Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add Letsencrypt automatic cert generation for registry layer- 86byxgqbj #319

Closed
wants to merge 2 commits into from

Conversation

drizzentic
Copy link
Collaborator

@drizzentic drizzentic commented Aug 5, 2024

Summary by CodeRabbit

  • New Features

    • Simplified domain configuration by changing the environment variable from DOMAIN_NAME_HOST_TRAEFIK to DOMAIN_NAME across multiple services.
    • Enhanced security for services by implementing TLS and directing traffic through websecure entry points.
  • Documentation

    • Updated reverse proxy documentation to reflect changes in the environment variable for clarity.
  • Bug Fixes

    • Corrected routing rules in Traefik configuration for multiple services to use the updated domain variable, improving accessibility and routing logic.

Copy link
Contributor

coderabbitai bot commented Aug 5, 2024

Walkthrough

The recent updates across multiple configuration files streamline the domain naming conventions for Traefik routing. The variable DOMAIN_NAME_HOST_TRAEFIK has been replaced with the simpler DOMAIN_NAME, enhancing clarity and consistency. This change simplifies the configuration for various services, strengthens security through improved TLS settings, and maintains existing functionality without introducing new logic.

Changes

Files Change Summary
.env.cluster, .env.local Changed variable name from DOMAIN_NAME_HOST_TRAEFIK to DOMAIN_NAME for enhanced clarity.
client-registry-jempi/docker-compose.api.yml, client-registry-jempi/docker-compose.web.yml, client-registry-santempi/docker-compose.yml, dashboard-visualiser-jsreport/docker-compose.yml, dashboard-visualiser-kibana/docker-compose.yml, dashboard-visualiser-superset/docker-compose.yml, identity-access-manager-keycloak/docker-compose.yml, interoperability-layer-openhim/docker-compose.yml, monitoring/docker-compose.yml Updated routing rules to use DOMAIN_NAME instead of DOMAIN_NAME_HOST_TRAEFIK, added TLS configuration, and specified secure entry points.

Sequence Diagram(s)

sequenceDiagram
    participant User
    participant Traefik
    participant Service

    User->>Traefik: Request to access service
    Traefik->>Service: Forward request with DOMAIN_NAME
    Service-->>Traefik: Response
    Traefik-->>User: Return response
Loading

🐇 In fields of green, I hop with glee,
Domain names are simple, just like me!
From HOST_TRAEFIK to DOMAIN so bright,
Routing is clear, oh, what a delight!
With TLS hugs, we’re secure, you see,
Hopping along, happy as can be! 🐇✨


Thank you for using CodeRabbit. We offer it for free to the OSS community and would appreciate your support in helping us grow. If you find it useful, would you consider giving us a shout-out on your favorite social media?

Share
Tips

Chat

There are 3 ways to chat with CodeRabbit:

  • Review comments: Directly reply to a review comment made by CodeRabbit. Example:
    • I pushed a fix in commit <commit_id>.
    • Generate unit testing code for this file.
    • Open a follow-up GitHub issue for this discussion.
  • Files and specific lines of code (under the "Files changed" tab): Tag @coderabbitai in a new review comment at the desired location with your query. Examples:
    • @coderabbitai generate unit testing code for this file.
    • @coderabbitai modularize this function.
  • PR comments: Tag @coderabbitai in a new PR comment to ask questions about the PR branch. For the best results, please provide a very specific query, as very limited context is provided in this mode. Examples:
    • @coderabbitai generate interesting stats about this repository and render them as a table.
    • @coderabbitai show all the console.log statements in this repository.
    • @coderabbitai read src/utils.ts and generate unit testing code.
    • @coderabbitai read the files in the src/scheduler package and generate a class diagram using mermaid and a README in the markdown format.
    • @coderabbitai help me debug CodeRabbit configuration file.

Note: Be mindful of the bot's finite context window. It's strongly recommended to break down tasks such as reading entire modules into smaller chunks. For a focused discussion, use review comments to chat about specific files and their changes, instead of using the PR comments.

