Differences
This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision | ||
knowledge_base:programming:docker [2024/09/30 20:09] – [Build, Test and Push] Normal User | knowledge_base:programming:docker [2025/03/01 22:42] (current) – [Create Dockerfile] Normal User | ||
---|---|---|---|
Line 25: | Line 25: | ||
Tip: use '' | Tip: use '' | ||
+ | [3/1/2025] - need to modify stock_info.py in the yahoo_fin package to fix data retrieving issue since Feb. 2025. Also need gcc for building Python Wheels | ||
+ | < | ||
+ | FROM python: | ||
+ | RUN apt-get update && apt-get install -y libpq-dev gcc | ||
+ | WORKDIR /app | ||
+ | COPY . /app | ||
+ | RUN pip install -U pip && pip install -r requirements.txt | ||
+ | ADD stock_info.py / | ||
+ | EXPOSE 8050 | ||
+ | CMD [" | ||
+ | </ | ||
===== Build, Test and Push ===== | ===== Build, Test and Push ===== | ||
Line 57: | Line 68: | ||
< | < | ||
docker save -o C: | docker save -o C: | ||
+ | docker save -o C: | ||
</ | </ | ||
Line 82: | Line 94: | ||
+ | ===== Add OIDC Authorization for Dash App ===== | ||
+ | |||
+ | ==== Dash App Code ==== | ||
+ | < | ||
+ | from dash_auth import OIDCAuth | ||
+ | app = Dash(__name__) | ||
+ | auth = OIDCAuth(app, | ||
+ | auth.register_provider( | ||
+ | " | ||
+ | token_endpoint_auth_method=" | ||
+ | client_id=os.environ[' | ||
+ | client_secret=os.environ[' | ||
+ | server_metadata_url=os.environ[' | ||
+ | ) | ||
+ | </ | ||
+ | Note: OIDCAuth requires Authlib python package (import OIDCAuth would fail without it) | ||
+ | |||
+ | ==== Customize OIDCAuth ==== | ||
+ | The following example will be able to get and remember the username who was authorized. | ||
+ | < | ||
+ | class OIDCAuthCustom(OIDCAuth): | ||
+ | |||
+ | def __init__(self, | ||
+ | self.username = None | ||
+ | super().__init__(*args, | ||
+ | |||
+ | def callback(self, | ||
+ | return_value = super().callback(idp) | ||
+ | |||
+ | client = self.get_oauth_client(idp) | ||
+ | self.username = client.userinfo().get(" | ||
+ | # ... | ||
+ | |||
+ | return return_value | ||
+ | </ | ||
+ | ==== Setup OIDC Server on Synology ==== | ||
+ | |||
+ | Synology package: SSO Server | ||
+ | |||
+ | How to debug: Look at SSO Server Log for hints. | ||
+ | |||
+ | ==== Tips for Hosting Docker Image on Synology ==== | ||
+ | |||
+ | === Import Docker Image Tarball === | ||
+ | |||
+ | After building the docker image and save as tarball, it can be imported to Synology docker using GUI or CLI's '' | ||
+ | < | ||
+ | docker image ls | ||
+ | </ | ||
+ | |||
+ | === Running Image with Docker Compose YML === | ||
+ | The method described here does NOT work. Reason being javascript based (Dash, Flask are all javascript based) programs are run on the client side. The SSO server thus must be accessible on the internet. | ||
+ | |||
+ | The important thing here is '' | ||
+ | * To access the host IP address, we really need to use the sham IP address. Please see explanation [[https:// | ||
+ | * SSO will reject authorization request if the well known server URL does not match its valid certificate. So we must use a valid A record such as '' | ||
+ | < | ||
+ | version: " | ||
+ | |||
+ | services: | ||
+ | server: | ||
+ | container_name: | ||
+ | image: georgewayne188/ | ||
+ | extra_hosts: | ||
+ | - www.isolo.org: | ||
+ | environment: | ||
+ | - USER_UID=1000 | ||
+ | - USER_GID=1000 | ||
+ | ports: | ||
+ | - " | ||
+ | restart: unless-stopped | ||
+ | </ | ||
+ | In developing phase while working on a Windows machine, had to add a local DNS entry in my Pihole DNS server for the URL to point to local server IP address. The entire project is [[https:// | ||
+ | |||
+ | |||
+ | === get_data in yahoo_fin.stock_info not working === | ||
+ | |||
+ | https:// | ||