mirror of
https://github.com/samply/bridgehead.git
synced 2025-06-16 23:00:15 +02:00
Compare commits
1 Commits
Threated-p
...
revert-223
Author | SHA1 | Date | |
---|---|---|---|
5fc9e01652 |
1
.github/CODEOWNERS
vendored
1
.github/CODEOWNERS
vendored
@ -1 +0,0 @@
|
|||||||
@samply/bridgehead-developers
|
|
39
.github/scripts/rename_inactive_branches.py
vendored
39
.github/scripts/rename_inactive_branches.py
vendored
@ -1,39 +0,0 @@
|
|||||||
import os
|
|
||||||
import requests
|
|
||||||
from datetime import datetime, timedelta
|
|
||||||
|
|
||||||
# Configuration
|
|
||||||
GITHUB_TOKEN = os.getenv('GITHUB_TOKEN')
|
|
||||||
REPO = 'samply/bridgehead'
|
|
||||||
HEADERS = {'Authorization': f'token {GITHUB_TOKEN}', 'Accept': 'application/vnd.github.v3+json'}
|
|
||||||
API_URL = f'https://api.github.com/repos/{REPO}/branches'
|
|
||||||
INACTIVE_DAYS = 365
|
|
||||||
CUTOFF_DATE = datetime.now() - timedelta(days=INACTIVE_DAYS)
|
|
||||||
|
|
||||||
# Fetch all branches
|
|
||||||
def get_branches():
|
|
||||||
response = requests.get(API_URL, headers=HEADERS)
|
|
||||||
response.raise_for_status()
|
|
||||||
return response.json() if response.status_code == 200 else []
|
|
||||||
|
|
||||||
# Rename inactive branches
|
|
||||||
def rename_branch(old_name, new_name):
|
|
||||||
rename_url = f'https://api.github.com/repos/{REPO}/branches/{old_name}/rename'
|
|
||||||
response = requests.post(rename_url, json={'new_name': new_name}, headers=HEADERS)
|
|
||||||
response.raise_for_status()
|
|
||||||
print(f"Renamed branch {old_name} to {new_name}" if response.status_code == 201 else f"Failed to rename {old_name}: {response.status_code}")
|
|
||||||
|
|
||||||
# Check if the branch is inactive
|
|
||||||
def is_inactive(commit_url):
|
|
||||||
last_commit_date = requests.get(commit_url, headers=HEADERS).json()['commit']['committer']['date']
|
|
||||||
return datetime.strptime(last_commit_date, '%Y-%m-%dT%H:%M:%SZ') < CUTOFF_DATE
|
|
||||||
|
|
||||||
# Rename inactive branches
|
|
||||||
def main():
|
|
||||||
for branch in get_branches():
|
|
||||||
if is_inactive(branch['commit']['url']):
|
|
||||||
#rename_branch(branch['name'], f"archived/{branch['name']}")
|
|
||||||
print(f"[LOG] Branch '{branch['name']}' is inactive and would be renamed to 'archived/{branch['name']}'")
|
|
||||||
|
|
||||||
if __name__ == "__main__":
|
|
||||||
main()
|
|
27
.github/workflows/rename-inactive-branches.yml
vendored
27
.github/workflows/rename-inactive-branches.yml
vendored
@ -1,27 +0,0 @@
|
|||||||
name: Cleanup - Rename Inactive Branches
|
|
||||||
|
|
||||||
on:
|
|
||||||
schedule:
|
|
||||||
- cron: '0 0 * * 0' # Runs every Sunday at midnight
|
|
||||||
|
|
||||||
jobs:
|
|
||||||
archive-stale-branches:
|
|
||||||
runs-on: ubuntu-latest
|
|
||||||
|
|
||||||
steps:
|
|
||||||
- name: Checkout Repository
|
|
||||||
uses: actions/checkout@v2
|
|
||||||
|
|
||||||
- name: Set up Python
|
|
||||||
uses: actions/setup-python@v2
|
|
||||||
with:
|
|
||||||
python-version: '3.x'
|
|
||||||
|
|
||||||
- name: Install Libraries
|
|
||||||
run: pip install requests
|
|
||||||
|
|
||||||
- name: Run Script to Rename Inactive Branches
|
|
||||||
run: |
|
|
||||||
python .github/scripts/rename_inactive_branches.py
|
|
||||||
env:
|
|
||||||
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}
|
|
2
LICENSE
2
LICENSE
@ -1,4 +1,4 @@
|
|||||||
Apache License test
|
Apache License
|
||||||
Version 2.0, January 2004
|
Version 2.0, January 2004
|
||||||
http://www.apache.org/licenses/
|
http://www.apache.org/licenses/
|
||||||
|
|
||||||
|
@ -76,7 +76,7 @@ The following URLs need to be accessible (prefix with `https://`):
|
|||||||
* git.verbis.dkfz.de
|
* git.verbis.dkfz.de
|
||||||
* To fetch docker images
|
* To fetch docker images
|
||||||
* docker.verbis.dkfz.de
|
* docker.verbis.dkfz.de
|
||||||
* Official Docker, Inc. URLs (subject to change, see [official list](https://docs.docker.com/desktop/setup/allow-list/))
|
* Official Docker, Inc. URLs (subject to change, see [official list](https://docs.docker.com/desktop/all))
|
||||||
* hub.docker.com
|
* hub.docker.com
|
||||||
* registry-1.docker.io
|
* registry-1.docker.io
|
||||||
* production.cloudflare.docker.com
|
* production.cloudflare.docker.com
|
||||||
@ -154,7 +154,7 @@ Pay special attention to:
|
|||||||
Clone the bridgehead repository:
|
Clone the bridgehead repository:
|
||||||
```shell
|
```shell
|
||||||
sudo mkdir -p /srv/docker/
|
sudo mkdir -p /srv/docker/
|
||||||
sudo git clone -b main https://github.com/samply/bridgehead.git /srv/docker/bridgehead
|
sudo git clone https://github.com/samply/bridgehead.git /srv/docker/bridgehead
|
||||||
```
|
```
|
||||||
|
|
||||||
Then, run the installation script:
|
Then, run the installation script:
|
||||||
@ -254,8 +254,6 @@ sh bridgehead uninstall
|
|||||||
|
|
||||||
## Site-specific configuration
|
## Site-specific configuration
|
||||||
|
|
||||||
[How to Change Config Access Token](docs/update-access-token.md)
|
|
||||||
|
|
||||||
### HTTPS Access
|
### HTTPS Access
|
||||||
|
|
||||||
Even within your internal network, the Bridgehead enforces HTTPS for all services. During the installation, a self-signed, long-lived certificate was created for you. To increase security, you can simply replace the files under `/etc/bridgehead/traefik-tls` with ones from established certification authorities such as [Let's Encrypt](https://letsencrypt.org) or [DFN-AAI](https://www.aai.dfn.de).
|
Even within your internal network, the Bridgehead enforces HTTPS for all services. During the installation, a self-signed, long-lived certificate was created for you. To increase security, you can simply replace the files under `/etc/bridgehead/traefik-tls` with ones from established certification authorities such as [Let's Encrypt](https://letsencrypt.org) or [DFN-AAI](https://www.aai.dfn.de).
|
||||||
|
@ -4,14 +4,13 @@ version: "3.7"
|
|||||||
|
|
||||||
services:
|
services:
|
||||||
blaze:
|
blaze:
|
||||||
image: docker.verbis.dkfz.de/cache/samply/blaze:0.31
|
image: docker.verbis.dkfz.de/cache/samply/blaze:0.28
|
||||||
container_name: bridgehead-bbmri-blaze
|
container_name: bridgehead-bbmri-blaze
|
||||||
environment:
|
environment:
|
||||||
BASE_URL: "http://bridgehead-bbmri-blaze:8080"
|
BASE_URL: "http://bridgehead-bbmri-blaze:8080"
|
||||||
JAVA_TOOL_OPTIONS: "-Xmx${BLAZE_MEMORY_CAP:-4096}m"
|
JAVA_TOOL_OPTIONS: "-Xmx${BLAZE_MEMORY_CAP:-4096}m"
|
||||||
DB_RESOURCE_CACHE_SIZE: ${BLAZE_RESOURCE_CACHE_CAP:-2500000}
|
DB_RESOURCE_CACHE_SIZE: ${BLAZE_RESOURCE_CACHE_CAP:-2500000}
|
||||||
DB_BLOCK_CACHE_SIZE: ${BLAZE_MEMORY_CAP}
|
DB_BLOCK_CACHE_SIZE: $BLAZE_MEMORY_CAP
|
||||||
CQL_EXPR_CACHE_SIZE: ${BLAZE_CQL_CACHE_CAP:-32}
|
|
||||||
ENFORCE_REFERENTIAL_INTEGRITY: "false"
|
ENFORCE_REFERENTIAL_INTEGRITY: "false"
|
||||||
volumes:
|
volumes:
|
||||||
- "blaze-data:/app/data"
|
- "blaze-data:/app/data"
|
||||||
|
@ -2,7 +2,7 @@ version: "3.7"
|
|||||||
|
|
||||||
services:
|
services:
|
||||||
focus-eric:
|
focus-eric:
|
||||||
image: docker.verbis.dkfz.de/cache/samply/focus:${FOCUS_TAG}-bbmri
|
image: docker.verbis.dkfz.de/cache/samply/focus:${FOCUS_TAG}
|
||||||
container_name: bridgehead-focus-eric
|
container_name: bridgehead-focus-eric
|
||||||
environment:
|
environment:
|
||||||
API_KEY: ${ERIC_FOCUS_BEAM_SECRET_SHORT}
|
API_KEY: ${ERIC_FOCUS_BEAM_SECRET_SHORT}
|
||||||
|
@ -2,7 +2,7 @@ version: "3.7"
|
|||||||
|
|
||||||
services:
|
services:
|
||||||
focus-gbn:
|
focus-gbn:
|
||||||
image: docker.verbis.dkfz.de/cache/samply/focus:${FOCUS_TAG}-bbmri
|
image: docker.verbis.dkfz.de/cache/samply/focus:${FOCUS_TAG}
|
||||||
container_name: bridgehead-focus-gbn
|
container_name: bridgehead-focus-gbn
|
||||||
environment:
|
environment:
|
||||||
API_KEY: ${GBN_FOCUS_BEAM_SECRET_SHORT}
|
API_KEY: ${GBN_FOCUS_BEAM_SECRET_SHORT}
|
||||||
|
55
bridgehead
55
bridgehead
@ -38,12 +38,6 @@ case "$PROJECT" in
|
|||||||
itcc)
|
itcc)
|
||||||
#nothing extra to do
|
#nothing extra to do
|
||||||
;;
|
;;
|
||||||
kr)
|
|
||||||
#nothing extra to do
|
|
||||||
;;
|
|
||||||
dhki)
|
|
||||||
#nothing extra to do
|
|
||||||
;;
|
|
||||||
minimal)
|
minimal)
|
||||||
#nothing extra to do
|
#nothing extra to do
|
||||||
;;
|
;;
|
||||||
@ -53,44 +47,17 @@ case "$PROJECT" in
|
|||||||
;;
|
;;
|
||||||
esac
|
esac
|
||||||
|
|
||||||
# Loads config variables and runs the projects setup script
|
|
||||||
loadVars() {
|
loadVars() {
|
||||||
|
# Load variables from /etc/bridgehead and /srv/docker/bridgehead
|
||||||
set -a
|
set -a
|
||||||
# Source the project specific config file
|
|
||||||
source /etc/bridgehead/$PROJECT.conf || fail_and_report 1 "/etc/bridgehead/$PROJECT.conf not found"
|
source /etc/bridgehead/$PROJECT.conf || fail_and_report 1 "/etc/bridgehead/$PROJECT.conf not found"
|
||||||
# Source the project specific local config file if present
|
|
||||||
# This file is ignored by git as oposed to the regular config file as it contains private site information like etl auth data
|
|
||||||
if [ -e /etc/bridgehead/$PROJECT.local.conf ]; then
|
if [ -e /etc/bridgehead/$PROJECT.local.conf ]; then
|
||||||
log INFO "Applying /etc/bridgehead/$PROJECT.local.conf"
|
log INFO "Applying /etc/bridgehead/$PROJECT.local.conf"
|
||||||
source /etc/bridgehead/$PROJECT.local.conf || fail_and_report 1 "Found /etc/bridgehead/$PROJECT.local.conf but failed to import"
|
source /etc/bridgehead/$PROJECT.local.conf || fail_and_report 1 "Found /etc/bridgehead/$PROJECT.local.conf but failed to import"
|
||||||
fi
|
fi
|
||||||
# Set execution environment on main default to prod else test
|
|
||||||
if [[ -z "${ENVIRONMENT+x}" ]]; then
|
|
||||||
if [ "$(git rev-parse --abbrev-ref HEAD)" == "main" ]; then
|
|
||||||
ENVIRONMENT="production"
|
|
||||||
else
|
|
||||||
ENVIRONMENT="test"
|
|
||||||
fi
|
|
||||||
fi
|
|
||||||
# Source the versions of the images components
|
|
||||||
case "$ENVIRONMENT" in
|
|
||||||
"production")
|
|
||||||
source ./versions/prod
|
|
||||||
;;
|
|
||||||
"test")
|
|
||||||
source ./versions/test
|
|
||||||
;;
|
|
||||||
*)
|
|
||||||
report_error 7 "Environment \"$ENVIRONMENT\" is unknown. Assuming production. FIX THIS!"
|
|
||||||
source ./versions/prod
|
|
||||||
;;
|
|
||||||
esac
|
|
||||||
fetchVarsFromVaultByFile /etc/bridgehead/$PROJECT.conf || fail_and_report 1 "Unable to fetchVarsFromVaultByFile"
|
fetchVarsFromVaultByFile /etc/bridgehead/$PROJECT.conf || fail_and_report 1 "Unable to fetchVarsFromVaultByFile"
|
||||||
setHostname
|
setHostname
|
||||||
optimizeBlazeMemoryUsage
|
optimizeBlazeMemoryUsage
|
||||||
# Run project specific setup if it exists
|
|
||||||
# This will ususally modiy the `OVERRIDE` to include all the compose files that the project depends on
|
|
||||||
# This is also where projects specify which modules to load
|
|
||||||
[ -e ./$PROJECT/vars ] && source ./$PROJECT/vars
|
[ -e ./$PROJECT/vars ] && source ./$PROJECT/vars
|
||||||
set +a
|
set +a
|
||||||
|
|
||||||
@ -106,6 +73,26 @@ loadVars() {
|
|||||||
fi
|
fi
|
||||||
detectCompose
|
detectCompose
|
||||||
setupProxy
|
setupProxy
|
||||||
|
|
||||||
|
# Set some project-independent default values
|
||||||
|
: ${ENVIRONMENT:=production}
|
||||||
|
export ENVIRONMENT
|
||||||
|
|
||||||
|
case "$ENVIRONMENT" in
|
||||||
|
"production")
|
||||||
|
export FOCUS_TAG=main
|
||||||
|
export BEAM_TAG=main
|
||||||
|
;;
|
||||||
|
"test")
|
||||||
|
export FOCUS_TAG=develop
|
||||||
|
export BEAM_TAG=develop
|
||||||
|
;;
|
||||||
|
*)
|
||||||
|
report_error 7 "Environment \"$ENVIRONMENT\" is unknown. Assuming production. FIX THIS!"
