It is a simple static web server that exposes Orthanc's Stone Web Viewer files from front folder, simulates some Orthanc's responses to hack the viewer and redirects the DICOM WADO requests to another endpoint. It can be used with any PACSs that supports DICOM WADO standard.
- Install Rust: https://www.rust-lang.org/tools/install
- Install NodeJS: https://nodejs.org
- Execute build script:
$ sh build.sh
- Use the .deb package from
/target/release/pstone_0.1.0.deb
.# dpkg -i pstone_0.1.0.deb
- Install Rust: https://www.rust-lang.org/tools/install
- Install NodeJS: https://nodejs.org
- Install JRSoftware Inno Setup: https://jrsoftware.org/isinfo.php
- Set the correct Inno Setup path value
INNO_DIR
in/build/.env
file. - Execute build script:
C:\>build.bat
- Use the installer program from
/target/release/pstone_0.1.0.exe
.
The service starts on boot. You can setup application using the config.yaml located in the same folder where the app runs.
Default Path:
- Windows =
C:\Program Files\PStone
- Ubuntu =
/usr/local/pstone
Setup config.yaml
:
# IP address of the server.
bindIp: "0.0.0.0"
# Port of the server.
port: 3000
# PACS type. (Only available Proteus PACS)
pacs: proteus
# PACS WADO endpoint.
pacsUrl: "http://127.0.0.1:8080/api/v1/"
# PACS Accept Invalid Certs for https local connection.
pacsInvalidCerts: false
# DICOM study download option. (Only available for Proteus PACS)
archive:
proteus:
token: "XXXXXXX"
# Data sent to Stone Web Viewer to identify PACS.
system:
apiVersion: 16
checkRevisions: false
databaseBackendPlugin: ~
dicomAet: "ORTHANC"
dicomPort: 4242
httpPort: 8042
isHttpServerSecure: true
name: "Orthanc Gateway"
pluginEnabled: true
storageAreaPlugin: ~
version: "1.10.1"
# TLS for listening server.
tls:
enabled: false
certs: ""
key: ""
This code is licensed under the Affero General Public License the same as Orthanc Web Viewer's license.