CodeRabbit Commands (invoked as PR comments)

  • @coderabbitai pause to pause the reviews on a PR.
  • @coderabbitai resume to resume the paused reviews.
  • @coderabbitai review to trigger an incremental review. This is useful when automatic reviews are disabled for the repository.
  • @coderabbitai full review to do a full review from scratch and review all the files again.
  • @coderabbitai summary to regenerate the summary of the PR.
  • @coderabbitai resolve resolve all the CodeRabbit review comments.
  • @coderabbitai configuration to show the current CodeRabbit configuration for the repository.
  • @coderabbitai help to get help.

Additionally, you can add @coderabbitai ignore anywhere in the PR description to prevent this PR from being reviewed.

CodeRabbit Configuration File (.coderabbit.yaml)

  • You can programmatically configure CodeRabbit by adding a .coderabbit.yaml file to the root of your repository.
  • Please see the configuration documentation for more information.
  • If your editor has YAML language server enabled, you can add the path at the top of this file to enable auto-completion and validation: # yaml-language-server: $schema=https://coderabbit.ai/integrations/schema.v2.json

Documentation and Community

  • Visit our Documentation for detailed information on how to use CodeRabbit.
  • Join our Discord Community to get help, request features, and share feedback.
  • Follow us on X/Twitter for updates and announcements.

Copy link
Contributor

@coderabbitai coderabbitai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Actionable comments posted: 0

Review details

Configuration used: CodeRabbit UI
Review profile: CHILL

Commits

Files that changed from the base of the PR and between 5e28705 and 4565376.

Files selected for processing (12)
  • .env.cluster (1 hunks)
  • .env.local (1 hunks)
  • client-registry-jempi/docker-compose.api.yml (1 hunks)
  • client-registry-jempi/docker-compose.web.yml (1 hunks)
  • client-registry-santempi/docker-compose.yml (2 hunks)
  • dashboard-visualiser-jsreport/docker-compose.yml (1 hunks)
  • dashboard-visualiser-kibana/docker-compose.yml (1 hunks)
  • dashboard-visualiser-superset/docker-compose.yml (1 hunks)
  • documentation/packages/reverse-proxy-traefik/README.md (1 hunks)
  • identity-access-manager-keycloak/docker-compose.yml (1 hunks)
  • interoperability-layer-openhim/docker-compose.yml (1 hunks)
  • monitoring/docker-compose.yml (2 hunks)
Files skipped from review due to trivial changes (3)
  • .env.cluster
  • .env.local
  • documentation/packages/reverse-proxy-traefik/README.md
Additional comments not posted (30)
dashboard-visualiser-kibana/docker-compose.yml (1)

20-20: LGTM! Simplified domain name variable usage.

The change from ${DOMAIN_NAME_HOST_TRAEFIK} to ${DOMAIN_NAME} simplifies the domain name variable used for routing. Ensure that ${DOMAIN_NAME} is correctly set in the environment.

client-registry-jempi/docker-compose.web.yml (5)

23-23: LGTM! Simplified domain name variable usage.

The change from ${DOMAIN_NAME_HOST_TRAEFIK} to ${DOMAIN_NAME} simplifies the domain name variable used for routing. Ensure that ${DOMAIN_NAME} is correctly set in the environment.


24-24: Approved: Secure entrypoint added.

The addition of websecure as an entrypoint ensures that the service will handle secure traffic.


25-25: Approved: TLS enabled.

Enabling TLS enhances the security of the connections.


26-26: Approved: TLS certresolver specified.

Specifying ${CERT_RESOLVER} for the TLS certresolver is necessary for obtaining TLS certificates automatically.


27-27: Approved: Load balancer server scheme updated to HTTPS.

Updating the load balancer's server scheme to https ensures that traffic is routed securely.

dashboard-visualiser-jsreport/docker-compose.yml (1)

19-19: LGTM! Simplified domain name variable usage.

