Open amsalama opened 3 years ago
Any help ?
I don't know where did you get the configuration but it doesn't match to the documentation, you can make the integration:
actually i follow these steps in link https://nroduit.github.io/en/getting-started/dcm4chee/#for-dcm4chee-arc-light Steps : 1- add these lines to docker-compose.yml version: "3" services: ldap: image: dcm4che/slapd-dcm4chee:2.4.50-23.0 logging: driver: json-file options: max-size: "10m" ports:
i hope quickly answer.
Your configuration doesn't match of the two possible configurations (first used weasis version at the server side, second only used the client installation):
IID_PATIENT_URL=../../weasis-pacs-connector/weasis?patientID={{patientID}}&access_token={{access_token}} IID_STUDY_URL=../../weasis-pacs-connector/weasis?studyUID={{studyUID}}&access_token={{access_token}} IID_URL_TARGET=_self
IID_PATIENT_URL=../../weasis-pacs-connector/weasis?patientID={{patientID}}&cdb&access_token={{access_token}} IID_STUDY_URL=../../weasis-pacs-connector/weasis?studyUID={{studyUID}}&cdb&access_token={{access_token}} IID_URL_TARGET=_self
If it doesn't work, you should have a look on weasis-pacs-connector logs (from wildfly console) or dcm4chee logs.
Did you try the most simple configuration: https://nroduit.github.io/en/basics/customize/integration/#download-directly-with-dicomweb-restful-services
Thanks a lot for reply . i change to IID_STUDY_URL=../../weasis-pacs-connector/weasis?&studyUID={{studyUID}}&target=_self&access_token={{access_token}} IID_PATIENT_URL=../../weasis-pacs-connector/weasis?&patientID={{patientID}}&target=_self&access_token={{access_token}} in server log it's query dcm4chee but not open weasis also, weasis have log file , if it have where is path ?
these line from server.log in dcm4chee : 112] 2020-12-23 12:40:36,132 INFO [org.dcm4che3.net.Association] (EE-ManagedExecutorService-default-Thread-11) DCM4CHEE<-PACS-CONNECTOR(4) >> A-ASSOCIATE-RQ 2020-12-23 12:40:36,133 INFO [org.dcm4che3.net.Association] (EE-ManagedExecutorService-default-Thread-11) DCM4CHEE<-PACS-CONNECTOR(4) << A-ASSOCIATE-AC 2020-12-23 12:40:36,135 INFO [org.dcm4che3.net.Dimse] (EE-ManagedExecutorService-default-Thread-11) DCM4CHEE<-PACS-CONNECTOR(4) >> 1:C-FIND-RQ[pcid=1, prior=0 cuid=1.2.840.10008.5.1.4.1.2.2.1 - Study Root Query/Retrieve Information Model - FIND tsuid=1.2.840.10008.1.2 - Implicit VR Little Endian] 2020-12-23 12:40:36,139 INFO [org.dcm4chee.arc.query.scp.CommonCFindSCP] (EE-ManagedExecutorService-default-Thread-11) DCM4CHEE<-PACS-CONNECTOR(4): Process C-FIND RQ: (0008,0020) DA [] StudyDate (0008,0030) TM [] StudyTime (0008,0050) SH [] AccessionNumber (0008,0052) CS [STUDY] QueryRetrieveLevel (0008,0061) CS [] ModalitiesInStudy (0008,0090) PN [] ReferringPhysicianName (0008,1030) LO [] StudyDescription (0010,0010) PN [] PatientName (0010,0020) LO [2168068] PatientID (0010,0021) LO [VA_CARSto-4DI63] IssuerOfPatientID (0010,0030) DA [] PatientBirthDate (0010,0040) CS [] PatientSex (0020,000D) UI [] StudyInstanceUID (0020,0010) SH [] StudyID
