 0000000..4a6ba0d --- /dev/null +++ b/.gitmodules @@ -0,0 +1,3 @@ +[submodule "site-config"] + path = site-config + url = https://code.mitro.dkfz.de/scm/bd/st.-patricks-town.git diff --git a/README.md b/README.md index 33a013d..fce60cf 100644 --- a/README.md +++ b/README.md @@ -1,23 +1,408 @@ -# bridgehead +# Bridgehead -This repository contains all tools to deploy a bridgehead with docker. If you have any questions about deploying a bridgehead, please contact us. +This repository contains all information and tools to deploy a bridgehead. If you have any questions about deploying a bridgehead, please [contact us](mailto:verbis-support@dkfz-heidelberg.de). -There are some prerequisites, which need to be meet before starting a bridgehead. If you running a Windows or Mac OS machine you should read starting a bridgehead. If you running a Linux machine you can start or install a bridgehead. +TODO: Insert comprehensive feature list of the bridgehead? Why would anyone install it? -## Setup +TOC -Clone this repository to /srv/docker/ +1. [Requirements](#requirements) + - [Hardware](#hardware) + - [System](#system-requirements) +2. [Getting Started](#getting-started) + - [DKTK](#dktkc4) + - [C4](#c4) + - [GBA/BBMRI-ERIC](#gbabbmri-eric) +3. [Configuration](#configuration) +4. [Managing your Bridgehead](#managing-your-bridgehead) + - [Systemd](#on-a-server) + - [Without Systemd](#on-developers-machine) +4. [Pitfalls](#pitfalls) +5. [Migration-guide](#migration-guide) +7. [License](#license) -The first step is to copy the site.conf. It contains some configuration and secrets for your bridgehead. -With cp site.dev.conf site.conf you can clone the template. You need to set the project accoriding to the which bridgehead you want to start. It's either a GBN/BBMRI-ERIC, DKTK, DKTK-FED or C4 Bridgehead. +## Requirements -Each Project needs a .env file where all the settings are located. Each Project has a template for it in their respective folder. We offer you to setup the file with and also to manage it. +### Hardware -### DKTK-FED +For running your bridgehead we recommend the follwing Hardware: -For the DKTK Federate Search put dkkt-fed as project in the site.conf. +- 4 CPU cores +- At least 8 GB Ram +- 10GB Hard Drive + how many data GB you need to store in the bridgehead -## Starting the bridgehead -./install_bridgehead \ No newline at end of file +### System Requirements + +Before starting the installation process, please ensure that following software is available on your system: + +#### [Git](https://git-scm.com/book/en/v2/Getting-Started-Installing-Git) + +To check that you have a working git installation, please run +``` shell +cd ~/; +git clone https://github.com/octocat/Hello-World.git; +cat ~/Hello-World/README; +rm -rf Hello-World; +``` +If you see the output "Hello World!" your installation should be working. + +#### [Docker](https://docs.docker.com/get-docker/) + +To check your docker installation, you can try to execute dockers "Hello World" Image. The command is: +``` shell +docker run --rm --name hello-world hello-world; +``` +Docker will now download the "hello-world" docker image and try to execute it. After the download you should see a message starting with "Hello from Docker!". + +> NOTE: If the download of the image fails (e.g with "connection timed out" message), ensure that you have correctly set the proxy for the docker daemon. Refer to ["Docker Daemon Proxy Configuration" in the "Pitfalls" section](#docker-daemon-proxy-configuration) + +You should also check, that the version of docker installed by you is newer than "1.20". To check this, just run + +``` shell +docker --version +``` + +#### [Docker Compose](https://docs.docker.com/compose/cli-command/#installing-compose-v2) + +To check your docker-compose installation, please run the following command. It uses the "hello-world" image from the previous section: +``` shell +docker-compose -f - up < NOTE: If you are part of the CCP-IT we will provide you another link for the configuration. + +You should now be able to run a bridgehead instance. To check if everything works, execute the following: +``` shell +sudo ./lib/init-test-environment.sh; +sudo ./start-bridgehead.sh ; +``` + +You should now be able