Difference between revisions of "Administration:Installing WormBase"

From WormBaseWiki
Jump to navigationJump to search
 
(168 intermediate revisions by 4 users not shown)
Line 1: Line 1:
= Address =
+
= Overview =
  
wb-dev.oicr.on.ca
+
This document describes how to install WormBase locally on your own machine.  Please note that as of August 2013, WormBase is almost entirely a distributed cloud-based application. Although possible to install and run on a single server (or cloud instance) the directions below may be slightly out-of-sync with how the principal WormBase architecture is built.
  
= Hardware =
+
= Recommendations =
  
The WormBase development server at OICR is a virtual server with the following stats:
+
== Hardware ==
  
* Debian Linux
+
'' As of April 2012, the suggested minimum hardware requirements for a basic installation of WormBase are:''
*500 GB disk space (mounted at /dev/hda1)
 
* 4 GB RAM
 
  
= Server Configuration =
+
* 500 GB disk space (1 TB preferable)
 +
* 8 GB RAM
  
== Basic Directory Layout ==
+
== Operating Systems ==
  
All WormBase components are collected under a single directory: /usr/local/wormbase
+
''You should be able to install and run the site on any Unix-y OS, including Mac OS X.  This document only describes installation on Debian and Debian-ish OSes like Amazon's Linux.  Your actual mileage may vary on other operating systems.''
  
$ ls /usr/local/wormbase
+
= Basic System Configuration =
      acedb/                    // The Acedb database (including bin directory)
 
      util/                      // Utility components such as e-pcr and wublast
 
      website-classic  // The classic WormBase website
 
                  extlib/                  // Third party Perl libraries 
 
      website-2.x          // The new-and-improved website!
 
  
Apache2: /usr/local/apache2
+
== Users And Groups ==
MySQL data directory: /usr/local/mysql/data
 
 
 
== Installing Libraries ==
 
 
 
Assuming a vanilla Debian installation, install the following libaries and all of their dependencies via ''sudo apt-get install''. Some of these libraries are discussed below.
 
      gcc
 
      curl
 
      wget
 
      bzip2
 
      mysql-server
 
      mysql-server-5.0
 
      libgd2-xpm-dev
 
      libgd2-xpm
 
      xinetd
 
      libdbd-mysql
 
      libdbd-mysql-perl
 
      libapache2-mod-perl2
 
      libgtk2.0-0
 
      libgtk2.0-dev
 
      libglib
 
      byacc
 
      libreadline5-dev
 
      flex
 
      libdb4.6
 
      libdb-dev
 
      emacs
 
      hg
 
 
 
== Preparing directories and users ==
 
 
 
WormBase uses several user accounts for directory and server permissions. You will need to create these users and several preliminary directories. Creating a new user and group varies among Unix flavors. On most Linux systems, the following commands will create the new groups. You should have sudo privilege to execute these commands.
 
 
 
=== User and group accounts ===
 
  
 
These users should not have a login password. They are to establish privileges only.
 
These users should not have a login password. They are to establish privileges only.
  
* acedb group
+
'''acedb group'''
  
 
This is the group that will have write privileges to the acedb directory tree. Acedb administrators should be added to this group.
 
This is the group that will have write privileges to the acedb directory tree. Acedb administrators should be added to this group.
  
  $ /usr/sbin/groupadd acedb
+
  $ groupadd acedb
  
* acedb user
+
'''acedb user'''
  
 
This is the user that the acedb server will run as. It should be a member of the acedb group.
 
This is the user that the acedb server will run as. It should be a member of the acedb group.
  
  $ /usr/sbin/useradd -g acedb -d /usr/local/wormbase/acedb acedb
+
  $ useradd -g acedb -d /usr/local/wormbase/acedb acedb
  
 
This ''useradd'' command also adds the new acedb user to the acedb group. Note that the acedb user's home directory was set to /usr/local/acedb, a directory which will be created in the next step.
 
This ''useradd'' command also adds the new acedb user to the acedb group. Note that the acedb user's home directory was set to /usr/local/acedb, a directory which will be created in the next step.
  
* wormbase group
+
'''wormbase group'''
  
 
This is a group that will have write privileges to the wormbase directory tree. WormBase administrators and authors should be added to this group.
 
This is a group that will have write privileges to the wormbase directory tree. WormBase administrators and authors should be added to this group.
  
  $ /usr/sbin/groupadd wormbase
+
  $ groupadd wormbase
  
 
This would be a good time to add yourself to the acedb and wormbase groups.
 
This would be a good time to add yourself to the acedb and wormbase groups.
  
  $ /usr/sbin/usermod -a -G acedb,wormbase [your_login_name]
+
  $ usermod -a -G acedb,wormbase [your_login_name]
 
 
[The '-a' argument keeps this command from deleting other, preexisting group memberships.]
 
  
 
You may need to re-login for these changes to take effect. Use the groups command to check which groups you are a member of:
 
You may need to re-login for these changes to take effect. Use the groups command to check which groups you are a member of:
Line 91: Line 50:
 
  % groups
 
  % groups
  
=== Directories ===
+
== Create Directories ==
  
The root container for all things WormBase:
+
''Create a root directory for all WormBase-related files. Although this directory can reside anywhere on your filesystem, for consistency with WormBase proper, we recommend installing at /usr/local/wormbase.  You'll need suitable privileges to install in this location.'''
 +
 
 +
'''The root container for all things WormBase'''
  
 
* /usr/local/wormbase, owner=root group=wormbase mode=drwxrwsr-x
 
* /usr/local/wormbase, owner=root group=wormbase mode=drwxrwsr-x
  
  $ mkdir /usr/local/wormbase
+
  $ cd /usr/local
  $ chgrp wormbase /usr/local/wormbase
+
$ sudo mkdir wormbase
  $ chmod 2775 /usr/local/wormbase
+
  $ sudo chown root:wormbase wormbase
 +
  $ sudo chmod 2775 wormbase
 +
 
 +
'''The AceDB directory contains acedb and associated databases:'''
 +
 
 +
* /usr/local/wormbase/acedb, owner=acedb group=acedb,mode=drwxrwsr-x
  
* The "classic" website: /usr/local/wormbase/website-classic, owner=root group=wormbase mode=drwxrwsr-x
+
$ mkdir /usr/local/wormbase/acedb
 +
$ chmod 2775 /usr/local/wormbase/acedb
 +
$ sudo chown acedb:acedb /usr/local/wormbase/acedb
  
$ mkdir /usr/local/wormbase/website-classic
+
'''The website/ directory contains one or many versions of the website:'''
$ chgrp wormbase /usr/local/wormbase/website-classic
 
$ chmod 2775 /usr/local/wormbase/website-classic
 
  
* External Perl libraries: /usr/local/wormbase/website-classic/extlib, owner=tharris group=wormbase mode=drwxrwsr-x
+
* /usr/local/wormbase/website, owner=[ANYONE] group=wormbase,mode=drwxrwsr-x
  
  $ mkdir /usr/local/wormbase/website-classic/extlib
+
  $ mkdir /usr/local/wormbase/website
  $ chgrp wormbase /usr/local/wormbase/website-classic/extlib
+
  $ chmod 2775 /usr/local/wormbase/website
  $ chmod 2775 /usr/local/wormbase/website-classic/extlib
+
  $ sudo chgrp wormbase /usr/local/wormbase/website
  
* /usr/local/wormbase/logs, owner=root group=wormbase mode=drwxrwsr-x
+
'''The services/ directory contains optional services such as e-pcr, blast, and nginx:'''
 +
 
 +
* /usr/local/wormbase/services, owner=[ANYONE] group=wormbase,mode=drwxrwsr-x
 +
 
 +
$ mkdir /usr/local/wormbase/services
 +
$ chmod 2775 /usr/local/wormbase/services
 +
$ sudo chgrp wormbase /usr/local/wormbase/services
 +
 
 +
'''The databases/ directory contains databases driving a number of features:'''
 +
 
 +
* /usr/local/wormbase/databases, owner=[ANYONE] group=wormbase,mode=drwxrwsr-x
 +
 
 +
$ mkdir /usr/local/wormbase/databases
 +
$ chmod 2775 /usr/local/wormbase/databases
 +
$ sudo chgrp wormbase /usr/local/wormbase/databases
 +
 
 +
'''The logs/ directory contains WormBase-wide log and pid files'''
 +
 
 +
* /usr/local/wormbase/logs, owner=[ANYONE] group=wormbase,mode=drwxrwwrwx
  
 
  $ mkdir /usr/local/wormbase/logs
 
  $ mkdir /usr/local/wormbase/logs
$ chgrp wormbase /usr/local/wormbase/logs
 
 
  $ chmod 2775 /usr/local/wormbase/logs
 
  $ chmod 2775 /usr/local/wormbase/logs
 +
$ sudo chgrp wormbase /usr/local/wormbase/logs
  
* /usr/local/wormbase/website-classic/cache, owner=nobody group=nobody mode=drwxrwsr-x
+
== Installing Library Prerequisites ==
  