The change from ${DOMAIN_NAME_HOST_TRAEFIK} to ${DOMAIN_NAME} simplifies the domain name variable used for routing. Ensure that ${DOMAIN_NAME} is correctly set in the environment.

identity-access-manager-keycloak/docker-compose.yml (1)

53-53: LGTM! But verify the new domain name variable usage.

The change to use ${DOMAIN_NAME} instead of ${DOMAIN_NAME_HOST_TRAEFIK} is approved.

However, ensure that ${DOMAIN_NAME} is correctly defined and used consistently across the configuration.

Verification successful

LGTM! The new domain name variable ${DOMAIN_NAME} is used consistently across the configuration.

The change to use ${DOMAIN_NAME} instead of ${DOMAIN_NAME_HOST_TRAEFIK} is verified and approved.

  • identity-access-manager-keycloak/docker-compose.yml
  • Other related docker-compose.yml files
Scripts executed

The following scripts were executed for the analysis:

Script:

#!/bin/bash
# Description: Verify the usage of the new domain name variable `${DOMAIN_NAME}`.

# Test: Search for the variable usage. Expect: Consistent usage of `${DOMAIN_NAME}`.
rg --type yaml '\${DOMAIN_NAME}'

Length of output: 135


Script:

#!/bin/bash
# Description: Verify the usage of the new domain name variable `${DOMAIN_NAME}`.

# Test: Search for the variable usage. Expect: Consistent usage of `${DOMAIN_NAME}`.
rg --type yaml '\\${DOMAIN_NAME}'

Length of output: 138


Script:

#!/bin/bash
# Description: Verify the usage of the new domain name variable `${DOMAIN_NAME}`.

# Test: Search for the variable usage. Expect: Consistent usage of `${DOMAIN_NAME}`.
rg --type yaml '\${DOMAIN_NAME}'

Length of output: 135


Script:

#!/bin/bash
# Description: Verify the usage of the new domain name variable `${DOMAIN_NAME}`.

# Test: Search for the variable usage. Expect: Consistent usage of `${DOMAIN_NAME}`.
grep -rF '${DOMAIN_NAME}' --include \*.yml

Length of output: 2105

client-registry-santempi/docker-compose.yml (10)

36-36: LGTM! But verify the load balancer server scheme usage.

The change to use https for the load balancer server scheme is approved.

However, ensure that the load balancer server scheme is correctly defined and used consistently across the configuration.

Verification successful

Verified: The load balancer server scheme is consistently set to https across the configuration.

The change is correctly implemented and aligns with the overall configuration strategy.

Scripts executed

The following scripts were executed for the analysis:

Script:

#!/bin/bash
# Description: Verify the usage of the load balancer server scheme.

# Test: Search for the load balancer server scheme usage. Expect: Consistent usage of `https`.
rg --type yaml 'loadbalancer.server.scheme=https'

Length of output: 786


52-52: LGTM! But verify the load balancer server scheme usage.

The change to use https for the load balancer server scheme is approved.

However, ensure that the load balancer server scheme is correctly defined and used consistently across the configuration.

Verification successful

Verification successful!

The load balancer server scheme is consistently defined as https across the configuration files.

  • interoperability-layer-openhim/docker-compose.yml
  • client-registry-jempi/docker-compose.api.yml
  • client-registry-santempi/docker-compose.yml
  • client-registry-jempi/docker-compose.web.yml

No issues found with the routing logic.

Scripts executed

The following scripts were executed for the analysis:

Script:

#!/bin/bash
# Description: Verify the usage of the load balancer server scheme.

# Test: Search for the load balancer server scheme usage. Expect: Consistent usage of `https`.
rg --type yaml 'loadbalancer.server.scheme=https'

Length of output: 786


34-34: LGTM! But verify the TLS settings usage.

The change to enable TLS for secure communication is approved.

However, ensure that the TLS settings are correctly defined and used consistently across the configuration.

Verification successful

TLS settings are used consistently across the configuration files.

The tls=true setting is consistently applied across various docker-compose.yml files, including client-registry-santempi/docker-compose.yml.