2020-12-23 12:40:36,178 INFO [org.dcm4che3.net.Dimse] (EE-ManagedExecutorService-default-Thread-12) DCM4CHEE<-PACS-CONNECTOR(4) << 1:C-FIND-RSP[pcid=1, status=ff00H cuid=1.2.840.10008.5.1.4.1.2.2.1 - Study Root Query/Retrieve Information Model - FIND tsuid=1.2.840.10008.1.2 - Implicit VR Little Endian] 2020-12-23 12:40:36,180 INFO [org.dcm4che3.net.Dimse] (EE-ManagedExecutorService-default-Thread-12) DCM4CHEE<-PACS-CONNECTOR(4) << 1:C-FIND-RSP[pcid=1, status=0H cuid=1.2.840.10008.5.1.4.1.2.2.1 - Study Root Query/Retrieve Information Model - FIND tsuid=1.2.840.10008.1.2 - Implicit VR Little Endian] 2020-12-23 12:40:36,181 INFO [org.dcm4che3.net.Connection] (EE-ManagedExecutorService-default-Thread-2) Accept connection Socket[addr=/127.0.0.1,port=46381,localport=11112] 2020-12-23 12:40:36,182 INFO [org.dcm4che3.net.Association] (EE-ManagedExecutorService-default-Thread-11) DCM4CHEE<-PACS-CONNECTOR(4) >> A-RELEASE-RQ 2020-12-23 12:40:36,182 INFO [org.dcm4che3.net.Association] (EE-ManagedExecutorService-default-Thread-11) DCM4CHEE<-PACS-CONNECTOR(4) << A-RELEASE-RP 2020-12-23 12:40:36,211 INFO [org.dcm4che3.net.Association] (EE-ManagedExecutorService-default-Thread-13) DCM4CHEE<-PACS-CONNECTOR(5) >> A-ASSOCIATE-RQ 2020-12-23 12:40:36,212 INFO [org.dcm4che3.net.Association] (EE-ManagedExecutorService-default-Thread-13) DCM4CHEE<-PACS-CONNECTOR(5) << A-ASSOCIATE-AC 2020-12-23 12:40:36,213 INFO [org.dcm4che3.net.Dimse] (EE-ManagedExecutorService-default-Thread-13) DCM4CHEE<-PACS-CONNECTOR(5) >> 1:C-FIND-RQ[pcid=1, prior=0 cuid=1.2.840.10008.5.1.4.1.2.2.1 - Study Root Query/Retrieve Information Model - FIND tsuid=1.2.840.10008.1.2 - Implicit VR Little Endian] 2020-12-23 12:40:36,213 INFO [org.dcm4chee.arc.query.scp.CommonCFindSCP] (EE-ManagedExecutorService-default-Thread-13) DCM4CHEE<-PACS-CONNECTOR(5): Process C-FIND RQ: (0008,0052) CS [SERIES] QueryRetrieveLevel (0008,0060) CS [] Modality (0008,103E) LO [] SeriesDescription (0020,000D) UI [1.2.840.113619.2.358.3.2831172914.667.1504680361.584] StudyIns (0020,000E) UI [] SeriesInstanceUID (0020,0011) IS [] SeriesNumber
2020-12-23 12:40:36,234 INFO [org.dcm4che3.net.Association] (EE-ManagedScheduledExecutorService-default-Thread-5) DCM4CHEE<-PACS-CONNECTOR(4): close Socket[addr=localhost/127.0.0.1,port=54639,localport=11112] 2020-12-23 12:40:36,241 INFO [org.dcm4che3.net.Dimse] (EE-ManagedExecutorService-default-Thread-12) DCM4CHEE<-PACS-CONNECTOR(5) << 1:C-FIND-RSP[pcid=1, status=ff00H cuid=1.2.840.10008.5.1.4.1.2.2.1 - Study Root Query/Retrieve Information Model - FIND tsuid=1.2.840.10008.1.2 - Implicit VR Little Endian] 2020-12-23 12:40:36,245 INFO [org.dcm4che3.net.Dimse] (EE-ManagedExecutorService-default-Thread-12) DCM4CHEE<-PACS-CONNECTOR(5) << 1:C-FIND-RSP[pcid=1, status=0H cuid=1.2.840.10008.5.1.4.1.2.2.1 - Study Root Query/Retrieve Information Model - FIND tsuid=1.2.840.10008.1.2 - Implicit VR Little Endian] 2020-12-23 12:40:36,248 INFO [org.dcm4che3.net.Association] (EE-ManagedExecutorService-default-Thread-13) DCM4CHEE<-PACS-CONNECTOR(5) >> A-RELEASE-RQ 2020-12-23 12:40:36,249 INFO [org.dcm4che3.net.Association] (EE-ManagedExecutorService-default-Thread-13) DCM4CHEE<-PACS-CONNECTOR(5) << A-RELEASE-RP 2020-12-23 12:40:36,249 INFO [org.dcm4che3.net.Connection] (EE-ManagedExecutorService-default-Thread-2) Accept connection Socket[addr=/127.0.0.1,port=58409,localport=11112] 2020-12-23 12:40:36,260 INFO [org.dcm4che3.net.Association] (EE-ManagedExecutorService-default-Thread-13) DCM4CHEE<-PACS-CONNECTOR(6) >> A-ASSOCIATE-RQ 2020-12-23 12:40:36,261 INFO [org.dcm4che3.net.Association] (EE-ManagedExecutorService-default-Thread-13) DCM4CHEE<-PACS-CONNECTOR(6) << A-ASSOCIATE-AC 2020-12-23 12:40:36,262 INFO [org.dcm4che3.net.Dimse] (EE-ManagedExecutorService-default-Thread-13) DCM4CHEE<-PACS-CONNECTOR(6) >> 1:C-FIND-RQ[pcid=1, prior=0 cuid=1.2.840.10008.5.1.4.1.2.2.1 - Study Root Query/Retrieve Information Model - FIND tsuid=1.2.840.10008.1.2 - Implicit VR Little Endian] 2020-12-23 12:40:36,262 INFO [org.dcm4chee.arc.query.scp.CommonCFindSCP] (EE-ManagedExecutorService-default-Thread-13) DCM4CHEE<-PACS-CONNECTOR(6): Process C-FIND RQ: (0008,0018) UI [] SOPInstanceUID (0008,0052) CS [IMAGE] QueryRetrieveLevel (0020,000D) UI [1.2.840.113619.2.358.3.2831172914.667.1504680361.584] StudyIns (0020,000E) UI [1.2.840.113619.2.358.3.2831172914.667.1504680361.589.4] Series (0020,0013) IS [] InstanceNumber
2020-12-23 12:40:36,300 INFO [org.dcm4che3.net.Dimse] (EE-ManagedExecutorService-default-Thread-12) DCM4CHEE<-PACS-CONNECTOR(6) << 1:C-FIND-RSP[pcid=1, status=ff00H cuid=1.2.840.10008.5.1.4.1.2.2.1 - Study Root Query/Retrieve Information Model - FIND tsuid=1.2.840.10008.1.2 - Implicit VR Little Endian] 2020-12-23 12:40:36,304 INFO [org.dcm4che3.net.Association] (EE-ManagedScheduledExecutorService-default-Thread-4) DCM4CHEE<-PACS-CONNECTOR(5): close Socket[addr=localhost/127.0.0.1,port=46381,localport=11112] 2020-12-23 12:40:36,314 INFO [org.dcm4che3.net.Dimse] (EE-ManagedExecutorService-default-Thread-12) DCM4CHEE<-PACS-CONNECTOR(6) << 1:C-FIND-RSP[pcid=1, status=0H cuid=1.2.840.10008.5.1.4.1.2.2.1 - Study Root Query/Retrieve Information Model - FIND tsuid=1.2.840.10008.1.2 - Implicit VR Little Endian] 2020-12-23 12:40:36,321 INFO [org.dcm4che3.net.Association] (EE-ManagedExecutorService-default-Thread-13) DCM4CHEE<-PACS-CONNECTOR(6) >> A-RELEASE-RQ 2020-12-23 12:40:36,322 INFO [org.dcm4che3.net.Association] (EE-ManagedExecutorService-default-Thread-13) DCM4CHEE<-PACS-CONNECTOR(6) << A-RELEASE-RP 2020-12-23 12:40:36,325 INFO [stdout] (pool-14-thread-2) 2020-12-23 12:40:36,315 [ool-14-thread-2] INFO o.w.d.m.t.ManifestBuilder Build Manifest in 192 ms [id=2] 2020-12-23 12:40:36,372 INFO [org.dcm4che3.net.Association] (EE-ManagedScheduledExecutorService-default-Thread-7) DCM4CHEE<-PACS-CONNECTOR(6): close Socket[addr=localhost/127.0.0.1,port=58409,localport=11112]
In logs everything seems to be OK. The manifest is created.