$ mkdir /usr/local/wormbase/website-classic/cache
+
Assuming a vanilla Debian installation, install the following libaries and all of their dependencies via ''sudo apt-get install''. Some of these libraries are discussed below.
$ chown nobody:nobody /usr/local/wormbase/website-classic/cache
+
      sharutils \
$ chmod 2775 /usr/local/wormbase/website-classic/cache
+
      gcc g++ \
 +
      curl wget \
 +
      bzip2 \
 +
      mysql-client \
 +
      mysql-server \
 +
      libgd2-xpm-dev\
 +
      libgd2-xpm \
 +
      xinetd \
 +
      libdbd-mysql \
 +
      libdbd-mysql-perl \
 +
      libapache2-mod-perl2 \
 +
      libgtk2.0-0 \
 +
      libgtk2.0-dev \
 +
      emacs \
 +
      git \
 +
      byacc \
 +
      libreadline-gplv2-dev \
 +
      flex \
 +
      libdb4.6 \
 +
      libdb-dev \
 +
      xml2 libxml2 libxml2-dev \
 +
      libmysql++-dev \
 +
      ncurses-bin \
 +
      libxmu-dev \
 +
      graphviz \
 +
      libssl-dev \
 +
      uuid \
 +
      uuid-dev \
 +
      libxslt1-dev \
 +
      xsltproc \
 +
      libgdbm3 \
 +
      libgdbm3-dev \
 +
      libstdc++ \
 +
      libstdc++-devel
  
* The "util" directory contains components that apply to both the classic and updated site, like wublast and e-pcr.
+
Build xapian (or install from package if available):
  
* /usr/local/wormbase/util/wublast, owner=root group=wormbase mode=drwxrwsr-x
+
$ wget http://oligarchy.co.uk/xapian/1.2.5/xapian-core-1.2.5.tar.gz
 +
$ tar xzf xapian-core*.tgz
 +
$ cd xapian-core
 +
$ ./configure
 +
$ make
 +
$ sudo make install
  
$ mkdir /usr/local/wormbase/util/wublast
+
Install Search::Xapian
$ chgrp wormbase /usr/local/wormbase/util/wublast
+
  $ perl -MCPAN -e 'install Search::Xapian'
  $ chmod 2775 /usr/local/wormbase/util/wublast
 
  
* /usr/local/wormbase/acedb, owner=acedb group=acedb,mode=drwxrwsr-x
+
== Install Perl 5.10.1 or greater ==
  
$ mkdir /usr/local/wormbase/acedb
+
You'll need Perl version 5.10.1 or greater.
$ chown acedb:acedb /usr/local/wormbase/acedb
 
$ chmod 2775 /usr/local/wormbase/acedb
 
  
= Checking out the Administration module =
+
'''Upgrading Perl via apt (recommended)'''
  
Fetch the administration code repository (privileged users only, for now)
+
Let your operating system managing your version of Perl.
  
todd> mkdir -p ~/projects/wormbase
+
''Configure your apt preferences''
todd> cd ~/projects/wormbase
 
todd> hg clone ssh://hg@bitbucket.org/tharris/wormbase-admin/  // Assuming you have already set up your ssh keys at bitbucket
 
  
= Perl modules =
+
Add the following to /etc/apt/sources.list
  
See [[Managing Perl Libraries]] for details on how to build and install required Perl modules.
+
#Stable
 +
deb http://ftp.us.debian.org/debian stable main non-free contrib
 +
#Testing
 +
deb http://ftp.us.debian.org/debian testing main non-free contrib
 +
#Unstable
 +
deb http://ftp.us.debian.org/debian unstable main non-free contrib
  
= Generic Genome Browser =
+
Configure your preferences in /etc/apt/preferences:
  
See [[Managing GBrowse]] for details on how to build and install GBrowse.
+
Package: *
 +
Pin: release a=stable
 +
Pin-Priority: 700
 +
Package: *
 +
Pin: release a=testing
 +
Pin-Priority: 650
 +
Package: *
 +
Pin: release a=unstable
 +
Pin-Priority: 600
  
= 3rd-party Support Applications =
+
Finally, install Perl
  
 +
sudo apt-get update
 +
sudo apt-get install perl/testing perl-base/testing perl-modules/testing libperl5.10/testing libperl-dev/testing
  
== Apache2 and mod_perl ==
+
And confirm
  
I prefer to build httpd and mod_perl from source; it seems easier than waiting for package repositories to be updated.
+
$ perl -v
 +
  This is perl, v5.10.1 (*) built for x86_64-linux-gnu-thread-multi
 +
  (with 40 registered patches, see perl -V for more detail)
  
=== Installation ===
+
'''Installing Perl from source'''
  
''Assuming you have already fetched the source into ~/src:''
+
We recommend installing a local version of Perl and required libraries. This makes management dramatically easier.  We keep our Perl with the webapp itself.
  
# Build httpd 2.2.11
+
If you have sufficient privileges, you may wish to use your pre-installed system Perl.
cd ~/src
 
tar xzf httpd-2.2.11.tar.gz
 
cd httpd-2.2.11
 
./configure --enable-mods-shared=all  --enable-ssl // We can enable modules in httpd.conf later
 
make
 
sudo make install
 
  
  # Build mod_perl2-0.4
+
  bash> mkdir ~/website/perl
  cd ~/src
+
bash> cd ~/src
  cd mod_perl-2.0.4
+
bash> curl -O http://www.cpan.org/src/perl-5.10.1.tar.gz
  perl -I/usr/local/wormbase/website-classic/extlib Makefile.PL INSTALL_BASE=/usr/local/wormbase/website-classic/extlib
+
  bash> cd ~/build
  // When prompted for the apxs path, enter: /usr/local/apache2/bin/apxs
+
bash> tar xzf ../src.perl-5.10.1.tar.gz
  make
+
  bash> cd perl-5.10.1
  sudo make install
+
  bash> ./Configure -des -Dprefix=$HOME/website/perl/5.10.1
 +
  bash> make
 +
  bash> make test
 +
  bash> make install
  
''If make fails, you may need to symlink libperl.so -> libperl.so.5.10.0 in /usr/lib''
+
Be sure to set up your your system to preferentially use this newly installed Perl:
  
=== Configuration ===
+
bash> export PATH=~/wormbase/perl/5.10.1/bin:${PATH}
  
* Set httpd to listen on your desired port. In the examples below, we assume port 8080.
+
= Install the Webapp =
  
  $ sudo perl -p -i -e's|Listen 80|Listen 8080|' /usr/local/apache2/conf/httpd.conf
+
'''Fetch the current production code from the git repository on github.'''
 +
  $ cd /usr/local/wormbase/website
 +
$ git clone git@github.com:WormBase/website.git
 +
$ mv website YOUR_NAME // name can be anything you want; useful for maintaining multiple versions
  
*  Set up a virtual host on your port.  Adjust PerlSwitches as appropriate for your architecture.
+
'''Install local:: lib'''
  
<VirtualHost *:80>
+
''The preferred method uses the web app's Makefile.PL and Module::Install to build all dependencies. We maintain local copies of all libraries with each version of the webapp.''
  Include /usr/local/wormbase/website-classic/conf/httpd.conf
 
  PerlOptions +Parent
 
  PerlSwitches -Mlib=/usr/local/wormbase/website-classic/extlib/lib/perl5 \
 
                -Mlib=/usr/local/wormbase/website-classic/extlib/lib/perl5/x86_64-linux-gnu-thread-multi
 
      #  PerlInterpStart 2                                                                                                                       
 
      #  PerlInterpMax 2                                                                                                                         
 
  <Directory "/usr/local/wormbase/website-classic/html">
 
        DirectoryIndex index.html
 
        #      Order deny,allow                                                                                                                     
 
        #      Deny from all                                                                                                                      
 
  </Directory>
 
</VirtualHost>
 
 
 
* Enable virtual hosts in httpd.conf
 
  
$ sudo perl -p -i -e's|\#Include conf/extra/httpd-hosts.conf|Include conf/extra/httpd_hosts.conf|' \
+
'''Build and install dependencies'''
      /usr/local/apache2/conf/httpd.conf
 
  
=== Set up httpd to run under inet.d ===
+
$ mkdir /usr/local/wormabase/extlib
 +
$ cd /usr/local/wormbase/website/YOUR_NAME
 +
$ perl Makefile.PL
 +
$ make installdeps
  
''Save the following file to /etc/init.d/httpd:''
+
''See the documentation on [[Managing Perl Libraries]] for additional details.''
  
<pre>
+
= Required 3rd-party Applications =
#!/bin/bash
 
#
 
# Startup script for the Apache Web Server
 
#
 
# chkconfig: - 85 15
 
# description: Apache is a World Wide Web server.  It is used to serve \
 
#              HTML files and CGI.
 
# processname: httpd
 
# pidfile: /usr/local/apache2/logs/httpd.pid
 
# config: /usr/local/apache2/conf/httpd.conf
 
  
# Source function library.
+
== Starman: the lightweight http server ==
. /etc/rc.d/init.d/functions
 
  
if [ -f /etc/sysconfig/httpd ]; then
+
PSGI: specification for Perl superglue between frameworks and servers.  Plack is an implementation of PSGI.  Compare to Rack (Ruby) or Jack (Javascript).
        . /etc/sysconfig/httpd
 
fi
 
  
# This will prevent initlog from swallowing up a pass-phrase prompt if
+
  http://plackperl.org/
# mod_ssl needs a pass-phrase from the user.
 
