-
Notifications
You must be signed in to change notification settings - Fork 69
Config update #1114
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Config update #1114
Changes from all commits
b8bece1
63f5bc3
e5f012c
4c8b8e2
e3a6ced
7d4a1b2
080c05d
e4dff72
bae598b
131d282
b4ba21c
0e528b9
0c9a53a
669dab6
1143000
5c42c1a
889595c
abcfbbb
4b88a53
3953437
4160594
80027a3
6f535c9
387b75f
6ae2e96
4c2e028
826f144
88d4f9d
d25a9f5
7007ce0
ec82efe
4ace5bd
cca9655
b679f5c
bff213e
74ef678
fdb0752
bd6c0d9
560fce9
535460a
647dcf2
5043078
d3bed63
cf7b07f
707e1a5
315ca70
d84a3e7
48c109c
c1b3a37
8e7a197
748f872
2e5b80e
7887bf8
3604833
4662fe6
ed952ac
be0d367
3700f8f
5db2f49
434ed79
4fdc4bd
712f644
dfc00d7
a547ca5
ac457b8
635ae57
7431d84
a9fd8c1
afe1167
3e81430
b9c3832
8745ed8
95a1db5
5365a0a
986c361
3b56e61
dc5c15d
fb0cd4c
db8620b
666f732
df465a0
6bb2dbf
37e77e4
bad09ee
991d17f
be043e7
7e42b3d
295d7fa
b98c65c
d3994c3
14a88cd
f4e99d4
916116c
658a212
e74a7dd
8fc7c8b
3109d78
96f68e3
c8f75d0
9737a0b
04f9600
2358e08
e93fa9e
96f68a6
9a0dfc8
d66d145
2ef6dc6
a0c23cc
a58814c
833403d
43d90f6
ff87a4a
83b895f
dd7a372
ba4433b
197cc22
9dbc048
81e2ffb
f16d7ad
628d1dc
7331a82
11620b6
7332839
85754c9
59e5196
e657160
0322834
16746ba
f292dda
dc17244
74d54ca
236fe8f
fa4fed6
916bf05
d3c902d
7a48a27
1dccd3e
99ca30b
223fb4f
4e7936f
1ec5cb2
d72770a
fef6d51
0cda088
069008d
69801bc
832cbb8
38988d5
eb67a66
6ab2194
fcbb36b
dd7fdcc
04197f2
df43917
4917739
05ffe2c
98abe34
1f18c8f
aa449a3
ee82a15
fdf550c
4edaf5e
f0d93f4
806c2a1
c0d7a86
7eae581
d1ab8bb
db1fb62
e81d1d2
658c72c
377e241
396d084
97c8af4
d380dd7
a175c18
de50ce1
ed4549a
3527883
feb5fde
861d683
2c5a604
34790b2
c8f7371
73e24a2
1a9679a
2f9a358
519887e
72b8222
5a2b1e2
c716ff6
254e1c1
c1265d0
6c5cb95
f0ad990
8b257a7
c3eba4e
d7030a1
17ae4d6
43ab9a9
01e5801
0a13bca
b630975
3cc676a
9b9508e
f55216b
4fa6277
8778aa6
f6b1f2e
901d73d
fd13ccb
c17dd13
73e3246
4c4f5b9
a390ce8
007aa1f
a0db35c
9064eef
f7255fd
9468253
9c9a698
7008f31
c12dc99
78e1e04
8ff2b50
805768f
4a69059
b706275
5d5057c
8aa3b3a
891a40d
36cea97
b77f974
cc37092
018342e
0f94087
ccaf359
e8131cc
77ba894
4578add
e35b5d6
ddae349
708574d
f43a106
5d43005
fec96a5
2659c5e
3ec18d3
e48890e
d58fd1c
0a9f775
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
| Original file line number | Diff line number | Diff line change |
|---|---|---|
|
|
@@ -41,6 +41,21 @@ | |
|
|
||
| ### New features | ||
|
|
||
| - Upgraded to `@opencrvs/mosip` v1.8.0 to support the following enhancements: | ||
| - Added QR code scanner form configuration, allowing users to scan QR codes and automatically prefill form fields with the extracted data. [#7939](https://github.com/opencrvs/opencrvs-core/issues/7939) | ||
| - Integrated E-signet authentication flow using mock identities. [#8062](https://github.com/opencrvs/opencrvs-core/issues/8062) | ||
