Conversation
| @@ -0,0 +1,3 @@ | |||
| # Ensure the component is detected when added to 'BIRDHOUSE_EXTRA_CONF_DIRS' | |||
There was a problem hiding this comment.
Not sure but I don't think this will make data-proxy "detected". I think for a component to be detected it needs to either have default.env or docker-compose-extra.yml file.
But if you want a DATA_PROXY_LOCATIONS var that can be used ad-hoc in env.local, then you have your default.env and docker-compose-extra.yml for this component :D
There was a problem hiding this comment.
For sure it needs more testing. I've only pushed what I had drafted up to realizing #583 (comment).
| - ``<SERVICE>_DATA_PROXY_DIR_PATH``: host machine directory to the data | ||
|
|
||
| By default, all services will employ ``/data/data-proxy/<service>`` as the host directory and ``/data/<service>`` | ||
| as web serving location. They can be configured globally or per service using relevant configuration variables. |
There was a problem hiding this comment.
I do not see what is enforcing or forcing this default "all services will employ /data/data-proxy/<service> as the host directory and /data/<service> as web serving location"
There was a problem hiding this comment.
Nothing is actually enforced. If we move forward with this concept, I think we would just make it an agreed upon default when writing the corresponding vars for all default.env of each service.
|
|
||
| Enabling ``components/<SERVICE>`` with ``optional-components/data-proxy`` will make the following variables available: | ||
| - ``<SERVICE>_DATA_PROXY_URL_PATH``: web access location to the data | ||
| - ``<SERVICE>_DATA_PROXY_DIR_PATH``: host machine directory to the data |
There was a problem hiding this comment.
Again, what is enforcing or forcing the pattern <SERVICE>_DATA_PROXY_URL_PATH and <SERVICE>_DATA_PROXY_DIR_PATH?
|
Wait a minute, I think we might over-engineer this one.
So if we want to globally toogle public/secure, why can't we just empty the var If we want to toogle per component that use it, we could define Basically we do not need to create We should wait for @mishaschwartz opinion on this one. |
I agree. Goes back to #583 (comment).
Exactly. However, it is important to have both of them defined separately. If proxy aliases were defined only in One alternative would be to have only
This is another option, but it is prone to break if some tweak or more advanced definitions needs to be done to
That actually adds another level of control, to have various protected or not locations per services. The Maybe this is a personal preference on my end, but I think that if you want any form of secured data access by enabling |
Overview
Concept idea discussed in #583 (comment)
Adds a generic
optional-components/data-proxythat combines withoptional-components/secure-data-proxyto offer similar behavior tooptional-components/stac-data-proxy, but in a generic fashion.Using
components/dggsas example. Similar could be done with other services.Changes
Non-breaking changes
optional-components/data-proxy.Breaking changes
Related Issue / Discussion
CI Operations
birdhouse_daccs_configs_branch: master
birdhouse_skip_ci: true