|
||||||
|
export FOCUS_TAG=main
|
||||||
|
export BEAM_TAG=main
|
||||||
|
;;
|
||||||
|
esac
|
||||||
}
|
}
|
||||||
|
|
||||||
case "$ACTION" in
|
case "$ACTION" in
|
||||||
|
@ -2,7 +2,7 @@ version: "3.7"
|
|||||||
|
|
||||||
services:
|
services:
|
||||||
blaze:
|
blaze:
|
||||||
image: docker.verbis.dkfz.de/cache/samply/blaze:0.31
|
image: docker.verbis.dkfz.de/cache/samply/blaze:0.28
|
||||||
container_name: bridgehead-cce-blaze
|
container_name: bridgehead-cce-blaze
|
||||||
environment:
|
environment:
|
||||||
BASE_URL: "http://bridgehead-cce-blaze:8080"
|
BASE_URL: "http://bridgehead-cce-blaze:8080"
|
||||||
|
@ -3,11 +3,6 @@ services:
|
|||||||
landing:
|
landing:
|
||||||
container_name: lens_federated-search
|
container_name: lens_federated-search
|
||||||
image: docker.verbis.dkfz.de/ccp/lens:${SITE_ID}
|
image: docker.verbis.dkfz.de/ccp/lens:${SITE_ID}
|
||||||
labels:
|
|
||||||
- "traefik.enable=true"
|
|
||||||
- "traefik.http.routers.landing.rule=PathPrefix(`/`)"
|
|
||||||
- "traefik.http.services.landing.loadbalancer.server.port=80"
|
|
||||||
- "traefik.http.routers.landing.tls=true"
|
|
||||||
|
|
||||||
spot:
|
spot:
|
||||||
image: docker.verbis.dkfz.de/ccp-private/central-spot
|
image: docker.verbis.dkfz.de/ccp-private/central-spot
|
||||||
|
@ -2,4 +2,5 @@
|
|||||||
|
|
||||||
if [ -n "$ENABLE_LENS" ];then
|
if [ -n "$ENABLE_LENS" ];then
|
||||||
OVERRIDE+=" -f ./$PROJECT/modules/lens-compose.yml"
|
OVERRIDE+=" -f ./$PROJECT/modules/lens-compose.yml"
|
||||||
fi
|
fi
|
||||||
|
}
|
2
cce/vars
2
cce/vars
@ -3,7 +3,7 @@ BROKER_URL=https://${BROKER_ID}
|
|||||||
PROXY_ID=${SITE_ID}.${BROKER_ID}
|
PROXY_ID=${SITE_ID}.${BROKER_ID}
|
||||||
FOCUS_BEAM_SECRET_SHORT="$(cat /proc/sys/kernel/random/uuid | sed 's/[-]//g' | head -c 20)"
|
FOCUS_BEAM_SECRET_SHORT="$(cat /proc/sys/kernel/random/uuid | sed 's/[-]//g' | head -c 20)"
|
||||||
FOCUS_RETRY_COUNT=${FOCUS_RETRY_COUNT:-64}
|
FOCUS_RETRY_COUNT=${FOCUS_RETRY_COUNT:-64}
|
||||||
SUPPORT_EMAIL=manoj.waikar@dkfz-heidelberg.de
|
SUPPORT_EMAIL=arturo.macias@dkfz-heidelberg.de
|
||||||
PRIVATEKEYFILENAME=/etc/bridgehead/pki/${SITE_ID}.priv.pem
|
PRIVATEKEYFILENAME=/etc/bridgehead/pki/${SITE_ID}.priv.pem
|
||||||
BROKER_URL_FOR_PREREQ=$BROKER_URL
|
BROKER_URL_FOR_PREREQ=$BROKER_URL
|
||||||
|
|
||||||
|
@ -2,14 +2,13 @@ version: "3.7"
|
|||||||
|
|
||||||
services:
|
services:
|
||||||
blaze:
|
blaze:
|
||||||
image: docker.verbis.dkfz.de/cache/samply/blaze:0.31
|
image: docker.verbis.dkfz.de/cache/samply/blaze:0.28
|
||||||
container_name: bridgehead-ccp-blaze
|
container_name: bridgehead-ccp-blaze
|
||||||
environment:
|
environment:
|
||||||
BASE_URL: "http://bridgehead-ccp-blaze:8080"
|
BASE_URL: "http://bridgehead-ccp-blaze:8080"
|
||||||
JAVA_TOOL_OPTIONS: "-Xmx${BLAZE_MEMORY_CAP:-4096}m"
|
JAVA_TOOL_OPTIONS: "-Xmx${BLAZE_MEMORY_CAP:-4096}m"
|
||||||
DB_RESOURCE_CACHE_SIZE: ${BLAZE_RESOURCE_CACHE_CAP:-2500000}
|
DB_RESOURCE_CACHE_SIZE: ${BLAZE_RESOURCE_CACHE_CAP:-2500000}
|
||||||
DB_BLOCK_CACHE_SIZE: ${BLAZE_MEMORY_CAP}
|
DB_BLOCK_CACHE_SIZE: $BLAZE_MEMORY_CAP
|
||||||
CQL_EXPR_CACHE_SIZE: ${BLAZE_CQL_CACHE_CAP:-32}
|
|
||||||
ENFORCE_REFERENTIAL_INTEGRITY: "false"
|
ENFORCE_REFERENTIAL_INTEGRITY: "false"
|
||||||
volumes:
|
volumes:
|
||||||
- "blaze-data:/app/data"
|
- "blaze-data:/app/data"
|
||||||
@ -22,7 +21,7 @@ services:
|
|||||||
- "traefik.http.routers.blaze_ccp.tls=true"
|
- "traefik.http.routers.blaze_ccp.tls=true"
|
||||||
|
|
||||||
focus:
|
focus:
|
||||||
image: docker.verbis.dkfz.de/cache/samply/focus:${FOCUS_TAG}-dktk
|
image: docker.verbis.dkfz.de/cache/samply/focus:${FOCUS_TAG}
|
||||||
container_name: bridgehead-focus
|
container_name: bridgehead-focus
|
||||||
environment:
|
environment:
|
||||||
API_KEY: ${FOCUS_BEAM_SECRET_SHORT}
|
API_KEY: ${FOCUS_BEAM_SECRET_SHORT}
|
||||||
@ -33,7 +32,6 @@ services:
|
|||||||
RETRY_COUNT: ${FOCUS_RETRY_COUNT}
|
RETRY_COUNT: ${FOCUS_RETRY_COUNT}
|
||||||
EPSILON: 0.28
|
EPSILON: 0.28
|
||||||
QUERIES_TO_CACHE: '/queries_to_cache.conf'
|
QUERIES_TO_CACHE: '/queries_to_cache.conf'
|
||||||
ENDPOINT_TYPE: ${FOCUS_ENDPOINT_TYPE:-blaze}
|
|
||||||
volumes:
|
volumes:
|
||||||
- /srv/docker/bridgehead/ccp/queries_to_cache.conf:/queries_to_cache.conf
|
- /srv/docker/bridgehead/ccp/queries_to_cache.conf:/queries_to_cache.conf
|
||||||
depends_on:
|
depends_on:
|
||||||
@ -59,6 +57,7 @@ services:
|
|||||||
- /etc/bridgehead/trusted-ca-certs:/conf/trusted-ca-certs:ro
|
- /etc/bridgehead/trusted-ca-certs:/conf/trusted-ca-certs:ro
|
||||||
- /srv/docker/bridgehead/ccp/root.crt.pem:/conf/root.crt.pem:ro
|
- /srv/docker/bridgehead/ccp/root.crt.pem:/conf/root.crt.pem:ro
|
||||||
|
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
blaze-data:
|
blaze-data:
|
||||||
|
|
||||||
|
@ -2,7 +2,7 @@ version: "3.7"
|
|||||||
|
|
||||||
services:
|
services:
|
||||||
blaze-secondary:
|
blaze-secondary:
|
||||||
image: docker.verbis.dkfz.de/cache/samply/blaze:0.31
|
image: docker.verbis.dkfz.de/cache/samply/blaze:0.28
|
||||||
container_name: bridgehead-ccp-blaze-secondary
|
container_name: bridgehead-ccp-blaze-secondary
|
||||||
environment:
|
environment:
|
||||||
BASE_URL: "http://bridgehead-ccp-blaze-secondary:8080"
|
BASE_URL: "http://bridgehead-ccp-blaze-secondary:8080"
|
||||||
|
@ -151,7 +151,7 @@ services:
|
|||||||
--pass-access-token=false
|
--pass-access-token=false
|
||||||
labels:
|
labels:
|
||||||
- "traefik.enable=true"
|
- "traefik.enable=true"
|
||||||
- "traefik.http.routers.oauth2_proxy.rule=PathPrefix(`/oauth2`)"
|
- "traefik.http.routers.oauth2_proxy.rule=Host(`${HOST}`) && PathPrefix(`/oauth2`)"
|
||||||
- "traefik.http.services.oauth2_proxy.loadbalancer.server.port=4180"
|
- "traefik.http.services.oauth2_proxy.loadbalancer.server.port=4180"
|
||||||
- "traefik.http.routers.oauth2_proxy.tls=true"
|
- "traefik.http.routers.oauth2_proxy.tls=true"
|
||||||
environment:
|
environment:
|
||||||
|
@ -13,7 +13,7 @@ services:
|
|||||||
PROXY_APIKEY: ${DNPM_BEAM_SECRET_SHORT}
|
PROXY_APIKEY: ${DNPM_BEAM_SECRET_SHORT}
|
||||||
APP_ID: dnpm-connect.${PROXY_ID}
|
APP_ID: dnpm-connect.${PROXY_ID}
|
||||||
DISCOVERY_URL: "./conf/central_targets.json"
|
DISCOVERY_URL: "./conf/central_targets.json"
|
||||||
LOCAL_TARGETS_FILE: "/conf/connect_targets.json"
|
LOCAL_TARGETS_FILE: "./conf/connect_targets.json"
|
||||||
HTTP_PROXY: "http://forward_proxy:3128"
|
HTTP_PROXY: "http://forward_proxy:3128"
|
||||||
HTTPS_PROXY: "http://forward_proxy:3128"
|
HTTPS_PROXY: "http://forward_proxy:3128"
|
||||||
NO_PROXY: beam-proxy,dnpm-backend,host.docker.internal${DNPM_ADDITIONAL_NO_PROXY}
|
NO_PROXY: beam-proxy,dnpm-backend,host.docker.internal${DNPM_ADDITIONAL_NO_PROXY}
|
||||||
@ -25,7 +25,7 @@ services:
|
|||||||
volumes:
|
volumes:
|
||||||
- /etc/bridgehead/trusted-ca-certs:/conf/trusted-ca-certs:ro
|
- /etc/bridgehead/trusted-ca-certs:/conf/trusted-ca-certs:ro
|
||||||
- /etc/bridgehead/dnpm/local_targets.json:/conf/connect_targets.json:ro
|
- /etc/bridgehead/dnpm/local_targets.json:/conf/connect_targets.json:ro
|
||||||
- /srv/docker/bridgehead/minimal/modules/dnpm-central-targets.json:/conf/central_targets.json:ro
|
- /etc/bridgehead/dnpm/central_targets.json:/conf/central_targets.json:ro
|
||||||
labels:
|
labels:
|
||||||
- "traefik.enable=true"
|
- "traefik.enable=true"
|
||||||
- "traefik.http.routers.dnpm-connect.rule=PathPrefix(`/dnpm-connect`)"
|
- "traefik.http.routers.dnpm-connect.rule=PathPrefix(`/dnpm-connect`)"
|
||||||
|
@ -1,99 +1,34 @@
|
|||||||
version: "3.7"
|
version: "3.7"
|
||||||
|
|
||||||
services:
|
services:
|
||||||
dnpm-mysql:
|
|
||||||
image: mysql:9
|
|
||||||
healthcheck:
|
|
||||||
test: [ "CMD", "mysqladmin" ,"ping", "-h", "localhost" ]
|
|
||||||
interval: 3s
|
|
||||||
timeout: 5s
|
|
||||||
retries: 5
|
|
||||||
environment:
|
|
||||||
MYSQL_ROOT_HOST: "%"
|
|
||||||
MYSQL_ROOT_PASSWORD: ${DNPM_MYSQL_ROOT_PASSWORD}
|
|
||||||
volumes:
|
|
||||||
- /var/cache/bridgehead/dnpm/mysql:/var/lib/mysql
|
|
||||||
|
|
||||||
dnpm-authup:
|
|
||||||
image: authup/authup:latest
|
|
||||||
container_name: bridgehead-dnpm-authup
|
|
||||||
volumes:
|
|
||||||
- /var/cache/bridgehead/dnpm/authup:/usr/src/app/writable
|
|
||||||
depends_on:
|
|
||||||
dnpm-mysql:
|
|
||||||
condition: service_healthy
|
|
||||||
command: server/core start
|
|
||||||
environment:
|
|
||||||
- PUBLIC_URL=https://${HOST}/auth/
|
|
||||||
- AUTHORIZE_REDIRECT_URL=https://${HOST}
|
|
||||||
- ROBOT_ADMIN_ENABLED=true
|
|
||||||
- ROBOT_ADMIN_SECRET=${DNPM_AUTHUP_SECRET}
|
|
||||||
- ROBOT_ADMIN_SECRET_RESET=true
|
|
||||||
- DB_TYPE=mysql
|
|
||||||
- DB_HOST=dnpm-mysql
|
|
||||||
- DB_USERNAME=root
|
|
||||||
- DB_PASSWORD=${DNPM_MYSQL_ROOT_PASSWORD}
|
|
||||||
- DB_DATABASE=auth
|
|
||||||
labels:
|
|
||||||
- "traefik.enable=true"
|
|
||||||
- "traefik.http.middlewares.authup-strip.stripprefix.prefixes=/auth"
|
|
||||||
- "traefik.http.routers.dnpm-auth.middlewares=authup-strip"
|
|
||||||
- "traefik.http.routers.dnpm-auth.rule=PathPrefix(`/auth`)"
|
|
||||||
- "traefik.http.services.dnpm-auth.loadbalancer.server.port=3000"
|
|
||||||
- "traefik.http.routers.dnpm-auth.tls=true"
|
|
||||||
|
|
||||||
dnpm-portal:
|
|
||||||
image: ghcr.io/dnpm-dip/portal:latest
|
|
||||||
container_name: bridgehead-dnpm-portal
|
|
||||||
environment:
|
|
||||||
- NUXT_API_URL=http://dnpm-backend:9000/
|
|
||||||
- NUXT_PUBLIC_API_URL=https://${HOST}/api/
|
|
||||||
- NUXT_AUTHUP_URL=http://dnpm-authup:3000/
|
|
||||||
- NUXT_PUBLIC_AUTHUP_URL=https://${HOST}/auth/
|
|
||||||
labels:
|
|
||||||
- "traefik.enable=true"
|
|
||||||
- "traefik.http.routers.dnpm-frontend.rule=PathPrefix(`/`)"
|
|
||||||
- "traefik.http.services.dnpm-frontend.loadbalancer.server.port=3000"
|
|
||||||
- "traefik.http.routers.dnpm-frontend.tls=true"
|
|
||||||
|
|
||||||
dnpm-backend:
|
dnpm-backend:
|
||||||
|
image: ghcr.io/kohlbacherlab/bwhc-backend:1.0-snapshot-broker-connector
|
||||||
container_name: bridgehead-dnpm-backend
|
container_name: bridgehead-dnpm-backend
|
||||||
image: ghcr.io/dnpm-dip/backend:latest
|
|
||||||
environment:
|
environment:
|
||||||
- LOCAL_SITE=${ZPM_SITE}:${SITE_NAME} # Format: {Site-ID}:{Site-name}, e.g. UKT:Tübingen
|
- ZPM_SITE=${ZPM_SITE}
|
||||||
- RD_RANDOM_DATA=${DNPM_SYNTH_NUM:--1}
|
- N_RANDOM_FILES=${DNPM_SYNTH_NUM}
|
||||||
- MTB_RANDOM_DATA=${DNPM_SYNTH_NUM:--1}
|
|
||||||
- HATEOAS_HOST=https://${HOST}
|
|
||||||
- CONNECTOR_TYPE=broker
|
|
||||||
- AUTHUP_URL=robot://system:${DNPM_AUTHUP_SECRET}@http://dnpm-authup:3000
|
|
||||||
volumes:
|
volumes:
|
||||||
- /etc/bridgehead/dnpm/config:/dnpm_config
|
- /etc/bridgehead/dnpm:/bwhc_config:ro
|
||||||
- /var/cache/bridgehead/dnpm/backend-data:/dnpm_data
|
- ${DNPM_DATA_DIR}:/bwhc_data
|
||||||
depends_on:
|
|
||||||
dnpm-authup:
|
|
||||||
condition: service_healthy
|
|
||||||
labels:
|
labels:
|
||||||
- "traefik.enable=true"
|
- "traefik.enable=true"
|
||||||
- "traefik.http.services.dnpm-backend.loadbalancer.server.port=9000"
|
- "traefik.http.routers.bwhc-backend.rule=PathPrefix(`/bwhc`)"
|
||||||
# expose everything
|
- "traefik.http.services.bwhc-backend.loadbalancer.server.port=9000"
|
||||||
- "traefik.http.routers.dnpm-backend.rule=PathPrefix(`/api`)"
|
- "traefik.http.routers.bwhc-backend.tls=true"
|
||||||
- "traefik.http.routers.dnpm-backend.tls=true"
|
|
||||||
- "traefik.http.routers.dnpm-backend.service=dnpm-backend"
|
|
||||||
# except ETL
|
|
||||||
- "traefik.http.routers.dnpm-backend-etl.rule=PathRegexp(`^/api(/.*)?etl(/.*)?$`)"
|
|
||||||
- "traefik.http.routers.dnpm-backend-etl.tls=true"
|
|
||||||
- "traefik.http.routers.dnpm-backend-etl.service=dnpm-backend"
|
|
||||||
# this needs an ETL processor with support for basic auth
|
|
||||||
- "traefik.http.routers.dnpm-backend-etl.middlewares=auth"
|
|
||||||
# except peer-to-peer
|
|
||||||
- "traefik.http.routers.dnpm-backend-peer.rule=PathRegexp(`^/api(/.*)?/peer2peer(/.*)?$`)"
|
|
||||||
- "traefik.http.routers.dnpm-backend-peer.tls=true"
|
|
||||||
- "traefik.http.routers.dnpm-backend-peer.service=dnpm-backend"
|
|
||||||
- "traefik.http.routers.dnpm-backend-peer.middlewares=dnpm-backend-peer"
|
|
||||||
# this effectively denies all requests
|
|
||||||
# this is okay, because requests from peers don't go through Traefik
|
|
||||||
- "traefik.http.middlewares.dnpm-backend-peer.ipWhiteList.sourceRange=0.0.0.0/32"
|
|
||||||
|
|
||||||
landing:
|
dnpm-frontend:
|
||||||
|
image: ghcr.io/kohlbacherlab/bwhc-frontend:2209
|
||||||
|
container_name: bridgehead-dnpm-frontend
|
||||||
|
links:
|
||||||
|
- dnpm-backend
|
||||||
|
environment:
|
||||||
|
- NUXT_HOST=0.0.0.0
|
||||||
|
- NUXT_PORT=8080
|
||||||
|
- BACKEND_PROTOCOL=https
|
||||||
|
- BACKEND_HOSTNAME=$HOST
|
||||||
|
- BACKEND_PORT=443
|
||||||
labels:
|
labels:
|
||||||
- "traefik.http.routers.landing.rule=PathPrefix(`/landing`)"
|
- "traefik.enable=true"
|
||||||
|
- "traefik.http.routers.bwhc-frontend.rule=PathPrefix(`/`)"
|
||||||
|
- "traefik.http.services.bwhc-frontend.loadbalancer.server.port=8080"
|
||||||
|
- "traefik.http.routers.bwhc-frontend.tls=true"
|
||||||
|
@ -1,16 +1,28 @@
|
|||||||
#!/bin/bash
|
#!/bin/bash
|
||||||
|
|
||||||
if [ -n "${ENABLE_DNPM_NODE}" ]; then
|
if [ -n "${ENABLE_DNPM_NODE}" ]; then
|
||||||
log INFO "DNPM setup detected -- will start DNPM:DIP node."
|
log INFO "DNPM setup detected (BwHC Node) -- will start BwHC node."
|
||||||
OVERRIDE+=" -f ./$PROJECT/modules/dnpm-node-compose.yml"
|
OVERRIDE+=" -f ./$PROJECT/modules/dnpm-node-compose.yml"
|
||||||
|
|
||||||
# Set variables required for BwHC Node. ZPM_SITE is assumed to be set in /etc/bridgehead/<project>.conf
|
# Set variables required for BwHC Node. ZPM_SITE is assumed to be set in /etc/bridgehead/<project>.conf
|
||||||
|
DNPM_APPLICATION_SECRET="$(echo \"This is a salt string to generate one consistent password for DNPM. It is not required to be secret.\" | sha1sum | openssl pkeyutl -sign -inkey /etc/bridgehead/pki/${SITE_ID}.priv.pem | base64 | head -c 30)"
|
||||||
if [ -z "${ZPM_SITE+x}" ]; then
|
if [ -z "${ZPM_SITE+x}" ]; then
|
||||||
log ERROR "Mandatory variable ZPM_SITE not defined!"