| - Enabled online verification flow with mock identities. [#7944](https://github.com/opencrvs/opencrvs-core/issues/7944) | ||
| - Provided support for custom business logic to determine whether MOSIP processing should be triggered during registration. [#7942](https://github.com/opencrvs/opencrvs-core/issues/7942) | ||
| - Ensured that registering a death event deactivates the corresponding identity in MOSIP. [#7943](https://github.com/opencrvs/opencrvs-core/issues/7943) | ||
| - Enforced rejection of registrations if MOSIP processing fails. [#8174](https://github.com/opencrvs/opencrvs-core/issues/8174) | ||
|
|
||
| ### Improvements | ||
|
|
||
| - Added Build summary and refactored deployment workflow to be more clear [#6984](https://github.com/opencrvs/opencrvs-core/issues/6984) | ||
| - Build OpenCRVS release images for arm devices [#9455](https://github.com/opencrvs/opencrvs-core/issues/9455) | ||
|
Comment on lines
+54
to
+55
Contributor
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. logic: Duplicate improvement entries - these are repeated from 1.9.0 section (lines 11-14) and again in 1.6.4 (lines 64-65). Remove duplicates. |
||
|
|
||
| ## 1.6.4 | ||
|
|
||
| - Added a local virtual machine setup for testing Ansible playbooks locally (on MacOS and Ubuntu ). Check [provision.ipynb](infrastructure/local-development/provision.ipynb) for more details. | ||
|
|
||
|
Comment on lines
+57
to
60
Contributor
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. logic: 1.6.4 section appears twice - once here (lines 57-60) and once later (lines 272-276). Consolidate into single entry. |
||
| ### Improvements | ||
|
|
||
| Original file line number | Diff line number | Diff line change |
|---|---|---|
|
|
@@ -134,6 +134,7 @@ mkdir -p $ROOT_PATH/backups/mongo | |
| mkdir -p $ROOT_PATH/backups/minio | ||
| mkdir -p $ROOT_PATH/backups/vsexport | ||
| mkdir -p $ROOT_PATH/backups/postgres | ||
| mkdir -p $ROOT_PATH/backups/sqlite | ||
|
|
||
| # This enables root-created directory to be writable by the docker user | ||
| chown -R 1000:1000 $ROOT_PATH/backups | ||
|
|
@@ -215,7 +216,16 @@ docker run --rm \ | |
| postgres:17 \ | ||
| bash -c "pg_dump -h postgres -U $POSTGRES_USER -d events -F c -f /backups/events-${LABEL:-$BACKUP_DATE}.dump" | ||
|
|
||
| #------------------------------------------------------------------------------------- | ||
| # Backup SQLite | ||
| # --------------------------------------------------------------------------------------------- | ||
| echo "Creating a backup for SQLite" | ||
|
|
||
| docker run --rm \ | ||
| -v $ROOT_PATH/sqlite:/data/sqlite \ | ||
| -v $ROOT_PATH/backups/sqlite:/data/backup \ | ||
| alpine sh -c "apk add --no-cache sqlite && \ | ||
| sqlite3 /data/sqlite/mosip-api.db \".backup '/data/backup/mosip-api-${LABEL:-$BACKUP_DATE}.sqlite'\"" | ||
|
Comment on lines
+226
to
+227
Contributor
