mirror of
https://github.com/samply/bridgehead.git
synced 2026-04-17 20:50:15 +02:00
Compare commits
1 Commits
main
...
feat/proxy
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
74c913cd0c |
31
README.md
31
README.md
@@ -27,7 +27,6 @@ This repository is the starting point for any information and tools you will nee
|
|||||||
- [Teiler (Frontend)](#teiler-frontend)
|
- [Teiler (Frontend)](#teiler-frontend)
|
||||||
- [Data Exporter Service](#data-exporter-service)
|
- [Data Exporter Service](#data-exporter-service)
|
||||||
- [Data Quality Report](#data-quality-report)
|
- [Data Quality Report](#data-quality-report)
|
||||||
- [Data Quality Agent](#data-quality-agent)
|
|
||||||
4. [Things you should know](#things-you-should-know)
|
4. [Things you should know](#things-you-should-know)
|
||||||
- [Auto-Updates](#auto-updates)
|
- [Auto-Updates](#auto-updates)
|
||||||
- [Auto-Backups](#auto-backups)
|
- [Auto-Backups](#auto-backups)
|
||||||
@@ -74,7 +73,7 @@ We recommend to install Docker(-compose) from its official sources as described
|
|||||||
|
|
||||||
A Bridgehead communicates to all central components via outgoing HTTPS connections.
|
A Bridgehead communicates to all central components via outgoing HTTPS connections.
|
||||||
|
|
||||||
Your site might require an outgoing proxy (i.e. HTTPS forward proxy) to connect to external servers; you should discuss this with your local systems administration. In that case, you will need to note down the URL of the proxy. If the proxy requires authentication, you will also need to make a note of its username and password. This information will be used later on during the installation process. TLS terminating proxies are also supported, see [here](#tls-terminating-proxies). Apart from the Bridgehead itself, you may also need to configure the proxy server in [git](https://gist.github.com/evantoli/f8c23a37eb3558ab8765) and [docker](https://docs.docker.com/network/proxy/).
|
Your site might require an outgoing proxy (i.e. HTTPS forward proxy) to connect to external servers; you should discuss this with your local systems administration. In that case, you will need to note down the URL of the proxy. If the proxy requires authentication, you will also need to make a note of its username and password. This information will be used later on during the installation process. Special characters in the proxy values, e.g. in the access credentials, must be [URL-encoded](https://en.wikipedia.org/wiki/Percent-encoding), e.g. by replacing `@` with `%40`, `/` with `%2F` and so on. TLS terminating proxies are also supported, see [here](#tls-terminating-proxies). Apart from the Bridgehead itself, you may also need to configure the proxy server in [git](https://gist.github.com/evantoli/f8c23a37eb3558ab8765) and [docker](https://docs.docker.com/network/proxy/).
|
||||||
|
|
||||||
The following URLs need to be accessible (prefix with `https://`):
|
The following URLs need to be accessible (prefix with `https://`):
|
||||||
* To fetch code and configuration from git repositories
|
* To fetch code and configuration from git repositories
|
||||||
@@ -425,32 +424,6 @@ ENABLE_EXPORTER=true
|
|||||||
```
|
```
|
||||||
[For further information](docs/exporter.md)
|
[For further information](docs/exporter.md)
|
||||||
|
|
||||||
### Data Quality Agent
|
|
||||||
|
|
||||||
The Data Quality Agent is an optional module that periodically evaluates the quality of FHIR data stored in Blaze. It generates local data quality reports accessible via the Bridgehead web interface.
|
|
||||||
|
|
||||||
To enable the service, set the following variable in your `<PROJECT>.conf` file:
|
|
||||||
|
|
||||||
```bash
|
|
||||||
ENABLE_DATA_QUALITY_AGENT=true
|
|
||||||
```
|
|
||||||
|
|
||||||
#### Sharing Data Quality Reports (recommended)
|
|
||||||
|
|
||||||
We encourage sharing your data quality reports with the central BBMRI-ERIC quality dashboard. The reports contain only aggregated, non-patient-identifiable statistics and help the network to monitor and improve overall data quality. However, quality reporting is completely optional and opt-in.