to access the landing page on your system, e.g "http:///" + +To remove the test-environment, run (make sure you don't have other docker services installed on this system, docker volume prune is destructive!) +``` shell +sudo ./stop-bridgehead.sh ; +sudo docker volume prune; +``` + +For a server, we highly recommend that you install the system units for managing the bridgehead, provided by us. . You can do this by executing the [setup-bridgehead-units.sh](./lib/setup-bridgehead-units.sh) script: +``` shell +sudo ./lib/setup-bridgehead-units.sh +``` + +Finally, you need to configure your sites secrets. These are places as configuration for each bridgeheads system unit. Refer to the section for your specific project: + +### DKTK/C4 + +You can create the site specific configuration with: + +``` shell +sudo systemctl edit bridgehead@dktk.service; +``` + +This will open your default editor allowing you to edit the docker system units configuration. Insert the following lines in the editor and define your machines secrets. You share some of the ID-Management secrets with the central patientlist (Mainz) and controlnumbergenerator (Frankfurt). Refer to the ["Configuration" section](#configuration) for this. + +``` conf +[Service] +Environment=HOSTIP= +Environment=HOST= +Environment=HTTP_PROXY_USER= +Environment=HTTP_PROXY_PASSWORD= +Environment=HTTPS_PROXY_USER= +Environment=HTTPS_PROXY_PASSWORD= +Environment=CONNECTOR_POSTGRES_PASS= +Environment=ML_DB_PASS= +Environment=MAGICPL_API_KEY= +Environment=MAGICPL_MAINZELLISTE_API_KEY= +Environment=MAGICPL_API_KEY_CONNECTOR= +Environment=MAGICPL_MAINZELLISTE_CENTRAL_API_KEY= +Environment=MAGICPL_CENTRAL_API_KEY= +Environment=MAGICPL_OIDC_CLIENT_ID= +Environment=MAGICPL_OIDC_CLIENT_SECRET= +``` + +To make the configuration effective, you need to tell systemd to reload the configuration and restart the docker service: + +``` shell +sudo systemctl daemon-reload; +sudo systemctl bridgehead@dktk.service; +``` + +### C4 + +You can create the site specific configuration with: + +``` shell +sudo systemctl edit bridgehead@c4.service; +``` + +This will open your default editor allowing you to edit the docker system units configuration. Insert the following lines in the editor and define your machines secrets. You share some of the ID-Management secrets with the central patientlist (Mainz) and controlnumbergenerator (Frankfurt). Refer to the ["Configuration" section](#configuration) for this. + +``` conf +[Service] +Environment=HOSTIP= +Environment=HOST= +Environment=HTTP_PROXY_USER= +Environment=HTTP_PROXY_PASSWORD= +Environment=HTTPS_PROXY_USER= +Environment=HTTPS_PROXY_PASSWORD= +Environment=CONNECTOR_POSTGRES_PASS= +Environment=STORE_POSTGRES_PASS= +Environment=ML_DB_PASS= +Environment=MAGICPL_API_KEY= +Environment=MAGICPL_MAINZELLISTE_API_KEY= +Environment=MAGICPL_API_KEY_CONNECTOR= +Environment=MAGICPL_MAINZELLISTE_CENTRAL_API_KEY= +Environment=MAGICPL_CENTRAL_API_KEY= +Environment=MAGICPL_OIDC_CLIENT_ID= +Environment=MAGICPL_OIDC_CLIENT_SECRET= +``` + +To make the configuration effective, you need to tell systemd to reload the configuration and restart the docker service: + +``` shell +sudo systemctl daemon-reload; +sudo systemctl bridgehead@c4.service; +``` +### GBA/BBMRI-ERIC + +You can create the site specific configuration with: + +``` shell +sudo systemctl edit bridgehead@gbn.service; +``` + +This will open your default editor allowing you to edit the docker system units configuration. Insert the following lines in the editor and define your machines secrets. + +``` conf +[Service] +Environment=HOSTIP= +Environment=HOST= +Environment=HTTP_PROXY_USER= +Environment=HTTP_PROXY_PASSWORD= +Environment=HTTPS_PROXY_USER= +Environment=HTTPS_PROXY_PASSWORD= +Environment=CONNECTOR_POSTGRES_PASS= +``` + +To make the configuration effective, you need to tell systemd to reload the configuration and restart the docker service: + +``` shell +sudo systemctl daemon-reload; +sudo systemctl bridgehead@gbn.service; +``` + +### Developers + +Because some developers machines doesn't support system units (e.g Windows Subsystem for Linux), we provide a dev environment [configuration script](./lib/init-test-environment.sh). +It is not recommended to