INITLOG_ARGS=""
 
  
# Path to the apachectl script, server binary, and short-form for messages.
+
Starman is a high performance pre-forking Perl PSGI server. We're using it in place of Apache+fastcgi.mod_perl.
apachectl=/usr/local/apache2/bin/apachectl
 
httpd=/usr/local/apache2/bin/httpd
 
pid=/usr/local/apache2/logs/httpd.pid
 
prog=httpd
 
RETVAL=0
 
  
# The semantics of these two functions differ from the way apachectl does
+
  https://github.com/miyagawa/Starman
# things -- attempting to start while running is a failure, and shutdown
 
# when not running is also a failure.  So we just do it the way init scripts
 
# are expected to behave here.
 
start() {
 
        echo -n $"Starting $prog: "
 
        daemon $httpd $OPTIONS
 
        RETVAL=$?
 
        echo
 
        [ $RETVAL = 0 ] && touch /var/lock/subsys/httpd
 
        return $RETVAL
 
}
 
stop() {
 
        echo -n $"Stopping $prog: "
 
        killproc $httpd
 
        RETVAL=$?
 
        echo
 
        [ $RETVAL = 0 ] && rm -f /var/lock/subsys/httpd $pid
 
}
 
reload() {
 
        echo -n $"Reloading $prog: "
 
        killproc $httpd -HUP
 
        RETVAL=$?
 
        echo
 
}
 
  
# See how we were called.
+
'''Install Plack and Starman'''
case "$1" in
+
:Catalyst::Controller::Metal
  start)
+
:Catalyst::Engine::PSGI
        start
+
:Catalyst::Helper::PSGI
        ;;
+
:Plack::Test::Adopt::Catalyst
  stop)
+
:cpanm Task::Plack
        stop
+
:cpanm Starman
        ;;
 
  status)
 
        status $httpd
 
        RETVAL=$?
 
        ;;
 
  restart)
 
        stop
 
        start
 
        ;;
 
  condrestart)
 
        if [ -f $pid ] ; then
 
                stop
 
                start
 
        fi
 
        ;;
 
  reload)
 
        reload
 
        ;;
 
  graceful|help|configtest|fullstatus)
 
        $apachectl $@
 
        RETVAL=$?
 
        ;;
 
  *)
 
        echo $"Usage: $prog {start|stop|restart|condrestart|reload|status"
 
echo $"|fullstatus|graceful|help|configtest}"
 
        exit 1
 
esac
 
  
exit $RETVAL
+
'''Configuration'''
</pre>
 
  
''Set which runlevels httpd will run under:''
+
The PSGI glue resides at:
  
  chkconfig --add httpd
+
  website/YOUR_NAME/wormbase.psgi
chkconfig --level 2345 httpd on
 
chkconfig --list
 
  
===Important Fix for mod_perl2/mod_dir incompatibility (the index.html problem) ===
+
''' Starting Starman '''
  
mod_perl2 intercepts Apache requests before any other modules. This means that for locations/directories configured with PerlHandlers that requests for dir or dir/ will NOT automatically redirect to the value of DirectoryIndexTo fix this problem, the lib/Apache/AddWormBaseBanner.pm needs to be modified:
+
  starman script/wormbase.psgi
 +
OR
 +
  starman -MFindBin script/wormbase_production.psgi
  
Insert the following:
+
'''Set up starman to launch automatically'''
  
# We need two additional modules:
+
Copy the stub init script from wormbase/conf/starman/starman.init:
use Apache2::Const -compile => qw(DIR_MAGIC_TYPE OK DECLINED);
 
use Apache2::SubRequest;
 
  
sub handler {
+
   cp /usr/local/wormbase/admin/conf/starman/starman.init
    my $r = shift;
 
   # --> Copy and paste starting here...
 
  # A directory request has content-type = httpd/unix directory                                                           
 
  # we check that the uri ends in a slash, since only in that case                                           
 
  # do we want to redirect, and finally to avoid redirect loops                                                                                     
 
  # we only do this on the initial request.                                                                                               
 
  # You must load Apache2::SubRequest in order to run internal_redirect                                                                                                       
 
  if ($r->content_type eq 'httpd/unix-directory'
 
      && $r->uri =~ '/$' && $r->is_initial_req ) {
 
      #        print STDERR "Accepting Directory Request\n";                                                                                                         
 
      # warn "internal request";                                                                                                                                                                               
 
        $r->internal_redirect($r->uri . 'index.html');
 
        return OK;
 
    }
 
  
 
== AceDB ==
 
== AceDB ==
Line 358: Line 292:
 
  $ sudo chown root:root ~acedb/bin/*
 
  $ sudo chown root:root ~acedb/bin/*
  
=== Testing the ACeDB Installation ===
+
'''Testing the ACeDB Installation'''
  
 
At this point, you can test whether the socket server runs correctly. Provided that you have added yourself to the acedb group, you can run the following command:
 
At this point, you can test whether the socket server runs correctly. Provided that you have added yourself to the acedb group, you can run the following command:
Line 370: Line 304:
 
   // ####  Working dir=/usr/local/acedb/elegans
 
   // ####  Working dir=/usr/local/acedb/elegans
 
   // #### clientTimeout=600 serverTimeout=600 maxKbytes=0 autoSaveInterval=600
 
   // #### clientTimeout=600 serverTimeout=600 maxKbytes=0 autoSaveInterval=600
 
 
   // Server listening socket 28 created
 
   // Server listening socket 28 created
  
Line 391: Line 324:
 
  // Bye
 
  // Bye
  
=== Configuring Acedb to start automatically under xinetd ===
+
'''Configuring Acedb to start automatically under xinetd'''
  
 
Install xinetd (not standard in Debian) if you didn't already:
 
Install xinetd (not standard in Debian) if you didn't already:
Line 405: Line 338:
 
  # default: on
 
  # default: on
 
  # description: wormbase acedb database
 
  # description: wormbase acedb database
  service acedb
+
  service acedb-wormbase
 
  {
 
  {
 
         protocol                = tcp
 
         protocol                = tcp
Line 435: Line 368:
 
== MySQL ==
 
== MySQL ==
  
=== Installation ===
+
'''Installation'''
 
 
Install mysql and various libraries via apt-get if you haven't already:
 
  
  $ sudo apt-get install mysql-server-5.0 mysql-server libdbd-mysql libdbd-mysql-perl
+
Install mysql and various libraries via apt-get if you haven't already. You will need the unstable and testing repositories set up when upgrading Perl.
  
If it fails, then disable innodb by default. edit /etc/mysql/my.cnf file (uncomment the line):
+
  $ sudo apt-get install libncurses5/testing
 +
  $ sudo apt-get install mysql-common/testing libmysqlclient16 mysql-server-5.1/testing \
 +
          mysql-client-5.1/testing libdbd-mysql/testing libdbd-mysql-perl/testing
  
  #skip-innodb
+
With this installation, databases are located at '''/var/lib/mysql'''.  We want to relocate this to /usr/local/mysql/data to be consistent with the WormBase.  We also want to able to write to this directory from the command line, so:
  $ sudo apt-get purge  mysql-server-5.0 mysql-server 
 
  $ sudo apt-get install mysql-server-5.0 mysql-server
 
 
 
With this installation, databases are located at '''/var/lib/mysql'''.  We want to relocate this to /usr/local/mysql/data to be consistent with existing nodes.  We also want to able to write to this directory from the command line, so:
 
  
 
  $ sudo nano /etc/my.cnf
 
  $ sudo nano /etc/my.cnf
Line 457: Line 386:
 
Mysqld will automatically be setup to launch at server boot (rc3 and rc5).
 
Mysqld will automatically be setup to launch at server boot (rc3 and rc5).
  
=== Set up mysql permissions ===
+
'''Set up mysql permissions '''
  
 
  $ mysql -u root -pPASSWORD
 
  $ mysql -u root -pPASSWORD
  mysql> grant select on elegans.* to nobody@localhost;
+
  mysql> grant select on c_elegans.* to nobody@localhost;
  
 
Repeat for:  
 
Repeat for:  
 +
* autocomplete
 +
* b_malayi
 
* c_briggsae
 
* c_briggsae
 +
* c_elegans
 +
* c_elegans_gmap
 +
* c_elegans_pmap
 
* c_japonica
 
* c_japonica
 
* c_remanei
 
* c_remanei
 
* c_brenneri
 
* c_brenneri
 +
* h_bacteriophora
 
* p_pacificus
 
* p_pacificus
* b_malayi
+
* ps1010
* c_elegans_gmap
+
 
* c_elegans_pmap
+
== Generic Genome Browser ==
* autocomplete
+
 
* h_bacteriophora
+
See [[GBrowse Administration]] for details on how to install GBrowse.
 +
 
 +
= Optional 3rd-party Applications =
 +
 
 +
== nginx ==
 +
 
 +
We use nginx as a lightweight proxy server and load balancing server.  You can skip this step and simply connect directly to the Starman http server.  Otherwise, see the [[Administration:WormBase_Production_Environment#Installing_nginx|production environment documentation]] on installing and configuring nginx.
 +
 
 +
== BLAST ==
 +
 
 +
The BLAST page requires WU-BLAST. This is a closed-source derivative of NCBI's BLAST. However, WU-BLAST is free to academic users (with licensing) and is thought to have [http://blast.wustl.edu/blast/README.html#Features performance advantages] over NCBI-BLAST; it can be downloaded from http://blast.wustl.edu/. A typical choice of WU-BLAST for Linux is blast2.linux26-i686.tar.gz.
 +
 
 +
You can skip this step if you don't want to provide BLAST services at your site.
 +
 
 +
By default, WormBase expects WU-BLAST to be installed in /usr/local/wormbase/services/wublast. This is the directory structure used by WormBase:
 +
 
 +
$ ls -l /usr/local/wormbase/services/wublast
 +
 
 +
lrwxrwxrwx  1 root  root    18 May  7 12:26  BLOSUM62 -> matrix/aa/BLOSUM62
 +
-rw-r--r--  1 root  root  46789 Feb  5  1998  HISTORY
 +
-rw-r--r--  1 root  root  6648 Mar  4  1997  README
 +
drwxr-xr-x  2 root  root  4096 May  7  12:46 bin/
 +
lrwxrwxrwx  1 root  root    25 Jul 24  08:20 databases -> /usr/local/wormbase/blast/
 +
drwxr-xr-x  2 root  root  4096 Jan 27  2000  filter/
 +
drwxr-xr-x  4 root  root  4096 Oct  4  1998  matrix/
  
 
== e-PCR ==
 
== e-PCR ==
  
* e-PCR (modified version, required for e-PCR search page)
+
A modified version of the epcr source can be found in the checked out website code in src/. See the enclosed README describing changes made to the original e-PCR distribution.  The binary should be placed in /usr/local/wormbase/services.
 