|
|
||||||
|
|
||||||
To opt in, additionally set the following variables in your `<PROJECT>.conf` file:
|
|
||||||
|
|
||||||
```bash
|
|
||||||
DATA_QUALITY_SERVER_URL=https://quality-dashboard.bbmri-eric.eu
|
|
||||||
DATA_QUALITY_SERVER_NAME=Central Data Quality Server of BBMRI
|
|
||||||
```
|
|
||||||
|
|
||||||
If these variables are not set, the Data Quality Agent will still run and generate local reports, but no data will be shared externally.
|
|
||||||
|
|
||||||
Reports are accessible at `https://<your-host>/bbmri-data-quality-agent` (default credentials are admin:admin, please change it after first login!!).
|
|
||||||
|
|
||||||
[Official documentation](https://fdqf.bbmri-eric.eu/user/deployment.html)
|
|
||||||
## Things you should know
|
## Things you should know
|
||||||
|
|
||||||
### Auto-Updates
|
### Auto-Updates
|
||||||
@@ -563,6 +536,8 @@ and restart the docker daemon:
|
|||||||
sudo systemctl restart docker
|
sudo systemctl restart docker
|
||||||
```
|
```
|
||||||
|
|
||||||
|
Please note that special characters in the proxy value, such as `#?!()[]{}`, must be double escaped using `%%`.
|
||||||
|
|
||||||
For more information, please consult the [official documentation](https://docs.docker.com/config/daemon/systemd/#httphttps-proxy).
|
For more information, please consult the [official documentation](https://docs.docker.com/config/daemon/systemd/#httphttps-proxy).
|
||||||
|
|
||||||
### Monitoring
|
### Monitoring
|
||||||
|
|||||||
@@ -1,23 +0,0 @@
|
|||||||
version: "3.7"
|
|
||||||
|
|
||||||
services:
|
|
||||||
data-quality-agent:
|
|
||||||
image: ghcr.io/bbmri-cz/data-quality-server:${DATA_QUALITY_AGENT_TAG}
|
|
||||||
container_name: bridgehead-bbmri-data-quality-agent
|
|
||||||
environment:
|
|
||||||
APP_SETTING_FHIR_URL: http://bridgehead-bbmri-blaze:8080/fhir
|
|
||||||
REPORTING_SERVER_URL: ${DATA_QUALITY_SERVER_URL}
|
|
||||||
REPORTING_SERVER_NAME: ${DATA_QUALITY_SERVER_NAME}
|
|
||||||
labels:
|
|
||||||
- "traefik.enable=true"
|
|
||||||
- "traefik.http.routers.data_quality_agent_bbmri.rule=PathPrefix(`/bbmri-data-quality-agent`)"
|
|
||||||
- "traefik.http.services.data_quality_agent_bbmri.loadbalancer.server.port=8082"
|
|
||||||
- "traefik.http.routers.data_quality_agent_bbmri.tls=true"
|
|
||||||
- "traefik.http.middlewares.data_quality_agent_bbmri_strip.stripprefix.prefixes=/bbmri-data-quality-agent"
|
|
||||||
- "traefik.http.routers.data_quality_agent_bbmri.middlewares=data_quality_agent_bbmri_strip,auth"
|
|
||||||
depends_on:
|
|
||||||
- "blaze"
|
|
||||||
volumes:
|
|
||||||
- /var/cache/bridgehead/bbmri/agent-db:/app/data
|
|
||||||
- /etc/localtime:/etc/localtime:ro
|
|
||||||
- /etc/timezone:/etc/timezone:ro
|
|
||||||
@@ -1,7 +0,0 @@
|
|||||||
#!/bin/bash
|
|
||||||
|
|
||||||
if [ "$ENABLE_DATA_QUALITY_AGENT" == "true" ]; then
|
|
||||||
log INFO "Data Quality Agent setup detected -- will start data-quality-agent service."
|
|
||||||
OVERRIDE+=" -f ./$PROJECT/modules/data-quality-agent-compose.yml"
|
|
||||||
fi
|
|
||||||
|
|
||||||
@@ -1,6 +1,6 @@
|
|||||||
#!/bin/bash
|
#!/bin/bash
|
||||||
|
|
||||||
if [ -n "${DS_DIRECTORY_USER_NAME}" ] || [ -n "${DS_DIRECTORY_USER_TOKEN}" ]; then
|
if [ -n "${DS_DIRECTORY_USER_NAME}" ]; then
|
||||||
log INFO "Directory sync setup detected -- will start directory sync service."
