mirror of
https://github.com/samply/bridgehead.git
synced 2025-06-16 23:00:15 +02:00
Compare commits
21 Commits
bugfix/tes
...
torbrenner
Author | SHA1 | Date | |
---|---|---|---|
8b5e2d1615 | |||
8334fac84d | |||
8000356b57 | |||
74d8e68d96 | |||
c568a56651 | |||
8384143387 | |||
8fe73a8123 | |||
bca63e82a9 | |||
721627a78f | |||
e08ff92401 | |||
6a71da3dd1 | |||
138a1fa5f1 | |||
39a87bcf61 | |||
655d0d24c7 | |||
fa0d9fb8b4 | |||
139fcecabe | |||
2058a7a5c9 | |||
47364f999e | |||
df1ec21848 | |||
a4e292dd18 | |||
75089ab428 |
@ -1,3 +1,4 @@
|
|||||||
|
# Just Testing the Branch Rules
|
||||||
# Bridgehead
|
# Bridgehead
|
||||||
|
|
||||||
The Bridgehead is a secure, low-effort solution to connect your research institution to a federated research network. It bundles interoperable, open-source software components into a turnkey package for installation on one of your secure servers. The Bridgehead is pre-configured with sane defaults, centrally monitored and with an absolute minimum of "moving parts" on your side, making it an extremely low-maintenance gateway to data sharing.
|
The Bridgehead is a secure, low-effort solution to connect your research institution to a federated research network. It bundles interoperable, open-source software components into a turnkey package for installation on one of your secure servers. The Bridgehead is pre-configured with sane defaults, centrally monitored and with an absolute minimum of "moving parts" on your side, making it an extremely low-maintenance gateway to data sharing.
|
||||||
@ -154,7 +155,7 @@ Pay special attention to:
|
|||||||
Clone the bridgehead repository:
|
Clone the bridgehead repository:
|
||||||
```shell
|
```shell
|
||||||
sudo mkdir -p /srv/docker/
|
sudo mkdir -p /srv/docker/
|
||||||
sudo git clone https://github.com/samply/bridgehead.git /srv/docker/bridgehead
|
sudo git clone -b main https://github.com/samply/bridgehead.git /srv/docker/bridgehead
|
||||||
```
|
```
|
||||||
|
|
||||||
Then, run the installation script:
|
Then, run the installation script:
|
||||||
|
@ -13,7 +13,7 @@ services:
|
|||||||
PROXY_APIKEY: ${DNPM_BEAM_SECRET_SHORT}
|
PROXY_APIKEY: ${DNPM_BEAM_SECRET_SHORT}
|
||||||
APP_ID: dnpm-connect.${PROXY_ID}
|
APP_ID: dnpm-connect.${PROXY_ID}
|
||||||
DISCOVERY_URL: "./conf/central_targets.json"
|
DISCOVERY_URL: "./conf/central_targets.json"
|
||||||
LOCAL_TARGETS_FILE: "./conf/connect_targets.json"
|
LOCAL_TARGETS_FILE: "/conf/connect_targets.json"
|
||||||
HTTP_PROXY: "http://forward_proxy:3128"
|
HTTP_PROXY: "http://forward_proxy:3128"
|
||||||
HTTPS_PROXY: "http://forward_proxy:3128"
|
HTTPS_PROXY: "http://forward_proxy:3128"
|
||||||
NO_PROXY: beam-proxy,dnpm-backend,host.docker.internal${DNPM_ADDITIONAL_NO_PROXY}
|
NO_PROXY: beam-proxy,dnpm-backend,host.docker.internal${DNPM_ADDITIONAL_NO_PROXY}
|
||||||
@ -25,7 +25,7 @@ services:
|
|||||||
volumes:
|
volumes:
|
||||||
- /etc/bridgehead/trusted-ca-certs:/conf/trusted-ca-certs:ro
|
- /etc/bridgehead/trusted-ca-certs:/conf/trusted-ca-certs:ro
|
||||||
- /etc/bridgehead/dnpm/local_targets.json:/conf/connect_targets.json:ro
|
- /etc/bridgehead/dnpm/local_targets.json:/conf/connect_targets.json:ro
|
||||||
- /etc/bridgehead/dnpm/central_targets.json:/conf/central_targets.json:ro
|
- /srv/docker/bridgehead/minimal/modules/dnpm-central-targets.json:/conf/central_targets.json:ro
|
||||||
labels:
|
labels:
|
||||||
- "traefik.enable=true"
|
- "traefik.enable=true"
|
||||||
- "traefik.http.routers.dnpm-connect.rule=PathPrefix(`/dnpm-connect`)"
|
- "traefik.http.routers.dnpm-connect.rule=PathPrefix(`/dnpm-connect`)"
|
||||||
|
@ -1,34 +1,99 @@
|
|||||||
version: "3.7"
|
version: "3.7"
|
||||||
|
|
||||||
services:
|
services:
|
||||||
dnpm-backend:
|
dnpm-mysql:
|
||||||
image: ghcr.io/kohlbacherlab/bwhc-backend:1.0-snapshot-broker-connector
|
image: mysql:9
|
||||||