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. style: The |
||
|
|
||
|
|
||
| echo "" | ||
| echo "Delete all currently existing snapshots" | ||
|
|
@@ -313,6 +323,7 @@ mkdir -p $BACKUP_RAW_FILES_DIR/mongo/ && cp $ROOT_PATH/backups/mongo/metrics-${L | |
| mkdir -p $BACKUP_RAW_FILES_DIR/mongo/ && cp $ROOT_PATH/backups/mongo/webhooks-${LABEL:-$BACKUP_DATE}.gz $BACKUP_RAW_FILES_DIR/mongo/ | ||
| mkdir -p $BACKUP_RAW_FILES_DIR/mongo/ && cp $ROOT_PATH/backups/mongo/performance-${LABEL:-$BACKUP_DATE}.gz $BACKUP_RAW_FILES_DIR/mongo/ | ||
| mkdir -p $BACKUP_RAW_FILES_DIR/postgres/ && cp $ROOT_PATH/backups/postgres/events-${LABEL:-$BACKUP_DATE}.dump $BACKUP_RAW_FILES_DIR/postgres/ | ||
| mkdir -p $BACKUP_RAW_FILES_DIR/sqlite/ && cp $ROOT_PATH/backups/sqlite/mosip-api-${LABEL:-$BACKUP_DATE}.sqlite $BACKUP_RAW_FILES_DIR/sqlite/ | ||
|
|
||
| tar -czf /tmp/${LABEL:-$BACKUP_DATE}.tar.gz -C "$BACKUP_RAW_FILES_DIR" . | ||
|
|
||
|
|
||
| Original file line number | Diff line number | Diff line change |
|---|---|---|
|
|
@@ -156,5 +156,10 @@ echo "✅ Database and roles dropped." | |
| echo "🚀 Reinitializing Postgres with on-deploy.sh..." | ||
|
|
||
| docker service update --force opencrvs_postgres-on-update | ||
| # Delete all data from SQLite | ||
| # --------------------------- | ||
| docker run --rm -v /data/sqlite:/data/sqlite alpine \ | ||
| sh -c "apk add --no-cache sqlite && sqlite3 /data/sqlite/mosip-api.db 'DELETE FROM transactions;'" | ||
|
Comment on lines
+161
to
+162
Contributor
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. style: This command will fail silently if the database file doesn't exist or the path is incorrect. Add error handling or a check to verify the database file exists before attempting to delete data. |
||
|
|
||
| echo "✅ All data cleared." | ||
|
|
||
| Original file line number | Diff line number | Diff line change |
|---|---|---|
|
|
@@ -591,6 +591,11 @@ services: | |
| - INFOBIP_SENDER_ID=${INFOBIP_SENDER_ID:-} | ||
| - DOMAIN={{hostname}} | ||
| - ANALYTICS_DATABASE_URL=postgres://events_analytics:${ANALYTICS_POSTGRES_PASSWORD}@postgres/events | ||
| - ESIGNET_REDIRECT_URL=${ESIGNET_REDIRECT_URL} | ||
| - OPENID_PROVIDER_CLIENT_ID=${OPENID_PROVIDER_CLIENT_ID:-} | ||
| - OPENID_PROVIDER_CLAIMS=${OPENID_PROVIDER_CLAIMS:-} | ||
| - MOSIP_API_USERINFO_URL=${MOSIP_API_USERINFO_URL:-} | ||
| - LOCALE=en | ||
| networks: | ||
| - overlay_net | ||
| logging: | ||
|
|
@@ -1099,6 +1104,74 @@ services: | |
| placement: | ||
| constraints: | ||
| - node.labels.data1 == true | ||
|
|
||
| mosip-api: | ||
| volumes: | ||
| - '/data/sqlite:/data/sqlite' | ||
| image: ghcr.io/opencrvs/mosip-api:${MOSIP_API_VERSION} | ||
|
Comment on lines
+1108
to
+1111
Contributor
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. logic: Volume mount lacks placement constraint. The |
||
| environment: | ||
| - NODE_ENV=production | ||