|
log INFO "Directory sync setup detected -- will start directory sync service."
|
||||||
OVERRIDE+=" -f ./$PROJECT/modules/directory-sync-compose.yml"
|
OVERRIDE+=" -f ./$PROJECT/modules/directory-sync-compose.yml"
|
||||||
fi
|
fi
|
||||||
|
|||||||
@@ -3,8 +3,6 @@ services:
|
|||||||
lens:
|
lens:
|
||||||
container_name: lens_federated-search
|
container_name: lens_federated-search
|
||||||
image: samply/cce-explorer:main
|
image: samply/cce-explorer:main
|
||||||
environment:
|
|
||||||
PUBLIC_SPOT_URL: https://${HOST}/prod
|
|
||||||
labels:
|
labels:
|
||||||
- "traefik.http.services.lens.loadbalancer.server.port=3000"
|
- "traefik.http.services.lens.loadbalancer.server.port=3000"
|
||||||
- "traefik.enable=true"
|
- "traefik.enable=true"
|
||||||
|
|||||||
@@ -1,6 +0,0 @@
|
|||||||
#!/bin/bash
|
|
||||||
if [ -n "$ENABLE_OSIRIS2FHIR" ]; then
|
|
||||||
log INFO "OSIRIS2FHIR-REST setup detected -- will start osiris2fhir module."
|
|
||||||
OVERRIDE+=" -f ./pscc/modules/osiris2fhir-compose.yml"
|
|
||||||
LOCAL_SALT="$(echo \"local-random-salt\" | openssl pkeyutl -sign -inkey /etc/bridgehead/pki/${SITE_ID}.priv.pem | base64 | head -c 30)"
|
|
||||||
fi
|
|
||||||
@@ -15,7 +15,7 @@ services:
|
|||||||
- "blaze-data:/app/data"
|
- "blaze-data:/app/data"
|
||||||
labels:
|
labels:
|
||||||
- "traefik.enable=true"
|
- "traefik.enable=true"
|
||||||
- "traefik.http.routers.blaze_itcc.rule=Host(`${HOST}`) && PathPrefix(`/itcc-localdatamanagement`)"
|
- "traefik.http.routers.blaze_itcc.rule=PathPrefix(`/itcc-localdatamanagement`)"
|
||||||
- "traefik.http.middlewares.itcc_b_strip.stripprefix.prefixes=/itcc-localdatamanagement"
|
- "traefik.http.middlewares.itcc_b_strip.stripprefix.prefixes=/itcc-localdatamanagement"
|
||||||
- "traefik.http.services.blaze_itcc.loadbalancer.server.port=8080"
|
- "traefik.http.services.blaze_itcc.loadbalancer.server.port=8080"
|
||||||
- "traefik.http.routers.blaze_itcc.middlewares=itcc_b_strip,auth"
|
- "traefik.http.routers.blaze_itcc.middlewares=itcc_b_strip,auth"
|
||||||
@@ -34,6 +34,7 @@ services:
|
|||||||
EPSILON: 0.28
|
EPSILON: 0.28
|
||||||
QUERIES_TO_CACHE: '/queries_to_cache.conf'
|
QUERIES_TO_CACHE: '/queries_to_cache.conf'
|
||||||
ENDPOINT_TYPE: ${FOCUS_ENDPOINT_TYPE:-blaze}
|
ENDPOINT_TYPE: ${FOCUS_ENDPOINT_TYPE:-blaze}
|
||||||
|
CQL_PROJECTS_ENABLED: "itcc"
|
||||||
volumes:
|
volumes:
|
||||||
- /srv/docker/bridgehead/itcc/queries_to_cache.conf:/queries_to_cache.conf:ro
|
- /srv/docker/bridgehead/itcc/queries_to_cache.conf:/queries_to_cache.conf:ro
|
||||||
depends_on:
|
depends_on:
|
||||||
|
|||||||
@@ -1,6 +0,0 @@
|
|||||||
#!/bin/bash
|
|
||||||
|
|
||||||
if [ -n "$ENABLE_OMICS" ];then