container_name: bridgehead-dnpm-backend
|
healthcheck:
|
||||||
|
test: [ "CMD", "mysqladmin" ,"ping", "-h", "localhost" ]
|
||||||
|
interval: 3s
|
||||||
|
timeout: 5s
|
||||||
|
retries: 5
|
||||||
environment:
|
environment:
|
||||||
- ZPM_SITE=${ZPM_SITE}
|
MYSQL_ROOT_HOST: "%"
|
||||||
- N_RANDOM_FILES=${DNPM_SYNTH_NUM}
|
MYSQL_ROOT_PASSWORD: ${DNPM_MYSQL_ROOT_PASSWORD}
|
||||||
volumes:
|
volumes:
|
||||||
- /etc/bridgehead/dnpm:/bwhc_config:ro
|
- /var/cache/bridgehead/dnpm/mysql:/var/lib/mysql
|
||||||
- ${DNPM_DATA_DIR}:/bwhc_data
|
|
||||||
labels:
|
|
||||||
- "traefik.enable=true"
|
|
||||||
- "traefik.http.routers.bwhc-backend.rule=PathPrefix(`/bwhc`)"
|
|
||||||
- "traefik.http.services.bwhc-backend.loadbalancer.server.port=9000"
|
|
||||||
- "traefik.http.routers.bwhc-backend.tls=true"
|
|
||||||
|
|
||||||
dnpm-frontend:
|
dnpm-authup:
|
||||||
image: ghcr.io/kohlbacherlab/bwhc-frontend:2209
|
image: authup/authup:latest
|
||||||
container_name: bridgehead-dnpm-frontend
|
container_name: bridgehead-dnpm-authup
|
||||||
links:
|
volumes:
|
||||||
- dnpm-backend
|
- /var/cache/bridgehead/dnpm/authup:/usr/src/app/writable
|
||||||
|
depends_on:
|
||||||
|
dnpm-mysql:
|
||||||
|
condition: service_healthy
|
||||||
|
command: server/core start
|
||||||
environment:
|
environment:
|
||||||
- NUXT_HOST=0.0.0.0
|
- PUBLIC_URL=https://${HOST}/auth/
|
||||||
- NUXT_PORT=8080
|
- AUTHORIZE_REDIRECT_URL=https://${HOST}
|
||||||
- BACKEND_PROTOCOL=https
|
- ROBOT_ADMIN_ENABLED=true
|
||||||
- BACKEND_HOSTNAME=$HOST
|
- ROBOT_ADMIN_SECRET=${DNPM_AUTHUP_SECRET}
|
||||||
- BACKEND_PORT=443
|
- ROBOT_ADMIN_SECRET_RESET=true
|
||||||
|
- DB_TYPE=mysql
|
||||||
|
- DB_HOST=dnpm-mysql
|
||||||
|
- DB_USERNAME=root
|
||||||
|
- DB_PASSWORD=${DNPM_MYSQL_ROOT_PASSWORD}
|
||||||
|
- DB_DATABASE=auth
|
||||||
labels:
|
labels:
|
||||||
- "traefik.enable=true"
|
- "traefik.enable=true"
|
||||||
- "traefik.http.routers.bwhc-frontend.rule=PathPrefix(`/`)"
|
- "traefik.http.middlewares.authup-strip.stripprefix.prefixes=/auth"
|
||||||
- "traefik.http.services.bwhc-frontend.loadbalancer.server.port=8080"
|
- "traefik.http.routers.dnpm-auth.middlewares=authup-strip"
|
||||||
- "traefik.http.routers.bwhc-frontend.tls=true"
|
- "traefik.http.routers.dnpm-auth.rule=PathPrefix(`/auth`)"
|
||||||
|
- "traefik.http.services.dnpm-auth.loadbalancer.server.port=3000"
|
||||||
|
- "traefik.http.routers.dnpm-auth.tls=true"
|
||||||
|
|
||||||
|
dnpm-portal:
|
||||||
|
image: ghcr.io/dnpm-dip/portal:latest
|
||||||
|
container_name: bridgehead-dnpm-portal
|
||||||
|
environment:
|
||||||
|
- NUXT_API_URL=http://dnpm-backend:9000/
|
||||||
|
- NUXT_PUBLIC_API_URL=https://${HOST}/api/
|
||||||
|
- NUXT_AUTHUP_URL=http://dnpm-authup:3000/
|
||||||
|
- NUXT_PUBLIC_AUTHUP_URL=https://${HOST}/auth/
|
||||||
|
labels:
|
||||||
|
- "traefik.enable=true"
|
||||||
|
- "traefik.http.routers.dnpm-frontend.rule=PathPrefix(`/`)"
|
||||||
|
- "traefik.http.services.dnpm-frontend.loadbalancer.server.port=3000"
|
||||||
|
- "traefik.http.routers.dnpm-frontend.tls=true"
|
||||||
|
|
||||||
|
dnpm-backend:
|
||||||
|
container_name: bridgehead-dnpm-backend
|
||||||
|
image: ghcr.io/dnpm-dip/backend:latest
|
||||||
|
environment:
|
||||||
|
- LOCAL_SITE=${ZPM_SITE}:${SITE_NAME} # Format: {Site-ID}:{Site-name}, e.g. UKT:Tübingen
|
||||||
|
- RD_RANDOM_DATA=${DNPM_SYNTH_NUM:--1}
|
||||||
|
- MTB_RANDOM_DATA=${DNPM_SYNTH_NUM:--1}
|
||||||
|
- HATEOAS_HOST=https://${HOST}
|
||||||
|
- CONNECTOR_TYPE=broker
|
||||||
|
- AUTHUP_URL=robot://system:${DNPM_AUTHUP_SECRET}@http://dnpm-authup:3000
|
||||||
|
volumes:
|
||||||
|
- /etc/bridgehead/dnpm/config:/dnpm_config
|
||||||
|
- /var/cache/bridgehead/dnpm/backend-data:/dnpm_data
|
||||||
|
depends_on:
|
||||||
|
dnpm-authup:
|
||||||
|
condition: service_healthy
|
||||||
|
labels:
|
||||||
|
- "traefik.enable=true"