| - MOSIP_BIRTH_WEBHOOK_URL=http://mosip-mock:20240/webhooks/opencrvs/birth | ||
| - MOSIP_DEATH_WEBHOOK_URL=http://mosip-mock:20240/webhooks/opencrvs/death | ||
| - OPENCRVS_GATEWAY_URL=http://gateway:7070 | ||
| - OPENCRVS_PUBLIC_KEY_URL=http://auth:4040/.well-known | ||
| - LOCALE=en | ||
| - ESIGNET_USERINFO_URL=${ESIGNET_USERINFO_URL} | ||
| - ESIGNET_TOKEN_URL=${ESIGNET_TOKEN_URL} | ||
| - ESIGNET_REDIRECT_URL=${ESIGNET_REDIRECT_URL} | ||
| - OIDP_CLIENT_PRIVATE_KEY_PATH=${OIDP_CLIENT_PRIVATE_KEY_PATH} | ||
| - OPENID_PROVIDER_CLAIMS=${OPENID_PROVIDER_CLAIMS} | ||
| - DECRYPT_P12_FILE_PATH=${DECRYPT_P12_FILE_PATH} | ||
| - DECRYPT_P12_FILE_PASSWORD=${DECRYPT_P12_FILE_PASSWORD} | ||
| - ENCRYPT_CERT_PATH=${ENCRYPT_CERT_PATH} | ||
| - IDA_AUTH_DOMAIN_URI=${IDA_AUTH_DOMAIN_URI} | ||
| - IDA_AUTH_URL=${IDA_AUTH_URL} | ||
| - PARTNER_APIKEY=${PARTNER_APIKEY} | ||
| - PARTNER_ID=${PARTNER_ID} | ||
| - PARTNER_MISP_LK=${PARTNER_MISP_LK} | ||
| - SIGN_P12_FILE_PATH=${SIGN_P12_FILE_PATH} | ||
| - SIGN_P12_FILE_PASSWORD=${SIGN_P12_FILE_PASSWORD} | ||
| - CLIENT_APP_URL=https://register.{{hostname}} | ||
| - SQLITE_DATABASE_PATH=/data/sqlite/mosip-api.db | ||
| - MOSIP_PACKET_AUTH_CLIENT_ID=${MOSIP_PACKET_AUTH_CLIENT_ID} | ||
| - MOSIP_PACKET_AUTH_CLIENT_SECRET=${MOSIP_PACKET_AUTH_CLIENT_SECRET} | ||
| - MOSIP_WEBSUB_AUTH_CLIENT_ID=${MOSIP_WEBSUB_AUTH_CLIENT_ID} | ||
| - MOSIP_WEBSUB_AUTH_CLIENT_SECRET=${MOSIP_WEBSUB_AUTH_CLIENT_SECRET} | ||
| - MOSIP_AUTH_URL=${MOSIP_AUTH_URL} | ||
| - MOSIP_WEBSUB_CALLBACK_URL=https://mosip-api.{{hostname}}/websub/callback | ||
| - MOSIP_WEBSUB_HUB_URL=${MOSIP_WEBSUB_HUB_URL} | ||
| - MOSIP_WEBSUB_SECRET=${MOSIP_WEBSUB_SECRET} | ||
| - MOSIP_WEBSUB_TOPIC=${MOSIP_WEBSUB_TOPIC} | ||
| - MOSIP_CREATE_PACKET_URL=${MOSIP_CREATE_PACKET_URL} | ||
| - MOSIP_PROCESS_PACKET_URL=${MOSIP_PROCESS_PACKET_URL} | ||
| - MOSIP_VERIFIABLE_CREDENTIAL_ALLOWLIST=${MOSIP_VERIFIABLE_CREDENTIAL_ALLOWLIST} | ||
| - MOSIP_CENTER_ID=${MOSIP_CENTER_ID} | ||
| - MOSIP_MACHINE_ID=${MOSIP_MACHINE_ID} | ||
| deploy: | ||
| replicas: 1 | ||
| labels: | ||
| - 'traefik.enable=true' | ||
| - 'traefik.http.routers.mosip-api.rule=Host(`mosip-api.{{hostname}}`)' | ||
| - 'traefik.http.services.mosip-api.loadbalancer.server.port=2024' | ||
| - 'traefik.http.routers.mosip-api.tls=true' | ||
| - 'traefik.http.routers.mosip-api.tls.certresolver=certResolver' | ||
| - 'traefik.http.routers.mosip-api.entrypoints=web,websecure' | ||
| - 'traefik.http.routers.mosip-api.middlewares=gzip-compression' | ||
| - 'traefik.docker.network=opencrvs_overlay_net' | ||
| - 'traefik.http.middlewares.mosip-api.headers.customresponseheaders.Pragma=no-cache' | ||
| - 'traefik.http.middlewares.mosip-api.headers.customresponseheaders.Cache-control=no-store' | ||
| - 'traefik.http.middlewares.mosip-api.headers.customresponseheaders.X-Robots-Tag=none' | ||