|
|
||||||
OVERRIDE+=" -f ./$PROJECT/modules/itcc-omics-ingest.yaml"
|
|
||||||
GENERATE_API_KEY="$(generate_simple_password 'omics')"
|
|
||||||
fi
|
|
||||||
@@ -1,14 +0,0 @@
|
|||||||
services:
|
|
||||||
omics-endpoint:
|
|
||||||
image: ghcr.io/samply/itcc-omics-ingest:main
|
|
||||||
environment:
|
|
||||||
- API_KEY=${GENERATE_API_KEY}
|
|
||||||
volumes:
|
|
||||||
- /var/cache/bridgehead/omics/data:/data/uploads
|
|
||||||
labels:
|
|
||||||
- "traefik.http.routers.omics.rule=Host(`${HOST}`) && PathPrefix(`/api/omics`)"
|
|
||||||
- "traefik.enable=true"
|
|
||||||
- "traefik.http.services.omics.loadbalancer.server.port=6080"
|
|
||||||
- "traefik.http.routers.omics.tls=true"
|
|
||||||
- "traefik.http.middlewares.omics-stripprefix.stripprefix.prefixes=/api"
|
|
||||||
- "traefik.http.routers.omics.middlewares=omics-stripprefix"
|
|
||||||
@@ -1,47 +1,33 @@
|
|||||||
version: "3.7"
|
version: "3.7"
|
||||||
services:
|
services:
|
||||||
itcc-explorer:
|
landing:
|
||||||
container_name: lens_itcc_explorer
|
container_name: lens_federated-search
|
||||||
image: samply/itcc-explorer:main
|
image: docker.verbis.dkfz.de/ccp/lens:${SITE_ID}
|
||||||
environment:
|
|
||||||
HOST: "0.0.0.0"
|
|
||||||
BIND_ADDR: "0.0.0.0:3000"
|
|
||||||
PUBLIC_ENVIRONMENT: ${PUBLIC_ENVIRONMENT}
|
|
||||||
labels:
|
labels:
|
||||||
- "traefik.enable=true"
|
- "traefik.enable=true"
|
||||||
- "traefik.http.routers.itcc.rule=Host(`${HOST}`) && PathPrefix(`/`)"
|
- "traefik.http.routers.landing.rule=PathPrefix(`/`)"
|
||||||
- "traefik.http.routers.itcc.entrypoints=websecure"
|
- "traefik.http.services.landing.loadbalancer.server.port=80"
|
||||||
- "traefik.http.services.itcc.loadbalancer.server.port=3000"
|
- "traefik.http.routers.landing.tls=true"
|
||||||
- "traefik.http.routers.itcc.tls=true"
|
|
||||||
|
|
||||||
spot:
|
spot:
|
||||||
image: samply/rustyspot:latest
|
image: docker.verbis.dkfz.de/ccp-private/central-spot
|
||||||
environment:
|
environment:
|
||||||
BEAM_SECRET: "${FOCUS_BEAM_SECRET_SHORT}"
|
BEAM_SECRET: "${FOCUS_BEAM_SECRET_SHORT}"
|
||||||
BEAM_PROXY_URL: http://beam-proxy:8081
|
BEAM_URL: http://beam-proxy:8081
|
||||||
BEAM_PROXY_ID: ${SITE_ID}
|
BEAM_PROXY_ID: ${SITE_ID}
|
||||||
BEAM_BROKER_ID: ${BROKER_ID}
|
BEAM_BROKER_ID: ${BROKER_ID}
|
||||||
BEAM_APP_ID: "spot.${SITE_ID}.${BROKER_ID}"
|
BEAM_APP_ID: "focus"
|
||||||
CORS_ORIGIN: "https://${HOST}"
|
PROJECT_METADATA: "itcc"
|
||||||
SITES: ${SITES}
|
|
||||||
TRANSFORM: LENS
|
|
||||||
PROJECT: "itcc"
|
|
||||||
BIND_ADDR: 0.0.0.0:8055
|
|
||||||
depends_on:
|
depends_on:
|
||||||
- "beam-proxy"
|
- "beam-proxy"
|
||||||
labels:
|
labels:
|
||||||
- "traefik.enable=true"
