mirror of
https://github.com/samply/bridgehead.git
synced 2026-04-17 22:00:14 +02:00
Compare commits
2 Commits
ovis
...
fix/traefi
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
80f1479818 | ||
|
|
bbda99254f |
6
cce/modules/osiris2fhir-setup.sh
Normal file
6
cce/modules/osiris2fhir-setup.sh
Normal file
@@ -0,0 +1,6 @@
|
|||||||
|
#!/bin/bash
|
||||||
|
if [ -n "$ENABLE_OSIRIS2FHIR" ]; then
|
||||||
|
log INFO "OSIRIS2FHIR-REST setup detected -- will start osiris2fhir module."
|
||||||
|
OVERRIDE+=" -f ./pscc/modules/osiris2fhir-compose.yml"
|
||||||
|
LOCAL_SALT="$(echo \"local-random-salt\" | openssl pkeyutl -sign -inkey /etc/bridgehead/pki/${SITE_ID}.priv.pem | base64 | head -c 30)"
|
||||||
|
fi
|
||||||
@@ -1,104 +0,0 @@
|
|||||||
version: "3.7"
|
|
||||||
|
|
||||||
services:
|
|
||||||
ovis-traefik-forward-auth:
|
|
||||||
image: docker.verbis.dkfz.de/cache/oauth2-proxy/oauth2-proxy:latest
|
|
||||||
environment:
|
|
||||||
- http_proxy=http://forward_proxy:3128
|
|
||||||
- https_proxy=http://forward_proxy:3128
|
|
||||||
- OAUTH2_PROXY_PROVIDER=oidc
|
|
||||||
- OAUTH2_PROXY_SKIP_PROVIDER_BUTTON=true
|
|
||||||
- OAUTH2_PROXY_OIDC_ISSUER_URL=${OIDC_PRIVATE_URL}
|
|
||||||
- OAUTH2_PROXY_CLIENT_ID=${OIDC_PRIVATE_CLIENT_ID}
|
|
||||||
- OAUTH2_PROXY_CLIENT_SECRET=${OIDC_CLIENT_SECRET}
|
|
||||||
- OAUTH2_PROXY_COOKIE_SECRET=${OVIS_AUTH_COOKIE_SECRET}
|
|
||||||
- OAUTH2_PROXY_COOKIE_NAME=_BRIDGEHEAD_oauth2_ovis
|
|
||||||
- OAUTH2_PROXY_COOKIE_DOMAINS=.${HOST}
|
|
||||||
- OAUTH2_PROXY_COOKIE_REFRESH=4m
|
|
||||||
- OAUTH2_PROXY_COOKIE_EXPIRE=24h
|
|
||||||
- OAUTH2_PROXY_HTTP_ADDRESS=:4180
|
|
||||||
- OAUTH2_PROXY_REVERSE_PROXY=true
|
|
||||||
- OAUTH2_PROXY_WHITELIST_DOMAINS=.${HOST}
|
|
||||||
- OAUTH2_PROXY_UPSTREAMS=static://202
|
|
||||||
- OAUTH2_PROXY_EMAIL_DOMAINS=*
|
|
||||||
- OAUTH2_PROXY_SCOPE=openid profile email
|
|
||||||
- OAUTH2_PROXY_SET_AUTHORIZATION_HEADER=true
|
|
||||||
- OAUTH2_PROXY_SET_XAUTHREQUEST=true
|
|
||||||
- OAUTH2_PROXY_ALLOWED_GROUPS=${OIDC_USER_GROUP}
|
|
||||||
- OAUTH2_PROXY_OIDC_GROUPS_CLAIM=${OIDC_GROUP_CLAIM}
|
|
||||||
- OAUTH2_PROXY_PROXY_PREFIX=/oauth2-ovis
|
|
||||||
labels:
|
|
||||||
- "traefik.enable=true"
|
|
||||||
- "traefik.http.services.ovis-traefik-forward-auth.loadbalancer.server.port=4180"
|
|
||||||
- "traefik.http.routers.ovis-traefik-forward-auth.rule=Host(`${HOST}`) && PathPrefix(`/oauth2-ovis`)"
|
|
||||||
- "traefik.http.routers.ovis-traefik-forward-auth.tls=true"
|
|
||||||
- "traefik.http.middlewares.traefik-forward-auth-ovis.forwardauth.address=http://ovis-traefik-forward-auth:4180"
|
|
||||||
- "traefik.http.middlewares.traefik-forward-auth-ovis.forwardauth.authResponseHeaders=Authorization"
|
|
||||||
depends_on:
|
|
||||||
forward_proxy:
|
|
||||||
condition: service_healthy
|
|
||||||
|
|
||||||
ovis-backend-database-mongodb:
|
|
||||||
image: docker.verbis.dkfz.de/ovis/ovis-backend-mongodb:latest
|
|
||||||
container_name: bridgehead-ccp-ovis-mongo
|
|
||||||
|
|
||||||
ovis-backend-mongodb-data-preprocessing:
|
|
||||||