The configuration of the URLs mentioned above is still wrong:
-IID_STUDY_URL=../../weasis-pacs-connector/weasis?&studyUID={{studyUID}}&target=_self&access_token={{access_token}}
+IID_PATIENT_URL=../../weasis-pacs-connector/weasis?patientID={{patientID}}&access_token={{access_token}}
-IID_PATIENT_URL=../../weasis-pacs-connector/weasis?&patientID={{patientID}}&target=_self&access_token={{access_token}}
+IID_STUDY_URL=../../weasis-pacs-connector/weasis?studyUID={{studyUID}}&access_token={{access_token}}
but it seems that importing URL from a Docker environment variable requires to escape '&'
IID_PATIENT_URL=../../weasis-pacs-connector/weasis?patientID={{patientID}}\&access_token={{access_token}}
IID_STUDY_URL=../../weasis-pacs-connector/weasis?studyUID={{studyUID}}\&access_token={{access_token}}
IID_URL_TARGET=_self
or try without weasis-pacs-connector:
IID_PATIENT_URL=weasis://$dicom:rs --url "{{qidoBaseURL}}{{qidoBasePath}}" -r "patientID={{patientID}}" --query-ext "\&includedefaults=false" -H "Authorization: Bearer {{access_token}}"
IID_STUDY_URL=weasis://$dicom:rs --url "{{qidoBaseURL}}{{qidoBasePath}}" -r "studyUID={{studyUID}}" --query-ext "\&includedefaults=false" -H "Authorization: Bearer {{access_token}}"
IID_URL_TARGET=_self
could u tell me where i check logs , manifest ? yes, i used in env file and also change now to what u sent but still have same issue not open weasis (query is ok )
I'm not sure that dcm4chee update the URLs from Docker environment variable, so could you provide here the values from dcm4chee: Configuration > Devices > dcm4chee-arc > Extensions > Edit extension > Child Objects > Web Applications > DCM4CHEE
this from UI as you refer IID_PATIENT_URL=../../weasis-pacs-connector/weasis?patientID={{patientID}}&access_token={{access_token}} IID_STUDY_URL=../../weasis-pacs-connector/weasis?studyUID={{studyUID}}&access_token={{access_token}} IID_URL_TARGET=_self
It seems correct.
So the problem is else where. Can you open weasis from https://nroduit.github.io/en/demo/
yes, it's work to open weasis if i install locally and click launch from demo page.
also, from d4c it open weasis and close without any open dicom image.
log file from my home ~/.weasis/log/boot-1.log
23.12.2020 13:49:43.405 INFO [main] org.weasis.launcher.ConfigData: Starting Weasis...
23.12.2020 13:49:43.493 INFO [main] org.weasis.launcher.ConfigData: Initialization of the launch configuration...
23.12.2020 13:49:43.493 INFO [main] org.weasis.launcher.ConfigData: Main arg 0 = weasis://%24dicom%3Aget%20-w%20https%3A%2F%2Fnroduit.github.io%2Fsamples%2Fdemo%2Fcomp
ression1.xml
23.12.2020 13:49:43.527 CONFIG [main] org.weasis.launcher.Singleton: Singleton server 45D86FE2 already running on port 46,357
23.12.2020 13:49:43.528 CONFIG [main] org.weasis.launcher.Singleton: Connect to 45D86FE2 on port 46,357
23.12.2020 13:51:59.497 INFO [main] org.weasis.launcher.ConfigData: Starting Weasis...