  • reverse-proxy-traefik/docker-compose.yml
  • interoperability-layer-openhim/docker-compose.yml
  • identity-access-manager-keycloak/docker-compose.yml
  • client-registry-jempi/docker-compose.api.yml
  • client-registry-jempi/docker-compose.web.yml
  • client-registry-santempi/docker-compose.yml
Scripts executed

The following scripts were executed for the analysis:

Script:

#!/bin/bash
# Description: Verify the usage of the TLS settings.

# Test: Search for the TLS settings usage. Expect: Consistent usage of `tls=true`.
rg --type yaml 'tls=true'

Length of output: 932


50-50: LGTM! But verify the TLS settings usage.

The change to enable TLS for secure communication is approved.

However, ensure that the TLS settings are correctly defined and used consistently across the configuration.

Verification successful

TLS settings are consistently used.

The tls=true setting is consistently applied across multiple docker-compose.yml files, ensuring secure communication for the Traefik routers.

  • reverse-proxy-traefik/docker-compose.yml
  • identity-access-manager-keycloak/docker-compose.yml
  • interoperability-layer-openhim/docker-compose.yml
  • client-registry-santempi/docker-compose.yml
  • client-registry-jempi/docker-compose.web.yml
  • client-registry-jempi/docker-compose.api.yml
Scripts executed

The following scripts were executed for the analysis:

Script:

#!/bin/bash
# Description: Verify the usage of the TLS settings.

# Test: Search for the TLS settings usage. Expect: Consistent usage of `tls=true`.
rg --type yaml 'tls=true'

Length of output: 932


33-33: LGTM! But verify the websecure entry point usage.

The change to specify websecure as the entry point is approved.

However, ensure that websecure is correctly defined and used consistently across the configuration.

Verification successful

Verified: The websecure entry point is correctly defined and used consistently across the configuration.

  • The websecure entry point is defined in reverse-proxy-traefik/docker-compose.yml with the address :443.
  • The entry point is used consistently in multiple docker-compose.yml files, including client-registry-santempi/docker-compose.yml.
Scripts executed

The following scripts were executed for the analysis:

Script:

#!/bin/bash
# Description: Verify the usage of the `websecure` entry point.

# Test: Search for the entry point usage. Expect: Consistent usage of `websecure`.
rg --type yaml 'entrypoints=websecure'

Length of output: 822


Script:

#!/bin/bash
# Description: Verify the definition of the `websecure` entry point in Traefik configuration files.

# Test: Search for the definition of the `websecure` entry point. Expect: Proper definition of `websecure`.
rg --type yaml 'entryPoints:.*websecure'

Length of output: 42


Script:

#!/bin/bash
# Description: Verify the definition of the `websecure` entry point in all YAML files.

# Test: Search for the `websecure` entry point definition. Expect: Proper definition of `websecure`.
rg --type yaml 'websecure'

Length of output: 896


49-49: LGTM! But verify the websecure entry point usage.

The change to specify websecure as the entry point is approved.

However, ensure that websecure is correctly defined and used consistently across the configuration.

Verification successful

Verify the definition of the websecure entry point.

The websecure entry point is used consistently across multiple docker-compose.yml files. However, please verify that the websecure entry point is correctly defined in the Traefik configuration.


Verify the definition of the websecure entry point.

The previous search did not yield any results. Please verify that the websecure entry point is correctly defined in the Traefik configuration by searching for the specific websecure entry point.


The websecure entry point is correctly defined and used consistently.

The websecure entry point is defined in reverse-proxy-traefik/docker-compose.yml with the address :443, and it is used consistently across multiple docker-compose.yml files.

  • reverse-proxy-traefik/docker-compose.yml: --entryPoints.websecure.address=:443
  • interoperability-layer-openhim/docker-compose.yml: Multiple routers using websecure
  • client-registry-santempi/docker-compose.yml: Multiple routers using websecure
  • client-registry-jempi/docker-compose.web.yml: jempi-web router using websecure
  • client-registry-jempi/docker-compose.api.yml: jempi-api router using websecure
Scripts executed

The following scripts were executed for the analysis:

Script:

#!/bin/bash
# Description: Verify the usage of the `websecure` entry point.