|
||||||
|
- "traefik.http.services.dnpm-backend.loadbalancer.server.port=9000"
|
||||||
|
# expose everything
|
||||||
|
- "traefik.http.routers.dnpm-backend.rule=PathPrefix(`/api`)"
|
||||||
|
- "traefik.http.routers.dnpm-backend.tls=true"
|
||||||
|
- "traefik.http.routers.dnpm-backend.service=dnpm-backend"
|
||||||
|
# except ETL
|
||||||
|
- "traefik.http.routers.dnpm-backend-etl.rule=PathRegexp(`^/api(/.*)?etl(/.*)?$`)"
|
||||||
|
- "traefik.http.routers.dnpm-backend-etl.tls=true"
|
||||||
|
- "traefik.http.routers.dnpm-backend-etl.service=dnpm-backend"
|
||||||
|
# this needs an ETL processor with support for basic auth
|
||||||
|
- "traefik.http.routers.dnpm-backend-etl.middlewares=auth"
|
||||||
|
# except peer-to-peer
|
||||||
|
- "traefik.http.routers.dnpm-backend-peer.rule=PathRegexp(`^/api(/.*)?/peer2peer(/.*)?$`)"
|
||||||
|
- "traefik.http.routers.dnpm-backend-peer.tls=true"
|
||||||
|
- "traefik.http.routers.dnpm-backend-peer.service=dnpm-backend"
|
||||||
|
- "traefik.http.routers.dnpm-backend-peer.middlewares=dnpm-backend-peer"
|
||||||
|
# this effectively denies all requests
|
||||||
|
# this is okay, because requests from peers don't go through Traefik
|
||||||
|
- "traefik.http.middlewares.dnpm-backend-peer.ipWhiteList.sourceRange=0.0.0.0/32"
|
||||||
|
|
||||||
|
landing:
|
||||||
|
labels:
|
||||||
|
- "traefik.http.routers.landing.rule=PathPrefix(`/landing`)"
|
||||||
|
@ -1,28 +1,16 @@
|
|||||||
#!/bin/bash
|
#!/bin/bash
|
||||||
|
|
||||||
if [ -n "${ENABLE_DNPM_NODE}" ]; then
|
if [ -n "${ENABLE_DNPM_NODE}" ]; then
|
||||||
log INFO "DNPM setup detected (BwHC Node) -- will start BwHC node."
|
log INFO "DNPM setup detected -- will start DNPM:DIP node."
|
||||||
OVERRIDE+=" -f ./$PROJECT/modules/dnpm-node-compose.yml"
|
OVERRIDE+=" -f ./$PROJECT/modules/dnpm-node-compose.yml"
|
||||||
|
|
||||||
# Set variables required for BwHC Node. ZPM_SITE is assumed to be set in /etc/bridgehead/<project>.conf
|
# Set variables required for BwHC Node. ZPM_SITE is assumed to be set in /etc/bridgehead/<project>.conf
|
||||||
DNPM_APPLICATION_SECRET="$(echo \"This is a salt string to generate one consistent password for DNPM. It is not required to be secret.\" | sha1sum | openssl pkeyutl -sign -inkey /etc/bridgehead/pki/${SITE_ID}.priv.pem | base64 | head -c 30)"
|
|
||||||
if [ -z "${ZPM_SITE+x}" ]; then
|
if [ -z "${ZPM_SITE+x}" ]; then
|
||||||
log ERROR "Mandatory variable ZPM_SITE not defined!"
|
log ERROR "Mandatory variable ZPM_SITE not defined!"
|
||||||
exit 1
|
exit 1
|
||||||
fi
|
fi
|
||||||
if [ -z "${DNPM_DATA_DIR+x}" ]; then
|
mkdir -p /var/cache/bridgehead/dnpm/ || fail_and_report 1 "Failed to create '/var/cache/bridgehead/dnpm/'. Please run sudo './bridgehead install $PROJECT' again to fix the permissions."
|
||||||
log ERROR "Mandatory variable DNPM_DATA_DIR not defined!"
|
DNPM_SYNTH_NUM=${DNPM_SYNTH_NUM:--1}
|
||||||
exit 1
|
DNPM_MYSQL_ROOT_PASSWORD="$(generate_simple_password 'dnpm mysql')"
|
||||||
fi
|
DNPM_AUTHUP_SECRET="$(generate_simple_password 'dnpm authup')"
|
||||||
DNPM_SYNTH_NUM=${DNPM_SYNTH_NUM:-0}
|
|
||||||
if grep -q 'traefik.http.routers.landing.rule=PathPrefix(`/landing`)' /srv/docker/bridgehead/minimal/docker-compose.override.yml 2>/dev/null; then
|
|
||||||
echo "Override of landing page url already in place"
|
|
||||||
else
|
|
||||||
echo "Adding override of landing page url"
|
|
||||||
if [ -f /srv/docker/bridgehead/minimal/docker-compose.override.yml ]; then
|
|
||||||
echo -e ' landing:\n labels:\n - "traefik.http.routers.landing.rule=PathPrefix(`/landing`)"' >> /srv/docker/bridgehead/minimal/docker-compose.override.yml
|
|
||||||
else
|
|
||||||
echo -e 'version: "3.7"\nservices:\n landing:\n labels:\n - "traefik.http.routers.landing.rule=PathPrefix(`/landing`)"' >> /srv/docker/bridgehead/minimal/docker-compose.override.yml
|
|
||||||
