From 619d1986087af1c797b692eb6f11c4411d6fd87e Mon Sep 17 00:00:00 2001 From: Loraine Gueguen <loraine.gueguen@sb-roscoff.fr> Date: Thu, 1 Apr 2021 23:45:23 +0200 Subject: [PATCH] Update README.md --- README.md | 33 ++++++++++++++++++++++++++++----- 1 file changed, 28 insertions(+), 5 deletions(-) diff --git a/README.md b/README.md index 586357c..f97d244 100755 --- a/README.md +++ b/README.md @@ -6,9 +6,28 @@ A stack of Docker services will be deployed for each organism. ## Description -Automatically generates functional GGA environments from a descriptive input yaml file. -See `examples/example.yml` for an example of what information can be described -and the correct formatting of this input file. +Automatically generates functional GGA environments from an input yaml file describing the data. +See `examples/example.yml` for an example of what information can be described and the correct formatting of this input file. + +Each GGA environment is deployed at [https://hostname/sp/genus_species/](https://hostname/sp/genus_species/). + +### Traefik + +Traefik is a reverse proxy which allows to direct HTTP traffic to various Docker Swarm services. + +The Traefik dashboard is deployed at [https://hostname/traefik/](https://hostname/traefik/) + +### Authentication with Authelia + +The authentication layer is optional. If used, the config file needs the variables `https_port`, `auth_hostname`, `authelia_config_path`. + +Authelia is an authentication agent, which can be plugged to an LDAP server, and that Traefik can you to check permissions to access services. + +Authelia is accessed automatically by Traefik to check permissions everytime someones wants to access a page. +If the user is not logged in, he is redirected to the authelia portal. +Note that Authelia needs a secured connexion (no self-signed certificate) between the upstream proxy and Traefik (and https between internet and the proxy). + +### Steps The "gga_load_data" tool is divided in 4 separate scripts: @@ -123,8 +142,7 @@ You can check the status of the Galaxy service with `$ docker service logs -f ge `./serexec genus_species_galaxy supervisorctl status`. When deploying the stack of services, the Galaxy service can take a long time to be ready. This is due to the Galaxy container preparing a persistent location for the container data. -In development mode only, this can be bypassed by setting the variable "persist_galaxy_data" to "False" in the config file. - +In development mode only, this can be bypassed by setting the variable `persist_galaxy_data` to `False` in the config file. ## Requirements @@ -135,3 +153,8 @@ Requires Python 3.6 ## License [BSD 3-Clause](./LICENSE) + +## Acknowledgments + +[Anthony Bretaudeau](https://github.com/abretaud) +[Matéo Boudet](https://github.com/mboudet) \ No newline at end of file -- GitLab