# Test: Search for the entry point usage. Expect: Consistent usage of `websecure`.
rg --type yaml 'entrypoints=websecure'

Length of output: 822


Script:

#!/bin/bash
# Description: Verify the definition of the `websecure` entry point in the Traefik configuration.

# Test: Search for the definition of the `websecure` entry point. Expect: Definition of `websecure` in the Traefik configuration.
rg --type yaml 'entryPoints:'

Length of output: 29


Script:

#!/bin/bash
# Description: Verify the definition of the `websecure` entry point in the Traefik configuration.

# Test: Search for the specific `websecure` entry point definition. Expect: Definition of `websecure` in the Traefik configuration.
rg --type yaml 'websecure'

Length of output: 896


51-51: LGTM! But verify the certificate resolver usage.

The change to specify the certificate resolver for automatic certificate management is approved.

However, ensure that ${CERT_RESOLVER} is correctly defined and used consistently across the configuration.

Verification successful

The usage of ${CERT_RESOLVER} is consistent across the configuration files.

The certificate resolver is correctly defined and used in multiple docker-compose.yml files, ensuring proper automatic certificate management.

  • client-registry-jempi/docker-compose.api.yml
  • client-registry-jempi/docker-compose.web.yml
  • client-registry-santempi/docker-compose.yml
  • identity-access-manager-keycloak/docker-compose.yml
  • interoperability-layer-openhim/docker-compose.yml
  • reverse-proxy-traefik/docker-compose.yml
Scripts executed

The following scripts were executed for the analysis:

Script:

#!/bin/bash
# Description: Verify the usage of the certificate resolver `${CERT_RESOLVER}`.

# Test: Search for the certificate resolver usage. Expect: Consistent usage of `${CERT_RESOLVER}`.
rg --type yaml '\${CERT_RESOLVER}'

Length of output: 139


Script:

#!/bin/bash
# Description: Verify the usage of the certificate resolver `${CERT_RESOLVER}`.

# Test: Search for the certificate resolver usage. Expect: Consistent usage of `${CERT_RESOLVER}`.
rg --type yaml '\\${CERT_RESOLVER}'

Length of output: 142


Script:

#!/bin/bash
# Description: Verify the usage of the certificate resolver `${CERT_RESOLVER}`.

# Test: Search for the certificate resolver usage. Expect: Consistent usage of `${CERT_RESOLVER}`.
rg --type yaml '\${CERT_RESOLVER}'

Length of output: 139


Script:

#!/bin/bash
# Description: Verify the usage of the certificate resolver `${CERT_RESOLVER}`.

# Test: Search for the certificate resolver usage. Expect: Consistent usage of `${CERT_RESOLVER}`.
grep -r '\${CERT_RESOLVER}' --include \*.yml

Length of output: 1048


35-35: LGTM! But verify the certificate resolver usage.

The change to specify the certificate resolver for automatic certificate management is approved.

However, ensure that ${CERT_RESOLVER} is correctly defined and used consistently across the configuration.

Verification successful

Let's correct the regex pattern and re-run the shell script to verify the usage of ${CERT_RESOLVER}.


Let's correct the regex pattern properly this time and re-run the shell script to verify the usage of ${CERT_RESOLVER}.


Let's modify the shell script to search for CERT_RESOLVER without escaping the dollar sign and re-run the script.


The certificate resolver ${CERT_RESOLVER} is used consistently across the configuration.

The search results show that ${CERT_RESOLVER} is used in multiple docker-compose.yml files, indicating that it is defined and used correctly.

  • reverse-proxy-traefik/docker-compose.yml
  • identity-access-manager-keycloak/docker-compose.yml
  • interoperability-layer-openhim/docker-compose.yml
  • client-registry-santempi/docker-compose.yml
  • client-registry-jempi/docker-compose.api.yml
  • client-registry-jempi/docker-compose.web.yml
Scripts executed

The following scripts were executed for the analysis:

Script:

#!/bin/bash
# Description: Verify the usage of the certificate resolver `${CERT_RESOLVER}`.