use this script in production! + +## Configuration + +### Basic Auth + +Some services we use authfication to protect the data. For example for local data managemnt like the blaze. + +The /auth direcotry contians for each project a file with user and password combination. If it is not present please create a file with just the project name. To add a combination use [htpasswdgenerator](https://htpasswdgenerator.de/) or use htpasswd on your maschine. + +### HTTPS Access + +We advise to use https for all service of your bridgehead. HTTPS is enabled on default. For starting the bridghead you need a ssl certificate. You can either create it yourself or get a signed one. You need to drop the certificates in /certs. + +If you want to create it yourself, you can generate the necessary certs with: + +``` shell +openssl req -x509 -newkey rsa:4096 -nodes -keyout certs/traefik.key -out certs/traefik.crt -days 365 +``` + + +### Locally Managed Secrets + +This section describes the secrets you need to configure locally through the configuration + +| Name | Recommended Value | Description | +|--------------------------------------|---------------------------------------------------------------------------------------------------| ----------- | +| HTTP_PROXY_USER | | Your local http proxy user | +| HOSTIP | Compute with: `docker run --rm --add-host=host.docker.internal:host-gateway ubuntu cat /etc/hosts | grep 'host.docker.internal' | awk '{print $1}'` | The ip from which docker containers can reach your host system. | +| HOST | Compute with: `hostname` |The hostname from which all components will eventually be available| +| HTTP_PROXY_PASSWORD | |Your local http proxy user's password| +| HTTPS_PROXY_USER | |Your local https proxy user| +| HTTPS_PROXY_PASSWORD || Your local https proxy user's password | +| CONNECTOR_POSTGRES_PASS | Random String |The password for your project specific connector.| +| STORE_POSTGRES_PASS | Random String |The password for your local datamanagements database (only relevant in c4)| +| ML_DB_PASS | Random String |The password for your local patientlist database| +| MAGICPL_API_KEY | Random String |The apiKey used by the local datamanagement to create pseudonymes.| +| MAGICPL_MAINZELLISTE_API_KEY | Random String |The apiKey used by the local id-manager to communicate with the local patientlist| +| MAGICPL_API_KEY_CONNECTOR | Random String |The apiKey used by the connector to communicate with the local patientlist| +| MAGICPL_MAINZELLISTE_CENTRAL_API_KEY | You need to ask the central patientlists admin for this. |The apiKey for your machine to communicate with the central patientlist| +| MAGICPL_CENTRAL_API_KEY | You need to ask the central controlnumbergenerator admin for this. |The apiKey for your machine to communicate with the central controlnumbergenerator| +| MAGICPL_OIDC_CLIENT_ID || The client id used for your machine, to connect with the central authentication service | +| MAGICPL_OIDC_CLIENT_SECRET || The client secret used for your machine, to connect with the central authentication service | + +### Cooperatively Managed Secrets + +> TODO: Describe secrets from site-config + +## Managing your Bridgehead + +> TODO: Rewrite this section (restart, stop, uninstall, manual updates) + +### On a Server + +#### Start + +This will start a not running bridgehead system unit: +``` shell +sudo systemctl start bridgehead@ +``` + +#### Stop + +This will stop a running bridgehead system unit: +``` shell +sudo systemctl stop bridgehead@ +``` + +#### Update + +This will update bridgehead system unit: +``` shell +sudo systemctl start bridgehead-update@ +``` + +#### Remove the Bridgehead System Units + +If, for some reason you want to remove the installed bridgehead units, we added a [script](./lib/remove-bridgehead-units.sh) you can execute: +``` shell +sudo ./lib/remove-bridgehead-units.sh +``` + +### On Developers Machine + +For developers, we provide additional scripts for starting and stopping the specif bridgehead: + +#### Start + +This shell script start a specified bridgehead. Choose between "dktk", "c4" and "gbn". +``` shell +./start-bridgehead +``` + +#### Stop + +This shell script stops a specified bridgehead. Choose between "dktk", "c4" and "gbn". +``` shell +./stop-bridgehead +``` + +#### Update + +This shell script updates the configuration for all bridgeheads installed on your system. +``` shell +./update-bridgehead +``` +> NOTE: If you want to regularly update your developing instance, you can create a CRON job that executes this script. + +## Migration Guide + +> TODO: How to transfer from windows/gbn + +## Pitfalls + +### [Git Proxy Configuration](https://gist.github.com/evantoli/f8c23a37eb3558ab8765) + +Unlike most other tools, git doesn't use the default proxy variables "http_proxy" and "https_proxy". To make git use a proxy, you will need to adjust the global git configuration: + +``` shell +sudo git config --global http.proxy http://:; +sudo git config --global https.proxy http://:; +``` +> NOTE: Some proxies may require user and password authentication. You can adjust the settings like this: "http://:@:". +> NOTE: It is also possible that a proxy requires https protocol, so you can replace this to. + +You can check that the updated configuration with + +``` shell +sudo git config --global --list; +``` + +### Docker Daemon Proxy Configuration + +Docker has a background daemon, responsible for downloading images and starting them. To configure the proxy for this daemon, use the systemctl command: + +``` shell +sudo systemctl edit docker +``` + +This will open your default editor allowing you to edit the docker system units configuration. Insert the following lines in the editor, replace and with the corresponding values for your machine and save the file: +``` conf +[Service] +Environment=HTTP_PROXY=http://: +Environment=HTTPS_PROXY=http://: +Environment=FTP_PROXY=http://: +``` +> NOTE: Some proxies may require user and password authentication. You can adjust the settings like this: "http://:@:". +> NOTE: It is also possible that a proxy requires https protocol, so you can replace this to. + +The file should now be at the location "/etc/systemd/system/docker.service.d/override.conf". You can proof check with +``` shell +cat /etc/systemd/system/docker.service.d/override.conf; +``` + +To make the configuration effective, you need to tell systemd to reload the configuration and restart the docker service: + +``` shell +sudo systemctl daemon-reload; +sudo systemctl restart docker; +``` + +## License + +Copyright 2019 - 2022 The Samply Community + +Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at + +http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License. diff --git a/dktk-fed/docker-compose.yml b/dktk-fed/docker-compose.yml index 3fbd00b..96d01a7 100644 --- a/dktk-fed/docker-compose.yml +++ b/dktk-fed/docker-compose.yml @@ -7,9 +7,11 @@ services: command: - --api.insecure=true - --entrypoints.web.address=:80 - - --entrypoints.web-secure.address=:443 + - --entrypoints.websecure.address=:443 - --providers.docker=true - --providers.file.directory=/configuration/ + - --entrypoints.web.http.redirections.entrypoint.to=websecure + - --entrypoints.web.http.redirections.entrypoint.scheme=https - --providers.file.watch=true ports: - 80:80 @@ -50,7 +52,9 @@ services: - "traefik.http.routers.blaze_dktk.rule=PathPrefix(`/dktk-localdatamanagement`)" - "traefik.http.middlewares.dktk_b_strip.stripprefix.prefixes=/dktk-localdatamanagement" - "traefik.http.services.blaze_dktk.loadbalancer.server.port=8080" - - "traefik.http.routers.blaze_dktk.middlewares=dktk_b_strip,test-auth" + - "traefik.http.routers.blaze_dktk.middlewares=dktk_b_strip,test-auth" + - "traefik.http.routers.blaze_dktk.tls=true" + volumes: blaze-data: diff --git a/lib/prerequisites.sh b/lib/prerequisites.sh index 05a4c59..65ec9e6 100755 --- a/lib/prerequisites.sh +++ b/lib/prerequisites.sh @@ -4,7 +4,7 @@ ## Check if user is a su echo "Welcome to the starting a bridgehead. We will get your instance up and running in no time" echo "First we will check if all prerequisites are met ..." -prerequisites="git docker docker-compose cat" +prerequisites="git docker docker-compose" for prerequisite in $prerequisites; do $prerequisite --version 2>&1 is_available=$? diff --git a/site-config b/site-config new file mode 160000 index 0000000..5636215 --- /dev/null +++ b/site-config @@ -0,0 +1 @@ +Subproject commit 56362155d1a849d8ea36f2ac750427353e37d109