fi
|
|
||||||
fi
|
|
||||||
fi
|
fi
|
||||||
|
@ -3,7 +3,7 @@ version: "3.7"
|
|||||||
services:
|
services:
|
||||||
obds2fhir-rest:
|
obds2fhir-rest:
|
||||||
container_name: bridgehead-obds2fhir-rest
|
container_name: bridgehead-obds2fhir-rest
|
||||||
image: docker.verbis.dkfz.de/ccp/obds2fhir-rest:main
|
image: docker.verbis.dkfz.de/samply/obds2fhir-rest:main
|
||||||
environment:
|
environment:
|
||||||
IDTYPE: BK_${IDMANAGEMENT_FRIENDLY_ID}_L-ID
|
IDTYPE: BK_${IDMANAGEMENT_FRIENDLY_ID}_L-ID
|
||||||
MAINZELLISTE_APIKEY: ${IDMANAGER_LOCAL_PATIENTLIST_APIKEY}
|
MAINZELLISTE_APIKEY: ${IDMANAGER_LOCAL_PATIENTLIST_APIKEY}
|
||||||
|
@ -18,3 +18,11 @@ done
|
|||||||
|
|
||||||
idManagementSetup
|
idManagementSetup
|
||||||
obds2fhirRestSetup
|
obds2fhirRestSetup
|
||||||
|
|
||||||
|
for module in modules/*.sh
|
||||||
|
do
|
||||||
|
log DEBUG "sourcing $module"
|
||||||
|
source $module
|
||||||
|
done
|
||||||
|
|
||||||
|
transfairSetup
|
@ -16,7 +16,7 @@ services:
|
|||||||
- --entrypoints.web.http.redirections.entrypoint.scheme=https
|
- --entrypoints.web.http.redirections.entrypoint.scheme=https
|
||||||
labels:
|
labels:
|
||||||
- "traefik.enable=true"
|
- "traefik.enable=true"
|
||||||
- "traefik.http.routers.dashboard.rule=PathPrefix(`/api`) || PathPrefix(`/dashboard/`)"
|
- "traefik.http.routers.dashboard.rule=PathPrefix(`/dashboard/`)"
|
||||||
- "traefik.http.routers.dashboard.entrypoints=websecure"
|
- "traefik.http.routers.dashboard.entrypoints=websecure"
|
||||||
- "traefik.http.routers.dashboard.service=api@internal"
|
- "traefik.http.routers.dashboard.service=api@internal"
|
||||||
- "traefik.http.routers.dashboard.tls=true"
|
- "traefik.http.routers.dashboard.tls=true"
|
||||||
|
142
minimal/modules/dnpm-central-targets.json
Normal file
142
minimal/modules/dnpm-central-targets.json
Normal file
@ -0,0 +1,142 @@
|
|||||||
|
{
|
||||||
|
"sites": [
|
||||||
|
{
|
||||||
|
"id": "UKFR",
|
||||||
|
"name": "Freiburg",
|
||||||
|
"virtualhost": "ukfr.dnpm.de",
|
||||||
|
"beamconnect": "dnpm-connect.dnpm-bridge.broker.ccp-it.dktk.dkfz.de"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"id": "UKHD",
|
||||||
|
"name": "Heidelberg",
|
||||||
|
"virtualhost": "ukhd.dnpm.de",
|
||||||
|
"beamconnect": "dnpm-connect.dnpm-bridge.broker.ccp-it.dktk.dkfz.de"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"id": "UKT",
|
||||||
|
"name": "Tübingen",
|
||||||
|
"virtualhost": "ukt.dnpm.de",
|
||||||
|
"beamconnect": "dnpm-connect.dnpm-bridge.broker.ccp-it.dktk.dkfz.de"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"id": "UKU",
|
||||||
|
"name": "Ulm",
|
||||||
|
"virtualhost": "uku.dnpm.de",
|
||||||
|
"beamconnect": "dnpm-connect.dnpm-bridge.broker.ccp-it.dktk.dkfz.de"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"id": "UM",
|
||||||
|
"name": "Mainz",
|
||||||
|
"virtualhost": "um.dnpm.de",
|
||||||
|
"beamconnect": "dnpm-connect.dnpm-bridge.broker.ccp-it.dktk.dkfz.de"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"id": "UKMR",
|
||||||
|
"name": "Marburg",
|
||||||
|
"virtualhost": "ukmr.dnpm.de",
|
||||||
|
"beamconnect": "dnpm-connect.dnpm-bridge.broker.ccp-it.dktk.dkfz.de"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"id": "UKE",
|
||||||
|
"name": "Hamburg",
|
||||||
|
"virtualhost": "uke.dnpm.de",
|
||||||
|
"beamconnect": "dnpm-connect.dnpm-bridge.broker.ccp-it.dktk.dkfz.de"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"id": "UKA",
|
||||||
|
"name": "Aachen",
|
||||||
|
"virtualhost": "uka.dnpm.de",
|
||||||
|
"beamconnect": "dnpm-connect.dnpm-bridge.broker.ccp-it.dktk.dkfz.de"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"id": "Charite",
|
||||||
|
"name": "Berlin",
|
||||||
|
"virtualhost": "charite.dnpm.de",
|
||||||
|
"beamconnect": "dnpm-connect.berlin-test.broker.ccp-it.dktk.dkfz.de"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"id": "MRI",