# Test: Search for the certificate resolver usage. Expect: Consistent usage of `${CERT_RESOLVER}`.
rg --type yaml '\${CERT_RESOLVER}'

Length of output: 139


Script:

#!/bin/bash
# Description: Verify the usage of the certificate resolver `${CERT_RESOLVER}`.

# Test: Search for the certificate resolver usage. Expect: Consistent usage of `${CERT_RESOLVER}`.
rg --type yaml '\\${CERT_RESOLVER}'

Length of output: 142


Script:

#!/bin/bash
# Description: Verify the usage of the certificate resolver `${CERT_RESOLVER}`.

# Test: Search for the certificate resolver usage. Expect: Consistent usage of `${CERT_RESOLVER}`.
rg --type yaml '\${CERT_RESOLVER}'

Length of output: 139


Script:

#!/bin/bash
# Description: Verify the usage of the certificate resolver `CERT_RESOLVER`.

# Test: Search for the certificate resolver usage. Expect: Consistent usage of `CERT_RESOLVER`.
rg --type yaml 'CERT_RESOLVER'

Length of output: 1031


48-48: LGTM! But verify the new domain name variable usage.

The change to use ${DOMAIN_NAME} instead of ${DOMAIN_NAME_HOST_TRAEFIK} is approved.

However, ensure that ${DOMAIN_NAME} is correctly defined and used consistently across the configuration.


32-32: LGTM! But verify the new domain name variable usage.

The change to use ${DOMAIN_NAME} instead of ${DOMAIN_NAME_HOST_TRAEFIK} is approved.

However, ensure that ${DOMAIN_NAME} is correctly defined and used consistently across the configuration.

dashboard-visualiser-superset/docker-compose.yml (1)

10-10: LGTM! But verify the new domain name variable usage.

The change to use ${DOMAIN_NAME} instead of ${DOMAIN_NAME_HOST_TRAEFIK} is approved.

However, ensure that ${DOMAIN_NAME} is correctly defined and used consistently across the configuration.

client-registry-jempi/docker-compose.api.yml (5)

32-32: LGTM! Simplified domain configuration.

The update to use ${DOMAIN_NAME} instead of ${DOMAIN_NAME_HOST_TRAEFIK} simplifies the domain configuration.


33-33: LGTM! Secure entry point.

Setting the entry point to websecure enhances security by ensuring traffic is routed through a secure entry point.


34-34: LGTM! TLS enabled.

Enabling TLS ensures secure communication for the jempi-api service.


35-35: LGTM! Certificate resolver added.

Adding a certificate resolver enhances flexibility in managing certificates for the jempi-api service.


36-36: LGTM! Secure server scheme.

Changing the load balancer's server scheme to https ensures secure communication for the jempi-api service.

interoperability-layer-openhim/docker-compose.yml (4)

52-52: LGTM! Simplified domain configuration.

The update to use ${DOMAIN_NAME} instead of ${DOMAIN_NAME_HOST_TRAEFIK} simplifies the domain configuration.


55-55: LGTM! Certificate resolver variable.

Using a variable ${CERT_RESOLVER} for the certificate resolver enhances flexibility in managing certificates for the openhimcomms service.


61-61: LGTM! Simplified domain configuration.

The update to use ${DOMAIN_NAME} instead of ${DOMAIN_NAME_HOST_TRAEFIK} simplifies the domain configuration.


64-64: LGTM! Certificate resolver variable.

Using a variable ${CERT_RESOLVER} for the certificate resolver enhances flexibility in managing certificates for the openhimcore service.

monitoring/docker-compose.yml (2)

14-14: LGTM! Simplified domain configuration.

The update to use ${DOMAIN_NAME} instead of ${DOMAIN_NAME_HOST_TRAEFIK} simplifies the domain configuration.


168-168: LGTM! Simplified domain configuration.

The update to use ${DOMAIN_NAME} instead of ${DOMAIN_NAME_HOST_TRAEFIK} simplifies the domain configuration.