23.12.2020 13:51:59.584 INFO [main] org.weasis.launcher.ConfigData: Initialization of the launch configuration...
23.12.2020 13:51:59.585 INFO [main] org.weasis.launcher.ConfigData: Main arg 0 = weasis://%24dicom%3Aget+-w+%22https%3A%2F%2F192.168.1.7%3A8443%2Fweasis-pacs-connector
%2FRequestManifest%3Fid%3D4%22+%24weasis%3Aconfig++cdb%3D%22https%3A%2F%2F192.168.1.7%3A8443%2Fweasis%22+cdb-ext%3D%22https%3A%2F%2F192.168.1.7%3A8443%2Fweasis-ext%22+au
th%3D%22Bearer+eyJhbGciOiJSUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJrZUxqOVo3LVEwdFlabi1aRk44SXJnWEVHYUZIel9Gbm55U2pZaXdyQkVnIn0.eyJleHAiOjE2MDg3MjQ2MTgsImlhdCI6MTYwODcyND
MxOCwiYXV0aF90aW1lIjoxNjA4NzIxMDYzLCJqdGkiOiIxN2U4ZDNmMC03ODFhLTQwOTctYTQzNi1hYTQxMzVjYTM5YWEiLCJpc3MiOiJodHRwczovLzE5Mi4xNjguMS43Ojg4NDMvYXV0aC9yZWFsbXMvZGNtNGNoZSIsImF
1ZCI6WyJyZWFsbS1tYW5hZ2VtZW50IiwiYWNjb3VudCJdLCJzdWIiOiJkMzFhYzRjZi04NGVmLTQyNjgtOWEzZS0xOWVmOWVhNjUxM2IiLCJ0eXAiOiJCZWFyZXIiLCJhenAiOiJkY200Y2hlZS1hcmMtdWkiLCJub25jZSI6
ImI5YTI1YWY0LTUyYzktNGJhNS04N2RjLWM5MTZlZjM3OWU2OCIsInNlc3Npb25fc3RhdGUiOiI0ZDEyM2EzNi0xOTY1LTQ1MTAtYjc3ZC1mNmZjMDYzNmU2NzgiLCJhY3IiOiIwIiwiYWxsb3dlZC1vcmlnaW5zIjpbImh0d
HBzOi8vMTkyLjE2OC4xLjc6ODQ0MyIsImh0dHBzOi8vbG9jYWxob3N0Ojg0NDMiXSwicmVhbG1fYWNjZXNzIjp7InJvbGVzIjpbIkFETUlOSVNUUkFUT1IiLCJhdWRpdGxvZyIsImFkbWluIiwidXNlciJdfSwicmVzb3VyY2
VfYWNjZXNzIjp7InJlYWxtLW1hbmFnZW1lbnQiOnsicm9sZXMiOlsidmlldy1yZWFsbSIsInZpZXctaWRlbnRpdHktcHJvdmlkZXJzIiwibWFuYWdlLWlkZW50aXR5LXByb3ZpZGVycyIsImltcGVyc29uYXRpb24iLCJyZWF
sbS1hZG1pbiIsImNyZWF0ZS1jbGllbnQiLCJtYW5hZ2UtdXNlcnMiLCJxdWVyeS1yZWFsbXMiLCJ2aWV3LWF1dGhvcml6YXRpb24iLCJxdWVyeS1jbGllbnRzIiwicXVlcnktdXNlcnMiLCJtYW5hZ2UtZXZlbnRzIiwibWFu
YWdlLXJlYWxtIiwidmlldy1ldmVudHMiLCJ2aWV3LXVzZXJzIiwidmlldy1jbGllbnRzIiwibWFuYWdlLWF1dGhvcml6YXRpb24iLCJtYW5hZ2UtY2xpZW50cyIsInF1ZXJ5LWdyb3VwcyJdfSwiYWNjb3VudCI6eyJyb2xlc
yI6WyJtYW5hZ2UtYWNjb3VudCIsIm1hbmFnZS1hY2NvdW50LWxpbmtzIiwidmlldy1wcm9maWxlIl19fSwic2NvcGUiOiJvcGVuaWQgZW1haWwgcHJvZmlsZSIsImVtYWlsX3ZlcmlmaWVkIjpmYWxzZSwicHJlZmVycmVkX3
VzZXJuYW1lIjoiYWRtaW4iLCJnaXZlbl9uYW1lIjoiIiwiZmFtaWx5X25hbWUiOiIifQ.Gq1tXZ_XivDddgBNTsktHguudawBGG4dJuv8X9YryMiNvRvNkdZnYezijhVOBdb_Bevq6bsBmKuHvBjcSirR3FJPupKfnmYkLRRy
wpBmRSxYX7WMo08aiB-ewTeynv8hVfO2-OrbUxbwi2ufdBHlum_BGtQ1XFR3X1PIDaqueVsRNg2Viy7mZ_pT4lRkFhjL00fnjl2Ha5Fp1GB7wQZSrupAcIuusNj7ASFDoODdbLdiDNLTlthgFmliAciO0FBQEixreNUUapHDi