 
This is located in the directory /usr/local/wormbase/e-PCR, which will come into existence after the WormBase site update program wb_update_wormbase.pl has been successfully run (see [[HowTo_Build_A_WormBase_Mirror#Using_wb_update_wormbase.pl_to_update_the_installation|below]] for details). Once the directory has been generated, run:
 
  
     $ cd /usr/local/wormbase/e-PCR
+
     $ cd /usr/local/wormbase/website/production/src
    # Edit 'makefile' to run install rather than ginstall, which doesn't exist on Fedora Linux
 
 
     $ make
 
     $ make
     $ make install  # or just run 'install e-PCR /usr/local/bin'
+
     $ install e-PCR /usr/local/wormbase/services/epcr
 
 
The file /usr/local/wormbase/e-PCR/README-Wormbase describes the changes that were made to the original e-PCR distribution.
 
  
 
== BLAT ==
 
== BLAT ==
Line 491: Line 445:
 
Jim Kent's BLAT (blast-like alignment tool) is a fast nucleotide aligner used by the blast search page. If you do not plan to support blast searches, you may safely skip this step.
 
Jim Kent's BLAT (blast-like alignment tool) is a fast nucleotide aligner used by the blast search page. If you do not plan to support blast searches, you may safely skip this step.
  
<nowiki># mkdir -p /usr/local/blat/bin ; cd /usr/local/blat/bin
+
  $ mkdir -p /usr/local/wormbase/services/blat/bin
% wget </nowiki>http://www.soe.ucsc.edu/~kent/exe/linux/blatSuite.33.zip  (for Intel Linux)
+
  $ cd /usr/local/wormbase/services/blat/bin
% unzip blatSuite.33.zip
+
  $ wget http://www.soe.ucsc.edu/~kent/exe/linux/blatSuite.33.zip  (for Intel Linux)
% rm blatSuite.33.zip version.doc 11.ooc
+
  $ unzip blatSuite.33.zip
 +
  $ rm blatSuite.33.zip version.doc 11.ooc
  
 
Note that this choice gives precompiled binaries for an Intel-based Linux distribution as of March 2006. It would probably be worth checking http://www.soe.ucsc.edu/~kent/exe/linux to see if there is a more up-to-date version than 33. Also, other operating systems will need other binaries. E.g., for Mac OS X, instead run:
 
Note that this choice gives precompiled binaries for an Intel-based Linux distribution as of March 2006. It would probably be worth checking http://www.soe.ucsc.edu/~kent/exe/linux to see if there is a more up-to-date version than 33. Also, other operating systems will need other binaries. E.g., for Mac OS X, instead run:
  
   % wget http://www.soe.ucsc.edu/~kent/exe/osX/blatSuite.33.zip
+
   $ wget http://www.soe.ucsc.edu/~kent/exe/osX/blatSuite.33.zip
 
 
For other types of operating systems (e.g., Linux on Opteron-based machines), see http://www.soe.ucsc.edu/~kent/exe/ for the available choices.
 
  
 
The blat server will be started automatically by the update script. For reference, the blat server is launched using the following command.
 
The blat server will be started automatically by the update script. For reference, the blat server is launched using the following command.
  
  % /usr/local/blat/bin/gfServer start localhost 2003 \
+
  $ /usr/local/wormbase/services/blat/bin/gfServer start localhost 2003 \
       /usr/local/wormbase/blat/*.nib &amp; &gt; /dev/null 2&gt;&amp;1
+
       /usr/local/wormbase/databases/VERSION/blat/*.nib &amp; &gt; /dev/null 2&gt;&amp;1
  
== BLAST ==
+
= Installing Databases NOT DONE =
  
The Blast page requires WU-BLAST. This is a closed-source derivative of NCBI's BLAST. However, WU-BLAST is free to academic users (with licensing) and is thought to have [http://blast.wustl.edu/blast/README.html#Features performance advantages] over NCBI-BLAST; it can be downloaded from http://blast.wustl.edu/. A typical choice of WU-BLAST for Linux is blast2.linux26-i686.tar.gz.
+
== Primary database (AceDB) ==
  
Conversely, the Blast page can be deactivated if you don't want to provide BLAST searches at your site.
+
== GFF Sequence feature database (MySQL) ==
  
By default, WormBase expects WU-BLAST to be installed in /usr/local/wublast. This is the directory structure used by WormBase:
+
== Support Databases ==
  
% ls -l /usr/local/wublast
+
Support databases are automatically synced to the nodes that require them by wormbase-admin/update/production/cron-rsync_support_dbs.sh. This is run from wb-dev.
ls -l /usr/local/wublast
 
total 72
 
lrwxrwxrwx  1 root  root    18 May  7 12:26  BLOSUM62 -&gt; matrix/aa/BLOSUM62
 
-rw-r--r--  1 root  root  46789 Feb  5  1998  HISTORY
 
-rw-r--r--  1 root  root  6648 Mar  4  1997  README
 
drwxr-xr-x  2 root  root  4096 May  7  12:46 bin/
 
lrwxrwxrwx  1 root  root    25 Jul 24  08:20 databases -&gt; /usr/local/wormbase/blast/
 
drwxr-xr-x  2 root  root  4096 Jan 27  2000  filter/
 
  drwxr-xr-x  4 root  root  4096 Oct  4  1998  matrix/
 
  
which can be set up in this manner (adapt to your system):
+
0 1 * * * /home/tharris/projects/wormbase/wormbase-admin/update/production/cron-rsync_support_dbs.sh
  
$ cd /usr/local/wublast
+
= Testing The Site =
$ zcat /usr/local/TGZ/blast2.linux26-i686.tar.gz | tar xf -
 
$ chown -R root:root *
 
$ mkdir bin
 
$ mv *fasta tblast* blast* *db xd* memfile pam wu-blastall bin
 
$ ln -s /usr/local/wormbase/blast databases
 
  
The important thing to note is that the databases directory is a symbolic link to /usr/local/wormbase/blast. This is where the update_wormbase.pl script (described in the next section) dumps its BLAST databases.
+
At this point, all components of a WormBase installation have been installed. You can test your installation by restarting the various server components of WormBase.
  
= The WormBase Software =
+
=== Restarting AceDB ===
  
Check out the WormBase software from CVS:
+
<nowiki># Via xinetd:
 +
$ /etc/init.d/xinetd reload (or restart)
 +
</nowiki>
  
  $ cd /usr/local/wormbase
+
<nowiki># ...or using saceclient
  $ cvs -d formaggio.cshl.org:/usr/local/cvs_repository co wormbase-website
+
% saceclient localhost -port 2005
  $ mv wormbase-website website-classic
+
acedb&gt; password:
 +
acedb&gt; shutdown now
 +
</nowiki>
  
== Configure localsdef.pm ==
+
=== Restarting MySQL ===
  
* $HOST
+
<nowiki># Via mysqladmin...
 +
% mysqladmin -uroot -pPASSWORD shutdown
 +
 +
# or using init.d
 +
$ /etc/init.d/mysql restart
 +
</nowiki>
  
This is the name of the host where the socket server runs. It is set to "localhost" by default.
+
=== Starting The Webapp ===
  
* $PORT
+
Set up environment:
  
This is the port on which the socket server runs, 2005 by default.
+
$ cd /your/checked/out/source
 +
$ cp wormbase.env.template wormbase.env  // Edit as necessary.
 +
$ source wormbase.env
  
* $ACEPASS, $USERNAME, $PASSWORD
+
Start the built in development server:
  
These three items define the acedb username and password.
+
$ script/wormbase_server -p 9999 -r -d  // choose a suitable port.
  
* $MYSQL_HOST, $MYSQL_USER, $MYSQL_PASS
+
Start up a starman server via plack:
  
These three items define the mysql host, username, and password.
+
$ cd /your/checked/out/source
 +
$ source wormbase.env
 +
$ starman -- port 9999 wormbase.psgi // choose a suitable port.
  
