This webapp provides a frontend interface for annotating AI generated output.
Project description
LX-Annotate
LX-Annotate is a Django + Vue application for annotating AI-generated outputs, with a media ingestion pipeline for videos and PDFs. This project was created by a team at Universitätsklinikum Würzburg, Bavaria.
Highlights
- Django backend with REST APIs and optional OIDC authentication
- Vue 3 SPA frontend integrated with Django via
django-vite - File watcher for automated video and PDF processing
- Reproducible environments via
devenv/Nix and Docker
Repository Layout
lx_annotate/Django app and settingsfrontend/Vue 3 applicationscripts/operational tooling and file watcher scriptsdata/runtime data (raw videos, PDFs, model cache)conf_template/sample configuration templatescontainer/Dockerfiles and container docs
Requirements
- Python 3.12
- Node.js 18+ (frontend)
- PostgreSQL (main app)
- Optional:
uv,direnv,devenv, Nix, Docker
Quick Start (Development)
direnv allow(if you usedevenv)uv sync(or install dependencies withpip)cp conf_template/default.env .envand update valuesexport DJANGO_SETTINGS_MODULE=lx_annotate.settings.settings_devpython manage.py load_base_db_datapython manage.py runserver
Open http://127.0.0.1:8000/.
Environment Variables and Secrets
Production secrets are typically injected by the host system.
For local development, use either secretspec.toml defaults or a local .env file.
Do not commit secrets. secretspec.toml is tracked in git.
Example:
direnv allow
secretspec --provider dotenv --profile development python manage.py runserver
See https://secretspec.dev/ for details.
Frontend
cd frontend
npm install
npm run build
Hot-reload development:
cd frontend
npm run dev
In another terminal:
export DJANGO_SETTINGS_MODULE=lx_annotate.settings.settings_dev
python manage.py runserver
File Watcher
The file watcher ingests media placed in:
data/import/video_import/data/import/report_import/
./scripts/start_filewatcher.sh dev
# or
python scripts/file_watcher.py
Configuration
- Development
.envis read from the repository root or~/.local/share/lx-annotate/.env. - Settings are driven by environment variables (see
secretspec.tomldefaults). - Sample configs live in
conf_template/.
Nix Builds
Nix build targets are available, but deployment paths may still need project-specific adjustments.
nix build .#prod-server
./result/bin/run-prod-server
nix build .#file-watcher
./result/bin/run-file-watcher
The repository flake also exposes the existing devenv environment as a Nix
dev shell:
nix develop --no-pure-eval
This evaluates devenv.nix through
the top-level flake.nix, so the same shell can be entered either with
devenv/direnv or directly through nix develop.
Wheel Deployment
The CI pipeline can now build a production wheel with frontend staticfiles
included via hatchling. Production runtime no longer needs Node.js or the
full devenv shell.
The current deployment strategy is:
- CI builds frontend assets and packages the app as a wheel
- production installs that wheel into a Python virtualenv
- host packages provide FFmpeg, Tesseract, and shared libraries
systemdruns Daphne and the file watcher as separate services- LuxNix deployments can also run a SAP IS-H import path/unit pair that converts dropped SAP zip exports into watcher-ready preanonymized files
- some legacy-to-runtime cutovers also run a one-shot data recovery service
- Nginx serves static/media files directly
Runtime layout is intentionally split:
- runtime code and the Python virtualenv live under the service user home
- runtime data, media, staticfiles, and
.env.systemdlive under/var/lib/lx-annotate
This split is required for the next hardening step: encrypting the data path and
restricting access to the endoreg-service-user while keeping application code
and deployment mechanics separate from protected patient data.
The canonical runtime variable for this boundary is
LX_ANNOTATE_ENCRYPTED_DATA_DIR. The app and current service wrappers still
export LX_ANNOTATE_DATA_DIR as a compatibility alias in some places, so the
environment is functional but not fully cleaned up yet.
Current runtime path roles:
LX_ANNOTATE_ENCRYPTED_DATA_DIR: canonical protected runtime rootLX_ANNOTATE_DATA_DIR: compatibility alias for the same rootDATA_DIR: legacy compatibility alias for the same rootSTORAGE_DIR: managed storage subtree, usually${LX_ANNOTATE_ENCRYPTED_DATA_DIR}/storageIO_DIR: import/export/workflow subtree root, currently still inside the protected root
New deployment code should anchor path derivation on
LX_ANNOTATE_ENCRYPTED_DATA_DIR and treat the other variables as derived paths
or compatibility aliases rather than separate roots.
For application-layer envelope encryption, lx_annotate also ships an opt-in
Django storage backend at lx_annotate.storage.encrypted.EncryptedStorage.
Enable it with LX_ANNOTATE_USE_ENCRYPTED_STORAGE=1 and provide
LX_ANNOTATE_MASTER_KEY or LX_ANNOTATE_MASTER_KEY_FILE. The backend generates
a per-file DEK, wraps it with the service-level KEK, writes ciphertext only
under LX_ANNOTATE_ENCRYPTED_DATA_DIR, and encrypts/decrypts in chunks so large
video uploads do not have to fit into memory. The KEK is intentionally
service-scoped rather than tied to a Keycloak session so background workers such
as manage.py run_filewatcher can still process stored files.
Encryption itself should not be implemented by generating random keys inside the application process. The app only consumes the mounted/unlocked path. Key management and unlock policy belong in a dedicated LuxNix service or external secrets/KMS layer.
For the architecture and mode selection details, see
docs/guides/deployment-strategy.md.
Deployment assets live in deploy/:
deploy/bootstrap-host.shdeploy/deploy.shdeploy/lx-annotate.servicedeploy/.env.systemd.example
See docs/guides/wheel-deployment.md for the full host bootstrap and systemd
flow.
For the current production-style service environment, including the
repo-local-data to /var/lib/lx-annotate/data recovery flow and the SAP IS-H
drop-to-watcher import path, see docs/guides/deployment-strategy.md.
Containers
Docker images now install Python packages into /app/.devenv/state/venv so the
container path matches the repository's preferred virtualenv layout.
This does not mean Docker runs the full Nix/devenv shell. Inside the
container, uv creates and manages the environment at that path, and the image
PATH is configured to use /app/.devenv/state/venv/bin.
See container/README.md for development and production Docker usage.
Tests
pytest
cd frontend
npm run test:unit
License
MIT. See LICENSE.
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file lx_annotate-0.0.5.tar.gz.
File metadata
- Download URL: lx_annotate-0.0.5.tar.gz
- Upload date:
- Size: 34.6 MB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.2.0 CPython/3.12.12
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
6396dfd5721e40a15890bc7b88d938a990595fb4f1c38592bc60a652afc85b7c
|
|
| MD5 |
4ac829dcd2fdd4b6ca27d661dc72fe24
|
|
| BLAKE2b-256 |
2bdaea7f7bdcb805b8a9313c4e7f0e8ea6d92a358192385f5cc180a287b86585
|
File details
Details for the file lx_annotate-0.0.5-py3-none-any.whl.
File metadata
- Download URL: lx_annotate-0.0.5-py3-none-any.whl
- Upload date:
- Size: 35.1 MB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.2.0 CPython/3.12.12
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
104a3b4a518658b8b7345e3674a89d576092ebfc5a28e71ee1b0989b3c734e0e
|
|
| MD5 |
955db871539988fcecbdb82c4ecb1e72
|
|
| BLAKE2b-256 |
d549bc31fd7dda75dee93a852579ee8fe502c6b7d33085a31effe3e8e0b41592
|