bE6yyAbG_0m0-T9YhtWoL7Vuo9Dv6gzTNQd1l17DtqGSrmGd_4Ud5Vu0ce4NA9oTawqBAYquQ%22
23.12.2020 13:52:00.118 SEVERE [main] org.weasis.launcher.WeasisLauncher: Cannot read properties file: https://192.168.1.7:8443/weasis/conf/config.properties
javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to re
quested target
at java.base/sun.security.ssl.Alert.createSSLException(Unknown Source)
at java.base/sun.security.ssl.TransportContext.fatal(Unknown Source)
at java.base/sun.security.ssl.TransportContext.fatal(Unknown Source)
at java.base/sun.security.ssl.TransportContext.fatal(Unknown Source)
at java.base/sun.security.ssl.CertificateMessage$T12CertificateConsumer.checkServerCerts(Unknown Source)
at java.base/sun.security.ssl.CertificateMessage$T12CertificateConsumer.onCertificate(Unknown Source)
at java.base/sun.security.ssl.CertificateMessage$T12CertificateConsumer.consume(Unknown Source)
at java.base/sun.security.ssl.SSLHandshake.consume(Unknown Source)
at java.base/sun.security.ssl.HandshakeContext.dispatch(Unknown Source)
at java.base/sun.security.ssl.HandshakeContext.dispatch(Unknown Source)
at java.base/sun.security.ssl.TransportContext.dispatch(Unknown Source)
at java.base/sun.security.ssl.SSLTransport.decode(Unknown Source)
at java.base/sun.security.ssl.SSLSocketImpl.decode(Unknown Source)
at java.base/sun.security.ssl.SSLSocketImpl.readHandshakeRecord(Unknown Source)
at java.base/sun.security.ssl.SSLSocketImpl.startHandshake(Unknown Source)
at java.base/sun.security.ssl.SSLSocketImpl.startHandshake(Unknown Source)
at java.base/sun.net.www.protocol.https.HttpsClient.afterConnect(Unknown Source)
at java.base/sun.net.www.protocol.https.AbstractDelegateHttpsURLConnection.connect(Unknown Source)
at java.base/sun.net.www.protocol.http.HttpURLConnection.getInputStream0(Unknown Source)
at java.base/sun.net.www.protocol.http.HttpURLConnection.getInputStream(Unknown Source)
at java.base/sun.net.www.protocol.https.HttpsURLConnectionImpl.getInputStream(Unknown Source)
at org.weasis.launcher.WeasisLauncher.readProperties(WeasisLauncher.java:650)
at org.weasis.launcher.ConfigData.loadConfigProperties(ConfigData.java:623)
at org.weasis.launcher.ConfigData.init(ConfigData.java:125)
at org.weasis.launcher.ConfigData.