|
- "traefik.enable=true"
|
||||||
- "traefik.http.services.spot.loadbalancer.server.port=8055"
|
- "traefik.http.services.spot.loadbalancer.server.port=8080"
|
||||||
- "traefik.http.middlewares.corsheaders2.headers.accesscontrolallowmethods=GET,OPTIONS,POST"
|
- "traefik.http.middlewares.corsheaders2.headers.accesscontrolallowmethods=GET,OPTIONS,POST"
|
||||||
- "traefik.http.middlewares.corsheaders2.headers.accesscontrolallowheaders=content-type"
|
|
||||||
- "traefik.http.middlewares.corsheaders2.headers.accesscontrolalloworiginlist=https://${HOST}"
|
- "traefik.http.middlewares.corsheaders2.headers.accesscontrolalloworiginlist=https://${HOST}"
|
||||||
- "traefik.http.middlewares.corsheaders2.headers.accesscontrolallowcredentials=true"
|
- "traefik.http.middlewares.corsheaders2.headers.accesscontrolallowcredentials=true"
|
||||||
- "traefik.http.middlewares.corsheaders2.headers.accesscontrolmaxage=-1"
|
- "traefik.http.middlewares.corsheaders2.headers.accesscontrolmaxage=-1"
|
||||||
- "traefik.http.routers.spot.rule=Host(`${HOST}`) && PathPrefix(`/prod`)"
|
- "traefik.http.routers.spot.rule=Host(`${HOST}`) && PathPrefix(`/backend`)"
|
||||||
- "traefik.http.middlewares.stripprefix_spot.stripprefix.prefixes=/prod"
|
- "traefik.http.middlewares.stripprefix_spot.stripprefix.prefixes=/backend"
|
||||||
- "traefik.http.routers.spot.tls=true"
|
- "traefik.http.routers.spot.tls=true"
|
||||||
- "traefik.http.routers.spot.middlewares=corsheaders2,stripprefix_spot,auth"
|
- "traefik.http.routers.spot.middlewares=corsheaders2,stripprefix_spot,auth"
|
||||||
|
|
||||||
beam-proxy:
|
|
||||||
environment:
|
|
||||||
APP_spot_KEY: ${FOCUS_BEAM_SECRET_SHORT}
|
|
||||||
|
|||||||
@@ -6,7 +6,6 @@ FOCUS_RETRY_COUNT=${FOCUS_RETRY_COUNT:-64}
|
|||||||
SUPPORT_EMAIL=arturo.macias@dkfz-heidelberg.de
|
SUPPORT_EMAIL=arturo.macias@dkfz-heidelberg.de
|
||||||
PRIVATEKEYFILENAME=/etc/bridgehead/pki/${SITE_ID}.priv.pem
|
PRIVATEKEYFILENAME=/etc/bridgehead/pki/${SITE_ID}.priv.pem
|
||||||
BROKER_URL_FOR_PREREQ=$BROKER_URL
|
BROKER_URL_FOR_PREREQ=$BROKER_URL
|
||||||
PUBLIC_ENVIRONMENT=prod
|
|
||||||
|
|
||||||
for module in $PROJECT/modules/*.sh
|
for module in $PROJECT/modules/*.sh
|
||||||
do
|
do
|
||||||
|
|||||||
@@ -12,8 +12,7 @@ services:
|
|||||||
BASE_URL: "http://bridgehead-kr-blaze:8080"
|
BASE_URL: "http://bridgehead-kr-blaze:8080"
|
||||||
JAVA_TOOL_OPTIONS: "-Xmx${BLAZE_MEMORY_CAP:-4096}m"
|
JAVA_TOOL_OPTIONS: "-Xmx${BLAZE_MEMORY_CAP:-4096}m"
|
||||||
DB_RESOURCE_CACHE_SIZE: ${BLAZE_RESOURCE_CACHE_CAP:-2500000}
|
DB_RESOURCE_CACHE_SIZE: ${BLAZE_RESOURCE_CACHE_CAP:-2500000}
|
||||||
DB_BLOCK_CACHE_SIZE: ${BLAZE_MEMORY_CAP}
|