|
||||||
|
"name": "Muenchen-tum",
|
||||||
|
"virtualhost": "mri.dnpm.de",
|
||||||
|
"beamconnect": "dnpm-connect.muenchen-tum.broker.ccp-it.dktk.dkfz.de"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"id": "KUM",
|
||||||
|
"name": "Muenchen-lmu",
|
||||||
|
"virtualhost": "kum.dnpm.de",
|
||||||
|
"beamconnect": "dnpm-connect.muenchen-lmu.broker.ccp-it.dktk.dkfz.de"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"id": "MHH",
|
||||||
|
"name": "Hannover",
|
||||||
|
"virtualhost": "mhh.dnpm.de",
|
||||||
|
"beamconnect": "dnpm-connect.hannover.broker.ccp-it.dktk.dkfz.de"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"id": "UKDD",
|
||||||
|
"name": "dresden-dnpm",
|
||||||
|
"virtualhost": "ukdd.dnpm.de",
|
||||||
|
"beamconnect": "dnpm-connect.dresden-dnpm.broker.ccp-it.dktk.dkfz.de"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"id": "UKB",
|
||||||
|
"name": "Bonn",
|
||||||
|
"virtualhost": "ukb.dnpm.de",
|
||||||
|
"beamconnect": "dnpm-connect.bonn-dnpm.broker.ccp-it.dktk.dkfz.de"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"id": "UKD",
|
||||||
|
"name": "Duesseldorf",
|
||||||
|
"virtualhost": "ukd.dnpm.de",
|
||||||
|
"beamconnect": "dnpm-connect.duesseldorf-dnpm.broker.ccp-it.dktk.dkfz.de"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"id": "UKK",
|
||||||
|
"name": "Koeln",
|
||||||
|
"virtualhost": "ukk.dnpm.de",
|
||||||
|
"beamconnect": "dnpm-connect.dnpm-bridge.broker.ccp-it.dktk.dkfz.de"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"id": "UME",
|
||||||
|
"name": "Essen",
|
||||||
|
"virtualhost": "ume.dnpm.de",
|
||||||
|
"beamconnect": "dnpm-connect.essen.broker.ccp-it.dktk.dkfz.de"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"id": "UKM",
|
||||||
|
"name": "Muenster",
|
||||||
|
"virtualhost": "ukm.dnpm.de",
|
||||||
|
"beamconnect": "dnpm-connect.muenster-dnpm.broker.ccp-it.dktk.dkfz.de"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"id": "UKF",
|
||||||
|
"name": "Frankfurt",
|
||||||
|
"virtualhost": "ukf.dnpm.de",
|
||||||
|
"beamconnect": "dnpm-connect.frankfurt.broker.ccp-it.dktk.dkfz.de"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"id": "UMG",
|
||||||
|
"name": "Goettingen",
|
||||||
|
"virtualhost": "umg.dnpm.de",
|
||||||
|
"beamconnect": "dnpm-connect.goettingen.broker.ccp-it.dktk.dkfz.de"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"id": "UKW",
|
||||||
|
"name": "Würzburg",
|
||||||
|
"virtualhost": "ukw.dnpm.de",
|
||||||
|
"beamconnect": "dnpm-connect.wuerzburg-dnpm.broker.ccp-it.dktk.dkfz.de"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"id": "UKSH",
|
||||||
|
"name": "Schleswig-Holstein",
|
||||||
|
"virtualhost": "uksh.dnpm.de",
|
||||||
|
"beamconnect": "dnpm-connect.uksh-dnpm.broker.ccp-it.dktk.dkfz.de"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"id": "TKT",
|
||||||
|
"name": "Test",
|
||||||
|
"virtualhost": "tkt.dnpm.de",
|
||||||
|
"beamconnect": "dnpm-connect.tobias-develop.broker.ccp-it.dktk.dkfz.de"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
@ -29,7 +29,7 @@ services:
|
|||||||
PROXY_APIKEY: ${DNPM_BEAM_SECRET_SHORT}
|
PROXY_APIKEY: ${DNPM_BEAM_SECRET_SHORT}
|
||||||
APP_ID: dnpm-connect.${DNPM_PROXY_ID}
|
APP_ID: dnpm-connect.${DNPM_PROXY_ID}
|
||||||
DISCOVERY_URL: "./conf/central_targets.json"
|
DISCOVERY_URL: "./conf/central_targets.json"
|
||||||
LOCAL_TARGETS_FILE: "./conf/connect_targets.json"
|
LOCAL_TARGETS_FILE: "/conf/connect_targets.json"
|
||||||
HTTP_PROXY: http://forward_proxy:3128
|
HTTP_PROXY: http://forward_proxy:3128
|
||||||
HTTPS_PROXY: http://forward_proxy:3128
|
HTTPS_PROXY: http://forward_proxy:3128
|
||||||
NO_PROXY: dnpm-beam-proxy,dnpm-backend, host.docker.internal${DNPM_ADDITIONAL_NO_PROXY}
|
NO_PROXY: dnpm-beam-proxy,dnpm-backend, host.docker.internal${DNPM_ADDITIONAL_NO_PROXY}
|
||||||
@ -41,7 +41,7 @@ services:
|
|||||||
volumes:
|
volumes:
|
||||||
- /etc/bridgehead/trusted-ca-certs:/conf/trusted-ca-certs:ro
|
- /etc/bridgehead/trusted-ca-certs:/conf/trusted-ca-certs:ro
|
||||||
- /etc/bridgehead/dnpm/local_targets.json:/conf/connect_targets.json:ro
|
- /etc/bridgehead/dnpm/local_targets.json:/conf/connect_targets.json:ro
|
||||||
- /etc/bridgehead/dnpm/central_targets.json:/conf/central_targets.json:ro
|
- /srv/docker/bridgehead/minimal/modules/dnpm-central-targets.json:/conf/central_targets.json:ro
|
||||||
labels:
|
labels:
|
||||||
- "traefik.enable=true"
|
- "traefik.enable=true"
|
||||||
- "traefik.http.routers.dnpm-connect.rule=PathPrefix(`/dnpm-connect`)"
|
- "traefik.http.routers.dnpm-connect.rule=PathPrefix(`/dnpm-connect`)"
|
||||||
|
@ -1,34 +1,99 @@
|
|||||||
version: "3.7"
|
version: "3.7"
|
||||||
|
|
||||||
services:
|
services:
|
||||||
dnpm-backend:
|
dnpm-mysql:
|
||||||
image: ghcr.io/kohlbacherlab/bwhc-backend:1.0-snapshot-broker-connector
|
image: mysql:9
|
||||||
container_name: bridgehead-dnpm-backend
|
healthcheck:
|
||||||
|
test: [ "CMD", "mysqladmin" ,"ping", "-h", "localhost" ]
|
||||||
|
interval: 3s
|
||||||
|
timeout: 5s
|
||||||
|
retries: 5
|
||||||
environment:
|
environment:
|
||||||
- ZPM_SITE=${ZPM_SITE}
|
MYSQL_ROOT_HOST: "%"
|
||||||
- N_RANDOM_FILES=${DNPM_SYNTH_NUM}
|
MYSQL_ROOT_PASSWORD: ${DNPM_MYSQL_ROOT_PASSWORD}
|
||||||
volumes:
|
volumes:
|
||||||
- /etc/bridgehead/dnpm:/bwhc_config:ro
|
- /var/cache/bridgehead/dnpm/mysql:/var/lib/mysql
|
||||||
- ${DNPM_DATA_DIR}:/bwhc_data
|
|
||||||
labels:
|
|
||||||
- "traefik.enable=true"
|
|
||||||
- "traefik.http.routers.bwhc-backend.rule=PathPrefix(`/bwhc`)"
|
|
||||||
- "traefik.http.services.bwhc-backend.loadbalancer.server.port=9000"
|
|
||||||
- "traefik.http.routers.bwhc-backend.tls=true"
|
|
||||||
|
|
||||||
dnpm-frontend:
|
dnpm-authup:
|
||||||
image: ghcr.io/kohlbacherlab/bwhc-frontend:2209
|
image: authup/authup:latest
|
||||||
container_name: bridgehead-dnpm-frontend
|
container_name: bridgehead-dnpm-authup
|
||||||
links:
|
volumes:
|
||||||
- dnpm-backend
|
- /var/cache/bridgehead/dnpm/authup:/usr/src/app/writable
|
||||||
|
depends_on:
|
||||||
|
dnpm-mysql:
|
||||||
|
condition: service_healthy
|
||||||
|
command: server/core start
|
||||||
environment:
|
environment:
|
||||||
- NUXT_HOST=0.0.0.0
|
- PUBLIC_URL=https://${HOST}/auth/
|
||||||
- NUXT_PORT=8080
|
- AUTHORIZE_REDIRECT_URL=https://${HOST}
|
||||||
- BACKEND_PROTOCOL=https
|
- ROBOT_ADMIN_ENABLED=true
|
||||||
- BACKEND_HOSTNAME=$HOST
|
- ROBOT_ADMIN_SECRET=${DNPM_AUTHUP_SECRET}
|
||||||
- BACKEND_PORT=443
|
- ROBOT_ADMIN_SECRET_RESET=true
|
||||||
|
- DB_TYPE=mysql
|
||||||
|
- DB_HOST=dnpm-mysql
|
||||||
|
- DB_USERNAME=root
|
||||||
|
- DB_PASSWORD=${DNPM_MYSQL_ROOT_PASSWORD}
|
||||||
|
- DB_DATABASE=auth
|
||||||
labels:
|
labels:
|
||||||
- "traefik.enable=true"
|
- "traefik.enable=true"
|
||||||
- "traefik.http.routers.bwhc-frontend.rule=PathPrefix(`/`)"
|
- "traefik.http.middlewares.authup-strip.stripprefix.prefixes=/auth/"
|
||||||
- "traefik.http.services.bwhc-frontend.loadbalancer.server.port=8080"
|
- "traefik.http.routers.dnpm-auth.middlewares=authup-strip"
|
||||||
- "traefik.http.routers.bwhc-frontend.tls=true"
|
- "traefik.http.routers.dnpm-auth.rule=PathPrefix(`/auth`)"
|
||||||
|
- "traefik.http.services.dnpm-auth.loadbalancer.server.port=3000"
|
||||||
|
- "traefik.http.routers.dnpm-auth.tls=true"
|
||||||
|
|
||||||
|
dnpm-portal:
|
||||||
|
image: ghcr.io/dnpm-dip/portal:latest
|
||||||
|
container_name: bridgehead-dnpm-portal
|
||||||
|
environment:
|
||||||
|
- NUXT_API_URL=http://dnpm-backend:9000/
|
||||||
|
- NUXT_PUBLIC_API_URL=https://${HOST}/api/
|
||||||
|
- NUXT_AUTHUP_URL=http://dnpm-authup:3000/
|
||||||
|
- NUXT_PUBLIC_AUTHUP_URL=https://${HOST}/auth/
|
||||||
|
labels:
|
||||||
|
- "traefik.enable=true"