|
log ERROR "Mandatory variable ZPM_SITE not defined!"
|
||||||
exit 1
|
exit 1
|
||||||
fi
|
fi
|
||||||
mkdir -p /var/cache/bridgehead/dnpm/ || fail_and_report 1 "Failed to create '/var/cache/bridgehead/dnpm/'. Please run sudo './bridgehead install $PROJECT' again to fix the permissions."
|
if [ -z "${DNPM_DATA_DIR+x}" ]; then
|
||||||
DNPM_SYNTH_NUM=${DNPM_SYNTH_NUM:--1}
|
log ERROR "Mandatory variable DNPM_DATA_DIR not defined!"
|
||||||
DNPM_MYSQL_ROOT_PASSWORD="$(generate_simple_password 'dnpm mysql')"
|
exit 1
|
||||||
DNPM_AUTHUP_SECRET="$(generate_simple_password 'dnpm authup')"
|
fi
|
||||||
|
DNPM_SYNTH_NUM=${DNPM_SYNTH_NUM:-0}
|
||||||
|
if grep -q 'traefik.http.routers.landing.rule=PathPrefix(`/landing`)' /srv/docker/bridgehead/minimal/docker-compose.override.yml 2>/dev/null; then
|
||||||
|
echo "Override of landing page url already in place"
|
||||||
|
else
|
||||||
|
echo "Adding override of landing page url"
|
||||||
|
if [ -f /srv/docker/bridgehead/minimal/docker-compose.override.yml ]; then
|
||||||
|
echo -e ' landing:\n labels:\n - "traefik.http.routers.landing.rule=PathPrefix(`/landing`)"' >> /srv/docker/bridgehead/minimal/docker-compose.override.yml
|
||||||
|
else
|
||||||
|
echo -e 'version: "3.7"\nservices:\n landing:\n labels:\n - "traefik.http.routers.landing.rule=PathPrefix(`/landing`)"' >> /srv/docker/bridgehead/minimal/docker-compose.override.yml
|
||||||
|
fi
|
||||||
|
fi
|
||||||
fi
|
fi
|
||||||
|
@ -65,8 +65,3 @@ services:
|
|||||||
- "traefik.http.routers.reporter_ccp.tls=true"
|
- "traefik.http.routers.reporter_ccp.tls=true"
|
||||||
- "traefik.http.middlewares.reporter_ccp_strip.stripprefix.prefixes=/ccp-reporter"
|
- "traefik.http.middlewares.reporter_ccp_strip.stripprefix.prefixes=/ccp-reporter"
|
||||||
- "traefik.http.routers.reporter_ccp.middlewares=reporter_ccp_strip"
|
- "traefik.http.routers.reporter_ccp.middlewares=reporter_ccp_strip"
|
||||||
|
|
||||||
focus:
|
|
||||||
environment:
|
|
||||||
EXPORTER_URL: "http://exporter:8092"
|
|
||||||
EXPORTER_API_KEY: "${EXPORTER_API_KEY}"
|
|
||||||
|
@ -23,7 +23,3 @@ services:
|
|||||||
POSTGRES_DB: "dashboard"
|
POSTGRES_DB: "dashboard"
|
||||||
volumes:
|
volumes:
|
||||||
- "/var/cache/bridgehead/ccp/dashboard-db:/var/lib/postgresql/data"
|
- "/var/cache/bridgehead/ccp/dashboard-db:/var/lib/postgresql/data"
|
||||||
|
|
||||||
focus:
|
|
||||||
environment:
|
|
||||||
POSTGRES_CONNECTION_STRING: "postgresql://dashboard:${DASHBOARD_DB_PASSWORD}@dashboard-db/dashboard"
|
|
@ -4,5 +4,4 @@ if [ "$ENABLE_FHIR2SQL" == true ]; then
|
|||||||
log INFO "Dashboard setup detected -- will start Dashboard backend and FHIR2SQL service."
|
log INFO "Dashboard setup detected -- will start Dashboard backend and FHIR2SQL service."
|
||||||
OVERRIDE+=" -f ./$PROJECT/modules/fhir2sql-compose.yml"
|
OVERRIDE+=" -f ./$PROJECT/modules/fhir2sql-compose.yml"
|
||||||
DASHBOARD_DB_PASSWORD="$(generate_simple_password 'fhir2sql')"
|
DASHBOARD_DB_PASSWORD="$(generate_simple_password 'fhir2sql')"
|
||||||
FOCUS_ENDPOINT_TYPE="blaze-and-sql"
|
|
||||||
fi
|
fi
|
||||||
|
@ -19,18 +19,10 @@ services:
|
|||||||
- traefik-forward-auth
|
- traefik-forward-auth
|
||||||
labels:
|
labels:
|
||||||
- "traefik.enable=true"
|
- "traefik.enable=true"
|
||||||
# Router with Authentication
|
|
||||||
- "traefik.http.routers.id-manager.rule=PathPrefix(`/id-manager`)"
|
- "traefik.http.routers.id-manager.rule=PathPrefix(`/id-manager`)"
|
||||||
|
- "traefik.http.services.id-manager.loadbalancer.server.port=8080"
|
||||||
- "traefik.http.routers.id-manager.tls=true"
|
- "traefik.http.routers.id-manager.tls=true"
|
||||||
- "traefik.http.routers.id-manager.middlewares=traefik-forward-auth-idm"
|
- "traefik.http.routers.id-manager.middlewares=traefik-forward-auth-idm"
|
||||||
- "traefik.http.routers.id-manager.service=id-manager-service"
|
|
||||||
# Router without Authentication
|
|
||||||
- "traefik.http.routers.id-manager-compatibility.rule=PathPrefix(`/id-manager/paths/translator/getIds`)"
|
|
||||||
- "traefik.http.routers.id-manager-compatibility.tls=true"
|
|
||||||
- "traefik.http.routers.id-manager-compatibility.service=id-manager-service"
|
|
||||||
# Definition of Service
|
|
||||||
- "traefik.http.services.id-manager-service.loadbalancer.server.port=8080"
|
|
||||||
- "traefik.http.services.id-manager-service.loadbalancer.server.scheme=http"
|
|
||||||
|
|
||||||
patientlist:
|
patientlist:
|
||||||
image: docker.verbis.dkfz.de/bridgehead/mainzelliste
|
image: docker.verbis.dkfz.de/bridgehead/mainzelliste
|
||||||
@ -65,7 +57,7 @@ services:
|
|||||||
- "/tmp/bridgehead/patientlist/:/docker-entrypoint-initdb.d/"
|
- "/tmp/bridgehead/patientlist/:/docker-entrypoint-initdb.d/"
|
||||||
|
|
||||||
traefik-forward-auth:
|
traefik-forward-auth:
|
||||||
image: docker.verbis.dkfz.de/cache/oauth2-proxy/oauth2-proxy:latest
|
image: docker.verbis.dkfz.de/cache/oauth2-proxy/oauth2-proxy:v7.6.0
|
||||||
environment:
|
environment:
|
||||||
- http_proxy=http://forward_proxy:3128
|
- http_proxy=http://forward_proxy:3128
|
||||||
- https_proxy=http://forward_proxy:3128
|
- https_proxy=http://forward_proxy:3128
|
||||||
@ -75,7 +67,6 @@ services:
|
|||||||
- OAUTH2_PROXY_CLIENT_ID=bridgehead-${SITE_ID}
|
- OAUTH2_PROXY_CLIENT_ID=bridgehead-${SITE_ID}
|
||||||
- OAUTH2_PROXY_CLIENT_SECRET=${IDMANAGER_AUTH_CLIENT_SECRET}
|
- OAUTH2_PROXY_CLIENT_SECRET=${IDMANAGER_AUTH_CLIENT_SECRET}
|
||||||
- OAUTH2_PROXY_COOKIE_SECRET=${IDMANAGER_AUTH_COOKIE_SECRET}
|
- OAUTH2_PROXY_COOKIE_SECRET=${IDMANAGER_AUTH_COOKIE_SECRET}
|
||||||
- OAUTH2_PROXY_COOKIE_NAME=_BRIDGEHEAD_oauth2_idm
|
|
||||||
- OAUTH2_PROXY_COOKIE_DOMAINS=.${HOST}
|
- OAUTH2_PROXY_COOKIE_DOMAINS=.${HOST}
|
||||||
- OAUTH2_PROXY_HTTP_ADDRESS=:4180
|
- OAUTH2_PROXY_HTTP_ADDRESS=:4180
|
||||||
- OAUTH2_PROXY_REVERSE_PROXY=true
|
- OAUTH2_PROXY_REVERSE_PROXY=true
|
||||||
@ -101,12 +92,5 @@ services:
|
|||||||
forward_proxy:
|
forward_proxy:
|
||||||
condition: service_healthy
|
condition: service_healthy
|
||||||
|
|
||||||
ccp-patient-project-identificator:
|
|
||||||
image: docker.verbis.dkfz.de/cache/samply/ccp-patient-project-identificator
|
|
||||||
container_name: bridgehead-ccp-patient-project-identificator
|
|
||||||
environment:
|
|
||||||
MAINZELLISTE_APIKEY: ${IDMANAGER_LOCAL_PATIENTLIST_APIKEY}
|
|
||||||
SITE_NAME: ${IDMANAGEMENT_FRIENDLY_ID}
|
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
patientlist-db-data:
|
patientlist-db-data:
|
||||||
|
@ -3,7 +3,7 @@
|
|||||||
function idManagementSetup() {
|
function idManagementSetup() {
|
||||||
if [ -n "$IDMANAGER_UPLOAD_APIKEY" ]; then
|
if [ -n "$IDMANAGER_UPLOAD_APIKEY" ]; then
|
||||||
log INFO "id-management setup detected -- will start id-management (mainzelliste & magicpl)."
|
log INFO "id-management setup detected -- will start id-management (mainzelliste & magicpl)."
|
||||||
OVERRIDE+=" -f ./ccp/modules/id-management-compose.yml"
|
OVERRIDE+=" -f ./$PROJECT/modules/id-management-compose.yml"
|
||||||
|
|
||||||
# Auto Generate local Passwords
|
# Auto Generate local Passwords
|
||||||
PATIENTLIST_POSTGRES_PASSWORD="$(echo \"id-management-module-db-password-salt\" | openssl pkeyutl -sign -inkey /etc/bridgehead/pki/${SITE_ID}.priv.pem | base64 | head -c 30)"
|
PATIENTLIST_POSTGRES_PASSWORD="$(echo \"id-management-module-db-password-salt\" | openssl pkeyutl -sign -inkey /etc/bridgehead/pki/${SITE_ID}.priv.pem | base64 | head -c 30)"
|
||||||
|
@ -12,6 +12,7 @@ services:
|
|||||||
CTS_API_KEY: ${NNGM_CTS_APIKEY}
|
CTS_API_KEY: ${NNGM_CTS_APIKEY}
|
||||||
CRYPT_KEY: ${NNGM_CRYPTKEY}
|
CRYPT_KEY: ${NNGM_CRYPTKEY}
|
||||||
#CTS_MAGICPL_SITE: ${SITE_ID}TODO
|
#CTS_MAGICPL_SITE: ${SITE_ID}TODO
|
||||||
|
restart: always
|
||||||
labels:
|
labels:
|
||||||
- "traefik.enable=true"
|
- "traefik.enable=true"
|
||||||
- "traefik.http.routers.connector.rule=PathPrefix(`/nngm-connector`)"
|
- "traefik.http.routers.connector.rule=PathPrefix(`/nngm-connector`)"
|
||||||
|
@ -3,13 +3,14 @@ version: "3.7"
|
|||||||
services:
|
services:
|
||||||
obds2fhir-rest:
|
obds2fhir-rest:
|
||||||
container_name: bridgehead-obds2fhir-rest
|
container_name: bridgehead-obds2fhir-rest
|
||||||
image: docker.verbis.dkfz.de/samply/obds2fhir-rest:main
|
image: docker.verbis.dkfz.de/ccp/obds2fhir-rest:main
|
||||||
environment:
|
environment:
|
||||||
IDTYPE: BK_${IDMANAGEMENT_FRIENDLY_ID}_L-ID
|
IDTYPE: BK_${IDMANAGEMENT_FRIENDLY_ID}_L-ID
|
||||||
MAINZELLISTE_APIKEY: ${IDMANAGER_LOCAL_PATIENTLIST_APIKEY}
|
MAINZELLISTE_APIKEY: ${IDMANAGER_LOCAL_PATIENTLIST_APIKEY}
|
||||||
SALT: ${LOCAL_SALT}
|
SALT: ${LOCAL_SALT}
|
||||||
KEEP_INTERNAL_ID: ${KEEP_INTERNAL_ID:-false}
|
KEEP_INTERNAL_ID: ${KEEP_INTERNAL_ID:-false}
|
||||||
MAINZELLISTE_URL: ${PATIENTLIST_URL:-http://patientlist:8080/patientlist}
|
MAINZELLISTE_URL: ${PATIENTLIST_URL:-http://patientlist:8080/patientlist}
|
||||||
|
restart: always
|
||||||
labels:
|
labels:
|
||||||
- "traefik.enable=true"
|
- "traefik.enable=true"
|
||||||
- "traefik.http.routers.obds2fhir-rest.rule=PathPrefix(`/obds2fhir-rest`) || PathPrefix(`/adt2fhir-rest`)"
|
- "traefik.http.routers.obds2fhir-rest.rule=PathPrefix(`/obds2fhir-rest`) || PathPrefix(`/adt2fhir-rest`)"
|
||||||
|
@ -7,7 +7,7 @@ function obds2fhirRestSetup() {
|
|||||||
log ERROR "Missing ID-Management Module! Fix this by setting up ID Management:"
|
log ERROR "Missing ID-Management Module! Fix this by setting up ID Management:"
|
||||||
PATIENTLIST_URL=" "
|
PATIENTLIST_URL=" "
|
||||||
fi
|
fi
|
||||||
OVERRIDE+=" -f ./ccp/modules/obds2fhir-rest-compose.yml"
|
OVERRIDE+=" -f ./$PROJECT/modules/obds2fhir-rest-compose.yml"
|
||||||
LOCAL_SALT="$(echo \"local-random-salt\" | openssl pkeyutl -sign -inkey /etc/bridgehead/pki/${SITE_ID}.priv.pem | base64 | head -c 30)"
|
LOCAL_SALT="$(echo \"local-random-salt\" | openssl pkeyutl -sign -inkey /etc/bridgehead/pki/${SITE_ID}.priv.pem | base64 | head -c 30)"
|
||||||
fi
|
fi
|
||||||
}
|
}
|
||||||
|
@ -1,66 +0,0 @@
|
|||||||
version: "3.7"
|
|
||||||
|
|
||||||
services:
|
|
||||||
blaze:
|
|
||||||
image: docker.verbis.dkfz.de/cache/samply/blaze:0.31
|
|
||||||
container_name: bridgehead-dhki-blaze
|
|
||||||
environment:
|
|
||||||
BASE_URL: "http://bridgehead-dhki-blaze:8080"
|
|
||||||
JAVA_TOOL_OPTIONS: "-Xmx${BLAZE_MEMORY_CAP:-4096}m"
|
|
||||||
DB_RESOURCE_CACHE_SIZE: ${BLAZE_RESOURCE_CACHE_CAP:-2500000}
|
|
||||||
DB_BLOCK_CACHE_SIZE: $BLAZE_MEMORY_CAP
|
|
||||||
ENFORCE_REFERENTIAL_INTEGRITY: "false"
|
|
||||||
volumes:
|
|
||||||
- "blaze-data:/app/data"
|
|
||||||
labels:
|
|
||||||
- "traefik.enable=true"
|
|
||||||
- "traefik.http.routers.blaze_dhki.rule=PathPrefix(`/dhki-localdatamanagement`)"
|
|
||||||
- "traefik.http.middlewares.dhki_b_strip.stripprefix.prefixes=/dhki-localdatamanagement"
|
|
||||||
- "traefik.http.services.blaze_dhki.loadbalancer.server.port=8080"
|
|
||||||
- "traefik.http.routers.blaze_dhki.middlewares=dhki_b_strip,auth"
|
|
||||||
- "traefik.http.routers.blaze_dhki.tls=true"
|
|
||||||
|
|
||||||
focus:
|
|
||||||
image: docker.verbis.dkfz.de/cache/samply/focus:${FOCUS_TAG}
|
|
||||||
container_name: bridgehead-focus
|
|
||||||
environment:
|
|
||||||
API_KEY: ${FOCUS_BEAM_SECRET_SHORT}
|
|
||||||
BEAM_APP_ID_LONG: focus.${PROXY_ID}
|
|
||||||
PROXY_ID: ${PROXY_ID}
|
|
||||||
BLAZE_URL: "http://bridgehead-dhki-blaze:8080/fhir/"
|
|
||||||
BEAM_PROXY_URL: http://beam-proxy:8081
|
|
||||||
RETRY_COUNT: ${FOCUS_RETRY_COUNT}
|
|
||||||
EPSILON: 0.28
|
|
||||||
QUERIES_TO_CACHE: '/queries_to_cache.conf'
|
|
||||||
volumes:
|
|
||||||
- /srv/docker/bridgehead/dhki/queries_to_cache.conf:/queries_to_cache.conf
|
|
||||||
depends_on:
|
|
||||||
- "beam-proxy"
|
|
||||||
- "blaze"
|
|
||||||
|
|
||||||
beam-proxy:
|
|
||||||
image: docker.verbis.dkfz.de/cache/samply/beam-proxy:develop
|
|
||||||
container_name: bridgehead-beam-proxy
|
|
||||||
environment:
|
|
||||||
BROKER_URL: ${BROKER_URL}
|
|
||||||
PROXY_ID: ${PROXY_ID}
|
|
||||||
APP_focus_KEY: ${FOCUS_BEAM_SECRET_SHORT}
|
|
||||||
PRIVKEY_FILE: /run/secrets/proxy.pem
|
|
||||||
ALL_PROXY: http://forward_proxy:3128
|
|
||||||
TLS_CA_CERTIFICATES_DIR: /conf/trusted-ca-certs
|
|
||||||
ROOTCERT_FILE: /conf/root.crt.pem
|
|
||||||
secrets:
|
|
||||||
- proxy.pem
|
|
||||||
depends_on:
|
|
||||||
- "forward_proxy"
|
|
||||||
volumes:
|
|
||||||
- /etc/bridgehead/trusted-ca-certs:/conf/trusted-ca-certs:ro
|
|
||||||
- /srv/docker/bridgehead/dhki/root.crt.pem:/conf/root.crt.pem:ro
|
|
||||||
|
|
||||||
|
|
||||||
volumes:
|
|
||||||
blaze-data:
|
|
||||||
|
|
||||||
secrets:
|
|
||||||
proxy.pem:
|
|
||||||
file: /etc/bridgehead/pki/${SITE_ID}.priv.pem
|
|
@ -1,2 +0,0 @@
|
|||||||
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
|
|
||||||
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
|
|
@ -1,20 +0,0 @@
|
|||||||
-----BEGIN CERTIFICATE-----