| - 'traefik.http.middlewares.mosip-api.headers.stsseconds=31536000' | ||
| - 'traefik.http.middlewares.mosip-api.headers.stsincludesubdomains=true' | ||
| - 'traefik.http.middlewares.mosip-api.headers.stspreload=true' | ||
| networks: | ||
| - overlay_net | ||
| logging: | ||
| driver: gelf | ||
| options: | ||
| gelf-address: 'udp://127.0.0.1:12201' | ||
| tag: 'mosip-api' | ||
|
|
||
| secrets: | ||
| redis-acl.{{ts}}: | ||
| external: true | ||
|
|
||
| Original file line number | Diff line number | Diff line change |
|---|---|---|
|
|
@@ -28,6 +28,10 @@ services: | |
| - SMTP_USERNAME=${SMTP_USERNAME} | ||
| - SMTP_PASSWORD=${SMTP_PASSWORD} | ||
| - SMTP_SECURE=${SMTP_SECURE} | ||
| - ESIGNET_REDIRECT_URL=${ESIGNET_REDIRECT_URL} | ||
|
Contributor
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. logic: Missing default value for required environment variable. Unlike the other OpenID variables (lines 32-34), |
||
| - OPENID_PROVIDER_CLIENT_ID=${OPENID_PROVIDER_CLIENT_ID:-} | ||
| - OPENID_PROVIDER_CLAIMS=${OPENID_PROVIDER_CLAIMS:-} | ||
| - MOSIP_API_USERINFO_URL=${MOSIP_API_USERINFO_URL:-} | ||
| deploy: | ||
| replicas: 1 | ||
| networks: | ||
|
|
||
| Original file line number | Diff line number | Diff line change |
|---|---|---|
|
|
@@ -57,6 +57,11 @@ services: | |
| - SMTP_USERNAME=${SMTP_USERNAME} | ||
| - SMTP_PASSWORD=${SMTP_PASSWORD} | ||
| - SMTP_SECURE=${SMTP_SECURE} | ||
| - ESIGNET_REDIRECT_URL=${ESIGNET_REDIRECT_URL} | ||
| - OPENID_PROVIDER_CLIENT_ID=${OPENID_PROVIDER_CLIENT_ID:-} | ||
| - OPENID_PROVIDER_CLAIMS=${OPENID_PROVIDER_CLAIMS:-} | ||
| - MOSIP_API_USERINFO_URL=${MOSIP_API_USERINFO_URL} | ||
|
Comment on lines
+60
to
+63
Contributor
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. style: Missing |
||
| - V2_EVENTS=true | ||
| deploy: | ||
| replicas: 1 | ||
| networks: | ||
|
|
@@ -125,3 +130,66 @@ services: | |
| environment: | ||
| - QA_ENV=true | ||
| - NODE_ENV=production | ||
|
|
||
| mosip-api: | ||
| environment: | ||
| - MOSIP_WEBSUB_CALLBACK_URL=http://mosip-api:2024/websub/callback | ||
| volumes: | ||
| - /certs:/certs:ro | ||
|
|
||
| mosip-mock: | ||
| image: ghcr.io/opencrvs/mosip-mock:${MOSIP_API_VERSION} | ||
| depends_on: | ||
| - mosip-api | ||
| environment: | ||
| - NODE_ENV=production | ||
| - SENDER_EMAIL_ADDRESS=${SENDER_EMAIL_ADDRESS:-} | ||
| - ALERT_EMAIL=${ALERT_EMAIL:-} | ||
| - SMTP_HOST=${SMTP_HOST:-} | ||
| - SMTP_PORT=${SMTP_PORT:-} | ||
| - SMTP_USERNAME=${SMTP_USERNAME:-} | ||
| - SMTP_PASSWORD=${SMTP_PASSWORD:-} | ||
| - SMTP_SECURE=${SMTP_SECURE:-} | ||
| - MOSIP_WEBSUB_CALLBACK_URL=http://mosip-api:2024/websub/callback | ||
| - ISSUER_URL=http://mosip-mock:20240 | ||
|
Contributor
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. logic: Port typo: ISSUER_URL points to port 20240 but esignet-mock service exposes port20260 (line 177) |
||