* $MASTER
+
At this point, you should now be able to connect to WormBase at:
  
This is used only for the WormBase master site. Should be set to 0.
+
http://localhost:YOURPORT/
  
* $MIRROR
+
If you are running your site on one of the ports matching the nginx reverse proxy configuration as described above, you should be able to:
  
Whether or not the site is a mirror. Should be set to the name of the mirror.
+
http://subdomain.wormbase.org/
  
* $DEVELOPMENT
+
To run your site using the init script:
  
Whether or not the site is a development site. Internally, this controls the nature of caching on the site. Should be set to 0.
+
source wormbase.env
 +
./script/wormbase-init.sh start
  
* $BLAST2WORMBASE, $WORMBASE2BLAST
+
= Administration =
  
These two options control where the blast script directs queries, and where those queries are returned. This is provided in the event that a second standalone blast server is provided. If not, these two options should point to:
+
'''Checking out the Administration module'''
 
 
$WORMBASE2BLAST=http://your.hostname.org/
 
  
 +
Fetch the administration code repository (privileged users only, for now)
  
 +
todd> mkdir -p ~/projects/wormbase
 +
todd> cd ~/projects/wormbase
 +
todd> hg clone ssh://hg@bitbucket.org/tharris/wormbase-admin/  // Assuming you have already set up your ssh keys at bitbucket
  
 +
== Updating the web application ==
  
 +
== Updating databases ==
  
 +
== Backing up your system ==
  
  
  
= Cronjobs =
+
== Cronjobs ==
  
 
''Set up the following cronjobs:''
 
''Set up the following cronjobs:''
  
== Log Rotation (root cron) ==
+
'''Log Rotation (root cron)'''
  
 
  # Rotate WormBase logs
 
  # Rotate WormBase logs
 
  10 1 * * * /home/todd/projects/wormbase/admin/maintenance/rotate_httpd_logs.pl
 
  10 1 * * * /home/todd/projects/wormbase/admin/maintenance/rotate_httpd_logs.pl
 +
 +
Or via logrotate:
 +
 +
00 00 * * * /usr/sbin/logrotate -s /var/tmp/logrotate.status /usr/local/wormbase/admin/crons/wormbase-logrotate.conf
 +
 +
The contents of this file look like this:
 +
 +
/usr/local/wormbase/logs/*_log {
 +
        daily
 +
        missingok
 +
        rotate 3650  # keep 10 years worth of logs
 +
        compress
 +
        notifempty
 +
        sharedscripts
 +
        mail wormbase-logs@tharris.org  # when a log file expires, email it to me.
 +
        postrotate
 +
                /usr/local/apache2/bin/apachectl graceful
 +
        endscript
 +
}
 +
  
 
For nodes running acedb, add the following entry which deals with its massive log files:
 
For nodes running acedb, add the following entry which deals with its massive log files:
Line 602: Line 580:
 
  35 * * * * /home/todd/projects/wormbase/admin/maintenance/purge_acedb_logs.sh
 
  35 * * * * /home/todd/projects/wormbase/admin/maintenance/purge_acedb_logs.sh
  
 
+
Watch for runaway httpd processes:
 +
*/5 * * * * /usr/local/wormbase/admin/monitoring/monitor_httpd_runaways.sh
  
 
The final step is to arrange for Acedb to start automatically and for MySQL to restart if necessary.
 
The final step is to arrange for Acedb to start automatically and for MySQL to restart if necessary.
  
=== Installing MySQL and BLAT monitoring scripts ===
+
'''Installing MySQL and BLAT monitoring scripts NOT DONE'''
  
 
Run:
 
Run:
Line 620: Line 599:
 
     0 * * * * /usr/local/wormbase/util/admin/restart_mysqld.pl
 
     0 * * * * /usr/local/wormbase/util/admin/restart_mysqld.pl
 
     0 * * * * /usr/local/wormbase/util/admin/restart_blat.pl
 
     0 * * * * /usr/local/wormbase/util/admin/restart_blat.pl
 
  
 
== Installing scripts to verify that the servers are running ==
 
== Installing scripts to verify that the servers are running ==
Line 646: Line 624:
 
This stanza will check that the acedb server logs do not grow larger than 100 MB.
 
This stanza will check that the acedb server logs do not grow larger than 100 MB.
  
= Testing The Site =
+
== Blocking robots ==
 +
 
 +
It can be useful to block search engines (such as Google) from crawling over one's mirror. To do this, go to /usr/local/wormbase/html, and make a file called "robots.txt" with the following contents:
 +
 
 +
    User-agent: *
 +
    Disallow: /
 +
 
 +
= Appendices =
 +
 
 +
== Appendix 1: Mac OS 10.6 (Snow Leopard) Prequisites  ==
 +
 
 +
=== XCode > 3.21 ===
 +
 
 +
''You will need this for building C libraries as well as fixing the broken Perl that shipping with 10.6.''
 +
 
 +
=== MySQL >= 5.1 ===
 +
 
 +
''MySQL is not expressly required, but you do need it for building DBD::mysql.''
 +
 
 +
bash> cd src
 +
bash> curl -O http://mysql.mirrors.pair.com/Downloads/MySQL-5.1/mysql-5.1.39.tar.gz
 +
bash> tar xzf mysql-5.1.41.tar.gz
 +
bash> cd mysql-5.1.41
 +
bash> ./configure --prefix=/usr/local/mysql \
 +
                  --with-extra-charsets=complex \
 +
                  --enable-thread-safe-client \
 +
                  --enable-local-infile \
 +
                  --enable-shared \
 +
                  --with-plugins=innobase
 +
bash> make
 +
bash> sudo make install
 +
bash> cd /usr/local/mysql
 +
bash> sudo ./bin/mysql_install_db --user=mysql
 +
bash> sudo chown -R mysql ./var
 +
 
 +
=== libpng ===
 +
 
 +
bash> curl -O http://softlayer.dl.sourceforge.net/project/libpng/00-libpng-stable/1.2.40/libpng-1.2.40.tar.gz
 +
bash> tar xzf libpng-*
 +
bash> ccd libpng*
 +
bash> ./configure
 +
bash> make
 +
bash> sudo make install
 +
 
 +
=== libgd ===
 +
 
 +
bash> curl -O http://www.libgd.org/releases/gd-2.0.35.tar.gz
 +
bash> tar xzf gd*
 +
bash> cd gd*
 +
bash> ./configure
 +
bash> make
 +
bash> sudo make install
 +
 
 +
== Appendix 2: mod_perl and Apache installation ==
 +
 
 +
WormBase no longer runs off apache and mod_perl, although it is entirely possible to do so.  Here's how to install these components.
  
At this point, all components of a WormBase installation have been installed. You can test your installation by restarting the various server components of WormBase.
+
''I prefer to build httpd and mod_perl from source; it seems easier than waiting for package repositories to be updated.  Besides, I really despise Debian's apache layout. It's horrid.''
  
=== Restarting AceDB ===
+
=== Installation ===
  
<nowiki># Via xinetd:
+
''Assuming you have already fetched the source into ~/src:''
$ /etc/init.d/xinetd reload (or restart)
 
</nowiki>
 
  
  <nowiki># ...or using saceclient
+
  # Build httpd 2.2.11
  % saceclient localhost -port 2005
+
cd ~/src
  acedb&gt; password:
+
tar xzf httpd-2.2.11.tar.gz
  acedb&gt; shutdown now
+
  cd httpd-2.2.11
  </nowiki>
+
  ./configure --enable-mods-shared=all --enable-proxy
 +
  make
 +
  sudo make install
  
=== Restarting MySQL ===
+
# Build mod_perl2-0.4
 +
cd ~/src
 +
cd mod_perl-2.0.4
 +
perl -I/usr/local/wormbase/website-classic/extlib Makefile.PL INSTALL_BASE=/usr/local/wormbase/website-classic/extlib
 +
// When prompted for the apxs path, enter: /usr/local/apache2/bin/apxs
 +
make
 +
sudo make install
  
<nowiki># Via mysqladmin...
+
=== Configuration ===
% mysqladmin -uroot -pPASSWORD shutdown
 
 
# or using init.d
 
$ /etc/init.d/mysql restart
 
</nowiki>
 
  
=== Restarting Apache ===
+
''We typically set up services as individual virtual servers.  Here's an example.  See "Special Services" below for additional details.''
  
When the configuration files have been checked and adjusted, restart Apache with the following command:
+
Modify the primary httpd.conf file (/usr/local/apache2/conf/httpd.conf) as follows:
  
  $ /etc/init.d/apache restart
+
#User daemon
 +
User nobody
  
Check /usr/local/wormbase/logs/classic-error_log for WormBase-specific errors and /var/log/apache2/error_log for general errors.
+
Set up a virtual host on your port.  Adjust PerlSwitches as appropriate for your architecture, and the Listen directive of the primary apaache httpd.conf file as appropriate.
  
=== BLAT ===
+
<VirtualHost *:80>
 +
  Include /usr/local/wormbase/website-classic/conf/httpd.conf
 +
  PerlOptions +Parent
 +
  PerlSwitches -Mlib=/usr/local/wormbase/website-classic/extlib/lib/perl5 \
 +
                -Mlib=/usr/local/wormbase/website-classic/extlib/lib/perl5/x86_64-linux-gnu-thread-multi
 +
  #  PerlInterpStart 2                                                                                               
 +
    #  PerlInterpMax 2                                                                                             
 +
  <Directory "/usr/local/wormbase/website-classic/html">
 +
        DirectoryIndex index.html
 +
        #      Order deny,allow       
 +
        #      Deny from all                                                                                           
 +
  </Directory>
 +
  # Redirect requests for the old movable type atom feeds to feedburner
 +
  RewriteEngine ON
 +
  #  RewriteRule ^/rss/wormbase-live-atom\.xml$ http://feeds.feedburner.com/wormbase [R=301,L]
 +
  RewriteRule ^/rss/wormbase-live-atom\.xml$ http://feeds.feedburner.com/wormbase [R=301,L]
 +
  RewriteRule ^/news\.xml$ http://feeds.feedburner.com/wormbase [R=301,L]
 +
  RewriteRule ^/rss/wormbase-live\.xml$ http://feeds.feedburner.com/wormbase [R=301,L]
 +
</VirtualHost>
  
% /usr/local/blat/bin/gfServer start localhost 2003 \
+
Enable virtual hosts in httpd.conf by uncommenting the following line:
      /usr/local/wormbase/blat/*.nib &amp; &gt; /dev/null 2&gt;&amp;1
 
  
== Blocking robots ==
+
# Include conf/extra/httpd-hosts.conf
  
It can be useful to block search engines (such as Google) from crawling over one's mirror. To do this, go to /usr/local/wormbase/html, and make a file called "robots.txt" with the following contents:
+
=== Set up httpd to run under inet.d ===
  
    User-agent: *
+
cd /etc/init.d
    Disallow: /
+
sudo ln -s /usr/local/apache2/bin/apachectl httpd
  
=Updating Production Nodes to match this reality=
+
Edit apachectl to make it "LSB" compliant (ie Debian compliant). Add the following after the she-bang:
  
1. Create /usr/local/wormbase/website-classic
+
### BEGIN INIT INFO                                                           
 +
# Provides:          httpd                                                     
 +
# Required-Start:    $all                                                     
 +
# Required-Stop:    $remote_fs $syslog                                       
 +
# Default-Start:    3 5                                                   
 +
# Default-Stop:      0 1 2 4 6                                                     
 +
# Short-Description: Start daemon at boot time                                 
 +
# Description:      Enable service provided by daemon.                        
 +
### END INIT INFO
  
2. Move all website files into website-classic
+
cd /etc/rc3.d
 +
sudo ln -s ../init.d/apache2 S99apache2
 +
cd ../rc5.d
 +
sudo ln -s ../init.d/apache2 S99apache2
  
3. Move database to /usr/local/wormbase
+
Or via update-rc.d
  
4. Create /usr/local/wormbase/logs
+
sudo update-rc.d apache2 start 99 3 5 . stop 0 1 2 4 6 .
  
5. Install Perl Modules as described above
 
  
6. Install GBrowse as described above
+
=== PHP ===
  
7. Update admin module for pushing software to production (and for maintaining staging module)
+
cd ~/src
 +
tar xzf php-5.2.4.tar.gz
 +
./configure --with-apxs2=/usr/local/apache2/bin/apxs --with-mysql
 +
make
 +
sudo make install
  
 
= AUTHOR =
 
= AUTHOR =
  
[[User:Tharris|Todd Harris]] (toddwharris@gmail.com)
+
[[User:Tharris|Todd Harris]] (todd@wormbase.org)
 +
 
 +
 
 +
[[Category: Architecture (Web Dev)]]

Latest revision as of 19:10, 18 June 2014

Overview

This document describes how to install WormBase locally on your own machine. Please note that as of August 2013, WormBase is almost entirely a distributed cloud-based application. Although possible to install and run on a single server (or cloud instance) the directions below may be slightly out-of-sync with how the principal WormBase architecture is built.

Recommendations

Hardware

As of April 2012, the suggested minimum hardware requirements for a basic installation of WormBase are:

  • 500 GB disk space (1 TB preferable)
  • 8 GB RAM

Operating Systems

You should be able to install and run the site on any Unix-y OS, including Mac OS X. This document only describes installation on Debian and Debian-ish OSes like Amazon's Linux. Your actual mileage may vary on other operating systems.

Basic System Configuration

Users And Groups

These users should not have a login password. They are to establish privileges only.

acedb group

This is the group that will have write privileges to the acedb directory tree. Acedb administrators should be added to this group.

$ groupadd acedb

acedb user

This is the user that the acedb server will run as. It should be a member of the acedb group.

$ useradd -g acedb -d /usr/local/wormbase/acedb acedb

This useradd command also adds the new acedb user to the acedb group. Note that the acedb user's home directory was set to /usr/local/acedb, a directory which will be created in the next step.

wormbase group

This is a group that will have write privileges to the wormbase directory tree. WormBase administrators and authors should be added to this group.

$ groupadd wormbase

This would be a good time to add yourself to the acedb and wormbase groups.

$ usermod -a -G acedb,wormbase [your_login_name]

You may need to re-login for these changes to take effect. Use the groups command to check which groups you are a member of:

% groups

Create Directories

Create a root directory for all WormBase-related files. Although this directory can reside anywhere on your filesystem, for consistency with WormBase proper, we recommend installing at /usr/local/wormbase. You'll need suitable privileges to install in this location.'

The root container for all things WormBase

  • /usr/local/wormbase, owner=root group=wormbase mode=drwxrwsr-x
$ cd /usr/local
$ sudo mkdir wormbase
$ sudo chown root:wormbase wormbase
$ sudo chmod 2775 wormbase

The AceDB directory contains acedb and associated databases:

  • /usr/local/wormbase/acedb, owner=acedb group=acedb,mode=drwxrwsr-x
$ mkdir /usr/local/wormbase/acedb
$ chmod 2775 /usr/local/wormbase/acedb
$ sudo chown acedb:acedb /usr/local/wormbase/acedb

The website/ directory contains one or many versions of the website:

  • /usr/local/wormbase/website, owner=[ANYONE] group=wormbase,mode=drwxrwsr-x
$ mkdir /usr/local/wormbase/website
$ chmod 2775 /usr/local/wormbase/website
$ sudo chgrp wormbase /usr/local/wormbase/website

The services/ directory contains optional services such as e-pcr, blast, and nginx:

  • /usr/local/wormbase/services, owner=[ANYONE] group=wormbase,mode=drwxrwsr-x
$ mkdir /usr/local/wormbase/services
$ chmod 2775 /usr/local/wormbase/services
$ sudo chgrp wormbase /usr/local/wormbase/services

The databases/ directory contains databases driving a number of features:

  • /usr/local/wormbase/databases, owner=[ANYONE] group=wormbase,mode=drwxrwsr-x
$ mkdir /usr/local/wormbase/databases
$ chmod 2775 /usr/local/wormbase/databases
$ sudo chgrp wormbase /usr/local/wormbase/databases

The logs/ directory contains WormBase-wide log and pid files

  • /usr/local/wormbase/logs, owner=[ANYONE] group=wormbase,mode=drwxrwwrwx
$ mkdir /usr/local/wormbase/logs
$ chmod 2775 /usr/local/wormbase/logs
$ sudo chgrp wormbase /usr/local/wormbase/logs

Installing Library Prerequisites

Assuming a vanilla Debian installation, install the following libaries and all of their dependencies via sudo apt-get install. Some of these libraries are discussed below.

     sharutils \
     gcc g++ \
     curl wget \
     bzip2 \
     mysql-client \
     mysql-server \
     libgd2-xpm-dev\
     libgd2-xpm \
     xinetd \
     libdbd-mysql \
     libdbd-mysql-perl \
     libapache2-mod-perl2 \
     libgtk2.0-0 \
     libgtk2.0-dev \
     emacs \
     git \
     byacc \
     libreadline-gplv2-dev \
     flex \
     libdb4.6 \
     libdb-dev \
     xml2 libxml2 libxml2-dev \
     libmysql++-dev \
     ncurses-bin \
     libxmu-dev \
     graphviz \
     libssl-dev \
     uuid \
     uuid-dev \
     libxslt1-dev \
     xsltproc \
     libgdbm3 \
     libgdbm3-dev \
     libstdc++ \
     libstdc++-devel 

Build xapian (or install from package if available):

$ wget http://oligarchy.co.uk/xapian/1.2.5/xapian-core-1.2.5.tar.gz
$ tar xzf xapian-core*.tgz
$ cd xapian-core
$ ./configure
$ make
$ sudo make install

Install Search::Xapian

$ perl -MCPAN -e 'install Search::Xapian'

Install Perl 5.10.1 or greater

You'll need Perl version 5.10.1 or greater.

Upgrading Perl via apt (recommended)

Let your operating system managing your version of Perl.

Configure your apt preferences

Add the following to /etc/apt/sources.list

#Stable
deb http://ftp.us.debian.org/debian stable main non-free contrib
#Testing
deb http://ftp.us.debian.org/debian testing main non-free contrib
#Unstable
deb http://ftp.us.debian.org/debian unstable main non-free contrib

Configure your preferences in /etc/apt/preferences:

Package: *
Pin: release a=stable
Pin-Priority: 700
Package: *
Pin: release a=testing
Pin-Priority: 650
Package: *
Pin: release a=unstable
Pin-Priority: 600

Finally, install Perl

sudo apt-get update
sudo apt-get install perl/testing perl-base/testing perl-modules/testing libperl5.10/testing libperl-dev/testing

And confirm

$ perl -v
 This is perl, v5.10.1 (*) built for x86_64-linux-gnu-thread-multi
 (with 40 registered patches, see perl -V for more detail)

Installing Perl from source

We recommend installing a local version of Perl and required libraries. This makes management dramatically easier. We keep our Perl with the webapp itself.

If you have sufficient privileges, you may wish to use your pre-installed system Perl.

bash> mkdir ~/website/perl
bash> cd ~/src
bash> curl -O http://www.cpan.org/src/perl-5.10.1.tar.gz
bash> cd ~/build
bash> tar xzf ../src.perl-5.10.1.tar.gz
bash> cd perl-5.10.1
bash> ./Configure -des -Dprefix=$HOME/website/perl/5.10.1
bash> make
bash> make test
bash> make install

Be sure to set up your your system to preferentially use this newly installed Perl:

bash> export PATH=~/wormbase/perl/5.10.1/bin:${PATH}

Install the Webapp

Fetch the current production code from the git repository on github.