|
|
||||||
MIIDNTCCAh2gAwIBAgIUSWUPebUMNfJvPKMjdgX+WiH+OXgwDQYJKoZIhvcNAQEL
|
|
||||||
BQAwFjEUMBIGA1UEAxMLQnJva2VyLVJvb3QwHhcNMjQwMTA1MDg1NTM4WhcNMzQw
|
|
||||||
MTAyMDg1NjA4WjAWMRQwEgYDVQQDEwtCcm9rZXItUm9vdDCCASIwDQYJKoZIhvcN
|
|
||||||
AQEBBQADggEPADCCAQoCggEBAL/nvo9Bn1/6Z/K4BKoLM6/mVziM4cmXTVx4npVz
|
|
||||||
pnptwPPFU4rz47akRZ6ZMD5MO0bsyvaxG1nwVrW3aAGC42JIGTdZHKwMKrd35sxw
|
|
||||||
k3YlGJagGUs+bKHUCL55OcSmyDWlh/UhA8+eeJWjOt9u0nYXv+vi+N4JSHA0oC9D
|
|
||||||
bTF1v+7blrTQagf7PTPSF3pe22iXOjJYdOkZMWoMoNAjn6F958fkLNLY3csOZwvP
|
|
||||||
/3eyNNawyAEPWeIm33Zk630NS8YHggz6WCqwXvuaKb6910mRP8jgauaYsqgsOyDt
|
|
||||||
pbWuvk//aZWdGeN9RNsAA8eGppygiwm/m9eRC6I0shDwv6ECAwEAAaN7MHkwDgYD
|
|
||||||
VR0PAQH/BAQDAgEGMA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYEFFn/dbW1J3ry
|
|
||||||
7TBzbKo3H4vJr2MiMB8GA1UdIwQYMBaAFFn/dbW1J3ry7TBzbKo3H4vJr2MiMBYG
|
|
||||||
A1UdEQQPMA2CC0Jyb2tlci1Sb290MA0GCSqGSIb3DQEBCwUAA4IBAQCa2V8B8aad
|
|
||||||
XNDS1EUIi9oMdvGvkolcdFwx9fI++qu9xSIaZs5GETHck3oYKZF0CFP5ESnKDn5w
|
|
||||||
enWgm5M0y+hVZppzB163WmET1efBXwrdyn8j4336NjX352h63JGWCaI2CfZ1qG1p
|
|
||||||
kf5W9CVXllSFaJe5r994ovgyHvK2ucWwe8l8iMJbQhH79oKi/9uJMCD6aUXnpg1K
|
|
||||||
nPHW1lsVx6foqYWijdBdtFU2i7LSH2OYo0nb1PgRnY/SABV63JHfJnqW9dZy4f7G
|
|
||||||
rpsvvrmFrKmEnCZH0n6qveY3Z5bMD94Yx0ebkCTYEqAw3pV65gwxrzBTpEg6dgF0
|
|
||||||
eG0eKFUS0REJ
|
|
||||||
-----END CERTIFICATE-----
|
|
28
dhki/vars
28
dhki/vars
@ -1,28 +0,0 @@
|
|||||||
BROKER_ID=broker.hector.dkfz.de
|
|
||||||
BROKER_URL=https://${BROKER_ID}
|
|
||||||
PROXY_ID=${SITE_ID}.${BROKER_ID}
|
|
||||||
FOCUS_BEAM_SECRET_SHORT="$(cat /proc/sys/kernel/random/uuid | sed 's/[-]//g' | head -c 20)"
|
|
||||||
FOCUS_RETRY_COUNT=${FOCUS_RETRY_COUNT:-64}
|
|
||||||
SUPPORT_EMAIL=support-ccp@dkfz-heidelberg.de
|
|
||||||
PRIVATEKEYFILENAME=/etc/bridgehead/pki/${SITE_ID}.priv.pem
|
|
||||||
|
|
||||||
BROKER_URL_FOR_PREREQ=$BROKER_URL
|
|
||||||
|
|
||||||
POSTGRES_TAG=15.6-alpine
|
|
||||||
|
|
||||||
for module in ccp/modules/*.sh
|
|
||||||
do
|
|
||||||
log DEBUG "sourcing $module"
|
|
||||||
source $module
|
|
||||||
done
|
|
||||||
|
|
||||||
idManagementSetup
|
|
||||||
obds2fhirRestSetup
|
|
||||||
|
|
||||||
for module in modules/*.sh
|
|
||||||
do
|
|
||||||
log DEBUG "sourcing $module"
|
|
||||||
source $module
|
|
||||||
done
|
|
||||||
|
|
||||||
transfairSetup
|
|
@ -1,42 +0,0 @@
|
|||||||
## How to Change Config Access Token
|
|
||||||
|
|
||||||
### 1. Generate a New Access Token
|
|
||||||
|
|
||||||
1. Go to your Git configuration repository provider, it might be either [git.verbis.dkfz.de](https://git.verbis.dkfz.de) or [gitlab.bbmri-eric.eu](https://gitlab.bbmri-eric.eu).
|
|
||||||
2. Navigate to the configuration repository for your site.
|
|
||||||
3. Go to **Settings → Access Tokens** to check if your Access Token is valid or expired.
|
|
||||||
- **If expired**, create a new Access Token.
|
|
||||||
4. Configure the new Access Token with the following settings:
|
|
||||||
- **Expiration date**: One year from today, minus one day.
|
|
||||||
- **Role**: Developer.
|
|
||||||
- **Scope**: Only `read_repository`.
|
|
||||||
5. Save the newly generated Access Token in a secure location.
|
|
||||||
|
|
||||||
---
|
|
||||||
|
|
||||||
### 2. Replace the Old Access Token
|
|
||||||
|
|
||||||
1. Navigate to `/etc/bridgehead` in your system.
|
|
||||||
2. Run the following command to retrieve the current Git remote URL:
|
|
||||||
```bash
|
|
||||||
git remote get-url origin
|
|
||||||
```
|
|
||||||
Example output:
|
|
||||||
```
|
|
||||||
https://name40dkfz-heidelberg.de:<old_access_token>@git.verbis.dkfz.de/bbmri-bridgehead-configs/test.git
|
|
||||||
```
|
|
||||||
3. Replace `<old_access_token>` with your new Access Token in the URL.
|
|
||||||
4. Set the updated URL using the following command:
|
|
||||||
```bash
|
|
||||||
git remote set-url origin https://name40dkfz-heidelberg.de:<new_access_token>@git.verbis.dkfz.de/bbmri-bridgehead-configs/test.git
|
|
||||||
|
|
||||||
```
|
|
||||||
|
|
||||||
5. Start the Bridgehead update service by running:
|
|
||||||
```bash
|
|
||||||
systemctl start bridgehead-update@<project>
|
|
||||||
```
|
|
||||||
6. View the output to ensure the update process is successful:
|
|
||||||
```bash
|
|
||||||
journalctl -u bridgehead-update@<project> -f
|
|
||||||
```
|
|
@ -2,7 +2,7 @@ version: "3.7"
|
|||||||
|
|
||||||
services:
|
services:
|
||||||
blaze:
|
blaze:
|
||||||
image: docker.verbis.dkfz.de/cache/samply/blaze:0.31
|
image: docker.verbis.dkfz.de/cache/samply/blaze:0.28
|
||||||
container_name: bridgehead-itcc-blaze
|
container_name: bridgehead-itcc-blaze
|
||||||
environment:
|
environment:
|
||||||
BASE_URL: "http://bridgehead-itcc-blaze:8080"
|
BASE_URL: "http://bridgehead-itcc-blaze:8080"
|
||||||
|
@ -3,11 +3,6 @@ services:
|
|||||||
landing:
|
landing:
|
||||||
container_name: lens_federated-search
|
container_name: lens_federated-search
|
||||||
image: docker.verbis.dkfz.de/ccp/lens:${SITE_ID}
|
image: docker.verbis.dkfz.de/ccp/lens:${SITE_ID}
|
||||||
labels:
|
|
||||||
- "traefik.enable=true"
|
|
||||||
- "traefik.http.routers.landing.rule=PathPrefix(`/`)"
|
|
||||||
- "traefik.http.services.landing.loadbalancer.server.port=80"
|
|
||||||
- "traefik.http.routers.landing.tls=true"
|
|
||||||
|
|
||||||
spot:
|
spot:
|
||||||
image: docker.verbis.dkfz.de/ccp-private/central-spot
|
image: docker.verbis.dkfz.de/ccp-private/central-spot
|
||||||
|
@ -3,7 +3,7 @@ BROKER_URL=https://${BROKER_ID}
|
|||||||
PROXY_ID=${SITE_ID}.${BROKER_ID}
|
PROXY_ID=${SITE_ID}.${BROKER_ID}
|
||||||
FOCUS_BEAM_SECRET_SHORT="$(cat /proc/sys/kernel/random/uuid | sed 's/[-]//g' | head -c 20)"
|
FOCUS_BEAM_SECRET_SHORT="$(cat /proc/sys/kernel/random/uuid | sed 's/[-]//g' | head -c 20)"
|
||||||
FOCUS_RETRY_COUNT=${FOCUS_RETRY_COUNT:-64}
|
FOCUS_RETRY_COUNT=${FOCUS_RETRY_COUNT:-64}
|
||||||
SUPPORT_EMAIL=arturo.macias@dkfz-heidelberg.de
|
SUPPORT_EMAIL=manoj.waikar@dkfz-heidelberg.de
|
||||||
PRIVATEKEYFILENAME=/etc/bridgehead/pki/${SITE_ID}.priv.pem
|
PRIVATEKEYFILENAME=/etc/bridgehead/pki/${SITE_ID}.priv.pem
|
||||||
BROKER_URL_FOR_PREREQ=$BROKER_URL
|
BROKER_URL_FOR_PREREQ=$BROKER_URL
|
||||||
|
|
||||||
|
@ -1,67 +0,0 @@
|
|||||||
version: "3.7"
|
|
||||||
|
|
||||||
services:
|
|
||||||
landing:
|
|
||||||
deploy:
|
|
||||||
replicas: 0 #deactivate landing page
|
|
||||||
|
|
||||||
blaze:
|
|
||||||
image: docker.verbis.dkfz.de/cache/samply/blaze:0.31
|
|
||||||
container_name: bridgehead-kr-blaze
|
|
||||||
environment:
|
|
||||||
BASE_URL: "http://bridgehead-kr-blaze:8080"
|
|
||||||
JAVA_TOOL_OPTIONS: "-Xmx${BLAZE_MEMORY_CAP:-4096}m"
|
|
||||||
DB_RESOURCE_CACHE_SIZE: ${BLAZE_RESOURCE_CACHE_CAP:-2500000}
|
|
||||||
DB_BLOCK_CACHE_SIZE: $BLAZE_MEMORY_CAP
|
|
||||||
ENFORCE_REFERENTIAL_INTEGRITY: "false"
|
|
||||||
volumes:
|
|
||||||
- "blaze-data:/app/data"
|
|
||||||
labels:
|
|
||||||
- "traefik.enable=true"
|
|
||||||
- "traefik.http.routers.blaze_kr.rule=PathPrefix(`/kr-localdatamanagement`)"
|
|
||||||
- "traefik.http.middlewares.kr_b_strip.stripprefix.prefixes=/kr-localdatamanagement"
|
|
||||||
- "traefik.http.services.blaze_kr.loadbalancer.server.port=8080"
|
|
||||||
- "traefik.http.routers.blaze_kr.middlewares=kr_b_strip,auth"
|
|
||||||
- "traefik.http.routers.blaze_kr.tls=true"
|
|
||||||
|
|
||||||
focus:
|
|
||||||
image: docker.verbis.dkfz.de/cache/samply/focus:${FOCUS_TAG}
|
|
||||||
container_name: bridgehead-focus
|
|
||||||
environment:
|
|
||||||
API_KEY: ${FOCUS_BEAM_SECRET_SHORT}
|
|
||||||
BEAM_APP_ID_LONG: focus.${PROXY_ID}
|
|
||||||
PROXY_ID: ${PROXY_ID}
|
|
||||||
BLAZE_URL: "http://bridgehead-kr-blaze:8080/fhir/"
|
|
||||||
BEAM_PROXY_URL: http://beam-proxy:8081
|
|
||||||
RETRY_COUNT: ${FOCUS_RETRY_COUNT}
|
|
||||||
EPSILON: 0.28
|
|
||||||
depends_on:
|
|
||||||
- "beam-proxy"
|
|
||||||
- "blaze"
|
|
||||||
|
|
||||||
beam-proxy:
|
|
||||||
image: docker.verbis.dkfz.de/cache/samply/beam-proxy:develop
|
|
||||||
container_name: bridgehead-beam-proxy
|
|
||||||
environment:
|
|
||||||
BROKER_URL: ${BROKER_URL}
|
|
||||||
PROXY_ID: ${PROXY_ID}
|
|
||||||
APP_focus_KEY: ${FOCUS_BEAM_SECRET_SHORT}
|
|
||||||
PRIVKEY_FILE: /run/secrets/proxy.pem
|
|
||||||
ALL_PROXY: http://forward_proxy:3128
|
|
||||||
TLS_CA_CERTIFICATES_DIR: /conf/trusted-ca-certs
|
|
||||||
ROOTCERT_FILE: /conf/root.crt.pem
|
|
||||||
secrets:
|
|
||||||
- proxy.pem
|
|
||||||
depends_on:
|
|
||||||
- "forward_proxy"
|
|
||||||
volumes:
|
|
||||||
- /etc/bridgehead/trusted-ca-certs:/conf/trusted-ca-certs:ro
|
|
||||||
- /srv/docker/bridgehead/kr/root.crt.pem:/conf/root.crt.pem:ro
|
|
||||||
|
|
||||||
|
|
||||||
volumes:
|
|
||||||
blaze-data:
|
|
||||||
|
|
||||||
secrets:
|
|
||||||
proxy.pem:
|
|
||||||
file: /etc/bridgehead/pki/${SITE_ID}.priv.pem
|
|
@ -1,6 +0,0 @@
|
|||||||
# Full Excel Export
|
|
||||||
curl --location --request POST 'https://${HOST}/ccp-exporter/request?query=Patient&query-format=FHIR_PATH&template-id=ccp&output-format=EXCEL' \
|
|
||||||
--header 'x-api-key: ${EXPORT_API_KEY}'
|
|
||||||
|
|
||||||
# QB
|
|
||||||
curl --location --request POST 'https://${HOST}/ccp-reporter/generate?template-id=ccp'
|
|
@ -1,67 +0,0 @@
|
|||||||
version: "3.7"
|
|
||||||
|
|
||||||
services:
|
|
||||||
exporter:
|
|
||||||
image: docker.verbis.dkfz.de/ccp/dktk-exporter:latest
|
|
||||||
container_name: bridgehead-ccp-exporter
|
|
||||||
environment:
|
|
||||||
JAVA_OPTS: "-Xms1G -Xmx8G -XX:+UseG1GC"
|
|
||||||
LOG_LEVEL: "INFO"
|
|
||||||
EXPORTER_API_KEY: "${EXPORTER_API_KEY}" # Set in exporter-setup.sh
|
|
||||||
CROSS_ORIGINS: "https://${HOST}"
|
|
||||||
EXPORTER_DB_USER: "exporter"
|
|
||||||
EXPORTER_DB_PASSWORD: "${EXPORTER_DB_PASSWORD}" # Set in exporter-setup.sh
|
|
||||||
EXPORTER_DB_URL: "jdbc:postgresql://exporter-db:5432/exporter"
|
|
||||||
HTTP_RELATIVE_PATH: "/ccp-exporter"
|
|
||||||
SITE: "${SITE_ID}"
|
|
||||||
HTTP_SERVLET_REQUEST_SCHEME: "https"
|
|
||||||
OPAL_PASSWORD: "${EXPORTER_OPAL_PASSWORD}"
|
|
||||||
labels:
|
|
||||||
- "traefik.enable=true"
|
|
||||||
- "traefik.http.routers.exporter_ccp.rule=PathPrefix(`/ccp-exporter`)"
|
|
||||||
- "traefik.http.services.exporter_ccp.loadbalancer.server.port=8092"
|
|
||||||
- "traefik.http.routers.exporter_ccp.tls=true"
|
|
||||||
- "traefik.http.middlewares.exporter_ccp_strip.stripprefix.prefixes=/ccp-exporter"
|
|
||||||
- "traefik.http.routers.exporter_ccp.middlewares=exporter_ccp_strip"
|
|
||||||
volumes:
|
|
||||||
- "/var/cache/bridgehead/ccp/exporter-files:/app/exporter-files/output"
|
|
||||||
|
|
||||||
exporter-db:
|
|
||||||
image: docker.verbis.dkfz.de/cache/postgres:${POSTGRES_TAG}
|
|
||||||
container_name: bridgehead-ccp-exporter-db
|
|
||||||
environment:
|
|
||||||
POSTGRES_USER: "exporter"
|
|
||||||
POSTGRES_PASSWORD: "${EXPORTER_DB_PASSWORD}" # Set in exporter-setup.sh
|
|
||||||
POSTGRES_DB: "exporter"
|
|
||||||
volumes:
|
|
||||||
# Consider removing this volume once we find a solution to save Lens-queries to be executed in the explorer.
|
|
||||||
- "/var/cache/bridgehead/ccp/exporter-db:/var/lib/postgresql/data"
|
|
||||||
|
|
||||||
reporter:
|
|
||||||
image: docker.verbis.dkfz.de/ccp/dktk-reporter:latest
|
|
||||||
container_name: bridgehead-ccp-reporter
|
|
||||||
environment:
|
|
||||||
JAVA_OPTS: "-Xms1G -Xmx8G -XX:+UseG1GC"
|
|
||||||
LOG_LEVEL: "INFO"
|
|
||||||
CROSS_ORIGINS: "https://${HOST}"
|
|
||||||
HTTP_RELATIVE_PATH: "/ccp-reporter"
|
|
||||||
SITE: "${SITE_ID}"
|
|
||||||
EXPORTER_API_KEY: "${EXPORTER_API_KEY}" # Set in exporter-setup.sh
|
|
||||||
EXPORTER_URL: "http://exporter:8092"
|
|
||||||
LOG_FHIR_VALIDATION: "false"
|
|
||||||
HTTP_SERVLET_REQUEST_SCHEME: "https"
|
|
||||||
|
|
||||||
# In this initial development state of the bridgehead, we are trying to have so many volumes as possible.
|
|
||||||
# However, in the first executions in the CCP sites, this volume seems to be very important. A report is
|
|
||||||
# a process that can take several hours, because it depends on the exporter.
|
|
||||||
# There is a risk that the bridgehead restarts, losing the already created export.
|
|
||||||
|
|
||||||
volumes:
|
|
||||||
- "/var/cache/bridgehead/ccp/reporter-files:/app/reports"
|
|
||||||
labels:
|
|
||||||
- "traefik.enable=true"
|
|
||||||
- "traefik.http.routers.reporter_ccp.rule=PathPrefix(`/ccp-reporter`)"
|
|
||||||
- "traefik.http.services.reporter_ccp.loadbalancer.server.port=8095"
|
|
||||||
- "traefik.http.routers.reporter_ccp.tls=true"
|
|
||||||
- "traefik.http.middlewares.reporter_ccp_strip.stripprefix.prefixes=/ccp-reporter"
|
|
||||||
- "traefik.http.routers.reporter_ccp.middlewares=reporter_ccp_strip"
|
|
@ -1,8 +0,0 @@
|
|||||||
#!/bin/bash -e
|
|
||||||
|
|
||||||
if [ "$ENABLE_EXPORTER" == true ]; then
|
|
||||||
log INFO "Exporter setup detected -- will start Exporter service."