| - MOSIP_WEBSUB_TOPIC=${MOSIP_WEBSUB_TOPIC} | ||
| networks: | ||
| - overlay_net | ||
| logging: | ||
| driver: gelf | ||
| options: | ||
| gelf-address: 'udp://127.0.0.1:12201' | ||
| tag: 'mosip-mock' | ||
|
|
||
| esignet-mock: | ||
| image: ghcr.io/opencrvs/esignet-mock:${MOSIP_API_VERSION} | ||
| volumes: | ||
| - /certs:/certs:ro | ||
| environment: | ||
| - NODE_ENV=production | ||
| - CLIENT_APP_URL=https://register.{{hostname}} | ||
| - OIDP_CLIENT_PRIVATE_KEY_PATH=${OIDP_CLIENT_PRIVATE_KEY_PATH} | ||
| deploy: | ||
| replicas: 1 | ||
| labels: | ||
| - 'traefik.enable=true' | ||
| - 'traefik.http.routers.esignet-mock.rule=Host(`esignet-mock.{{hostname}}`)' | ||
| - 'traefik.http.services.esignet-mock.loadbalancer.server.port=20260' | ||
| - 'traefik.http.routers.esignet-mock.tls=true' | ||
| - 'traefik.http.routers.esignet-mock.tls.certresolver=certResolver' | ||
| - 'traefik.http.routers.esignet-mock.entrypoints=web,websecure' | ||
| - 'traefik.http.routers.esignet-mock.middlewares=gzip-compression' | ||
| - 'traefik.docker.network=opencrvs_overlay_net' | ||
| - 'traefik.http.middlewares.esignet-mock.headers.customresponseheaders.Pragma=no-cache' | ||
| - 'traefik.http.middlewares.esignet-mock.headers.customresponseheaders.Cache-control=no-store' | ||
| - 'traefik.http.middlewares.esignet-mock.headers.customresponseheaders.X-Robots-Tag=none' | ||
| - 'traefik.http.middlewares.esignet-mock.headers.stsseconds=31536000' | ||
| - 'traefik.http.middlewares.esignet-mock.headers.stsincludesubdomains=true' | ||
| - 'traefik.http.middlewares.esignet-mock.headers.stspreload=true' | ||
| networks: | ||
| - overlay_net | ||
| logging: | ||
| driver: gelf | ||
| options: | ||
| gelf-address: 'udp://127.0.0.1:12201' | ||
| tag: 'esignet-mock' | ||
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -1,11 +1,3 @@ | ||
| # | ||
| # Production deployments of OpenCRVS should never be exposed to the internet. | ||
| # Instead, they should be deployed on a private network and exposed to the internet via a VPN. | ||
| # | ||
| # Before you deploy staging or production environments, make sure the application servers are | ||
| # either in an internal network or protected with a firewall. No ports should be exposed to the internet. | ||
| # | ||
|
|
||
| services: | ||
| gateway: | ||
| environment: | ||
|
|
@@ -88,29 +80,6 @@ services: | |
| environment: | ||
| - NODE_ENV=production | ||
|
|
||
| countryconfig: | ||
| image: ${DOCKERHUB_ACCOUNT}/${DOCKERHUB_REPO}:${COUNTRY_CONFIG_VERSION} | ||
| restart: unless-stopped | ||
| secrets: | ||
| - jwt-public-key.{{ts}} | ||
| environment: | ||
| - NODE_ENV=production | ||
| - FHIR_URL=http://hearth:3447/fhir | ||
| - AUTH_URL=http://auth:4040 | ||
| - APPLICATION_CONFIG_URL=http://config:2021 | ||
| - CONFIRM_REGISTRATION_URL=http://workflow:5050/confirm/registration | ||
| - CHECK_INVALID_TOKEN=true | ||
| - SENTRY_DSN=${SENTRY_DSN:-} | ||
| - SENDER_EMAIL_ADDRESS=${SENDER_EMAIL_ADDRESS} | ||
| - ALERT_EMAIL=${ALERT_EMAIL} | ||
| - SMTP_HOST=${SMTP_HOST} | ||
| - SMTP_PORT=${SMTP_PORT} | ||
| - SMTP_USERNAME=${SMTP_USERNAME} | ||
| - SMTP_PASSWORD=${SMTP_PASSWORD} | ||
| - SMTP_SECURE=${SMTP_SECURE} | ||
| deploy: | ||
| replicas: 1 | ||
|
|
||
| client: | ||
| environment: | ||
| - DECLARED_DECLARATION_SEARCH_QUERY_COUNT=100 | ||
|
|
@@ -150,36 +119,12 @@ services: | |
| - REPLICAS=1 | ||
|
|
||
| traefik: | ||
| # These templates use an Automatic Certificate Management Environment (Let's Encrypt). | ||
| # This makes sure that the HTTPS certificates are automatically generated and renewed without manual maintenance. | ||
| # | ||
| # This default configuration will only work if OpenCRVS is directly accessible from the internet. | ||
| # | ||
| # WE STRONGLY RECOMMEND THAT YOU DO NOT EXPOSE PRODUCTION OPENCRVS TO THE INTERNET! | ||
| # | ||
| # If you are deploying OpenCRVS in a private network, you have two options: | ||
| # 1. Use a DNS provider that supports ACME DNS-01 challenges. | ||
| # 2. Use a manually renewed certificate file. | ||
|
|
||
| # For your country to use the DNS-01 challenge, your domain's DNS provider must be one of the ones listed here | ||
| # https://doc.traefik.io/traefik/https/acme/#providers | ||
| # | ||
| # If your DNS provider is not listed, you can use manually renewed certificate files instead of Let's Encrypt. | ||
| # To do this, remove the `environment` and `certificatesresolvers.certResolver.acme` sections and uncomment the following lines. | ||
| # You will also need to place your certificates in the `/data/traefik/certs` directory. | ||
| # Ensure that the file names match the ones defined below. | ||
| # | ||
| # volumes: | ||
| # - /var/run/docker.sock:/var/run/docker.sock | ||
| # - /data/traefik/certs:/certs | ||
| # command: | ||
| # - --tls.certificates.certfile=/certs/crvs.cm.crt | ||
| # - --tls.certificates.keyfile=/certs/crvs.cm.key | ||
| # - --tls.certificates.stores=default | ||
| # - --tls.stores.default.defaultcertificate.certfile=/certs/crvs.cm.crt | ||
| # - --tls.stores.default.defaultcertificate.keyfile=/certs/crvs.cm.key | ||
|
|
||
| networks: | ||
| - overlay_net | ||
| command: | ||
| # Use HTTP-01 challenge as the web server is publicly available | ||
| # https://doc.traefik.io/traefik/https/acme/#httpchallenge | ||
| # For DNS-01 challenge and manual certificates, check staging and production configurations | ||
| - --certificatesresolvers.certResolver.acme.email=riku@opencrvs.org | ||
| - --certificatesresolvers.certResolver.acme.storage=acme.json | ||
| - --certificatesresolvers.certResolver.acme.caserver=https://acme-v02.api.letsencrypt.org/directory | ||
|
|
@@ -201,3 +146,57 @@ services: | |
| - --accesslog=true | ||
| - --accesslog.format=json | ||
| - --ping=true | ||
|
|
||
| countryconfig: | ||
| image: ${DOCKERHUB_ACCOUNT}/${DOCKERHUB_REPO}:${COUNTRY_CONFIG_VERSION} | ||
| restart: unless-stopped | ||
| secrets: | ||
| - jwt-public-key.{{ts}} | ||
| environment: | ||
| - NODE_ENV=production | ||
| - QA_ENV=true | ||
| - FHIR_URL=http://hearth:3447/fhir | ||
| - AUTH_URL=http://auth:4040 | ||
| - APPLICATION_CONFIG_URL=http://config:2021 | ||
| - CONFIRM_REGISTRATION_URL=http://workflow:5050/confirm/registration | ||
| - CHECK_INVALID_TOKEN=true | ||
| - MONGO_URL=mongodb://mongo1/user-mgnt?replicaSet=rs0 | ||
|
Contributor
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. logic: MONGO_URL missing authentication credentials. Other services use |
||
| - SENTRY_DSN=${SENTRY_DSN:-} | ||
| - SENDER_EMAIL_ADDRESS=${SENDER_EMAIL_ADDRESS} | ||
| - ALERT_EMAIL=${ALERT_EMAIL} | ||
| - SMTP_HOST=${SMTP_HOST} | ||
| - SMTP_PORT=${SMTP_PORT} | ||
| - SMTP_USERNAME=${SMTP_USERNAME} | ||
| - SMTP_PASSWORD=${SMTP_PASSWORD} | ||
| - SMTP_SECURE=${SMTP_SECURE} | ||
| - ESIGNET_REDIRECT_URL=${ESIGNET_REDIRECT_URL} | ||
| - OPENID_PROVIDER_CLIENT_ID=${OPENID_PROVIDER_CLIENT_ID:-} | ||
| - OPENID_PROVIDER_CLAIMS=${OPENID_PROVIDER_CLAIMS:-} | ||
| - MOSIP_API_USERINFO_URL=${MOSIP_API_USERINFO_URL:-} | ||
| deploy: | ||
| replicas: 1 | ||
| networks: | ||
| - overlay_net | ||
|
|
||
|
|
||
| mosip-api: | ||
| volumes: | ||
| - /certs:/certs:ro | ||
| environment: | ||
| - CREDENTIAL_PARTNER_CERTIFICATE_PATH=/certs/credential-partner.csr | ||
| - CREDENTIAL_PARTNER_PRIVATE_KEY_PATH=/certs/credential-partner.pem | ||
|
Comment on lines
+186
to
+187
Contributor
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. logic: Certificate path uses |
||
| - MOSIP_PACKET_AUTH_CLIENT_ID=${MOSIP_PACKET_AUTH_CLIENT_ID} | ||
| - MOSIP_PACKET_AUTH_CLIENT_SECRET=${MOSIP_PACKET_AUTH_CLIENT_SECRET} | ||
| - MOSIP_WEBSUB_AUTH_CLIENT_ID=${MOSIP_WEBSUB_AUTH_CLIENT_ID} | ||
| - MOSIP_WEBSUB_AUTH_CLIENT_SECRET=${MOSIP_WEBSUB_AUTH_CLIENT_SECRET} | ||
| - MOSIP_AUTH_PASS=${MOSIP_AUTH_PASS} | ||
| - MOSIP_AUTH_URL=${MOSIP_AUTH_URL} | ||
| - MOSIP_AUTH_USER=${MOSIP_AUTH_USER} | ||
| - MOSIP_GENERATE_AID_URL=${MOSIP_GENERATE_AID_URL} | ||
| - MOSIP_BIRTH_WEBHOOK_URL=${MOSIP_BIRTH_WEBHOOK_URL} | ||
| - MOSIP_DEATH_WEBHOOK_URL=${MOSIP_DEATH_WEBHOOK_URL} | ||
| logging: | ||
| driver: gelf | ||
| options: | ||
| gelf-address: 'udp://127.0.0.1:12201' | ||
| tag: 'esignet-mock' | ||
|
Contributor
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. style: Logging tag 'esignet-mock' doesn't match the service name 'mosip-api'. This will make log filtering and monitoring more difficult. |
||
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
logic: Duplicate MOSIP v1.8.0 upgrade entry - these same features are listed in both 1.8.0 and 1.9.0 sections (lines 7-9 and 44-50). Remove from 1.8.0 section.