|
||||||
|
- "traefik.http.routers.dnpm-frontend.rule=PathPrefix(`/`)"
|
||||||
|
- "traefik.http.services.dnpm-frontend.loadbalancer.server.port=3000"
|
||||||
|
- "traefik.http.routers.dnpm-frontend.tls=true"
|
||||||
|
|
||||||
|
dnpm-backend:
|
||||||
|
container_name: bridgehead-dnpm-backend
|
||||||
|
image: ghcr.io/dnpm-dip/backend:latest
|
||||||
|
environment:
|
||||||
|
- LOCAL_SITE=${ZPM_SITE}:${SITE_NAME} # Format: {Site-ID}:{Site-name}, e.g. UKT:Tübingen
|
||||||
|
- RD_RANDOM_DATA=${DNPM_SYNTH_NUM:--1}
|
||||||
|
- MTB_RANDOM_DATA=${DNPM_SYNTH_NUM:--1}
|
||||||
|
- HATEOAS_HOST=https://${HOST}
|
||||||
|
- CONNECTOR_TYPE=broker
|
||||||
|
- AUTHUP_URL=robot://system:${DNPM_AUTHUP_SECRET}@http://dnpm-authup:3000
|
||||||
|
volumes:
|
||||||
|
- /etc/bridgehead/dnpm/config:/dnpm_config
|
||||||
|
- /var/cache/bridgehead/dnpm/backend-data:/dnpm_data
|
||||||
|
depends_on:
|
||||||
|
dnpm-authup:
|
||||||
|
condition: service_healthy
|
||||||
|
labels:
|
||||||
|
- "traefik.enable=true"
|
||||||
|
- "traefik.http.services.dnpm-backend.loadbalancer.server.port=9000"
|
||||||
|
# expose everything
|
||||||
|
- "traefik.http.routers.dnpm-backend.rule=PathPrefix(`/api`)"
|
||||||
|
- "traefik.http.routers.dnpm-backend.tls=true"
|
||||||
|
- "traefik.http.routers.dnpm-backend.service=dnpm-backend"
|
||||||
|
# except ETL
|
||||||
|
- "traefik.http.routers.dnpm-backend-etl.rule=PathRegexp(`^/api(/.*)?etl(/.*)?$`)"
|
||||||
|
- "traefik.http.routers.dnpm-backend-etl.tls=true"
|
||||||
|
- "traefik.http.routers.dnpm-backend-etl.service=dnpm-backend"
|
||||||
|
# this needs an ETL processor with support for basic auth
|
||||||
|
- "traefik.http.routers.dnpm-backend-etl.middlewares=auth"
|
||||||
|
# except peer-to-peer
|
||||||
|
- "traefik.http.routers.dnpm-backend-peer.rule=PathRegexp(`^/api(/.*)?/peer2peer(/.*)?$`)"
|
||||||
|
- "traefik.http.routers.dnpm-backend-peer.tls=true"
|
||||||
|
- "traefik.http.routers.dnpm-backend-peer.service=dnpm-backend"
|
||||||
|
- "traefik.http.routers.dnpm-backend-peer.middlewares=dnpm-backend-peer"
|
||||||
|
# this effectively denies all requests
|
||||||
|
# this is okay, because requests from peers don't go through Traefik
|
||||||
|
- "traefik.http.middlewares.dnpm-backend-peer.ipWhiteList.sourceRange=0.0.0.0/32"
|
||||||
|
|
||||||
|
landing:
|
||||||
|
labels:
|
||||||
|
- "traefik.http.routers.landing.rule=PathPrefix(`/landing`)"
|
||||||
|
@ -1,28 +1,16 @@
|
|||||||
#!/bin/bash
|
#!/bin/bash
|
||||||
|
|
||||||
if [ -n "${ENABLE_DNPM_NODE}" ]; then
|
if [ -n "${ENABLE_DNPM_NODE}" ]; then
|
||||||
log INFO "DNPM setup detected (BwHC Node) -- will start BwHC node."
|
log INFO "DNPM setup detected -- will start DNPM:DIP node."
|
||||||
OVERRIDE+=" -f ./$PROJECT/modules/dnpm-node-compose.yml"
|
OVERRIDE+=" -f ./$PROJECT/modules/dnpm-node-compose.yml"
|
||||||
|
|
||||||
# Set variables required for BwHC Node. ZPM_SITE is assumed to be set in /etc/bridgehead/<project>.conf
|
# Set variables required for BwHC Node. ZPM_SITE is assumed to be set in /etc/bridgehead/<project>.conf
|
||||||
DNPM_APPLICATION_SECRET="$(echo \"This is a salt string to generate one consistent password for DNPM. It is not required to be secret.\" | sha1sum | openssl pkeyutl -sign -inkey /etc/bridgehead/pki/${SITE_ID}.priv.pem | base64 | head -c 30)"
|
|
||||||
if [ -z "${ZPM_SITE+x}" ]; then
|
if [ -z "${ZPM_SITE+x}" ]; then
|
||||||
log ERROR "Mandatory variable ZPM_SITE not defined!"
|
log ERROR "Mandatory variable ZPM_SITE not defined!"
|
||||||
exit 1
|
exit 1
|
||||||
fi
|
fi
|
||||||
if [ -z "${DNPM_DATA_DIR+x}" ]; then
|
mkdir -p /var/cache/bridgehead/dnpm/ || fail_and_report 1 "Failed to create '/var/cache/bridgehead/dnpm/'. Please run sudo './bridgehead install $PROJECT' again to fix the permissions."
|
||||||
log ERROR "Mandatory variable DNPM_DATA_DIR not defined!"