|
|
||||||
OVERRIDE+=" -f ./$PROJECT/modules/exporter-compose.yml"
|
|
||||||
EXPORTER_DB_PASSWORD="$(echo \"This is a salt string to generate one consistent password for the exporter. It is not required to be secret.\" | sha1sum | openssl pkeyutl -sign -inkey /etc/bridgehead/pki/${SITE_ID}.priv.pem | base64 | head -c 30)"
|
|
||||||
EXPORTER_API_KEY="$(echo \"This is a salt string to generate one consistent API KEY for the exporter. It is not required to be secret.\" | sha1sum | openssl pkeyutl -sign -inkey /etc/bridgehead/pki/${SITE_ID}.priv.pem | base64 | head -c 64)"
|
|
||||||
fi
|
|
@ -1,15 +0,0 @@
|
|||||||
# Exporter and Reporter
|
|
||||||
|
|
||||||
|
|
||||||
## Exporter
|
|
||||||
The exporter is a REST API that exports the data of the different databases of the bridgehead in a set of tables.
|
|
||||||
It can accept different output formats as CSV, Excel, JSON or XML. It can also export data into Opal.
|
|
||||||
|
|
||||||
## Exporter-DB
|
|
||||||
It is a database to save queries for its execution in the exporter.
|
|
||||||
The exporter manages also the different executions of the same query in through the database.
|
|
||||||
|
|
||||||
## Reporter
|
|
||||||
This component is a plugin of the exporter that allows to create more complex Excel reports described in templates.
|
|
||||||
It is compatible with different template engines as Groovy, Thymeleaf,...
|
|
||||||
It is perfect to generate a document as our traditional CCP quality report.
|
|
@ -1,35 +0,0 @@
|
|||||||
version: "3.7"
|
|
||||||
services:
|
|
||||||
landing:
|
|
||||||
deploy:
|
|
||||||
replicas: 1 #reactivate if lens is in use
|
|
||||||
container_name: lens_federated-search
|
|
||||||
image: docker.verbis.dkfz.de/ccp/lens:${SITE_ID}
|
|
||||||
labels:
|
|
||||||
- "traefik.enable=true"
|
|
||||||
- "traefik.http.routers.landing.rule=PathPrefix(`/`)"
|
|
||||||
- "traefik.http.services.landing.loadbalancer.server.port=80"
|
|
||||||
- "traefik.http.routers.landing.tls=true"
|
|
||||||
|
|
||||||
spot:
|
|
||||||
image: docker.verbis.dkfz.de/ccp-private/central-spot
|
|
||||||
environment:
|
|
||||||
BEAM_SECRET: "${FOCUS_BEAM_SECRET_SHORT}"
|
|
||||||
BEAM_URL: http://beam-proxy:8081
|
|
||||||
BEAM_PROXY_ID: ${SITE_ID}
|
|
||||||
BEAM_BROKER_ID: ${BROKER_ID}
|
|
||||||
BEAM_APP_ID: "focus"
|
|
||||||
PROJECT_METADATA: "kr_supervisors"
|
|
||||||
depends_on:
|
|
||||||
- "beam-proxy"
|
|
||||||
labels:
|
|
||||||
- "traefik.enable=true"
|
|
||||||
- "traefik.http.services.spot.loadbalancer.server.port=8080"
|
|
||||||
- "traefik.http.middlewares.corsheaders2.headers.accesscontrolallowmethods=GET,OPTIONS,POST"
|
|
||||||
- "traefik.http.middlewares.corsheaders2.headers.accesscontrolalloworiginlist=https://${HOST}"
|
|
||||||
- "traefik.http.middlewares.corsheaders2.headers.accesscontrolallowcredentials=true"
|
|
||||||
- "traefik.http.middlewares.corsheaders2.headers.accesscontrolmaxage=-1"
|
|
||||||
- "traefik.http.routers.spot.rule=Host(`${HOST}`) && PathPrefix(`/backend`)"
|
|
||||||
- "traefik.http.middlewares.stripprefix_spot.stripprefix.prefixes=/backend"
|
|
||||||
- "traefik.http.routers.spot.tls=true"
|
|
||||||
- "traefik.http.routers.spot.middlewares=corsheaders2,stripprefix_spot"
|
|
@ -1,5 +0,0 @@
|
|||||||
#!/bin/bash
|
|
||||||
|
|
||||||
if [ -n "$ENABLE_LENS" ];then
|
|
||||||
OVERRIDE+=" -f ./$PROJECT/modules/lens-compose.yml"
|
|
||||||
fi
|
|
@ -1,19 +0,0 @@
|
|||||||
version: "3.7"
|
|
||||||
|
|
||||||
services:
|
|
||||||
obds2fhir-rest:
|
|
||||||
container_name: bridgehead-obds2fhir-rest
|
|
||||||
image: docker.verbis.dkfz.de/ccp/obds2fhir-rest:main
|
|
||||||
environment:
|
|
||||||
IDTYPE: BK_${IDMANAGEMENT_FRIENDLY_ID}_L-ID
|
|
||||||
MAINZELLISTE_APIKEY: ${IDMANAGER_LOCAL_PATIENTLIST_APIKEY}
|
|
||||||
SALT: ${LOCAL_SALT}
|
|
||||||
KEEP_INTERNAL_ID: ${KEEP_INTERNAL_ID:-false}
|
|
||||||
MAINZELLISTE_URL: ${PATIENTLIST_URL:-http://patientlist:8080/patientlist}
|
|
||||||
labels:
|
|
||||||
- "traefik.enable=true"
|
|
||||||
- "traefik.http.routers.obds2fhir-rest.rule=PathPrefix(`/obds2fhir-rest`) || PathPrefix(`/adt2fhir-rest`)"
|
|
||||||
- "traefik.http.middlewares.obds2fhir-rest_strip.stripprefix.prefixes=/obds2fhir-rest,/adt2fhir-rest"
|
|
||||||
- "traefik.http.services.obds2fhir-rest.loadbalancer.server.port=8080"
|
|
||||||
- "traefik.http.routers.obds2fhir-rest.tls=true"
|
|
||||||
- "traefik.http.routers.obds2fhir-rest.middlewares=obds2fhir-rest_strip,auth"
|
|
@ -1,13 +0,0 @@
|
|||||||
#!/bin/bash
|
|
||||||
|
|
||||||
function obds2fhirRestSetup() {
|
|
||||||
if [ -n "$ENABLE_OBDS2FHIR_REST" ]; then
|
|
||||||
log INFO "oBDS2FHIR-REST setup detected -- will start obds2fhir-rest module."
|
|
||||||
if [ ! -n "$IDMANAGER_UPLOAD_APIKEY" ]; then
|
|
||||||
log ERROR "Missing ID-Management Module! Fix this by setting up ID Management:"
|
|
||||||
PATIENTLIST_URL=" "
|
|
||||||
fi
|
|
||||||
OVERRIDE+=" -f ./$PROJECT/modules/obds2fhir-rest-compose.yml"
|
|
||||||
LOCAL_SALT="$(echo \"local-random-salt\" | openssl pkeyutl -sign -inkey /etc/bridgehead/pki/${SITE_ID}.priv.pem | base64 | head -c 30)"
|
|
||||||
fi
|
|
||||||
}
|
|
@ -1,81 +0,0 @@
|
|||||||
version: "3.7"
|
|
||||||
|
|
||||||
services:
|
|
||||||
|
|
||||||
teiler-orchestrator:
|
|
||||||
image: docker.verbis.dkfz.de/cache/samply/teiler-orchestrator:latest
|
|
||||||
container_name: bridgehead-teiler-orchestrator
|
|
||||||
labels:
|
|
||||||
- "traefik.enable=true"
|
|
||||||
- "traefik.http.routers.teiler_orchestrator_ccp.rule=PathPrefix(`/ccp-teiler`)"
|
|
||||||
- "traefik.http.services.teiler_orchestrator_ccp.loadbalancer.server.port=9000"
|
|
||||||
- "traefik.http.routers.teiler_orchestrator_ccp.tls=true"
|
|
||||||
- "traefik.http.middlewares.teiler_orchestrator_ccp_strip.stripprefix.prefixes=/ccp-teiler"
|
|
||||||
- "traefik.http.routers.teiler_orchestrator_ccp.middlewares=teiler_orchestrator_ccp_strip"
|
|
||||||
environment:
|
|
||||||
TEILER_BACKEND_URL: "https://${HOST}/ccp-teiler-backend"
|
|
||||||
TEILER_DASHBOARD_URL: "https://${HOST}/ccp-teiler-dashboard"
|
|
||||||
DEFAULT_LANGUAGE: "${TEILER_DEFAULT_LANGUAGE_LOWER_CASE}"
|
|
||||||
HTTP_RELATIVE_PATH: "/ccp-teiler"
|
|
||||||
|
|
||||||
teiler-dashboard:
|
|
||||||
image: docker.verbis.dkfz.de/cache/samply/teiler-dashboard:develop
|
|
||||||
container_name: bridgehead-teiler-dashboard
|
|
||||||
labels:
|
|
||||||
- "traefik.enable=true"
|
|
||||||
- "traefik.http.routers.teiler_dashboard_ccp.rule=PathPrefix(`/ccp-teiler-dashboard`)"
|
|
||||||
- "traefik.http.services.teiler_dashboard_ccp.loadbalancer.server.port=80"
|
|
||||||
- "traefik.http.routers.teiler_dashboard_ccp.tls=true"
|
|
||||||
- "traefik.http.middlewares.teiler_dashboard_ccp_strip.stripprefix.prefixes=/ccp-teiler-dashboard"
|
|
||||||
- "traefik.http.routers.teiler_dashboard_ccp.middlewares=teiler_dashboard_ccp_strip"
|
|
||||||
environment:
|
|
||||||
DEFAULT_LANGUAGE: "${TEILER_DEFAULT_LANGUAGE}"
|
|
||||||
TEILER_BACKEND_URL: "https://${HOST}/ccp-teiler-backend"
|
|
||||||
OIDC_URL: "${OIDC_URL}"
|
|
||||||
OIDC_REALM: "${OIDC_REALM}"
|
|
||||||
OIDC_CLIENT_ID: "${OIDC_PUBLIC_CLIENT_ID}"
|
|
||||||
OIDC_TOKEN_GROUP: "${OIDC_GROUP_CLAIM}"
|
|
||||||
TEILER_ADMIN_NAME: "${OPERATOR_FIRST_NAME} ${OPERATOR_LAST_NAME}"
|
|
||||||
TEILER_ADMIN_EMAIL: "${OPERATOR_EMAIL}"
|
|
||||||
TEILER_ADMIN_PHONE: "${OPERATOR_PHONE}"
|
|
||||||
TEILER_PROJECT: "${PROJECT}"
|
|
||||||
EXPORTER_API_KEY: "${EXPORTER_API_KEY}"
|
|
||||||
TEILER_ORCHESTRATOR_URL: "https://${HOST}/ccp-teiler"
|
|
||||||
TEILER_DASHBOARD_HTTP_RELATIVE_PATH: "/ccp-teiler-dashboard"
|
|
||||||
TEILER_ORCHESTRATOR_HTTP_RELATIVE_PATH: "/ccp-teiler"
|
|
||||||
TEILER_USER: "${OIDC_USER_GROUP}"
|
|
||||||
TEILER_ADMIN: "${OIDC_ADMIN_GROUP}"
|
|
||||||
REPORTER_DEFAULT_TEMPLATE_ID: "ccp-qb"
|
|
||||||
EXPORTER_DEFAULT_TEMPLATE_ID: "ccp"
|
|
||||||
|
|
||||||
|
|
||||||
teiler-backend:
|
|
||||||
image: docker.verbis.dkfz.de/ccp/dktk-teiler-backend:latest
|
|
||||||
container_name: bridgehead-teiler-backend
|
|
||||||
labels:
|
|
||||||
- "traefik.enable=true"
|
|
||||||
- "traefik.http.routers.teiler_backend_ccp.rule=PathPrefix(`/ccp-teiler-backend`)"
|
|
||||||
- "traefik.http.services.teiler_backend_ccp.loadbalancer.server.port=8085"
|
|
||||||
- "traefik.http.routers.teiler_backend_ccp.tls=true"
|
|
||||||
- "traefik.http.middlewares.teiler_backend_ccp_strip.stripprefix.prefixes=/ccp-teiler-backend"
|
|
||||||
- "traefik.http.routers.teiler_backend_ccp.middlewares=teiler_backend_ccp_strip"
|
|
||||||
environment:
|
|
||||||
LOG_LEVEL: "INFO"
|
|
||||||
APPLICATION_PORT: "8085"
|
|
||||||
APPLICATION_ADDRESS: "${HOST}"
|
|
||||||
DEFAULT_LANGUAGE: "${TEILER_DEFAULT_LANGUAGE}"
|
|
||||||
CONFIG_ENV_VAR_PATH: "/run/secrets/ccp.conf"
|
|
||||||
TEILER_ORCHESTRATOR_HTTP_RELATIVE_PATH: "/ccp-teiler"
|
|
||||||
TEILER_ORCHESTRATOR_URL: "https://${HOST}/ccp-teiler"
|
|
||||||
TEILER_DASHBOARD_DE_URL: "https://${HOST}/ccp-teiler-dashboard/de"
|
|
||||||
TEILER_DASHBOARD_EN_URL: "https://${HOST}/ccp-teiler-dashboard/en"
|
|
||||||
CENTRAX_URL: "${CENTRAXX_URL}"
|
|
||||||
HTTP_PROXY: "http://forward_proxy:3128"
|
|
||||||
ENABLE_MTBA: "${ENABLE_MTBA}"
|
|
||||||
ENABLE_DATASHIELD: "${ENABLE_DATASHIELD}"
|
|
||||||
secrets:
|
|
||||||
- ccp.conf
|
|
||||||
|
|
||||||
secrets:
|
|
||||||
ccp.conf:
|
|
||||||
file: /etc/bridgehead/ccp.conf
|
|
@ -1,9 +0,0 @@
|
|||||||
#!/bin/bash -e
|
|
||||||
|
|
||||||
if [ "$ENABLE_TEILER" == true ];then
|
|
||||||
log INFO "Teiler setup detected -- will start Teiler services."
|
|
||||||
OVERRIDE+=" -f ./$PROJECT/modules/teiler-compose.yml"
|
|
||||||
TEILER_DEFAULT_LANGUAGE=DE
|
|
||||||
TEILER_DEFAULT_LANGUAGE_LOWER_CASE=${TEILER_DEFAULT_LANGUAGE,,}
|
|
||||||
add_public_oidc_redirect_url "/ccp-teiler/*"
|
|
||||||
fi
|
|
@ -1,19 +0,0 @@
|
|||||||
# Teiler
|
|
||||||
This module orchestrates the different microfrontends of the bridgehead as a single page application.
|
|
||||||
|
|
||||||
## Teiler Orchestrator
|
|
||||||
Single SPA component that consists on the root HTML site of the single page application and a javascript code that
|
|
||||||
gets the information about the microfrontend calling the teiler backend and is responsible for registering them. With the
|
|
||||||
resulting mapping, it can initialize, mount and unmount the required microfrontends on the fly.
|
|
||||||
|
|
||||||
The microfrontends run independently in different containers and can be based on different frameworks (Angular, Vue, React,...)
|
|
||||||
This microfrontends can run as single alone but need an extension with Single-SPA (https://single-spa.js.org/docs/ecosystem).
|
|
||||||
There are also available three templates (Angular, Vue, React) to be directly extended to be used directly in the teiler.
|
|
||||||
|
|
||||||
## Teiler Dashboard
|
|
||||||
It consists on the main dashboard and a set of embedded services.
|
|
||||||
### Login
|
|
||||||
user and password in ccp.local.conf
|
|
||||||
|
|
||||||
## Teiler Backend
|
|
||||||
In this component, the microfrontends are configured.