$ cd /usr/local/wormbase/website
$ git clone git@github.com:WormBase/website.git
$ mv website YOUR_NAME // name can be anything you want; useful for maintaining multiple versions

Install local:: lib

The preferred method uses the web app's Makefile.PL and Module::Install to build all dependencies. We maintain local copies of all libraries with each version of the webapp.

Build and install dependencies

$ mkdir /usr/local/wormabase/extlib
$ cd /usr/local/wormbase/website/YOUR_NAME
$ perl Makefile.PL
$ make installdeps

See the documentation on Managing Perl Libraries for additional details.

Required 3rd-party Applications

Starman: the lightweight http server

PSGI: specification for Perl superglue between frameworks and servers. Plack is an implementation of PSGI. Compare to Rack (Ruby) or Jack (Javascript).

  http://plackperl.org/

Starman is a high performance pre-forking Perl PSGI server. We're using it in place of Apache+fastcgi.mod_perl.

 https://github.com/miyagawa/Starman

Install Plack and Starman

Catalyst::Controller::Metal
Catalyst::Engine::PSGI
Catalyst::Helper::PSGI
Plack::Test::Adopt::Catalyst
cpanm Task::Plack
cpanm Starman

Configuration

The PSGI glue resides at:

website/YOUR_NAME/wormbase.psgi

Starting Starman

starman script/wormbase.psgi
OR
starman -MFindBin script/wormbase_production.psgi

Set up starman to launch automatically

Copy the stub init script from wormbase/conf/starman/starman.init:

 cp /usr/local/wormbase/admin/conf/starman/starman.init

AceDB

I always build acedb from source.

$ tar xzf ACEDB-source*    // CAUTION: Tarbomb.
// Requires installation of a whole bunch of things first: libgtk2.0-0 libgtk2.0-dev libglib, byacc, etc, etc
// Modify the makefile: create a target for server programs (xace tace saceserver sgifacerver)
// This is all I care about:
   SERVERS = xace tace saceserver sgifaceserver saceclient
   servers: $(SERVERS)
$ export ACEDB_MACHINE=LINUX_4
$ make servers
$ cd ~acedb
$ ln -s bin-VERSION bin 
$ cp tace xace sgifaceserver saceserver saceclient ~acedb/bin/.
$ sudo chown root:root ~acedb/bin/*

Testing the ACeDB Installation

At this point, you can test whether the socket server runs correctly. Provided that you have added yourself to the acedb group, you can run the following command:

 % ~acedb/bin/sgifaceserver ~acedb/wormbase
 // Database directory: /usr/local/wormbase/acedb/wormbase
 // Shared files: /usr/local/acedb
 // #### Server started at 2001-07-23_16:42:31
 // #### host=mondseer.cshl.org  listening port=23100
 // #### Database dir=/usr/local/acedb/elegans
 // ####  Working dir=/usr/local/acedb/elegans
 // #### clientTimeout=600 serverTimeout=600 maxKbytes=0 autoSaveInterval=600
 // Server listening socket 28 created

The line "listening port=23100" indicates that the server is listening to port 23100. Open a new terminal window and use saceclient to confirm that you can communicate with the server:

% ~acedb/bin/saceclient localhost -port 23100
Please enter userid: anonymous
Please enter passwd:
acedb@localhost> find Sequence
// Response: 65 bytes.
// Found 236493 objects in this class
// 236493 Active Objects
acedb@localhost> quit
// Closing connection to server.
// Client sent termination signal by server.
// Response: 13 bytes.
// A bientot
// Please report problems to acedb@sanger.ac.uk
// Bye

Configuring Acedb to start automatically under xinetd

Install xinetd (not standard in Debian) if you didn't already:

  $ sudo apt-get install xinetd

Create a configuration file for acedb:

 $ sudo emacs /etc/xinetd.d/acedb-wormbase 

 # file: /etc/xinetd.d/acedb-wormbase
 # default: on
 # description: wormbase acedb database
 service acedb-wormbase
 {
        protocol                = tcp
        socket_type             = stream
        port                    = 2005
        flags                   = REUSE
        wait                    = yes
        user                    = acedb
        group                   = acedb
        log_on_success          += USERID DURATION
        log_on_failure          += USERID HOST
        server                  = /usr/local/wormbase/acedb/bin/sgifaceserver
        server_args             = /usr/local/wormbase/acedb/wormbase 1200:1200:0
 }
 

Edit /etc/services. Although xinetd is not supposed to use /etc/services, the following line must be added:

acedb-wormbase           2005/tcp

Restart xinetd with the following command:

$ sudo /etc/init.d/xinetd reload (or restart)

You should now be able to talk to the database using saceclient:

$ ~acedb/bin/saceclient localhost -port 2005

MySQL

Installation

Install mysql and various libraries via apt-get if you haven't already. You will need the unstable and testing repositories set up when upgrading Perl.

 $ sudo apt-get install libncurses5/testing
 $ sudo apt-get install mysql-common/testing libmysqlclient16 mysql-server-5.1/testing \
         mysql-client-5.1/testing libdbd-mysql/testing libdbd-mysql-perl/testing

With this installation, databases are located at /var/lib/mysql. We want to relocate this to /usr/local/mysql/data to be consistent with the WormBase. We also want to able to write to this directory from the command line, so:

$ sudo nano /etc/my.cnf
Set datadir to /usr/local/mysql/data
$ mkdir -p /usr/local/mysql/data
$ sudo chown -R mysql:mysql /usr/local/mysql
$ sudo chmod 2775 /usr/local/mysql/data 

Mysqld will automatically be setup to launch at server boot (rc3 and rc5).

Set up mysql permissions

$ mysql -u root -pPASSWORD
mysql> grant select on c_elegans.* to nobody@localhost;

Repeat for:

  • autocomplete
  • b_malayi
  • c_briggsae
  • c_elegans
  • c_elegans_gmap
  • c_elegans_pmap
  • c_japonica
  • c_remanei
  • c_brenneri
  • h_bacteriophora
  • p_pacificus
  • ps1010

Generic Genome Browser

See GBrowse Administration for details on how to install GBrowse.

Optional 3rd-party Applications

nginx

We use nginx as a lightweight proxy server and load balancing server. You can skip this step and simply connect directly to the Starman http server. Otherwise, see the production environment documentation on installing and configuring nginx.

BLAST

The BLAST page requires WU-BLAST. This is a closed-source derivative of NCBI's BLAST. However, WU-BLAST is free to academic users (with licensing) and is thought to have performance advantages over NCBI-BLAST; it can be downloaded from http://blast.wustl.edu/. A typical choice of WU-BLAST for Linux is blast2.linux26-i686.tar.gz.

You can skip this step if you don't want to provide BLAST services at your site.

By default, WormBase expects WU-BLAST to be installed in /usr/local/wormbase/services/wublast. This is the directory structure used by WormBase:

$ ls -l /usr/local/wormbase/services/wublast
lrwxrwxrwx  1 root  root     18 May  7 12:26  BLOSUM62 -> matrix/aa/BLOSUM62
-rw-r--r--  1 root  root  46789 Feb  5  1998  HISTORY
-rw-r--r--  1 root  root   6648 Mar  4  1997  README
drwxr-xr-x  2 root  root   4096 May  7  12:46 bin/
lrwxrwxrwx  1 root  root     25 Jul 24  08:20 databases -> /usr/local/wormbase/blast/
drwxr-xr-x  2 root  root   4096 Jan 27  2000  filter/
drwxr-xr-x  4 root  root   4096 Oct  4  1998  matrix/

e-PCR

A modified version of the epcr source can be found in the checked out website code in src/. See the enclosed README describing changes made to the original e-PCR distribution. The binary should be placed in /usr/local/wormbase/services.

   $ cd /usr/local/wormbase/website/production/src
   $ make
   $ install e-PCR /usr/local/wormbase/services/epcr

BLAT

Jim Kent's BLAT (blast-like alignment tool) is a fast nucleotide aligner used by the blast search page. If you do not plan to support blast searches, you may safely skip this step.

 $ mkdir -p /usr/local/wormbase/services/blat/bin
 $ cd /usr/local/wormbase/services/blat/bin
 $ wget http://www.soe.ucsc.edu/~kent/exe/linux/blatSuite.33.zip  (for Intel Linux)
 $ unzip blatSuite.33.zip
 $ rm blatSuite.33.zip version.doc 11.ooc

Note that this choice gives precompiled binaries for an Intel-based Linux distribution as of March 2006. It would probably be worth checking http://www.soe.ucsc.edu/~kent/exe/linux to see if there is a more up-to-date version than 33. Also, other operating systems will need other binaries. E.g., for Mac OS X, instead run:

 $ wget http://www.soe.ucsc.edu/~kent/exe/osX/blatSuite.33.zip

The blat server will be started automatically by the update script. For reference, the blat server is launched using the following command.

$ /usr/local/wormbase/services/blat/bin/gfServer start localhost 2003 \
     /usr/local/wormbase/databases/VERSION/blat/*.nib & > /dev/null 2>&1

Installing Databases NOT DONE

Primary database (AceDB)

GFF Sequence feature database (MySQL)

Support Databases

Support databases are automatically synced to the nodes that require them by wormbase-admin/update/production/cron-rsync_support_dbs.sh. This is run from wb-dev.

0 1 * * * /home/tharris/projects/wormbase/wormbase-admin/update/production/cron-rsync_support_dbs.sh

Testing The Site

At this point, all components of a WormBase installation have been installed. You can test your installation by restarting the various server components of WormBase.