DB_BLOCK_CACHE_SIZE: $BLAZE_MEMORY_CAP
|
||||||
CQL_EXPR_CACHE_SIZE: ${BLAZE_CQL_CACHE_CAP:-32}
|
|
||||||
ENFORCE_REFERENTIAL_INTEGRITY: "false"
|
ENFORCE_REFERENTIAL_INTEGRITY: "false"
|
||||||
volumes:
|
volumes:
|
||||||
- "blaze-data:/app/data"
|
- "blaze-data:/app/data"
|
||||||
|
|||||||
6
kr/modules/export-and-qb.curl-templates
Normal file
6
kr/modules/export-and-qb.curl-templates
Normal file
@@ -0,0 +1,6 @@
|
|||||||
|
# Full Excel Export
|
||||||
|
curl --location --request POST 'https://${HOST}/ccp-exporter/request?query=Patient&query-format=FHIR_PATH&template-id=ccp&output-format=EXCEL' \
|
||||||
|
--header 'x-api-key: ${EXPORT_API_KEY}'
|
||||||
|
|
||||||
|
# QB
|
||||||
|
curl --location --request POST 'https://${HOST}/ccp-reporter/generate?template-id=ccp'
|
||||||
@@ -4,41 +4,32 @@ services:
|
|||||||
deploy:
|
deploy:
|
||||||
replicas: 1 #reactivate if lens is in use
|
replicas: 1 #reactivate if lens is in use
|
||||||
container_name: lens_federated-search
|
container_name: lens_federated-search
|
||||||
image: docker.verbis.dkfz.de/ccp/kr-explorer:main
|
image: docker.verbis.dkfz.de/ccp/lens:${SITE_ID}
|
||||||
environment:
|
|
||||||
PUBLIC_SPOT_URL: https://${HOST}/prod
|
|
||||||
labels:
|
labels:
|
||||||
- "traefik.http.services.lens.loadbalancer.server.port=3000"
|
|
||||||
- "traefik.enable=true"
|
- "traefik.enable=true"
|
||||||
- "traefik.http.routers.lens.rule=Host(`${HOST}`)"
|
- "traefik.http.routers.landing.rule=PathPrefix(`/`)"
|
||||||
- "traefik.http.routers.lens.tls=true"
|
- "traefik.http.services.landing.loadbalancer.server.port=80"
|
||||||
|
- "traefik.http.routers.landing.tls=true"
|
||||||
|
|
||||||
spot:
|
spot:
|
||||||
image: samply/rustyspot:latest
|
image: docker.verbis.dkfz.de/ccp-private/central-spot
|
||||||
environment:
|
environment:
|
||||||
BEAM_SECRET: "${FOCUS_BEAM_SECRET_SHORT}"
|
BEAM_SECRET: "${FOCUS_BEAM_SECRET_SHORT}"
|
||||||
BEAM_PROXY_URL: http://beam-proxy:8081
|
BEAM_URL: http://beam-proxy:8081
|
||||||
BEAM_APP_ID: "spot.${SITE_ID}.${BROKER_ID}"
|
BEAM_PROXY_ID: ${SITE_ID}
|
||||||
CORS_ORIGIN: "https://${HOST}"
|
BEAM_BROKER_ID: ${BROKER_ID}
|
||||||
SITES: ${SITES}
|
BEAM_APP_ID: "focus"
|
||||||
TRANSFORM: LENS
|
PROJECT_METADATA: "kr_supervisors"
|
||||||
PROJECT: kr
|
|
||||||
BIND_ADDR: 0.0.0.0:8055
|
|
||||||
depends_on:
|
depends_on:
|
||||||
- "beam-proxy"
|
- "beam-proxy"
|
||||||
labels:
|
labels:
|
||||||
- "traefik.enable=true"
|
- "traefik.enable=true"
|
||||||
- "traefik.http.services.spot.loadbalancer.server.port=8055"
|
- "traefik.http.services.spot.loadbalancer.server.port=8080"
|
||||||
- "traefik.http.middlewares.corsheaders2.headers.accesscontrolallowmethods=GET,OPTIONS,POST"