|
|
@ -1,20 +0,0 @@
|
|||||||
-----BEGIN CERTIFICATE-----
|
|
||||||
MIIDNTCCAh2gAwIBAgIUW34NEb7bl0+Ywx+I1VKtY5vpAOowDQYJKoZIhvcNAQEL
|
|
||||||
BQAwFjEUMBIGA1UEAxMLQnJva2VyLVJvb3QwHhcNMjQwMTIyMTMzNzEzWhcNMzQw
|
|
||||||
MTE5MTMzNzQzWjAWMRQwEgYDVQQDEwtCcm9rZXItUm9vdDCCASIwDQYJKoZIhvcN
|
|
||||||
AQEBBQADggEPADCCAQoCggEBAL5UegLXTlq3XRRj8LyFs3aF0tpRPVoW9RXp5kFI
|
|
||||||
TnBvyO6qjNbMDT/xK+4iDtEX4QQUvsxAKxfXbe9i1jpdwjgH7JHaSGm2IjAiKLqO
|
|
||||||
OXQQtguWwfNmmp96Ql13ArLj458YH08xMO/w2NFWGwB/hfARa4z/T0afFuc/tKJf
|
|
||||||
XbGCG9xzJ9tmcG45QN8NChGhVvaTweNdVxGWlpHxmi0Mn8OM9CEuB7nPtTTiBuiu
|
|
||||||
pRC2zVVmNjVp4ktkAqL7IHOz+/F5nhiz6tOika9oD3376Xj055lPznLcTQn2+4d7
|
|
||||||
K7ZrBopCFxIQPjkgmYRLfPejbpdUjK1UVJw7hbWkqWqH7JMCAwEAAaN7MHkwDgYD
|
|
||||||
VR0PAQH/BAQDAgEGMA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYEFGjvRcaIP4HM
|
|
||||||
poIguUAK9YL2n7fbMB8GA1UdIwQYMBaAFGjvRcaIP4HMpoIguUAK9YL2n7fbMBYG
|
|
||||||
A1UdEQQPMA2CC0Jyb2tlci1Sb290MA0GCSqGSIb3DQEBCwUAA4IBAQCbzycJSaDm
|
|
||||||
AXXNJqQ88djrKs5MDXS8RIjS/cu2ayuLaYDe+BzVmUXNA0Vt9nZGdaz63SLLcjpU
|
|
||||||
fNSxBfKbwmf7s30AK8Cnfj9q4W/BlBeVizUHQsg1+RQpDIdMrRQrwkXv8mfLw+w5
|
|
||||||
3oaXNW6W/8KpBp/H8TBZ6myl6jCbeR3T8EMXBwipMGop/1zkbF01i98Xpqmhx2+l
|
|
||||||
n+80ofPsSspOo5XmgCZym8CD/m/oFHmjcvOfpOCvDh4PZ+i37pmbSlCYoMpla3u/
|
|
||||||
7MJMP5lugfLBYNDN2p+V4KbHP/cApCDT5UWLOeAWjgiZQtHH5ilDeYqEc1oPjyJt
|
|
||||||
Rtup0MTxSJtN
|
|
||||||
-----END CERTIFICATE-----
|
|
16
kr/vars
16
kr/vars
@ -1,16 +0,0 @@
|
|||||||
BROKER_ID=test-no-real-data.broker.samply.de
|
|
||||||
BROKER_URL=https://${BROKER_ID}
|
|
||||||
PROXY_ID=${SITE_ID}.${BROKER_ID}
|
|
||||||
FOCUS_BEAM_SECRET_SHORT="$(cat /proc/sys/kernel/random/uuid | sed 's/[-]//g' | head -c 20)"
|
|
||||||
FOCUS_RETRY_COUNT=${FOCUS_RETRY_COUNT:-64}
|
|
||||||
SUPPORT_EMAIL=arturo.macias@dkfz-heidelberg.de
|
|
||||||
PRIVATEKEYFILENAME=/etc/bridgehead/pki/${SITE_ID}.priv.pem
|
|
||||||
BROKER_URL_FOR_PREREQ=$BROKER_URL
|
|
||||||
|
|
||||||
for module in $PROJECT/modules/*.sh
|
|
||||||
do
|
|
||||||
log DEBUG "sourcing $module"
|
|
||||||
source $module
|
|
||||||
done
|
|
||||||
|
|
||||||
obds2fhirRestSetup
|
|
@ -54,7 +54,7 @@ checkOwner(){
|
|||||||
|
|
||||||
printUsage() {
|
printUsage() {
|
||||||
echo "Usage: bridgehead start|stop|logs|docker-logs|is-running|update|install|uninstall|adduser|enroll PROJECTNAME"
|
echo "Usage: bridgehead start|stop|logs|docker-logs|is-running|update|install|uninstall|adduser|enroll PROJECTNAME"
|
||||||
echo "PROJECTNAME should be one of ccp|bbmri|cce|itcc|kr|dhki"
|
echo "PROJECTNAME should be one of ccp|bbmri|cce|itcc"
|
||||||
}
|
}
|
||||||
|
|
||||||
checkRequirements() {
|
checkRequirements() {
|
||||||
@ -116,7 +116,7 @@ assertVarsNotEmpty() {
|
|||||||
MISSING_VARS=""
|
MISSING_VARS=""
|
||||||
|
|
||||||
for VAR in $@; do
|
for VAR in $@; do
|
||||||
if [ -z "${!VAR}" ]; then
|
if [ -z "${!VAR}" ]; then
|
||||||
MISSING_VARS+="$VAR "
|
MISSING_VARS+="$VAR "
|
||||||
fi
|
fi
|
||||||
done
|
done
|
||||||
@ -171,10 +171,8 @@ optimizeBlazeMemoryUsage() {
|
|||||||
if [ $available_system_memory_chunks -eq 0 ]; then
|
if [ $available_system_memory_chunks -eq 0 ]; then
|
||||||
log WARN "Only ${BLAZE_MEMORY_CAP} system memory available for Blaze. If your Blaze stores more than 128000 fhir ressources it will run significally slower."
|
log WARN "Only ${BLAZE_MEMORY_CAP} system memory available for Blaze. If your Blaze stores more than 128000 fhir ressources it will run significally slower."
|
||||||
export BLAZE_RESOURCE_CACHE_CAP=128000;
|
export BLAZE_RESOURCE_CACHE_CAP=128000;
|
||||||
export BLAZE_CQL_CACHE_CAP=32;
|
|
||||||
else
|
else
|
||||||
export BLAZE_RESOURCE_CACHE_CAP=$((available_system_memory_chunks * 312500))
|
export BLAZE_RESOURCE_CACHE_CAP=$((available_system_memory_chunks * 312500))
|
||||||
export BLAZE_CQL_CACHE_CAP=$((($system_memory_in_mb/4)/16));
|
|
||||||
fi
|
fi
|
||||||
fi
|
fi
|
||||||
}
|
}
|
||||||
@ -318,7 +316,7 @@ function sync_secrets() {
|
|||||||
docker.verbis.dkfz.de/cache/samply/secret-sync-local:latest
|
docker.verbis.dkfz.de/cache/samply/secret-sync-local:latest
|
||||||
|
|
||||||
set -a # Export variables as environment variables
|
set -a # Export variables as environment variables
|
||||||
source /var/cache/bridgehead/secrets/oidc
|
source /var/cache/bridgehead/secrets/*
|
||||||
set +a # Export variables in the regular way
|
set +a # Export variables in the regular way
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -1,11 +0,0 @@
|
|||||||
#!/bin/bash
|
|
||||||
|
|
||||||
[ "$1" = "get" ] || exit
|
|
||||||
|
|
||||||
source /var/cache/bridgehead/secrets/gitlab_token
|
|
||||||
|
|
||||||
# Any non-empty username works, only the token matters
|
|
||||||
cat << EOF
|
|
||||||
username=bk
|
|
||||||
password=$BRIDGEHEAD_CONFIG_REPO_TOKEN
|
|
||||||
EOF
|
|
41
lib/gitpassword.sh
Executable file
41
lib/gitpassword.sh
Executable file
@ -0,0 +1,41 @@
|
|||||||
|
#!/bin/bash
|
||||||
|
|
||||||
|
if [ "$1" != "get" ]; then
|
||||||
|
echo "Usage: $0 get"
|
||||||
|
exit 1
|
||||||
|
fi
|
||||||
|
|
||||||
|
baseDir() {
|
||||||
|
# see https://stackoverflow.com/questions/59895
|
||||||
|
SOURCE=${BASH_SOURCE[0]}
|
||||||
|
while [ -h "$SOURCE" ]; do # resolve $SOURCE until the file is no longer a symlink
|
||||||
|
DIR=$( cd -P "$( dirname "$SOURCE" )" >/dev/null 2>&1 && pwd )
|
||||||
|
SOURCE=$(readlink "$SOURCE")
|
||||||
|
[[ $SOURCE != /* ]] && SOURCE=$DIR/$SOURCE # if $SOURCE was a relative symlink, we need to resolve it relative to the path where the symlink file was located
|
||||||
|
done
|
||||||
|
DIR=$( cd -P "$( dirname "$SOURCE" )/.." >/dev/null 2>&1 && pwd )
|
||||||
|
echo $DIR
|
||||||
|
}
|
||||||
|
|
||||||
|
BASE=$(baseDir)
|
||||||
|
cd $BASE
|
||||||
|
|
||||||
|
source lib/functions.sh
|
||||||
|
|
||||||
|
assertVarsNotEmpty SITE_ID || fail_and_report 1 "gitpassword.sh failed: SITE_ID is empty."
|
||||||
|
|
||||||
|
PARAMS="$(cat)"
|
||||||
|
GITHOST=$(echo "$PARAMS" | grep "^host=" | sed 's/host=\(.*\)/\1/g')
|
||||||
|
|
||||||
|
fetchVarsFromVault GIT_PASSWORD
|
||||||
|
|
||||||
|
if [ -z "${GIT_PASSWORD}" ]; then
|
||||||
|
fail_and_report 1 "gitpassword.sh failed: Git password not found."
|
||||||
|
fi
|
||||||
|
|
||||||
|
cat <<EOF
|
||||||
|
protocol=https
|
||||||
|
host=$GITHOST
|
||||||
|
username=bk-${SITE_ID}
|
||||||
|
password=${GIT_PASSWORD}
|
||||||
|
EOF
|
@ -57,15 +57,6 @@ case "$PROJECT" in
|
|||||||
;;
|
;;
|
||||||
itcc)
|
itcc)
|
||||||
site_configuration_repository_middle="git.verbis.dkfz.de/itcc-sites/"
|
site_configuration_repository_middle="git.verbis.dkfz.de/itcc-sites/"
|
||||||
;;
|
|
||||||
dhki)
|
|
||||||
site_configuration_repository_middle="git.verbis.dkfz.de/dhki/"
|
|
||||||
;;
|
|
||||||
kr)
|
|
||||||
site_configuration_repository_middle="git.verbis.dkfz.de/krebsregister-sites/"
|
|
||||||
;;
|
|
||||||
dhki)
|
|
||||||
site_configuration_repository_middle="git.verbis.dkfz.de/dhki/"
|
|
||||||
;;
|
;;
|
||||||
minimal)
|
minimal)
|
||||||
site_configuration_repository_middle="git.verbis.dkfz.de/minimal-bridgehead-configs/"
|
site_configuration_repository_middle="git.verbis.dkfz.de/minimal-bridgehead-configs/"
|
||||||
|
@ -3,16 +3,14 @@
|
|||||||
source lib/functions.sh
|
source lib/functions.sh
|
||||||
|
|
||||||
detectCompose
|
detectCompose
|
||||||
CONFIG_DIR="/etc/bridgehead/"
|
|
||||||
COMPONENT_DIR="/srv/docker/bridgehead/"
|
|
||||||
|
|
||||||
if ! id "bridgehead" &>/dev/null; then
|
if ! id "bridgehead" &>/dev/null; then
|
||||||
log ERROR "User bridgehead does not exist. Please run bridgehead install $PROJECT"
|
log ERROR "User bridgehead does not exist. Please run bridgehead install $PROJECT"
|
||||||
exit 1
|
exit 1
|
||||||
fi
|
fi
|
||||||
|
|
||||||
checkOwner "${CONFIG_DIR}" bridgehead || exit 1
|
checkOwner /srv/docker/bridgehead bridgehead || exit 1
|
||||||
checkOwner "${COMPONENT_DIR}" bridgehead || exit 1
|
checkOwner /etc/bridgehead bridgehead || exit 1
|
||||||
|
|
||||||
## Check if user is a su
|
## Check if user is a su
|
||||||
log INFO "Checking if all prerequisites are met ..."
|
log INFO "Checking if all prerequisites are met ..."
|
||||||
@ -34,31 +32,31 @@ fi
|
|||||||
log INFO "Checking configuration ..."
|
log INFO "Checking configuration ..."
|
||||||
|
|
||||||
## Download submodule
|
## Download submodule
|
||||||
if [ ! -d "${CONFIG_DIR}" ]; then
|
if [ ! -d "/etc/bridgehead/" ]; then
|
||||||
fail_and_report 1 "Please set up the config folder at ${CONFIG_DIR}. Instruction are in the readme."
|
fail_and_report 1 "Please set up the config folder at /etc/bridgehead. Instruction are in the readme."
|
||||||
fi
|
fi
|
||||||
|
|
||||||
# TODO: Check all required variables here in a generic loop
|
# TODO: Check all required variables here in a generic loop
|
||||||
|
|
||||||
#check if project env is present
|
#check if project env is present
|
||||||
if [ -d "${CONFIG_DIR}${PROJECT}.conf" ]; then
|
if [ -d "/etc/bridgehead/${PROJECT}.conf" ]; then
|
||||||
fail_and_report 1 "Project config not found. Please copy the template from ${PROJECT} and put it under ${CONFIG_DIR}${PROJECT}.conf."
|
fail_and_report 1 "Project config not found. Please copy the template from ${PROJECT} and put it under /etc/bridgehead-config/${PROJECT}.conf."
|
||||||
fi
|
fi
|
||||||
|
|
||||||
# TODO: Make sure you're in the right directory, or, even better, be independent from the working directory.
|
# TODO: Make sure you're in the right directory, or, even better, be independent from the working directory.
|
||||||
|
|
||||||
log INFO "Checking ssl cert for accessing bridgehead via https"
|
log INFO "Checking ssl cert for accessing bridgehead via https"
|
||||||
|
|
||||||
if [ ! -d "${CONFIG_DIR}traefik-tls" ]; then
|
if [ ! -d "/etc/bridgehead/traefik-tls" ]; then
|
||||||
log WARN "TLS certs for accessing bridgehead via https missing, we'll now create a self-signed one. Please consider getting an officially signed one (e.g. via Let's Encrypt ...) and put into /etc/bridgehead/traefik-tls"
|
log WARN "TLS certs for accessing bridgehead via https missing, we'll now create a self-signed one. Please consider getting an officially signed one (e.g. via Let's Encrypt ...) and put into /etc/bridgehead/traefik-tls"
|
||||||
mkdir -p /etc/bridgehead/traefik-tls
|
mkdir -p /etc/bridgehead/traefik-tls
|
||||||
fi
|
fi
|
||||||
|
|
||||||
if [ ! -e "${CONFIG_DIR}traefik-tls/fullchain.pem" ]; then
|
if [ ! -e "/etc/bridgehead/traefik-tls/fullchain.pem" ]; then
|
||||||
openssl req -x509 -newkey rsa:4096 -nodes -keyout /etc/bridgehead/traefik-tls/privkey.pem -out /etc/bridgehead/traefik-tls/fullchain.pem -days 3650 -subj "/CN=$HOST"
|
openssl req -x509 -newkey rsa:4096 -nodes -keyout /etc/bridgehead/traefik-tls/privkey.pem -out /etc/bridgehead/traefik-tls/fullchain.pem -days 3650 -subj "/CN=$HOST"
|
||||||
fi
|
fi
|
||||||
|
|
||||||
if [ -e "${CONFIG_DIR}"vault.conf ]; then
|
if [ -e /etc/bridgehead/vault.conf ]; then
|
||||||
if [ "$(stat -c "%a %U" /etc/bridgehead/vault.conf)" != "600 bridgehead" ]; then
|
if [ "$(stat -c "%a %U" /etc/bridgehead/vault.conf)" != "600 bridgehead" ]; then
|
||||||
fail_and_report 1 "/etc/bridgehead/vault.conf has wrong owner/permissions. To correct this issue, run chmod 600 /etc/bridgehead/vault.conf && chown bridgehead /etc/bridgehead/vault.conf."
|
fail_and_report 1 "/etc/bridgehead/vault.conf has wrong owner/permissions. To correct this issue, run chmod 600 /etc/bridgehead/vault.conf && chown bridgehead /etc/bridgehead/vault.conf."
|
||||||
fi
|
fi
|
||||||
@ -66,7 +64,7 @@ fi
|
|||||||
|
|
||||||
log INFO "Checking network access ($BROKER_URL_FOR_PREREQ) ..."
|
log INFO "Checking network access ($BROKER_URL_FOR_PREREQ) ..."
|
||||||
|
|
||||||
source "${CONFIG_DIR}${PROJECT}".conf
|
source /etc/bridgehead/${PROJECT}.conf
|
||||||
source ${PROJECT}/vars
|
source ${PROJECT}/vars
|
||||||
|
|
||||||
if [ "${PROJECT}" != "minimal" ]; then
|
if [ "${PROJECT}" != "minimal" ]; then
|
||||||
@ -94,10 +92,10 @@ if [ "${PROJECT}" != "minimal" ]; then
|
|||||||
fi
|
fi
|
||||||
fi
|
fi
|
||||||
checkPrivKey() {
|
checkPrivKey() {
|
||||||
if [ -e "${CONFIG_DIR}pki/${SITE_ID}.priv.pem" ]; then
|
if [ -e /etc/bridgehead/pki/${SITE_ID}.priv.pem ]; then
|
||||||
log INFO "Success - private key found."
|
log INFO "Success - private key found."
|
||||||
else
|
else
|
||||||
log ERROR "Unable to find private key at ${CONFIG_DIR}pki/${SITE_ID}.priv.pem. To fix, please run\n bridgehead enroll ${PROJECT}\nand follow the instructions."
|
log ERROR "Unable to find private key at /etc/bridgehead/pki/${SITE_ID}.priv.pem. To fix, please run\n bridgehead enroll ${PROJECT}\nand follow the instructions."
