Skip to content

Wirecloud/docker-wirecloud

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

Supported tags and respective Dockerfile links

What is WireCloud?

Support badge

WireCloud builds on cutting-edge end-user development, RIA and semantic technologies to offer a next-generation end-user centred web application mashup platform aimed at leveraging the long tail of the Internet of Services. WireCloud builds on cutting-edge end-user (software) development, RIA and semantic technologies to offer a next-generation end-user centred web application mashup platform aimed at allowing end users without programming skills to easily create web applications and dashboards/cockpits (e.g. to visualize their data of interest or to control their domotized home or environment). Web application mashups integrate heterogeneous data, application logic, and UI components (widgets) sourced from the Web to create new coherent and value-adding composite applications. They are targeted at leveraging the "long tail" of the Web of Services (a.k.a. the Programmable Web) by exploiting rapid development, DIY, and shareability. They typically serve a specific situational (i.e. immediate, short-lived, customized) need, frequently with high potential for reuse. Is this "situational" character which precludes them to be offered as 'off-the-shelf' functionality by solution providers, and therefore creates the need for a tool like WireCloud

WireCloud is part of FIWARE. Check it out in the Catalogue

WireCloud's logo

How to use this image

$ docker run --name some-wirecloud -p 80:8000 -e DEBUG=True -d fiware/wirecloud

The following environment variables are also honored for configuring your WireCloud instance:

  • -e DEBUG=... (defaults to "False", use "True" for running WireCloud in debug mode. Debug mode should be enabled for running WireCloud in standalone mode)
  • -e LOGLEVEL=... (defaults to "INFO")
  • -e ALLOWED_HOSTS=... (defaults to "*", whitespace whitespace-separated list of allowed hosts. See Django documentation for more details)
  • -e DEFAULT_LANGUAGE=... (defaults to "browser", see documentation for more details)
  • -e DEFAULT_THEME=... (defaults to "wirecloud.defaulttheme")
  • -e DB_HOST=... (defaults to nothing, provide a host value to connect this image with a DB server)
  • -e DB_NAME=... (defaults to "postgres")
  • -e DB_USERNAME=... (defaults to "postgres")
  • -e DB_PASSWORD=... (defaults to "postgres")
  • -e DB_PORT=... (defaults to "5432")
  • -e FORWARDED_ALLOW_IPS=... (defaults to "*", set this to provide a list of trusted reverse proxies)
  • -e ELASTICSEARCH2_URL=... (defaults to nothing, leave it empty to use Whoosh instead).
  • -e LANGUAGE_CODE=... (defaults to "en-gb", See django documentation for more details)
  • -e MEMCACHED_LOCATION=... (defaults to nothing, leave it empty to disable memcached support)
  • -e FIWARE_IDM_SERVER=... (defaults to nothing, leave it empty for authenticating users using the credentials stored on the WireCloud database.)
  • -e FIWARE_IDM_PUBLIC_URL=... (defaults to nothing, leave it empty for using the FIWARE_IDM_SERVER configuration for building the url when redirecting the browser to the IdM portal)
  • -e SOCIAL_AUTH_FIWARE_KEY=... (defaults to nothing)
  • -e SOCIAL_AUTH_FIWARE_SECRET=... (defaults to nothing)
  • -e KEYCLOAK_IDM_SERVER=... (defaults to nothing, leave it empty for authenticating users using the credentials stored on the WireCloud database.)
  • -e KEYCLOAK_REALM=... (default to nothing, realm to use for connecting with keycloak)
  • -e KEYCLOAK_KEY=... (default to nothing)
  • -e KEYCLOAK_GLOBAL_ROLE=... (default to "False")
  • -e SOCIAL_AUTH_KEYCLOAK_KEY=... (defaults to nothing)
  • -e SOCIAL_AUTH_KEYCLOAK_SECRET=... (defaults to nothing)
  • -e HTTPS_VERIFY=... (True, False or path to a certificate bundle, default to "/etc/ssl/certs/ca-certificates.crt")
  • -e ADMIN_URL_PATH=... (default to "^admin/", regexp for the administration path)

In addition to those environment variables, this docker image also allows you to configure the following Django settings using environment variables with the same name: CACHE_MIDDLEWARE_KEY_PREFIX, CSRF_COOKIE_AGE, CSRF_COOKIE_HTTPONLY, CSRF_COOKIE_NAME, CSRF_COOKIE_SECURE, DEFAULT_FROM_EMAIL, EMAIL_HOST, EMAIL_HOST_PASSWORD, EMAIL_PORT, EMAIL_HOST_USER, EMAIL_USE_SSL, EMAIL_USE_TLS, FORCE_SCRIPT_NAME, LOGOUT_REDIRECT_URL, SECRET_KEY, SESSION_COOKIE_AGE, SESSION_COOKIE_NAME, SESSION_COOKIE_HTTPONLY and SESSION_COOKIE_SECURE. See Django documentation for more details.

When running WireCloud with TLS behind a reverse proxy such as Apache/NGINX which is responsible for doing TLS termination, be sure to set the X-Forwarded-Proto, X-Forwarded-Host and X-Forwarded-Port headers appropriately.