image: docker.verbis.dkfz.de/ovis/ovis-backend-preprocessor:latest
|
|
||||||
container_name: bridgehead-ccp-ovis-preprocessing
|
|
||||||
environment:
|
|
||||||
ADDRESS: mongodb://ovis-backend-database-mongodb:27017
|
|
||||||
|
|
||||||
depends_on:
|
|
||||||
- ovis-backend-database-mongodb
|
|
||||||
healthcheck:
|
|
||||||
test: ["CMD-SHELL", "node -e \"require('http').get('http://localhost:9000/health', res => process.exit(res.statusCode===200?0:1)).on('error', () => process.exit(1));\""]
|
|
||||||
interval: 10s
|
|
||||||
timeout: 5s
|
|
||||||
retries: 6
|
|
||||||
start_period: 5s
|
|
||||||
|
|
||||||
ovis-backend-data-import:
|
|
||||||
image: docker.verbis.dkfz.de/ovis/ovis-backend-data-import-ccp:latest
|
|
||||||
container_name: bridgehead-ccp-ovis-import
|
|
||||||
depends_on:
|
|
||||||
ovis-backend-mongodb-data-preprocessing:
|
|
||||||
condition: service_healthy
|
|
||||||
environment:
|
|
||||||
FHIR_SERVER_URL: http://bridgehead-ccp-blaze:8080/fhir
|
|
||||||
|
|
||||||
ovis-backend-apollo:
|
|
||||||
image: docker.verbis.dkfz.de/ovis/ovis-backend-apollo:latest
|
|
||||||
container_name: bridgehead-ccp-ovis-backend
|
|
||||||
environment:
|
|
||||||
ADDRESS: mongodb://ovis-backend-database-mongodb:27017
|
|
||||||
depends_on:
|
|
||||||
- ovis-backend-database-mongodb
|
|
||||||
- ovis-backend-mongodb-data-preprocessing
|
|
||||||
- ovis-backend-data-import
|
|
||||||
healthcheck:
|
|
||||||
test: ["CMD-SHELL", "test -d /app/node_modules/mongodb"]
|
|
||||||
interval: 10s
|
|
||||||
timeout: 5s
|
|
||||||
retries: 5
|
|
||||||
# Internal only - no direct Traefik exposure. GraphQL is accessed via frontend internal proxy.
|
|
||||||
|
|
||||||
ovis-frontend:
|
|
||||||
image: docker.verbis.dkfz.de/ovis/ovis-frontend:latest
|
|
||||||
container_name: bridgehead-ccp-ovis-frontend
|
|
||||||
environment:
|
|
||||||
OVIS_PUBLIC_BASE_PATH: /ccp-ovis
|
|
||||||
PUBLIC_LOGIN_ENABLED: "false"
|
|
||||||
PUBLIC_OVIS_IMPORT: ccp
|
|
||||||
ORIGIN: https://${HOST}
|
|
||||||
depends_on:
|
|
||||||
ovis-backend-apollo:
|
|
||||||
condition: service_healthy
|
|
||||||
labels:
|
|
||||||
- "traefik.enable=true"
|
|
||||||
- "traefik.http.middlewares.ovis-frontend-ccp-slash-redirect.redirectregex.regex=^https?://([^/]+)/ccp-ovis$"
|
|
||||||
- "traefik.http.middlewares.ovis-frontend-ccp-slash-redirect.redirectregex.replacement=https://$${1}/ccp-ovis/"
|
|
||||||
- "traefik.http.middlewares.ovis-frontend-ccp-slash-redirect.redirectregex.permanent=true"
|
|
||||||
- "traefik.http.routers.ovis-frontend-ccp.tls=true"
|
|
||||||
- "traefik.http.routers.ovis-frontend-ccp.rule=PathPrefix(`/ccp-ovis`)"
|
|
||||||
- "traefik.http.routers.ovis-frontend-ccp.middlewares=traefik-forward-auth-ovis,ovis-frontend-ccp-slash-redirect"
|
|
||||||
- "traefik.http.services.ovis-frontend-ccp.loadbalancer.server.port=5173"
|
|
||||||
@@ -1,9 +0,0 @@
|
|||||||
#!/bin/bash -e
|
|
||||||
|
|
||||||
if [ -n "$ENABLE_OVIS" ]; then
|
|
||||||
log INFO "OVIS setup detected -- will start OVIS services with local oauth2-proxy middleware."