@drizzentic drizzentic marked this pull request as draft August 5, 2024 11:15
@drizzentic drizzentic marked this pull request as ready for review August 6, 2024 15:31
Copy link
Contributor

@coderabbitai coderabbitai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Actionable comments posted: 0

Review details

Configuration used: CodeRabbit UI
Review profile: CHILL

Commits

Files that changed from the base of the PR and between 4565376 and 9694dca.

Files selected for processing (12)
  • .env.cluster (1 hunks)
  • .env.local (1 hunks)
  • client-registry-jempi/docker-compose.api.yml (3 hunks)
  • client-registry-jempi/docker-compose.web.yml (2 hunks)
  • client-registry-santempi/docker-compose.yml (2 hunks)
  • dashboard-visualiser-jsreport/docker-compose.yml (1 hunks)
  • dashboard-visualiser-kibana/docker-compose.yml (1 hunks)
  • dashboard-visualiser-superset/docker-compose.yml (1 hunks)
  • documentation/packages/reverse-proxy-traefik/README.md (1 hunks)
  • identity-access-manager-keycloak/docker-compose.yml (1 hunks)
  • interoperability-layer-openhim/docker-compose.yml (1 hunks)
  • monitoring/docker-compose.yml (2 hunks)
Files skipped from review due to trivial changes (6)
  • .env.cluster
  • .env.local
  • dashboard-visualiser-kibana/docker-compose.yml
  • dashboard-visualiser-superset/docker-compose.yml
  • documentation/packages/reverse-proxy-traefik/README.md
  • monitoring/docker-compose.yml
Files skipped from review as they are similar to previous changes (6)
  • client-registry-jempi/docker-compose.api.yml
  • client-registry-jempi/docker-compose.web.yml
  • client-registry-santempi/docker-compose.yml
  • dashboard-visualiser-jsreport/docker-compose.yml
  • identity-access-manager-keycloak/docker-compose.yml
  • interoperability-layer-openhim/docker-compose.yml

Copy link
Contributor

@coderabbitai coderabbitai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Actionable comments posted: 0

Review details

Configuration used: CodeRabbit UI
Review profile: CHILL

Commits

Files that changed from the base of the PR and between 9694dca and 92e6267.

Files selected for processing (12)
  • .env.cluster (1 hunks)
  • .env.local (1 hunks)
  • client-registry-jempi/docker-compose.api.yml (3 hunks)
  • client-registry-jempi/docker-compose.web.yml (2 hunks)
  • client-registry-santempi/docker-compose.yml (2 hunks)
  • dashboard-visualiser-jsreport/docker-compose.yml (1 hunks)
  • dashboard-visualiser-kibana/docker-compose.yml (1 hunks)
  • dashboard-visualiser-superset/docker-compose.yml (1 hunks)
  • documentation/packages/reverse-proxy-traefik/README.md (1 hunks)
  • identity-access-manager-keycloak/docker-compose.yml (1 hunks)
  • interoperability-layer-openhim/docker-compose.yml (1 hunks)
  • monitoring/docker-compose.yml (7 hunks)
Files skipped from review due to trivial changes (4)
  • .env.cluster
  • .env.local
  • dashboard-visualiser-superset/docker-compose.yml
  • interoperability-layer-openhim/docker-compose.yml
Files skipped from review as they are similar to previous changes (8)
  • client-registry-jempi/docker-compose.api.yml
  • client-registry-jempi/docker-compose.web.yml
  • client-registry-santempi/docker-compose.yml
  • dashboard-visualiser-jsreport/docker-compose.yml
  • dashboard-visualiser-kibana/docker-compose.yml
  • documentation/packages/reverse-proxy-traefik/README.md
  • identity-access-manager-keycloak/docker-compose.yml
  • monitoring/docker-compose.yml

@drizzentic drizzentic marked this pull request as draft August 7, 2024 05:55
@drizzentic drizzentic marked this pull request as ready for review August 7, 2024 05:55
@drizzentic drizzentic closed this Aug 14, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant