An Apache HTTPd based Docker container to perform CARDS HTTP header modification and routing in a Kubernetes environment
-
Build a self-contained
cards/cards:latest
Docker container image and import this image into your Kubernetes environment. -
Build this
cards/proxy
Docker container image withdocker build -t cards/proxy .
and import that image into your Kubernetes environment. -
Deploy one of the Kubernetes Deployment YAML files with
kubectl create -f DEPLOYMENT_FILE.yml
replacingDEPLOYMENT_FILE.yml
withcards_oak_filesystem_proxy.yml
if SAML is not used orcards_oak_filesystem_proxy_saml.yml
if SAML is used. The latter will expect a SAML IdP (such as Keycloak) to be configured and available athttp://localhost:8484/
. Additionally, a validsamlKeystore.p12
will need to be generated and copied into the running CARDS container under/opt/cards/
. To enable SAML authentication, theUtilities/Administration/SAML/add_saml_sp_config.py
script can be used. -
Access CARDS by using
kubectl port-forward
to access port 80 on the pod.
-
Build a self-contained
cards/cards:latest
Docker container image. -
Build this
cards/proxy
Docker container image withdocker build -t cards/proxy .
. -
Start a Docker Compose environment with
docker-compose -f COMPOSE_FILE.yml up -d
replacingCOMPOSE_FILE.yml
withcards_oak_filesystem_proxy.yml
if SAML is not used orcards_oak_filesystem_proxy_saml.yml
if SAML is used. The latter will start aquay.io/keycloak/keycloak:15.0.2
container on port 8484. To use that Keycloak container, it must be configured and then asamlKeystore.p12
file must be generated and copied into the running CARDS container under/opt/cards/
. To enable SAML authentication, theUtilities/Administration/SAML/add_saml_sp_config.py
script can be used. -
CARDS will be available at
http://localhost:8080
.