|
- "traefik.http.middlewares.corsheaders2.headers.accesscontrolallowmethods=GET,OPTIONS,POST"
|
||||||
- "traefik.http.middlewares.corsheaders2.headers.accesscontrolallowheaders=content-type"
|
|
||||||
- "traefik.http.middlewares.corsheaders2.headers.accesscontrolalloworiginlist=https://${HOST}"
|
- "traefik.http.middlewares.corsheaders2.headers.accesscontrolalloworiginlist=https://${HOST}"
|
||||||
- "traefik.http.middlewares.corsheaders2.headers.accesscontrolallowcredentials=true"
|
- "traefik.http.middlewares.corsheaders2.headers.accesscontrolallowcredentials=true"
|
||||||
- "traefik.http.middlewares.corsheaders2.headers.accesscontrolmaxage=-1"
|
- "traefik.http.middlewares.corsheaders2.headers.accesscontrolmaxage=-1"
|
||||||
- "traefik.http.routers.spot.rule=Host(`${HOST}`) && PathPrefix(`/prod`)"
|
- "traefik.http.routers.spot.rule=Host(`${HOST}`) && PathPrefix(`/backend`)"
|
||||||
- "traefik.http.middlewares.stripprefix_spot.stripprefix.prefixes=/prod"
|
- "traefik.http.middlewares.stripprefix_spot.stripprefix.prefixes=/backend"
|
||||||
- "traefik.http.routers.spot.tls=true"
|
- "traefik.http.routers.spot.tls=true"
|
||||||
- "traefik.http.routers.spot.middlewares=corsheaders2,stripprefix_spot,auth"
|
- "traefik.http.routers.spot.middlewares=corsheaders2,stripprefix_spot"
|
||||||
|
|
||||||
beam-proxy:
|
|
||||||
environment:
|
|
||||||
APP_spot_KEY: ${FOCUS_BEAM_SECRET_SHORT}
|
|
||||||
|
|||||||
@@ -3,7 +3,7 @@ version: "3.7"
|
|||||||
services:
|
services:
|
||||||
obds2fhir-rest:
|
obds2fhir-rest:
|
||||||
container_name: bridgehead-obds2fhir-rest
|
container_name: bridgehead-obds2fhir-rest
|
||||||
image: docker.verbis.dkfz.de/samply/obds2fhir-rest:main
|
image: docker.verbis.dkfz.de/ccp/obds2fhir-rest:main
|
||||||
environment:
|
environment:
|
||||||
IDTYPE: BK_${IDMANAGEMENT_FRIENDLY_ID}_L-ID
|
IDTYPE: BK_${IDMANAGEMENT_FRIENDLY_ID}_L-ID
|
||||||
MAINZELLISTE_APIKEY: ${IDMANAGER_LOCAL_PATIENTLIST_APIKEY}
|
MAINZELLISTE_APIKEY: ${IDMANAGER_LOCAL_PATIENTLIST_APIKEY}
|
||||||
|
|||||||
2
kr/vars
2
kr/vars
@@ -3,7 +3,7 @@ BROKER_URL=https://${BROKER_ID}
|
|||||||
PROXY_ID=${SITE_ID}.${BROKER_ID}
|
PROXY_ID=${SITE_ID}.${BROKER_ID}
|
||||||
FOCUS_BEAM_SECRET_SHORT="$(cat /proc/sys/kernel/random/uuid | sed 's/[-]//g' | head -c 20)"
|
FOCUS_BEAM_SECRET_SHORT="$(cat /proc/sys/kernel/random/uuid | sed 's/[-]//g' | head -c 20)"
|
||||||
FOCUS_RETRY_COUNT=${FOCUS_RETRY_COUNT:-64}
|
FOCUS_RETRY_COUNT=${FOCUS_RETRY_COUNT:-64}
|
||||||
SUPPORT_EMAIL=p.delpy@dkfz-heidelberg.de
|
SUPPORT_EMAIL=arturo.macias@dkfz-heidelberg.de
|
||||||
PRIVATEKEYFILENAME=/etc/bridgehead/pki/${SITE_ID}.priv.pem
|
