mirror of
https://gitea.publichub.eu/oscar.krause/fastapi-dls.git
synced 2026-04-08 00:45:49 +03:00
Compare commits
6 Commits
2.0.1
...
82c8e89d8f
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
82c8e89d8f | ||
|
|
2ee92b6f81 | ||
|
|
52a1834817 | ||
|
|
dd0042b850 | ||
|
|
eded286c89 | ||
|
|
764e012fb7 |
@@ -1,6 +1,9 @@
|
||||
# Toggle debug mode
|
||||
#DEBUG=false
|
||||
|
||||
# Cert Path
|
||||
CERT_PATH="/etc/fastapi-dls/cert"
|
||||
|
||||
# Where the client can find the DLS server
|
||||
DLS_URL=127.0.0.1
|
||||
DLS_PORT=443
|
||||
|
||||
@@ -3,6 +3,8 @@
|
||||
WORKING_DIR=/usr/share/fastapi-dls
|
||||
CONFIG_DIR=/etc/fastapi-dls
|
||||
|
||||
source $CONFIG_DIR/env
|
||||
|
||||
while true; do
|
||||
[ -f $CONFIG_DIR/webserver.key ] && default_answer="N" || default_answer="Y"
|
||||
[ $default_answer == "Y" ] && V="Y/n" || V="y/N"
|
||||
@@ -25,27 +27,32 @@ if [ -f $CONFIG_DIR/webserver.key ]; then
|
||||
|
||||
if [ -x "$(command -v curl)" ]; then
|
||||
echo "> Testing API ..."
|
||||
source $CONFIG_DIR/env
|
||||
curl --insecure -X GET https://$DLS_URL:$DLS_PORT/-/health
|
||||
else
|
||||
echo "> Testing API failed, curl not available. Please test manually!"
|
||||
fi
|
||||
fi
|
||||
|
||||
echo "> Create Certificate-Chain folder ..."
|
||||
mkdir -p $CERT_PATH
|
||||
|
||||
echo "> Set permissions ..."
|
||||
chown -R www-data:www-data $CONFIG_DIR
|
||||
chown -R www-data:www-data $WORKING_DIR
|
||||
|
||||
echo "> Done."
|
||||
|
||||
cat <<EOF
|
||||
|
||||
# # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # #
|
||||
# #
|
||||
# fastapi-dls is now installed. #
|
||||
# #
|
||||
# Service should be up and running. #
|
||||
# Webservice is listen to https://localhost #
|
||||
# #
|
||||
# Configuration is stored in /etc/fastapi-dls/env. #
|
||||
# Service should be up and running (if you choose to auto-generate #
|
||||
# self-signed webserver certificate). #
|
||||
# #
|
||||
# - Webservice is listen to https://localhost # #
|
||||
# - Configuration is stored in /etc/fastapi-dls/env #
|
||||
# #
|
||||
# # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # #
|
||||
|
||||
|
||||
134
README.md
134
README.md
@@ -416,6 +416,140 @@ acme.sh --issue -d example.com \
|
||||
|
||||
After first success you have to replace `--issue` with `--renew`.
|
||||
|
||||
## Nginx Reverse Proxy (experimental)
|
||||
|
||||
- This guide is written for Debian/Ubuntu systems, other may work, but you have to do your setup on your own
|
||||
- Uvicorn does no longer serve requests directly
|
||||
- NGINX is used as HTTP & HTTPS entrypoint
|
||||
- Assumes you already have set up webserver certificate and private-key
|
||||
|
||||
**Install Nginx Webserver**
|
||||
|
||||
```shell
|
||||
apt-get install nginx-light
|
||||
```
|
||||
|
||||
**Remove default vhost**
|
||||
|
||||
```shell
|
||||
rm /etc/nginx/sites-enabled/default
|
||||
```
|
||||
|
||||
**Create fastapi-dls vhost**
|
||||
|
||||
<details>
|
||||
<summary>`/etc/nginx/sites-available/fastapi-dls`</summary>
|
||||
|
||||
```
|
||||
upstream dls-backend {
|
||||
server 127.0.0.1:8000; # must match dls listen port
|
||||
}
|
||||
|
||||
server {
|
||||
listen 443 ssl http2 default_server;
|
||||
listen [::]:443 ssl http2 default_server;
|
||||
|
||||
root /var/www/html;
|
||||
index index.html;
|
||||
server_name _;
|
||||
|
||||
ssl_certificate "/etc/fastapi-dls/cert/webserver.crt";
|
||||
ssl_certificate_key "/etc/fastapi-dls/cert/webserver.key";
|
||||
ssl_session_cache shared:SSL:1m;
|
||||
ssl_session_timeout 10m;
|
||||
ssl_protocols TLSv1.3 TLSv1.2;
|
||||
# ssl_ciphers "ECDHE-ECDSA-CHACHA20-POLY1305";
|
||||
# ssl_ciphers PROFILE=SYSTEM;
|
||||
ssl_prefer_server_ciphers on;
|
||||
|
||||
location / {
|
||||
# https://www.uvicorn.org/deployment/
|
||||
proxy_set_header Host $http_host;
|
||||
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
||||
proxy_set_header X-Forwarded-Proto $scheme;
|
||||
proxy_set_header Upgrade $http_upgrade;
|
||||
proxy_set_header Connection $connection_upgrade;
|
||||
proxy_redirect off;
|
||||
proxy_buffering off;
|
||||
|
||||
proxy_set_header X-Real-IP $remote_addr;
|
||||
|
||||
proxy_pass http://dls-backend$request_uri;
|
||||
}
|
||||
|
||||
location = /-/health {
|
||||
access_log off;
|
||||
add_header 'Content-Type' 'application/json';