Docker Secrets

As an alternative to passing sensitive information via environment variables, _FILE may be appended to some sensitive environment variables, causing the initialization script to load the values for those variables from files present in the container. In particular, this can be used to load passwords from Docker secrets stored in /run/secrets/<secret_name> files. For example:

docker run --name wirecloud -e DB_PASSWORD_FILE=/run/secrets/password -d fiware/wirecloud

Currently, this _FILE suffix is supported for:

  • EMAIL_HOST_PASSWORD
  • KEYCLOAK_KEY
  • LOGOUT_REDIRECT_URL
  • SECRET_KEY
  • SOCIAL_AUTH_FIWARE_KEY
  • SOCIAL_AUTH_FIWARE_SECRET
  • SOCIAL_AUTH_KEYCLOAK_KEY
  • SOCIAL_AUTH_KEYCLOAK_SECRET

Running manage.py commands

You can run any available manage.py command by using docker exec -ti some-wirecloud manage.py .... For example, you can create superusers/administrators by running the following command:

$ docker exec -ti some-wirecloud manage.py createsuperuser
Username (leave blank to use 'root'): admin
Email address: ${youremail}
Password: ${yourpassword}
Password (again): ${yourpassword}
Superuser created successfully.

Regarding commands using the filesystem, take into account that those commands will be executed inside the container and thus the filesystem will be the one used by the container. The manage.py script will not check if those commands make changes outside the provided volumes. Anyway, they can be used without any problem. For example, static files can be collected using the following command:

$ docker exec -ti some-wirecloud manage.py collectstatic

Use docker exec -ti some-wirecloud manage.py --help for getting the list of available commands.

... via docker stack deploy or docker-compose

Example docker-compose.yml for WireCloud:

version: "3"

services:

    nginx:
        restart: always
        image: nginx
        ports:
            - 80:80
        volumes:
            - ./nginx.conf:/etc/nginx/nginx.conf:ro
            - ./wirecloud-static:/var/www/static:ro
        depends_on:
            - wirecloud


    postgres:
        restart: always
        image: postgres
        environment:
            - POSTGRES_PASSWORD=wirepass   # Change this password!
        volumes:
            - ./postgres-data:/var/lib/postgresql/data


    elasticsearch:
        restart: always
        image: elasticsearch:2.4
        volumes:
            - ./elasticsearch-data:/usr/share/elasticsearch/data
        command: elasticsearch -Des.index.max_result_window=50000


    memcached:
        restart: always
        image: memcached:1
        command: memcached -m 2048m


    wirecloud:
        restart: always
        image: fiware/wirecloud
        depends_on:
            - postgres
            - elasticsearch
            - memcached
        environment:
            - DEBUG=False
            # - DEFAULT_THEME=wirecloud.defaulttheme
            - DB_HOST=postgres
            - DB_PASSWORD=wirepass   # Change this password!
            - FORWARDED_ALLOW_IPS=*
            - ELASTICSEARCH2_URL=http://elasticsearch:9200/
            - MEMCACHED_LOCATION=memcached:11211
            # Uncomment the following environment variables to enable IDM integration
            #- FIWARE_IDM_SERVER=${FIWARE_IDM_SERVER}
            #- SOCIAL_AUTH_FIWARE_KEY=${SOCIAL_AUTH_FIWARE_KEY}
            #- SOCIAL_AUTH_FIWARE_SECRET=${SOCIAL_AUTH_FIWARE_SECRET}
        volumes:
            - ./wirecloud-data:/opt/wirecloud_instance/data
            - ./wirecloud-static:/var/www/static

This docker-compose.yml file relies on a nginx.conf configuration file:

user  nginx;
worker_processes  1;

error_log  /var/log/nginx/error.log warn;
pid        /var/run/nginx.pid;


events {
    worker_connections  1024;
}


http {
    include       /etc/nginx/mime.types;
    default_type  application/octet-stream;

    log_format  main  '$remote_addr - $remote_user [$time_local] "$request" '
                      '$status $body_bytes_sent "$http_referer" '
                      '"$http_user_agent" "$http_x_forwarded_for"';

    access_log  /var/log/nginx/access.log  main;

    sendfile        on;
    #tcp_nopush     on;

    keepalive_timeout  65;

    #gzip  on;

    server {

        listen 80;
        server_name example.org;
        client_max_body_size 20M;
        charset utf-8;

        location /static {
            alias /var/www/static;
        }

        location / {
            proxy_pass http://wirecloud:8000;
            proxy_set_header Host $host;
            proxy_set_header X-Real-IP $remote_addr;
            proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
        }

    }
}

Run docker stack deploy -c docker-compose.yml wirecloud (or docker-compose -f docker-compose.yml up), wait for it to initialize completely, and visit http://swarm-ip, http://localhost, or http://host-ip (as appropriate). Also, take into account that you should configure https to have a production-ready deployment of WireCloud (not covered by this example).

Customizations

If you want to customize your WireCloud installation, the best option is to create a new docker image by extending one of the official images and installing new modules. For example, you can follow the following tutorial for creating a custom theme and install it on the extended image and use the DEFAULT_THEME environment variable to configure it as the default theme.

License

View license information for WireCloud.

Supported Docker versions

This image is officially supported on Docker version 1.7.0.

Support for older versions (down to 1.0) is provided on a best-effort basis.

User Feedback

Documentation

This document should provide everything you need to install WireCloud using docker. Anyway, you can find the User & Programmer's Manual and the Administration Guides on Read the Docs.

Issues

If you have any problems with or questions about this image, please contact us through a GitHub issue.

You can also reach many of the official image maintainers via the fiware and fiware-wirecloud tags on StackOverflow.

Contributing

You are invited to contribute new features, fixes, or updates, large or small; we are always thrilled to receive pull requests, and do our best to process them as fast as we can.

Before you start to code, we recommend discussing your plans through a GitHub issue, especially for more ambitious contributions. This gives other contributors a chance to point you in the right direction, give you feedback on your design, and help you find out if someone else is working on the same thing.