-
Notifications
You must be signed in to change notification settings - Fork 7
data-proxy concept
#585
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: ogc-api-dggs
Are you sure you want to change the base?
data-proxy concept
#585
Changes from all commits
51bb990
326c6e0
ebb8a4b
700c70c
c7d0784
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -1,4 +1,5 @@ | ||
| config/dggs/pydggsapi-config.json | ||
| config/magpie/config.yml | ||
| config/proxy/conf.extra-service.d/dggs.conf | ||
| config/data-proxy/conf.extra-service.d/dggs.conf | ||
| service-config.json |
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,5 @@ | ||
| location ${DGGS_DATA_PROXY_URL_PATH}/ { | ||
| ${SECURE_DATA_PROXY_AUTH_INCLUDE} | ||
|
|
||
| alias /data/data-proxy/${DGGS_API_NAME}/; | ||
| } |
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,5 @@ | ||
| services: | ||
| proxy: | ||
| volumes: | ||
| - ./components/dggs/config/data-proxy/conf.extra-service.d/dggs.conf:/etc/nginx/conf.extra-service.d/data-proxy/dggs.conf:ro | ||
| - ${DGGS_DATA_PROXY_DIR_PATH}:/data/data-proxy/${DGGS_API_NAME}:ro |
| Original file line number | Diff line number | Diff line change |
|---|---|---|
|
|
@@ -175,6 +175,38 @@ The anonymous user will now have all the permissions described in |magpie-public | |
| .. |magpie-public-perms| replace:: optional-components/all-public-access/all-public-access-magpie-permission.cfg | ||
| .. _env.local.example: ../env.local.example | ||
|
|
||
|
|
||
| .. _optional-components_data-proxy: | ||
|
|
||
| Provide web access to generic data | ||
| -------------------------------------------------------- | ||
|
|
||
| It is possible to serve static data files through Nginx by mapping a directory to a specific URL path. | ||
| This optional component provides a configurable location to serve such data. | ||
|
|
||
| .. seealso:: | ||
| Can be combined with :ref:`optional-components/secure-data-proxy <optional-components_secure-data-proxy>` | ||
| to control access to the data. Otherwise, it is public by default. | ||
|
|
||
| This component does not do anything on its own. It has to be combined with other components to make their | ||
| corresponding locations available through the web. | ||
|
|
||
| Enabling ``components/<SERVICE>`` with ``optional-components/data-proxy`` will make the following variables available: | ||
| - ``<SERVICE>_DATA_PROXY_URL_PATH``: web access location to the data | ||
| - ``<SERVICE>_DATA_PROXY_DIR_PATH``: host machine directory to the data | ||
|
|
||
| By default, all services will employ ``/data/data-proxy/<service>`` as the host directory and ``/data/<service>`` | ||
| as web serving location. They can be configured globally or per service using relevant configuration variables. | ||
|
Collaborator
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. I do not see what is enforcing or forcing this default "all services will employ
Member
Author
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Nothing is actually enforced. If we move forward with this concept, I think we would just make it an agreed upon default when writing the corresponding vars for all |
||
|
|
||
| How to enable in ``env.local`` (a copy from `env.local.example`_ (:download:`download </birdhouse/env.local.example>`)): | ||
|
|
||
| * Add ``./optional-components/data-proxy`` to ``BIRDHOUSE_EXTRA_CONF_DIRS``. | ||
| * Optionally, configure alternate locations. | ||
| * Optionally, combine with ``./optional-components/secure-data-proxy`` to control access to the data. | ||
| * Enable another component supporting this cross-component capability. | ||
|
|
||
| .. _optional-components_secure-data-proxy: | ||
|
|
||
| Control secured access to generic data | ||
| -------------------------------------------------------- | ||
|
|
||
|
|
||
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,3 @@ | ||
| # Ensure the component is detected when added to 'BIRDHOUSE_EXTRA_CONF_DIRS' | ||
|
Collaborator
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Not sure but I don't think this will make But if you want a
Member
Author
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. For sure it needs more testing. I've only pushed what I had drafted up to realizing #583 (comment). |
||
| # However, specific configurations for it are defined across other services | ||
| # Look for '..._DATA_PROXY_...' variables | ||
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Again, what is enforcing or forcing the pattern
<SERVICE>_DATA_PROXY_URL_PATHand<SERVICE>_DATA_PROXY_DIR_PATH?There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
see #585 (comment)