Skip to content

POSTPONED: VPN from within container#126

Draft
oleschwen wants to merge 266 commits intomainfrom
dev-122-vpn-from-within-container
Draft

POSTPONED: VPN from within container#126
oleschwen wants to merge 266 commits intomainfrom
dev-122-vpn-from-within-container

Conversation

@oleschwen
Copy link
Copy Markdown
Collaborator

@oleschwen oleschwen commented Sep 30, 2025

Test setup for connecting to VPN from inside the MediSwarm containers rather than on the host, including a setup for locally running an openvpn server. Postponed, as we do not need this for now.
The branch contains credentials used for the test setup, warnings about this can be ignored.

oleschwen and others added 30 commits July 8, 2025 14:38
… any more" – should work again with intended pytorch lightning version

This reverts commit f68b582.
…ld script for better error handling

Signed-off-by: GitHub CI <ci@github.com>
…v-code

Dev 34 latest update from gustav code
# Conflicts:
#	docker_config/Dockerfile_ODELIA
…etup

Signed-off-by: GitHub CI <ci@github.com>
Signed-off-by: GitHub CI <ci@github.com>
…rfile diff

Signed-off-by: GitHub CI <ci@github.com>
…k in script

Signed-off-by: GitHub CI <ci@github.com>
…n permissions

Co-authored-by: Copilot Autofix powered by AI <62310815+github-advanced-security[bot]@users.noreply.github.com>
…ataset processing

Signed-off-by: GitHub CI <ci@github.com>
oleschwen and others added 6 commits September 24, 2025 13:28
chore: Update APT versions in Dockerfile
…PN from within the container.

Currently requires manual steps (at least building the VPN container) for the test to succeed and will need to be adapted for productive VPN use.

* install packages for OpenVPN and debugging in ODELIA container
* changed docker run arguments for swarm nodes to be able to open VPN connection from within (currently as root, to be reconsidered)
* setup for building and VPN container, creating OpenVPN certificates (one fixed set committed), running VPN container
* swarm server now named testserver.local, but this name only needs to be reachable in the containers
* VPN container is assumed to be reachable on host at 172.17.0.1 from other containers
* changed ports for nvflare server to avoid interference with productive servers
* noted TODOs
* added integration test checking that and documenting how this works
@oleschwen oleschwen linked an issue Sep 30, 2025 that may be closed by this pull request
@gitguardian
Copy link
Copy Markdown

gitguardian bot commented Sep 30, 2025

⚠️ GitGuardian has uncovered 5 secrets following the scan of your pull request.

Please consider investigating the findings and remediating the incidents. Failure to do so may lead to compromising the associated services or software components.

🔎 Detected hardcoded secrets in your pull request
GitGuardian id GitGuardian status Secret Commit Filename
21197633 Triggered Generic Private Key 13f8209 tests/local_vpn/client_configs/client_B_client.ovpn View secret
21197634 Triggered Generic Private Key 13f8209 tests/local_vpn/client_configs/client_A_client.ovpn View secret
21197635 Triggered Generic Private Key 13f8209 tests/local_vpn/client_configs/testserver.local_client.ovpn View secret
21197636 Triggered Generic Private Key 13f8209 tests/local_vpn/server_config/server.key View secret
21197632 Triggered Generic Private Key 13f8209 tests/local_vpn/client_configs/admin@test.odelia_client.ovpn View secret
🛠 Guidelines to remediate hardcoded secrets
  1. Understand the implications of revoking this secret by investigating where it is used in your code.
  2. Replace and store your secrets safely. Learn here the best practices.
  3. Revoke and rotate these secrets.
  4. If possible, rewrite git history. Rewriting git history is not a trivial act. You might completely break other contributing developers' workflow and you risk accidentally deleting legitimate data.

To avoid such incidents in the future consider


🦉 GitGuardian detects secrets in your source code to help developers and security teams secure the modern development process. You are seeing this because you or someone else with access to this repository has authorized GitGuardian to scan your pull request.

@oleschwen oleschwen force-pushed the dev-122-vpn-from-within-container branch from 255ad91 to 0d1f098 Compare September 30, 2025 12:46
@oleschwen oleschwen changed the title WIP VPN from within container POSTPONED: VPN from within container Oct 13, 2025
@Ultimate-Storm Ultimate-Storm force-pushed the dev-122-vpn-from-within-container branch from 837c42d to c5407b4 Compare April 10, 2026 09:06
Comment on lines +11 to +53
runs-on: self-hosted
timeout-minutes: 60

steps:
- name: Checkout repository (with submodules)
uses: actions/checkout@v3
with:
submodules: true
fetch-depth: 0

- name: Set up Git
run: |
git config --global user.email "ci@github.com"
git config --global user.name "GitHub CI"

- name: Create and switch to apt-update branch
run: |
git checkout -b ci/apt-update || git switch ci/apt-update
- name: Run APT update script

run: |
chmod +x scripts/ci/update_apt_versions.sh
scripts/ci/update_apt_versions.sh
- name: Show git diff for debugging
run: git diff || true

- name: Push apt-update branch
if: env.NO_CHANGES == 'false'
run: git push origin ci/apt-update --force

- name: Create Pull Request
if: env.NO_CHANGES == 'false'
uses: peter-evans/create-pull-request@v5
with:
commit-message: "chore: update apt versions in Dockerfile_ODELIA"
branch: ci/apt-update
branch-suffix: timestamp
title: "chore: Update APT versions in Dockerfile"
body: |
This PR automatically updates APT package version numbers in `Dockerfile_ODELIA`
based on a rebuild and inspection of installation logs.
base: main
delete-branch: false No newline at end of file
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

Test VPN connection from within container

4 participants