|
DNPM_SYNTH_NUM=${DNPM_SYNTH_NUM:--1}
|
||||||
exit 1
|
DNPM_MYSQL_ROOT_PASSWORD="$(generate_simple_password 'dnpm mysql')"
|
||||||
fi
|
DNPM_AUTHUP_SECRET="$(generate_simple_password 'dnpm authup')"
|
||||||
DNPM_SYNTH_NUM=${DNPM_SYNTH_NUM:-0}
|
|
||||||
if grep -q 'traefik.http.routers.landing.rule=PathPrefix(`/landing`)' /srv/docker/bridgehead/minimal/docker-compose.override.yml 2>/dev/null; then
|
|
||||||
echo "Override of landing page url already in place"
|
|
||||||
else
|
|
||||||
echo "Adding override of landing page url"
|
|
||||||
if [ -f /srv/docker/bridgehead/minimal/docker-compose.override.yml ]; then
|
|
||||||
echo -e ' landing:\n labels:\n - "traefik.http.routers.landing.rule=PathPrefix(`/landing`)"' >> /srv/docker/bridgehead/minimal/docker-compose.override.yml
|
|
||||||
else
|
|
||||||
echo -e 'version: "3.7"\nservices:\n landing:\n labels:\n - "traefik.http.routers.landing.rule=PathPrefix(`/landing`)"' >> /srv/docker/bridgehead/minimal/docker-compose.override.yml
|
|
||||||
fi
|
|
||||||
fi
|
|
||||||
fi
|
fi
|
||||||
|
51
modules/transfair-compose.yml
Normal file
51
modules/transfair-compose.yml
Normal file
@ -0,0 +1,51 @@
|
|||||||
|
|
||||||
|
services:
|
||||||
|
transfair:
|
||||||
|
image: docker.verbis.dkfz.de/cache/samply/transfair:latest
|
||||||
|
container_name: bridgehead-transfair
|
||||||
|
environment:
|
||||||
|
# NOTE: Those 3 variables need only to be passed if their set, otherwise transfair will complain about empty url values
|
||||||
|
- INSTITUTE_TTP_URL
|
||||||
|
- INSTITUTE_TTP_API_KEY
|
||||||
|
- PROJECT_ID_SYSTEM
|
||||||
|
- FHIR_REQUEST_URL=${FHIR_REQUEST_URL}
|
||||||
|
- FHIR_INPUT_URL=${FHIR_INPUT_URL}
|
||||||
|
- FHIR_OUTPUT_URL=${FHIR_OUTPUT_URL:-http://blaze:8080}
|
||||||
|
- FHIR_REQUEST_CREDENTIALS=${FHIR_REQUEST_CREDENTIALS}
|
||||||
|
- FHIR_INPUT_CREDENTIALS=${FHIR_INPUT_CREDENTIALS}
|
||||||
|
- FHIR_OUTPUT_CREDENTIALS=${FHIR_OUTPUT_CREDENTIALS}
|
||||||
|
- EXCHANGE_ID_SYSTEM=${EXCHANGE_ID_SYSTEM:-SESSION_ID}
|
||||||
|
- DATABASE_URL=sqlite://transfair/data_requests.sql?mode=rwc
|
||||||
|
- RUST_LOG=${RUST_LOG:-info}
|
||||||
|
volumes:
|
||||||
|
- /var/cache/bridgehead/${PROJECT}/transfair:/transfair
|
||||||
|
|
||||||
|
transfair-input-blaze:
|
||||||
|
image: docker.verbis.dkfz.de/cache/samply/blaze:0.28
|
||||||
|
container_name: bridgehead-transfair-input-blaze
|
||||||
|
environment:
|
||||||
|
BASE_URL: "http://bridgehead-transfair-input-blaze:8080"
|
||||||
|
JAVA_TOOL_OPTIONS: "-Xmx1024m"
|
||||||
|
DB_BLOCK_CACHE_SIZE: 1024
|
||||||
|
CQL_EXPR_CACHE_SIZE: 8
|
||||||
|
ENFORCE_REFERENTIAL_INTEGRITY: "false"
|
||||||
|
volumes:
|
||||||
|
- "transfair-input-blaze-data:/app/data"
|
||||||
|
profiles: ["transfair-input-blaze"]
|
||||||
|
|
||||||
|
transfair-request-blaze:
|
||||||
|
image: docker.verbis.dkfz.de/cache/samply/blaze:0.28
|
||||||
|
container_name: bridgehead-transfair-requests-blaze
|
||||||
|
environment:
|
||||||
|
BASE_URL: "http://bridgehead-transfair-requests-blaze:8080"
|
||||||
|
JAVA_TOOL_OPTIONS: "-Xmx1024m"
|
||||||
|
DB_BLOCK_CACHE_SIZE: 1024
|
||||||
|
CQL_EXPR_CACHE_SIZE: 8
|
||||||
|
ENFORCE_REFERENTIAL_INTEGRITY: "false"
|
||||||
|
volumes:
|
||||||
|
- "transfair-request-blaze-data:/app/data"
|
||||||
|
profiles: ["transfair-request-blaze"]
|
||||||
|
|
||||||
|
volumes:
|
||||||
|
transfair-input-blaze-data:
|
||||||
|
transfair-request-blaze-data:
|
22
modules/transfair-setup.sh
Executable file
22
modules/transfair-setup.sh
Executable file
@ -0,0 +1,22 @@
|
|||||||
|
#!/bin/bash -e
|
||||||
|
|
||||||
|
function transfairSetup() {
|
||||||
|
if [[ -n "$INSTITUTE_TTP_URL" || -n "$EXCHANGE_ID_SYSTEM" ]]; then
|
||||||
|
echo "Starting transfair."
|
||||||
|
OVERRIDE+=" -f ./modules/transfair-compose.yml"
|
||||||
|
if [ -n "$FHIR_INPUT_URL" ]; then
|
||||||
|
log INFO "TransFAIR input fhir store set to external $FHIR_INPUT_URL"
|
||||||
|
else
|
||||||
|
log INFO "TransFAIR input fhir store not set writing to internal blaze"
|
||||||
|
FHIR_INPUT_URL="http://transfair-input-blaze:8080"
|
||||||
|
OVERRIDE+=" --profile transfair-input-blaze"
|
||||||
|
fi
|
||||||
|
if [ -n "$FHIR_REQUEST_URL" ]; then
|
||||||
|
log INFO "TransFAIR request fhir store set to external $FHIR_REQUEST_URL"
|
||||||
|
else
|
||||||
|
log INFO "TransFAIR request fhir store not set writing to internal blaze"
|
||||||
|
FHIR_REQUEST_URL="http://transfair-requests-blaze:8080"
|
||||||
|
OVERRIDE+=" --profile transfair-request-blaze"
|
||||||
|
fi
|
||||||
|
fi
|
||||||
|
}
|
Reference in New Issue
Block a user