Restarting AceDB

# Via xinetd:
 $ /etc/init.d/xinetd reload (or restart)
 
# ...or using saceclient
 % saceclient localhost -port 2005
 acedb> password:
 acedb> shutdown now
 

Restarting MySQL

# Via mysqladmin...
 % mysqladmin -uroot -pPASSWORD shutdown
 
 # or using init.d
 $ /etc/init.d/mysql restart
 

Starting The Webapp

Set up environment:

$ cd /your/checked/out/source
$ cp wormbase.env.template wormbase.env  // Edit as necessary.
$ source wormbase.env

Start the built in development server:

$ script/wormbase_server -p 9999 -r -d   // choose a suitable port.

Start up a starman server via plack:

$ cd /your/checked/out/source
$ source wormbase.env
$ starman -- port 9999 wormbase.psgi // choose a suitable port.

At this point, you should now be able to connect to WormBase at:

http://localhost:YOURPORT/

If you are running your site on one of the ports matching the nginx reverse proxy configuration as described above, you should be able to:

http://subdomain.wormbase.org/

To run your site using the init script:

source wormbase.env
./script/wormbase-init.sh start

Administration

Checking out the Administration module

Fetch the administration code repository (privileged users only, for now)

todd> mkdir -p ~/projects/wormbase
todd> cd ~/projects/wormbase
todd> hg clone ssh://hg@bitbucket.org/tharris/wormbase-admin/  // Assuming you have already set up your ssh keys at bitbucket

Updating the web application

Updating databases

Backing up your system

Cronjobs

Set up the following cronjobs:

Log Rotation (root cron)

# Rotate WormBase logs
10 1 * * * /home/todd/projects/wormbase/admin/maintenance/rotate_httpd_logs.pl

Or via logrotate:

00 00 * * * /usr/sbin/logrotate -s /var/tmp/logrotate.status /usr/local/wormbase/admin/crons/wormbase-logrotate.conf

The contents of this file look like this:

/usr/local/wormbase/logs/*_log {
        daily
        missingok
        rotate 3650  # keep 10 years worth of logs
        compress
        notifempty
        sharedscripts
        mail wormbase-logs@tharris.org   # when a log file expires, email it to me.
        postrotate
                /usr/local/apache2/bin/apachectl graceful
        endscript
}


For nodes running acedb, add the following entry which deals with its massive log files:

# Purge epic ACEDB logs
35 * * * * /home/todd/projects/wormbase/admin/maintenance/purge_acedb_logs.sh

Watch for runaway httpd processes:

  • /5 * * * * /usr/local/wormbase/admin/monitoring/monitor_httpd_runaways.sh

The final step is to arrange for Acedb to start automatically and for MySQL to restart if necessary.

Installing MySQL and BLAT monitoring scripts NOT DONE

Run:

   $ cp -i /usr/local/wormbase/util/admin/blat_server.initd /etc/rc.d/init.d/blat_server

Then run:

   $ crontab -u root -e

to add the following entries to root's crontab:

   0 * * * * /usr/local/wormbase/util/admin/restart_mysqld.pl
   0 * * * * /usr/local/wormbase/util/admin/restart_blat.pl

Installing scripts to verify that the servers are running

Two scripts in the WormBase directory can be used to ensure that the mysql and blat servers are running. To install, them:

% sudo cp /usr/localwormbase/util/admin/blat_server.initd \
          /etc/rc.d/init.d/blat_server

Place the restart scripts under cron control of a privileged user. These commands will check every hour to see that the servers are running.

 % sudo crontab -u root -e
0 * * * * /usr/local/wormbase/util/admin/restart_mysqld.pl
0 * * * * /usr/local/wormbase/util/admin/restart_blat.pl

At the same time, you might also wish to automate the rotatation of logs to prevent them from growing to an unwieldy size. You'll find an appropriate log rotation configuration stanza in util/rotate_wormbase_logs and a log rotate script in /usr/local/wormbase/bin/rotatelogs.pl. You will need both.

# Rotate httpd logs
 10 1 * * * /usr/local/wormbase/bin/rotatelogs.pl
 # Rotate acedb logs
 10 1 * * * logrotate /usr/local/wormbase/util/rotate_wormbase_logs
 

This stanza will check that the acedb server logs do not grow larger than 100 MB.

Blocking robots

It can be useful to block search engines (such as Google) from crawling over one's mirror. To do this, go to /usr/local/wormbase/html, and make a file called "robots.txt" with the following contents:

   User-agent: *
   Disallow: /

Appendices

Appendix 1: Mac OS 10.6 (Snow Leopard) Prequisites

XCode > 3.21

You will need this for building C libraries as well as fixing the broken Perl that shipping with 10.6.

MySQL >= 5.1

MySQL is not expressly required, but you do need it for building DBD::mysql.

bash> cd src
bash> curl -O http://mysql.mirrors.pair.com/Downloads/MySQL-5.1/mysql-5.1.39.tar.gz
bash> tar xzf mysql-5.1.41.tar.gz
bash> cd mysql-5.1.41
bash> ./configure --prefix=/usr/local/mysql \
                  --with-extra-charsets=complex \
                  --enable-thread-safe-client \
                  --enable-local-infile \
                  --enable-shared \
                  --with-plugins=innobase
bash> make
bash> sudo make install
bash> cd /usr/local/mysql
bash> sudo ./bin/mysql_install_db --user=mysql
bash> sudo chown -R mysql ./var

libpng

bash> curl -O http://softlayer.dl.sourceforge.net/project/libpng/00-libpng-stable/1.2.40/libpng-1.2.40.tar.gz
bash> tar xzf libpng-*
bash> ccd libpng*
bash> ./configure
bash> make
bash> sudo make install

libgd

bash> curl -O http://www.libgd.org/releases/gd-2.0.35.tar.gz
bash> tar xzf gd*
bash> cd gd*
bash> ./configure
bash> make
bash> sudo make install

Appendix 2: mod_perl and Apache installation

WormBase no longer runs off apache and mod_perl, although it is entirely possible to do so. Here's how to install these components.

I prefer to build httpd and mod_perl from source; it seems easier than waiting for package repositories to be updated. Besides, I really despise Debian's apache layout. It's horrid.

Installation

Assuming you have already fetched the source into ~/src:

# Build httpd 2.2.11
cd ~/src
tar xzf httpd-2.2.11.tar.gz
cd httpd-2.2.11
./configure --enable-mods-shared=all --enable-proxy
make
sudo make install
# Build mod_perl2-0.4
cd ~/src
cd mod_perl-2.0.4
perl -I/usr/local/wormbase/website-classic/extlib Makefile.PL INSTALL_BASE=/usr/local/wormbase/website-classic/extlib
// When prompted for the apxs path, enter: /usr/local/apache2/bin/apxs
make
sudo make install

Configuration

We typically set up services as individual virtual servers. Here's an example. See "Special Services" below for additional details.

Modify the primary httpd.conf file (/usr/local/apache2/conf/httpd.conf) as follows:

#User daemon
User nobody

Set up a virtual host on your port. Adjust PerlSwitches as appropriate for your architecture, and the Listen directive of the primary apaache httpd.conf file as appropriate.

<VirtualHost *:80>
  Include /usr/local/wormbase/website-classic/conf/httpd.conf
  PerlOptions +Parent
  PerlSwitches -Mlib=/usr/local/wormbase/website-classic/extlib/lib/perl5 \
               -Mlib=/usr/local/wormbase/website-classic/extlib/lib/perl5/x86_64-linux-gnu-thread-multi 
  #   PerlInterpStart 2                                                                                                
   #   PerlInterpMax 2                                                                                              
  <Directory "/usr/local/wormbase/website-classic/html">
       DirectoryIndex index.html
       #       Order deny,allow         
       #       Deny from all                                                                                            
  </Directory>
  # Redirect requests for the old movable type atom feeds to feedburner
  RewriteEngine ON
  #   RewriteRule ^/rss/wormbase-live-atom\.xml$ http://feeds.feedburner.com/wormbase [R=301,L]
  RewriteRule ^/rss/wormbase-live-atom\.xml$ http://feeds.feedburner.com/wormbase [R=301,L]
  RewriteRule ^/news\.xml$ http://feeds.feedburner.com/wormbase [R=301,L]
  RewriteRule ^/rss/wormbase-live\.xml$ http://feeds.feedburner.com/wormbase [R=301,L]
</VirtualHost>

Enable virtual hosts in httpd.conf by uncommenting the following line:

# Include conf/extra/httpd-hosts.conf

Set up httpd to run under inet.d

cd /etc/init.d
sudo ln -s /usr/local/apache2/bin/apachectl httpd

Edit apachectl to make it "LSB" compliant (ie Debian compliant). Add the following after the she-bang:

### BEGIN INIT INFO                                                             
# Provides:          httpd                                                      
# Required-Start:    $all                                                       
# Required-Stop:     $remote_fs $syslog                                         
# Default-Start:     3 5                                                    
# Default-Stop:      0 1 2 4 6                                                      
# Short-Description: Start daemon at boot time                                  
# Description:       Enable service provided by daemon.                         
### END INIT INFO
cd /etc/rc3.d
sudo ln -s ../init.d/apache2 S99apache2
cd ../rc5.d
sudo ln -s ../init.d/apache2 S99apache2

Or via update-rc.d

sudo update-rc.d apache2 start 99 3 5 . stop 0 1 2 4 6 .


PHP

cd ~/src
tar xzf php-5.2.4.tar.gz 
./configure --with-apxs2=/usr/local/apache2/bin/apxs --with-mysql
make
sudo make install

AUTHOR

Todd Harris (todd@wormbase.org)