|
||||||
return 1
|
return 1
|
||||||
fi
|
fi
|
||||||
return 0
|
return 0
|
||||||
@ -109,11 +107,6 @@ else
|
|||||||
checkPrivKey || exit 1
|
checkPrivKey || exit 1
|
||||||
fi
|
fi
|
||||||
|
|
||||||
for dir in "${CONFIG_DIR}" "${COMPONENT_DIR}"; do
|
|
||||||
log INFO "Checking branch: $(cd $dir && echo "$dir $(git branch --show-current)")"
|
|
||||||
hc_send log "Checking branch: $(cd $dir && echo "$dir $(git branch --show-current)")"
|
|
||||||
done
|
|
||||||
|
|
||||||
log INFO "Success - all prerequisites are met!"
|
log INFO "Success - all prerequisites are met!"
|
||||||
hc_send log "Success - all prerequisites are met!"
|
hc_send log "Success - all prerequisites are met!"
|
||||||
|
|
||||||
|
@ -19,7 +19,7 @@ fi
|
|||||||
|
|
||||||
hc_send log "Checking for bridgehead updates ..."
|
hc_send log "Checking for bridgehead updates ..."
|
||||||
|
|
||||||
CONFFILE=/etc/bridgehead/$PROJECT.conf
|
CONFFILE=/etc/bridgehead/$1.conf
|
||||||
|
|
||||||
if [ ! -e $CONFFILE ]; then
|
if [ ! -e $CONFFILE ]; then
|
||||||
fail_and_report 1 "Configuration file $CONFFILE not found."
|
fail_and_report 1 "Configuration file $CONFFILE not found."
|
||||||
@ -33,43 +33,7 @@ export SITE_ID
|
|||||||
checkOwner /srv/docker/bridgehead bridgehead || fail_and_report 1 "Update failed: Wrong permissions in /srv/docker/bridgehead"
|
checkOwner /srv/docker/bridgehead bridgehead || fail_and_report 1 "Update failed: Wrong permissions in /srv/docker/bridgehead"
|
||||||
checkOwner /etc/bridgehead bridgehead || fail_and_report 1 "Update failed: Wrong permissions in /etc/bridgehead"
|
checkOwner /etc/bridgehead bridgehead || fail_and_report 1 "Update failed: Wrong permissions in /etc/bridgehead"
|
||||||
|
|
||||||
# Use Secret Sync to validate the GitLab token in /var/cache/bridgehead/secrets/gitlab_token.
|
CREDHELPER="/srv/docker/bridgehead/lib/gitpassword.sh"
|
||||||
# If it is missing or expired, Secret Sync will create a new token and write it to the file.
|
|
||||||
# The git credential helper reads the token from the file during git pull.
|
|
||||||
mkdir -p /var/cache/bridgehead/secrets
|
|
||||||
touch /var/cache/bridgehead/secrets/gitlab_token # the file has to exist to be mounted correctly in the Docker container
|
|
||||||
log "INFO" "Running Secret Sync for the GitLab token"
|
|
||||||
docker pull docker.verbis.dkfz.de/cache/samply/secret-sync-local:latest # make sure we have the latest image
|
|
||||||
docker run --rm \
|
|
||||||
-v /var/cache/bridgehead/secrets/gitlab_token:/usr/local/cache \
|
|
||||||
-v $PRIVATEKEYFILENAME:/run/secrets/privkey.pem:ro \
|
|
||||||
-v /srv/docker/bridgehead/$PROJECT/root.crt.pem:/run/secrets/root.crt.pem:ro \
|
|
||||||
-v /etc/bridgehead/trusted-ca-certs:/conf/trusted-ca-certs:ro \
|
|
||||||
-e TLS_CA_CERTIFICATES_DIR=/conf/trusted-ca-certs \
|
|
||||||
-e NO_PROXY=localhost,127.0.0.1 \
|
|
||||||
-e ALL_PROXY=$HTTPS_PROXY_FULL_URL \
|
|
||||||
-e PROXY_ID=$PROXY_ID \
|
|
||||||
-e BROKER_URL=$BROKER_URL \
|
|
||||||
-e GITLAB_PROJECT_ACCESS_TOKEN_PROVIDER=secret-sync-central.oidc-client-enrollment.$BROKER_ID \
|
|
||||||
-e SECRET_DEFINITIONS=GitLabProjectAccessToken:BRIDGEHEAD_CONFIG_REPO_TOKEN: \
|
|
||||||
docker.verbis.dkfz.de/cache/samply/secret-sync-local:latest
|
|
||||||
if [ $? -eq 0 ]; then
|
|
||||||
log "INFO" "Secret Sync was successful"
|
|
||||||
# In the past we used to hardcode tokens into the repository URL. We have to remove those now for the git credential helper to become effective.
|
|
||||||
CLEAN_REPO="$(git -C /etc/bridgehead remote get-url origin | sed -E 's|https://[^@]+@|https://|')"
|
|
||||||
git -C /etc/bridgehead remote set-url origin "$CLEAN_REPO"
|
|
||||||
# Set the git credential helper
|
|
||||||
git -C /etc/bridgehead config credential.helper /srv/docker/bridgehead/lib/gitlab-token-helper.sh
|
|
||||||
else
|
|
||||||
log "WARN" "Secret Sync failed"
|
|
||||||
# Remove the git credential helper
|
|
||||||
git -C /etc/bridgehead config --unset credential.helper
|
|
||||||
fi
|
|
||||||
|
|
||||||
# In the past the git credential helper was also set for /srv/docker/bridgehead but never used.
|
|
||||||
# Let's remove it to avoid confusion. This line can be removed at some point the future when we
|
|
||||||
# believe that it was removed on all/most production servers.
|
|
||||||
git -C /srv/docker/bridgehead config --unset credential.helper
|
|
||||||
|
|
||||||
CHANGES=""
|
CHANGES=""
|
||||||
|
|
||||||
@ -81,6 +45,10 @@ for DIR in /etc/bridgehead $(pwd); do
|
|||||||
if [ -n "$OUT" ]; then
|
if [ -n "$OUT" ]; then
|
||||||
report_error log "The working directory $DIR is modified. Changed files: $OUT"
|
report_error log "The working directory $DIR is modified. Changed files: $OUT"
|
||||||
fi
|
fi
|
||||||
|
if [ "$(git -C $DIR config --get credential.helper)" != "$CREDHELPER" ]; then
|
||||||
|
log "INFO" "Configuring repo to use bridgehead git credential helper."
|
||||||
|
git -C $DIR config credential.helper "$CREDHELPER"
|
||||||
|
fi
|
||||||
old_git_hash="$(git -C $DIR rev-parse --verify HEAD)"
|
old_git_hash="$(git -C $DIR rev-parse --verify HEAD)"
|
||||||
if [ -z "$HTTPS_PROXY_FULL_URL" ]; then
|
if [ -z "$HTTPS_PROXY_FULL_URL" ]; then
|
||||||
log "INFO" "Git is using no proxy!"
|
log "INFO" "Git is using no proxy!"
|
||||||
@ -90,8 +58,7 @@ for DIR in /etc/bridgehead $(pwd); do
|
|||||||
OUT=$(retry 5 git -c http.proxy=$HTTPS_PROXY_FULL_URL -c https.proxy=$HTTPS_PROXY_FULL_URL -C $DIR fetch 2>&1 && retry 5 git -c http.proxy=$HTTPS_PROXY_FULL_URL -c https.proxy=$HTTPS_PROXY_FULL_URL -C $DIR pull 2>&1)
|
OUT=$(retry 5 git -c http.proxy=$HTTPS_PROXY_FULL_URL -c https.proxy=$HTTPS_PROXY_FULL_URL -C $DIR fetch 2>&1 && retry 5 git -c http.proxy=$HTTPS_PROXY_FULL_URL -c https.proxy=$HTTPS_PROXY_FULL_URL -C $DIR pull 2>&1)
|
||||||
fi
|
fi
|
||||||
if [ $? -ne 0 ]; then
|
if [ $? -ne 0 ]; then
|
||||||
OUT_SAN=$(echo $OUT | sed -E 's|://[^:]+:[^@]+@|://credentials@|g')
|
report_error log "Unable to update git $DIR: $OUT"
|
||||||
report_error log "Unable to update git $DIR: $OUT_SAN"
|
|
||||||
fi
|
fi
|
||||||
|
|
||||||
new_git_hash="$(git -C $DIR rev-parse --verify HEAD)"
|
new_git_hash="$(git -C $DIR rev-parse --verify HEAD)"
|
||||||
|
@ -10,13 +10,13 @@ services:
|
|||||||
- --providers.docker=true
|
- --providers.docker=true
|
||||||
- --providers.docker.exposedbydefault=false
|
- --providers.docker.exposedbydefault=false
|
||||||
- --providers.file.directory=/configuration/
|
- --providers.file.directory=/configuration/
|
||||||
- --api.dashboard=false
|
- --api.dashboard=true
|
||||||
- --accesslog=true
|
- --accesslog=true
|
||||||
- --entrypoints.web.http.redirections.entrypoint.to=websecure
|
- --entrypoints.web.http.redirections.entrypoint.to=websecure
|
||||||
- --entrypoints.web.http.redirections.entrypoint.scheme=https
|
- --entrypoints.web.http.redirections.entrypoint.scheme=https
|
||||||
labels:
|
labels:
|
||||||
- "traefik.enable=true"
|
- "traefik.enable=true"
|
||||||
- "traefik.http.routers.dashboard.rule=PathPrefix(`/dashboard/`)"
|
- "traefik.http.routers.dashboard.rule=PathPrefix(`/api`) || PathPrefix(`/dashboard`)"
|
||||||
- "traefik.http.routers.dashboard.entrypoints=websecure"
|
- "traefik.http.routers.dashboard.entrypoints=websecure"
|
||||||
- "traefik.http.routers.dashboard.service=api@internal"
|
- "traefik.http.routers.dashboard.service=api@internal"
|
||||||
- "traefik.http.routers.dashboard.tls=true"
|
- "traefik.http.routers.dashboard.tls=true"
|
||||||
|
@ -1,142 +0,0 @@
|
|||||||
{
|
|
||||||
"sites": [
|
|
||||||
{
|
|
||||||
"id": "UKFR",
|
|
||||||
"name": "Freiburg",
|
|
||||||
"virtualhost": "ukfr.dnpm.de",
|
|
||||||
"beamconnect": "dnpm-connect.dnpm-bridge.broker.ccp-it.dktk.dkfz.de"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"id": "UKHD",
|
|
||||||
"name": "Heidelberg",
|
|
||||||
"virtualhost": "ukhd.dnpm.de",
|
|
||||||
"beamconnect": "dnpm-connect.dnpm-bridge.broker.ccp-it.dktk.dkfz.de"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"id": "UKT",
|
|
||||||
"name": "Tübingen",
|
|
||||||
"virtualhost": "ukt.dnpm.de",
|
|
||||||
"beamconnect": "dnpm-connect.dnpm-bridge.broker.ccp-it.dktk.dkfz.de"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"id": "UKU",
|
|
||||||
"name": "Ulm",
|
|
||||||
"virtualhost": "uku.dnpm.de",
|
|
||||||
"beamconnect": "dnpm-connect.dnpm-bridge.broker.ccp-it.dktk.dkfz.de"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"id": "UM",
|
|
||||||
"name": "Mainz",
|
|
||||||
"virtualhost": "um.dnpm.de",
|
|
||||||
"beamconnect": "dnpm-connect.dnpm-bridge.broker.ccp-it.dktk.dkfz.de"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"id": "UKMR",
|
|
||||||
"name": "Marburg",
|
|
||||||
"virtualhost": "ukmr.dnpm.de",
|
|
||||||
"beamconnect": "dnpm-connect.dnpm-bridge.broker.ccp-it.dktk.dkfz.de"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"id": "UKE",
|
|
||||||
"name": "Hamburg",
|
|
||||||
"virtualhost": "uke.dnpm.de",
|
|
||||||
"beamconnect": "dnpm-connect.dnpm-bridge.broker.ccp-it.dktk.dkfz.de"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"id": "UKA",
|
|
||||||
"name": "Aachen",
|
|
||||||
"virtualhost": "uka.dnpm.de",
|
|
||||||
"beamconnect": "dnpm-connect.dnpm-bridge.broker.ccp-it.dktk.dkfz.de"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"id": "Charite",
|
|
||||||
"name": "Berlin",
|
|
||||||
"virtualhost": "charite.dnpm.de",
|
|
||||||
"beamconnect": "dnpm-connect.berlin-test.broker.ccp-it.dktk.dkfz.de"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"id": "MRI",
|
|
||||||
"name": "Muenchen-tum",
|
|
||||||
"virtualhost": "mri.dnpm.de",
|
|
||||||
"beamconnect": "dnpm-connect.muenchen-tum.broker.ccp-it.dktk.dkfz.de"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"id": "KUM",
|
|
||||||
"name": "Muenchen-lmu",
|
|
||||||
"virtualhost": "kum.dnpm.de",
|
|
||||||
"beamconnect": "dnpm-connect.muenchen-lmu.broker.ccp-it.dktk.dkfz.de"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"id": "MHH",
|
|
||||||
"name": "Hannover",
|
|
||||||
"virtualhost": "mhh.dnpm.de",
|
|
||||||
"beamconnect": "dnpm-connect.hannover.broker.ccp-it.dktk.dkfz.de"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"id": "UKDD",
|
|
||||||
"name": "dresden-dnpm",
|
|
||||||
"virtualhost": "ukdd.dnpm.de",
|
|
||||||
"beamconnect": "dnpm-connect.dresden-dnpm.broker.ccp-it.dktk.dkfz.de"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"id": "UKB",
|
|
||||||
"name": "Bonn",
|
|
||||||
"virtualhost": "ukb.dnpm.de",
|
|
||||||
"beamconnect": "dnpm-connect.bonn-dnpm.broker.ccp-it.dktk.dkfz.de"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"id": "UKD",
|
|
||||||
"name": "Duesseldorf",
|
|
||||||
"virtualhost": "ukd.dnpm.de",
|
|
||||||
"beamconnect": "dnpm-connect.duesseldorf-dnpm.broker.ccp-it.dktk.dkfz.de"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"id": "UKK",
|
|
||||||
"name": "Koeln",
|
|
||||||
"virtualhost": "ukk.dnpm.de",
|
|
||||||
"beamconnect": "dnpm-connect.dnpm-bridge.broker.ccp-it.dktk.dkfz.de"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"id": "UME",
|
|
||||||
"name": "Essen",
|
|
||||||
"virtualhost": "ume.dnpm.de",
|
|
||||||
"beamconnect": "dnpm-connect.essen.broker.ccp-it.dktk.dkfz.de"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"id": "UKM",
|
|
||||||
"name": "Muenster",
|
|
||||||
"virtualhost": "ukm.dnpm.de",
|
|
||||||
"beamconnect": "dnpm-connect.muenster-dnpm.broker.ccp-it.dktk.dkfz.de"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"id": "UKF",
|
|
||||||
"name": "Frankfurt",
|
|
||||||
"virtualhost": "ukf.dnpm.de",
|
|
||||||
"beamconnect": "dnpm-connect.frankfurt.broker.ccp-it.dktk.dkfz.de"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"id": "UMG",
|
|
||||||
"name": "Goettingen",
|
|
||||||
"virtualhost": "umg.dnpm.de",
|
|
||||||
"beamconnect": "dnpm-connect.goettingen.broker.ccp-it.dktk.dkfz.de"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"id": "UKW",
|
|
||||||
"name": "Würzburg",
|
|
||||||
"virtualhost": "ukw.dnpm.de",
|
|
||||||
"beamconnect": "dnpm-connect.wuerzburg-dnpm.broker.ccp-it.dktk.dkfz.de"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"id": "UKSH",
|
|
||||||
"name": "Schleswig-Holstein",
|
|
||||||
"virtualhost": "uksh.dnpm.de",
|
|
||||||
"beamconnect": "dnpm-connect.uksh-dnpm.broker.ccp-it.dktk.dkfz.de"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"id": "TKT",
|
|
||||||
"name": "Test",
|
|
||||||
"virtualhost": "tkt.dnpm.de",
|
|
||||||
"beamconnect": "dnpm-connect.tobias-develop.broker.ccp-it.dktk.dkfz.de"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
@ -29,7 +29,7 @@ services:
|
|||||||
PROXY_APIKEY: ${DNPM_BEAM_SECRET_SHORT}
|
PROXY_APIKEY: ${DNPM_BEAM_SECRET_SHORT}
|
||||||
APP_ID: dnpm-connect.${DNPM_PROXY_ID}
|
APP_ID: dnpm-connect.${DNPM_PROXY_ID}
|
||||||
DISCOVERY_URL: "./conf/central_targets.json"
|
DISCOVERY_URL: "./conf/central_targets.json"
|
||||||
LOCAL_TARGETS_FILE: "/conf/connect_targets.json"
|
LOCAL_TARGETS_FILE: "./conf/connect_targets.json"
|
||||||
HTTP_PROXY: http://forward_proxy:3128
|
HTTP_PROXY: http://forward_proxy:3128
|
||||||
HTTPS_PROXY: http://forward_proxy:3128