PRIVATEKEYFILENAME=/etc/bridgehead/pki/${SITE_ID}.priv.pem
|
||||||
BROKER_URL_FOR_PREREQ=$BROKER_URL
|
BROKER_URL_FOR_PREREQ=$BROKER_URL
|
||||||
|
|
||||||
|
|||||||
@@ -337,7 +337,7 @@ function sync_secrets() {
|
|||||||
}
|
}
|
||||||
|
|
||||||
function secret_sync_gitlab_token() {
|
function secret_sync_gitlab_token() {
|
||||||
if [[ "$PROJECT" != "ccp" && "$PROJECT" != "bbmri" ]]; then
|
if [[ "$PROJECT" != "dktk" && "$PROJECT" != "bbmri" ]]; then
|
||||||
log "INFO" "Not running Secret Sync for project minimal"
|
log "INFO" "Not running Secret Sync for project minimal"
|
||||||
return
|
return
|
||||||
fi
|
fi
|
||||||
|
|||||||
@@ -1,15 +0,0 @@
|
|||||||
services:
|
|
||||||
osiris2fhir:
|
|
||||||
container_name: bridgehead-osiris2fhir
|
|
||||||
image: docker.verbis.dkfz.de/ccp/osiris2fhir
|
|
||||||
environment:
|
|
||||||
FHIR_PROFILE: ${PROJECT:-pscc}
|
|
||||||
LOG_LEVEL: ${LOG_LEVEL:-INFO}
|
|
||||||
SALT: ${LOCAL_SALT}
|
|
||||||
labels:
|
|
||||||
- "traefik.enable=true"
|
|
||||||
- "traefik.http.routers.osiris2fhir.rule=PathPrefix(`/osiris2fhir`)"
|
|
||||||
- "traefik.http.middlewares.osiris2fhir_strip.stripprefix.prefixes=/osiris2fhir"
|
|
||||||
- "traefik.http.services.osiris2fhir.loadbalancer.server.port=8080"
|
|
||||||
- "traefik.http.routers.osiris2fhir.tls=true"
|
|
||||||
- "traefik.http.routers.osiris2fhir.middlewares=osiris2fhir_strip,auth"
|
|
||||||
@@ -1,6 +0,0 @@
|
|||||||
#!/bin/bash
|
|
||||||
if [ -n "$ENABLE_OSIRIS2FHIR" ]; then
|
|
||||||
log INFO "OSIRIS2FHIR-REST setup detected -- will start osiris2fhir module."
|
|
||||||
OVERRIDE+=" -f ./pscc/modules/osiris2fhir-compose.yml"
|
|
||||||
LOCAL_SALT="$(echo \"local-random-salt\" | openssl pkeyutl -sign -inkey /etc/bridgehead/pki/${SITE_ID}.priv.pem | base64 | head -c 30)"
|
|
||||||
fi
|
|
||||||
@@ -3,5 +3,4 @@ BEAM_TAG=develop
|
|||||||
BLAZE_TAG=0.32
|
BLAZE_TAG=0.32
|
||||||
POSTGRES_TAG=15.13-alpine
|
POSTGRES_TAG=15.13-alpine
|
||||||
TEILER_DASHBOARD_TAG=develop
|
TEILER_DASHBOARD_TAG=develop
|
||||||
MTBA_TAG=develop
|
MTBA_TAG=develop
|
||||||
DATA_QUALITY_AGENT_TAG=latest
|
|
||||||
@@ -3,5 +3,4 @@ BEAM_TAG=main
|
|||||||
BLAZE_TAG=0.32
|
BLAZE_TAG=0.32
|
||||||
POSTGRES_TAG=15.13-alpine
|
POSTGRES_TAG=15.13-alpine
|
||||||
TEILER_DASHBOARD_TAG=main
|
TEILER_DASHBOARD_TAG=main
|
||||||
MTBA_TAG=main
|
MTBA_TAG=main
|
||||||
DATA_QUALITY_AGENT_TAG=0.1
|
|
||||||
@@ -4,4 +4,3 @@ BLAZE_TAG=0.32
|
|||||||
POSTGRES_TAG=15.13-alpine
|
POSTGRES_TAG=15.13-alpine
|
||||||
TEILER_DASHBOARD_TAG=develop
|
TEILER_DASHBOARD_TAG=develop
|
||||||
MTBA_TAG=develop
|
MTBA_TAG=develop
|
||||||
DATA_QUALITY_AGENT_TAG=latest
|
|
||||||
|
|||||||
Reference in New Issue
Block a user