Read the last item of Warning box
i know last issue from certificate but if remove weasis locally and run from dcm4chee not open weasis viewer.
This is an expected behavior. If you replace 'weasis' by 'viewer' in the URLs it will used Java Webstart (not recommended and requires an installation of Java 8 on the client).
Some more information:
Thanks for reply but still have issue, how can i debug.
Which issue?
Not open weais viewer from dcm4chee if remove weasis from local machine.
As I said above it is an expected behavior when using weasis-protocol.
so, it's issue from dcm4chee side ?
It is not an issue but a requirement. The 'weasis://' URI must be registered with a local installation of Weasis.
so, if i not install weasis locally we can not open viewer right ?
Yes, if you are on Windows, it should suggest an App from the Microsoft Store where Weasis is registered.
It works in the same way as you smart phone when requiring a specific application.
thanks for your time .
i am sorry for more interruption i installed weasis locally and when i use IID_STUDY_URL=../../weasis-pacs-connector/weasis://$dicom:rs --url "{{qidoBaseURL}}{{qidoBasePath}}" -r "patientID={{patientID}}" --query-ext "&includedefaults=false" IID_PATIENT_URL=../../weasis-pacs-connector/weasis://$dicom:rs --url "{{qidoBaseURL}}{{qidoBasePath}}" -r "patientID={{patientID}}" --query-ext "&includedefaults=false" IID_URL_TARGET=_self not open viewer but if i use IID_STUDY_URL=weasis://$dicom:rs --url "{{qidoBaseURL}}{{qidoBasePath}}" -r "patientID={{patientID}}" --query-ext "&includedefaults=false" IID_PATIENT_URL=weasis://$dicom:rs --url "{{qidoBaseURL}}{{qidoBasePath}}" -r "patientID={{patientID}}" --query-ext "&includedefaults=false" IID_URL_TARGET=_self it's work can you clarify why ?
weasis-pacs-connector is a service that generates the launch configuration and the xml manifest for the images. So you need to follow the syntax described here.
The second configuration is a direct configuration of the launcher inside the URI (with parameters that are injected by dcm4chee or other PACS) and the XML is build on the client side (from Weasis 3.6.0). If you do not have specific needs you should use this configuration.
Weais viewer not running but query reach to dcm4chee steps : 1- deploy weasis.war,weasis-pacs-connector.war to wildlfy using http configure dcm4chee by adding IID_PATIENT_URL=../../weasis-pacs-connector/weasis?&patientID={}&target=_self IID_STUDY_URL=../../weasis-pacs-connector/weasis?&studyUID={}&target=_self
Also for IID_PATIENT_URL=http://localhost:8080/weasis-pacs-connector/weasis://$dicom:rs --url "http://192.168.1.7:8080/dcm4chee-arc/aets/DCM4CHEE/rs/studies" -r "\&patientID=2168068" -r " --query-ext "\&includedefaults=false" IID_STUDY_URL=http://localhost:8080/weasis-pacs-connector/weasis://$dicom:rs --url "http://192.168.1.7:8080/dcm4chee-arc/aets/DCM4CHEE/rs/studies" -r "\&studyID=1.2.840.113619.2.358.3.2831172914.667.1504680361.584" -r " --query-ext "\&includedefaults=false" Not query or open weasis viewer
also, how to enable logging in log server of dcm4chee arc (jboss wildfly) for weasis and weasis-pacs-connector
For dcm4hcee secure version 5.22.6 if i install weasis viewer locally (.deb package) : if using http it open and running but if calling using https it open without any images and give error "issue for certificate is : error in loading xml maifest from https://URL:8443/weasis-pacs-connector/RequestManifest?id=13" "server response : javax.net.ssl.sshHandshakeException: PKIX path building failed: sun.security.provider.certpath"