|
||||
return 200 '{\"status\":\"up\",\"service\":\"nginx\"}';
|
||||
}
|
||||
}
|
||||
|
||||
map $http_upgrade $connection_upgrade {
|
||||
default upgrade;
|
||||
'' close;
|
||||
}
|
||||
|
||||
server {
|
||||
listen 80;
|
||||
listen [::]:80;
|
||||
|
||||
root /var/www/html;
|
||||
index index.html;
|
||||
server_name _;
|
||||
|
||||
location /leasing/v1/lessor/shutdown {
|
||||
proxy_set_header Host $http_host;
|
||||
proxy_set_header X-Real-IP $remote_addr;
|
||||
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
||||
proxy_set_header X-Forwarded-Proto $scheme;
|
||||
proxy_pass http://dls-backend/leasing/v1/lessor/shutdown;
|
||||
}
|
||||
|
||||
location / {
|
||||
return 301 https://$host$request_uri;
|
||||
}
|
||||
}
|
||||
```
|
||||
</details>
|
||||
|
||||
**Enable and test vhost**
|
||||
|
||||
```shell
|
||||
ln -s /etc/nginx/sites-available/fastapi-dls /etc/nginx/sites-enabled/fastapi-dls
|
||||
|
||||
nginx -t
|
||||
# nginx: the configuration file /etc/nginx/nginx.conf syntax is ok
|
||||
# nginx: configuration file /etc/nginx/nginx.conf test is successful
|
||||
```
|
||||
|
||||
**Override default fastapi-dls systemd service**
|
||||
|
||||
```shell
|
||||
mkdir /etc/systemd/system/fastapi-dls.service.d
|
||||
```
|
||||
|
||||
<details>
|
||||
<summary>`/etc/systemd/system/fastapi-dls.service.d/override.conf`</summary>
|
||||
|
||||
```
|
||||
[Service]
|
||||
ExecStart=
|
||||
ExecStart=uvicorn main:app \
|
||||
--env-file /etc/fastapi-dls/env \
|
||||
--host 127.0.0.1 --port 8000 \
|
||||
--app-dir /usr/share/fastapi-dls/app \
|
||||
--proxy-headers
|
||||
```
|
||||
</details>
|
||||
|
||||
**Run**
|
||||
|
||||
```shell
|
||||
systemctl daemon-reload
|
||||
service nginx start
|
||||
service fastapi-dls start
|
||||
```
|
||||
|
||||
# Configuration
|
||||
|
||||
| Variable | Default | Usage |
|
||||
|
||||
11
ROADMAP.md
11
ROADMAP.md
@@ -2,6 +2,17 @@
|
||||
|
||||
I am planning to implement the following features in the future.
|
||||
|
||||
## Patching Endpoint
|
||||
|
||||
A (optional) Path-Variable to `gridd-unlock-patcher` which enables an additional endpoint.
|
||||
Here you can upload your `nvidia-gridd` binary or `nvxdapix.dll` which then will be patched and responded.
|
||||
|
||||
## All-In-One Installer Script Endpoint
|
||||
|
||||
A new all-in-one installer endpoint
|
||||
(here a script is returned for linux or windows which then could be called like
|
||||
curl https://<fastapi-dls>/-/install/deb | sh which then
|
||||
download and place a client-token in the right directory, patch your girdd / dll and restart nvidia-gridd service)
|
||||
|
||||
## HA - High Availability
|
||||
|
||||
|
||||
10
app/util.py
10
app/util.py
@@ -45,11 +45,11 @@ class CASetup:
|
||||
|
||||
self.service_instance_ref = service_instance_ref
|
||||
self.root_private_key_filename = join(cert_path_prefix, CASetup.ROOT_PRIVATE_KEY_FILENAME)
|
||||
self.root_certificate_filename = join(dirname(__file__), 'cert', CASetup.ROOT_CERTIFICATE_FILENAME)
|
||||
self.ca_private_key_filename = join(dirname(__file__), 'cert', CASetup.CA_PRIVATE_KEY_FILENAME)
|
||||
self.ca_certificate_filename = join(dirname(__file__), 'cert', CASetup.CA_CERTIFICATE_FILENAME)
|
||||
self.si_private_key_filename = join(dirname(__file__), 'cert', CASetup.SI_PRIVATE_KEY_FILENAME)
|
||||
self.si_certificate_filename = join(dirname(__file__), 'cert', CASetup.SI_CERTIFICATE_FILENAME)
|
||||
self.root_certificate_filename = join(cert_path_prefix, CASetup.ROOT_CERTIFICATE_FILENAME)
|
||||
self.ca_private_key_filename = join(cert_path_prefix, CASetup.CA_PRIVATE_KEY_FILENAME)
|
||||
self.ca_certificate_filename = join(cert_path_prefix, CASetup.CA_CERTIFICATE_FILENAME)
|
||||
self.si_private_key_filename = join(cert_path_prefix, CASetup.SI_PRIVATE_KEY_FILENAME)
|
||||
self.si_certificate_filename = join(cert_path_prefix, CASetup.SI_CERTIFICATE_FILENAME)
|
||||
|
||||
if not (isfile(self.root_private_key_filename)
|
||||
and isfile(self.root_certificate_filename)
|
||||
|
||||
@@ -3,6 +3,6 @@ uvicorn[standard]==0.34.2
|
||||
python-jose[cryptography]==3.4.0
|
||||
cryptography==44.0.3
|
||||
python-dateutil==2.9.0
|
||||
sqlalchemy==2.0.40
|
||||
sqlalchemy==2.0.41
|
||||
markdown==3.8
|
||||
python-dotenv==1.1.0
|
||||
|
||||
Reference in New Issue
Block a user