|
HTTPS_PROXY: http://forward_proxy:3128
|
||||||
NO_PROXY: dnpm-beam-proxy,dnpm-backend, host.docker.internal${DNPM_ADDITIONAL_NO_PROXY}
|
NO_PROXY: dnpm-beam-proxy,dnpm-backend, host.docker.internal${DNPM_ADDITIONAL_NO_PROXY}
|
||||||
@ -41,7 +41,7 @@ services:
|
|||||||
volumes:
|
volumes:
|
||||||
- /etc/bridgehead/trusted-ca-certs:/conf/trusted-ca-certs:ro
|
- /etc/bridgehead/trusted-ca-certs:/conf/trusted-ca-certs:ro
|
||||||
- /etc/bridgehead/dnpm/local_targets.json:/conf/connect_targets.json:ro
|
- /etc/bridgehead/dnpm/local_targets.json:/conf/connect_targets.json:ro
|
||||||
- /srv/docker/bridgehead/minimal/modules/dnpm-central-targets.json:/conf/central_targets.json:ro
|
- /etc/bridgehead/dnpm/central_targets.json:/conf/central_targets.json:ro
|
||||||
labels:
|
labels:
|
||||||
- "traefik.enable=true"
|
- "traefik.enable=true"
|
||||||
- "traefik.http.routers.dnpm-connect.rule=PathPrefix(`/dnpm-connect`)"
|
- "traefik.http.routers.dnpm-connect.rule=PathPrefix(`/dnpm-connect`)"
|
||||||
|
@ -1,99 +1,34 @@
|
|||||||
version: "3.7"
|
version: "3.7"
|
||||||
|
|
||||||
services:
|
services:
|
||||||
dnpm-mysql:
|
|
||||||
image: mysql:9
|
|
||||||
healthcheck:
|
|
||||||
test: [ "CMD", "mysqladmin" ,"ping", "-h", "localhost" ]
|
|
||||||
interval: 3s
|
|
||||||
timeout: 5s
|
|
||||||
retries: 5
|
|
||||||
environment:
|
|
||||||
MYSQL_ROOT_HOST: "%"
|
|
||||||
MYSQL_ROOT_PASSWORD: ${DNPM_MYSQL_ROOT_PASSWORD}
|
|
||||||
volumes:
|
|
||||||
- /var/cache/bridgehead/dnpm/mysql:/var/lib/mysql
|
|
||||||
|
|
||||||
dnpm-authup:
|
|
||||||
image: authup/authup:latest
|
|
||||||
container_name: bridgehead-dnpm-authup
|
|
||||||
volumes:
|
|
||||||
- /var/cache/bridgehead/dnpm/authup:/usr/src/app/writable
|
|
||||||
depends_on:
|
|
||||||
dnpm-mysql:
|
|
||||||
condition: service_healthy
|
|
||||||
command: server/core start
|
|
||||||
environment:
|
|
||||||
- PUBLIC_URL=https://${HOST}/auth/
|
|
||||||
- AUTHORIZE_REDIRECT_URL=https://${HOST}
|
|
||||||
- ROBOT_ADMIN_ENABLED=true
|
|
||||||
- ROBOT_ADMIN_SECRET=${DNPM_AUTHUP_SECRET}
|
|
||||||
- ROBOT_ADMIN_SECRET_RESET=true
|
|
||||||
- DB_TYPE=mysql
|
|
||||||
- DB_HOST=dnpm-mysql
|
|
||||||
- DB_USERNAME=root
|
|
||||||
- DB_PASSWORD=${DNPM_MYSQL_ROOT_PASSWORD}
|
|
||||||
- DB_DATABASE=auth
|
|
||||||
labels:
|
|
||||||
- "traefik.enable=true"
|
|
||||||
- "traefik.http.middlewares.authup-strip.stripprefix.prefixes=/auth/"
|
|
||||||
- "traefik.http.routers.dnpm-auth.middlewares=authup-strip"
|
|
||||||
- "traefik.http.routers.dnpm-auth.rule=PathPrefix(`/auth`)"
|
|
||||||
- "traefik.http.services.dnpm-auth.loadbalancer.server.port=3000"
|
|
||||||
- "traefik.http.routers.dnpm-auth.tls=true"
|
|
||||||
|
|
||||||
dnpm-portal:
|
|
||||||
image: ghcr.io/dnpm-dip/portal:latest
|
|
||||||
container_name: bridgehead-dnpm-portal
|
|
||||||
environment:
|
|
||||||
- NUXT_API_URL=http://dnpm-backend:9000/
|
|
||||||
- NUXT_PUBLIC_API_URL=https://${HOST}/api/
|
|
||||||
- NUXT_AUTHUP_URL=http://dnpm-authup:3000/
|
|
||||||
- NUXT_PUBLIC_AUTHUP_URL=https://${HOST}/auth/
|
|
||||||
labels:
|
|
||||||
- "traefik.enable=true"
|
|
||||||
- "traefik.http.routers.dnpm-frontend.rule=PathPrefix(`/`)"
|
|
||||||
- "traefik.http.services.dnpm-frontend.loadbalancer.server.port=3000"
|
|
||||||
- "traefik.http.routers.dnpm-frontend.tls=true"
|
|
||||||
|
|
||||||
dnpm-backend:
|
dnpm-backend:
|
||||||
|
image: ghcr.io/kohlbacherlab/bwhc-backend:1.0-snapshot-broker-connector
|
||||||
container_name: bridgehead-dnpm-backend
|
container_name: bridgehead-dnpm-backend
|
||||||
image: ghcr.io/dnpm-dip/backend:latest
|
|
||||||
environment:
|
environment:
|
||||||
- LOCAL_SITE=${ZPM_SITE}:${SITE_NAME} # Format: {Site-ID}:{Site-name}, e.g. UKT:Tübingen
|
- ZPM_SITE=${ZPM_SITE}
|
||||||
- RD_RANDOM_DATA=${DNPM_SYNTH_NUM:--1}
|
- N_RANDOM_FILES=${DNPM_SYNTH_NUM}
|
||||||
- MTB_RANDOM_DATA=${DNPM_SYNTH_NUM:--1}
|
|
||||||
- HATEOAS_HOST=https://${HOST}
|
|
||||||
- CONNECTOR_TYPE=broker
|
|
||||||
- AUTHUP_URL=robot://system:${DNPM_AUTHUP_SECRET}@http://dnpm-authup:3000
|
|
||||||
volumes:
|
volumes:
|
||||||
- /etc/bridgehead/dnpm/config:/dnpm_config
|
- /etc/bridgehead/dnpm:/bwhc_config:ro
|
||||||
- /var/cache/bridgehead/dnpm/backend-data:/dnpm_data
|
- ${DNPM_DATA_DIR}:/bwhc_data
|
||||||
depends_on:
|
|
||||||
dnpm-authup:
|
|
||||||
condition: service_healthy
|
|
||||||
labels:
|
labels:
|
||||||
- "traefik.enable=true"
|
- "traefik.enable=true"
|
||||||
- "traefik.http.services.dnpm-backend.loadbalancer.server.port=9000"
|
- "traefik.http.routers.bwhc-backend.rule=PathPrefix(`/bwhc`)"
|
||||||
# expose everything
|
- "traefik.http.services.bwhc-backend.loadbalancer.server.port=9000"
|
||||||
- "traefik.http.routers.dnpm-backend.rule=PathPrefix(`/api`)"
|
- "traefik.http.routers.bwhc-backend.tls=true"
|
||||||
- "traefik.http.routers.dnpm-backend.tls=true"
|
|
||||||
- "traefik.http.routers.dnpm-backend.service=dnpm-backend"
|
|
||||||
# except ETL
|
|
||||||
- "traefik.http.routers.dnpm-backend-etl.rule=PathRegexp(`^/api(/.*)?etl(/.*)?$`)"
|
|
||||||
- "traefik.http.routers.dnpm-backend-etl.tls=true"
|
|
||||||
- "traefik.http.routers.dnpm-backend-etl.service=dnpm-backend"
|
|
||||||
# this needs an ETL processor with support for basic auth
|
|
||||||
- "traefik.http.routers.dnpm-backend-etl.middlewares=auth"
|
|
||||||
# except peer-to-peer
|
|
||||||
- "traefik.http.routers.dnpm-backend-peer.rule=PathRegexp(`^/api(/.*)?/peer2peer(/.*)?$`)"
|
|
||||||
- "traefik.http.routers.dnpm-backend-peer.tls=true"
|
|
||||||
- "traefik.http.routers.dnpm-backend-peer.service=dnpm-backend"
|
|
||||||
- "traefik.http.routers.dnpm-backend-peer.middlewares=dnpm-backend-peer"
|
|
||||||
# this effectively denies all requests
|
|
||||||
# this is okay, because requests from peers don't go through Traefik
|
|
||||||
- "traefik.http.middlewares.dnpm-backend-peer.ipWhiteList.sourceRange=0.0.0.0/32"
|
|
||||||
|
|
||||||
landing:
|
dnpm-frontend:
|
||||||
|
image: ghcr.io/kohlbacherlab/bwhc-frontend:2209
|
||||||
|
container_name: bridgehead-dnpm-frontend
|
||||||
|
links:
|
||||||
|
- dnpm-backend
|
||||||
|
environment:
|
||||||
|
- NUXT_HOST=0.0.0.0
|
||||||
|
- NUXT_PORT=8080
|
||||||
|
- BACKEND_PROTOCOL=https
|
||||||
|
- BACKEND_HOSTNAME=$HOST
|
||||||
|
- BACKEND_PORT=443
|
||||||
labels:
|
labels:
|
||||||
- "traefik.http.routers.landing.rule=PathPrefix(`/landing`)"
|
- "traefik.enable=true"
|
||||||
|
- "traefik.http.routers.bwhc-frontend.rule=PathPrefix(`/`)"
|
||||||
|
- "traefik.http.services.bwhc-frontend.loadbalancer.server.port=8080"
|
||||||
|
- "traefik.http.routers.bwhc-frontend.tls=true"
|
||||||
|
@ -1,16 +1,28 @@
|
|||||||
#!/bin/bash
|
#!/bin/bash
|
||||||
|
|
||||||
if [ -n "${ENABLE_DNPM_NODE}" ]; then
|
if [ -n "${ENABLE_DNPM_NODE}" ]; then
|
||||||
log INFO "DNPM setup detected -- will start DNPM:DIP node."
|
log INFO "DNPM setup detected (BwHC Node) -- will start BwHC node."
|
||||||
OVERRIDE+=" -f ./$PROJECT/modules/dnpm-node-compose.yml"
|
OVERRIDE+=" -f ./$PROJECT/modules/dnpm-node-compose.yml"
|
||||||
|
|
||||||
# Set variables required for BwHC Node. ZPM_SITE is assumed to be set in /etc/bridgehead/<project>.conf
|
# Set variables required for BwHC Node. ZPM_SITE is assumed to be set in /etc/bridgehead/<project>.conf
|
||||||
|
DNPM_APPLICATION_SECRET="$(echo \"This is a salt string to generate one consistent password for DNPM. It is not required to be secret.\" | sha1sum | openssl pkeyutl -sign -inkey /etc/bridgehead/pki/${SITE_ID}.priv.pem | base64 | head -c 30)"
|
||||||
if [ -z "${ZPM_SITE+x}" ]; then
|
if [ -z "${ZPM_SITE+x}" ]; then
|
||||||
log ERROR "Mandatory variable ZPM_SITE not defined!"
|
log ERROR "Mandatory variable ZPM_SITE not defined!"
|
||||||
exit 1
|
exit 1
|
||||||
fi
|
fi
|
||||||
mkdir -p /var/cache/bridgehead/dnpm/ || fail_and_report 1 "Failed to create '/var/cache/bridgehead/dnpm/'. Please run sudo './bridgehead install $PROJECT' again to fix the permissions."
|
if [ -z "${DNPM_DATA_DIR+x}" ]; then
|
||||||
DNPM_SYNTH_NUM=${DNPM_SYNTH_NUM:--1}
|
log ERROR "Mandatory variable DNPM_DATA_DIR not defined!"
|
||||||
DNPM_MYSQL_ROOT_PASSWORD="$(generate_simple_password 'dnpm mysql')"
|
exit 1
|
||||||
DNPM_AUTHUP_SECRET="$(generate_simple_password 'dnpm authup')"
|
fi
|
||||||
|
DNPM_SYNTH_NUM=${DNPM_SYNTH_NUM:-0}
|
||||||
|
if grep -q 'traefik.http.routers.landing.rule=PathPrefix(`/landing`)' /srv/docker/bridgehead/minimal/docker-compose.override.yml 2>/dev/null; then
|
||||||
|
echo "Override of landing page url already in place"
|
||||||
|
else
|
||||||
|
echo "Adding override of landing page url"
|
||||||
|
if [ -f /srv/docker/bridgehead/minimal/docker-compose.override.yml ]; then
|
||||||
|
echo -e ' landing:\n labels:\n - "traefik.http.routers.landing.rule=PathPrefix(`/landing`)"' >> /srv/docker/bridgehead/minimal/docker-compose.override.yml
|
||||||
|
else
|
||||||
|
echo -e 'version: "3.7"\nservices:\n landing:\n labels:\n - "traefik.http.routers.landing.rule=PathPrefix(`/landing`)"' >> /srv/docker/bridgehead/minimal/docker-compose.override.yml
|
||||||
|
fi
|
||||||
|
fi
|
||||||
fi
|
fi
|
||||||
|
@ -11,6 +11,7 @@ services:
|
|||||||
CTS_API_KEY: ${NNGM_CTS_APIKEY}
|
CTS_API_KEY: ${NNGM_CTS_APIKEY}
|
||||||
CRYPT_KEY: ${NNGM_CRYPTKEY}
|
CRYPT_KEY: ${NNGM_CRYPTKEY}
|
||||||
#CTS_MAGICPL_SITE: ${SITE_ID}TODO
|
#CTS_MAGICPL_SITE: ${SITE_ID}TODO
|
||||||
|
restart: always
|
||||||
labels:
|
labels:
|
||||||
- "traefik.enable=true"
|
- "traefik.enable=true"
|
||||||
- "traefik.http.routers.connector.rule=PathPrefix(`/nngm-connector`)"
|
- "traefik.http.routers.connector.rule=PathPrefix(`/nngm-connector`)"
|
||||||
|
@ -1,51 +0,0 @@
|
|||||||
|
|
||||||
services:
|
|
||||||
transfair:
|
|
||||||
image: docker.verbis.dkfz.de/cache/samply/transfair:latest
|
|
||||||
container_name: bridgehead-transfair
|
|
||||||
environment:
|
|
||||||
# NOTE: Those 3 variables need only to be passed if their set, otherwise transfair will complain about empty url values
|
|
||||||
- INSTITUTE_TTP_URL
|
|
||||||
- INSTITUTE_TTP_API_KEY
|
|
||||||
- PROJECT_ID_SYSTEM
|
|
||||||
- FHIR_REQUEST_URL=${FHIR_REQUEST_URL}
|
|
||||||
- FHIR_INPUT_URL=${FHIR_INPUT_URL}
|
|
||||||
- FHIR_OUTPUT_URL=${FHIR_OUTPUT_URL:-http://blaze:8080}
|
|
||||||
- FHIR_REQUEST_CREDENTIALS=${FHIR_REQUEST_CREDENTIALS}
|
|
||||||
- FHIR_INPUT_CREDENTIALS=${FHIR_INPUT_CREDENTIALS}
|
|
||||||
- FHIR_OUTPUT_CREDENTIALS=${FHIR_OUTPUT_CREDENTIALS}
|
|
||||||
- EXCHANGE_ID_SYSTEM=${EXCHANGE_ID_SYSTEM:-SESSION_ID}
|
|
||||||
- DATABASE_URL=sqlite://transfair/data_requests.sql?mode=rwc
|
|
||||||
- RUST_LOG=${RUST_LOG:-info}
|
|
||||||
volumes:
|
|
||||||
- /var/cache/bridgehead/${PROJECT}/transfair:/transfair
|
|
||||||
|
|
||||||
transfair-input-blaze:
|
|
||||||
image: docker.verbis.dkfz.de/cache/samply/blaze:0.28
|
|
||||||
container_name: bridgehead-transfair-input-blaze
|
|
||||||
environment:
|
|
||||||
BASE_URL: "http://bridgehead-transfair-input-blaze:8080"
|
|
||||||
JAVA_TOOL_OPTIONS: "-Xmx1024m"
|
|
||||||
DB_BLOCK_CACHE_SIZE: 1024
|
|
||||||
CQL_EXPR_CACHE_SIZE: 8
|
|
||||||
ENFORCE_REFERENTIAL_INTEGRITY: "false"
|
|
||||||
volumes:
|
|
||||||
- "transfair-input-blaze-data:/app/data"
|
|
||||||
profiles: ["transfair-input-blaze"]
|
|
||||||
|
|
||||||
transfair-request-blaze:
|
|
||||||
image: docker.verbis.dkfz.de/cache/samply/blaze:0.28
|
|
||||||
container_name: bridgehead-transfair-requests-blaze
|
|
||||||
environment:
|
|
||||||
BASE_URL: "http://bridgehead-transfair-requests-blaze:8080"
|
|
||||||
JAVA_TOOL_OPTIONS: "-Xmx1024m"
|
|
||||||
DB_BLOCK_CACHE_SIZE: 1024
|
|
||||||
CQL_EXPR_CACHE_SIZE: 8
|
|
||||||
ENFORCE_REFERENTIAL_INTEGRITY: "false"
|
|
||||||
volumes:
|
|
||||||
- "transfair-request-blaze-data:/app/data"
|
|
||||||
profiles: ["transfair-request-blaze"]
|
|
||||||
|
|
||||||
volumes:
|
|
||||||
transfair-input-blaze-data:
|
|
||||||
transfair-request-blaze-data:
|
|
@ -1,22 +0,0 @@
|
|||||||
#!/bin/bash -e
|
|
||||||
|
|
||||||
function transfairSetup() {
|
|
||||||
if [[ -n "$INSTITUTE_TTP_URL" || -n "$EXCHANGE_ID_SYSTEM" ]]; then
|
|
||||||
echo "Starting transfair."
|
|
||||||
OVERRIDE+=" -f ./modules/transfair-compose.yml"
|
|
||||||
if [ -n "$FHIR_INPUT_URL" ]; then
|
|
||||||
log INFO "TransFAIR input fhir store set to external $FHIR_INPUT_URL"
|
|
||||||
else
|
|
||||||
log INFO "TransFAIR input fhir store not set writing to internal blaze"
|
|
||||||
FHIR_INPUT_URL="http://transfair-input-blaze:8080"
|
|
||||||
OVERRIDE+=" --profile transfair-input-blaze"
|
|
||||||
fi
|
|
||||||
if [ -n "$FHIR_REQUEST_URL" ]; then
|
|
||||||
log INFO "TransFAIR request fhir store set to external $FHIR_REQUEST_URL"
|
|
||||||
else
|
|
||||||
log INFO "TransFAIR request fhir store not set writing to internal blaze"
|
|
||||||
FHIR_REQUEST_URL="http://transfair-requests-blaze:8080"
|
|
||||||
OVERRIDE+=" --profile transfair-request-blaze"
|
|
||||||
fi
|
|
||||||
fi
|
|
||||||
}
|
|
@ -1,2 +0,0 @@
|
|||||||
FOCUS_TAG=main
|
|
||||||
BEAM_TAG=main
|
|
@ -1,2 +0,0 @@
|
|||||||
FOCUS_TAG=develop
|
|
||||||
BEAM_TAG=develop
|
|
Reference in New Issue
Block a user