|
|
||||||
OVERRIDE+=" -f ./$PROJECT/modules/ovis-compose.yml"
|
|
||||||
add_private_oidc_redirect_url "/oauth2-ovis/callback"
|
|
||||||
add_private_oidc_redirect_url "/ccp-ovis*"
|
|
||||||
OVIS_AUTH_COOKIE_SECRET="$(generate_simple_password 'ovisCookieSecret' | head -c 16)"
|
|
||||||
fi
|
|
||||||
@@ -16,7 +16,7 @@ services:
|
|||||||
- --entrypoints.web.http.redirections.entrypoint.scheme=https
|
- --entrypoints.web.http.redirections.entrypoint.scheme=https
|
||||||
labels:
|
labels:
|
||||||
- "traefik.enable=true"
|
- "traefik.enable=true"
|
||||||
- "traefik.http.routers.dashboard.rule=PathPrefix(`/dashboard/`)"
|
- "traefik.http.routers.dashboard.rule=PathPrefix(`/dashboard/`)||PathPrefix(`/api`)"
|
||||||
- "traefik.http.routers.dashboard.entrypoints=websecure"
|
- "traefik.http.routers.dashboard.entrypoints=websecure"
|
||||||
- "traefik.http.routers.dashboard.service=api@internal"
|
- "traefik.http.routers.dashboard.service=api@internal"
|
||||||
- "traefik.http.routers.dashboard.tls=true"
|
- "traefik.http.routers.dashboard.tls=true"
|
||||||
|
|||||||
@@ -1,8 +1,10 @@
|
|||||||
services:
|
services:
|
||||||
osiris2fhir:
|
osiris2fhir:
|
||||||
container_name: bridgehead-osiris2fhir
|
container_name: bridgehead-osiris2fhir
|
||||||
image: docker.verbis.dkfz.de/ccp/osiris2fhir:${SITE_ID}
|
image: docker.verbis.dkfz.de/ccp/osiris2fhir
|
||||||
environment:
|
environment:
|
||||||
|
FHIR_PROFILE: ${PROJECT:-pscc}
|
||||||
|
LOG_LEVEL: ${LOG_LEVEL:-INFO}
|
||||||
SALT: ${LOCAL_SALT}
|
SALT: ${LOCAL_SALT}
|
||||||
labels:
|
labels:
|
||||||
- "traefik.enable=true"
|
- "traefik.enable=true"
|
||||||
|
|||||||
@@ -1,6 +1,6 @@
|
|||||||
#!/bin/bash
|
#!/bin/bash
|
||||||
if [ -n "$ENABLE_OSIRIS2FHIR" ]; then
|
if [ -n "$ENABLE_OSIRIS2FHIR" ]; then
|
||||||
log INFO "oBDS2FHIR-REST setup detected -- will start osiris2fhir module."
|
log INFO "OSIRIS2FHIR-REST setup detected -- will start osiris2fhir module."
|
||||||
OVERRIDE+=" -f ./pscc/modules/osiris2fhir-compose.yml"
|
OVERRIDE+=" -f ./pscc/modules/osiris2fhir-compose.yml"
|
||||||
LOCAL_SALT="$(echo \"local-random-salt\" | openssl pkeyutl -sign -inkey /etc/bridgehead/pki/${SITE_ID}.priv.pem | base64 | head -c 30)"
|
LOCAL_SALT="$(echo \"local-random-salt\" | openssl pkeyutl -sign -inkey /etc/bridgehead/pki/${SITE_ID}.priv.pem | base64 | head -c 30)"
|
||||||
fi
|
fi
|
||||||
Reference in New Issue
Block a user