docker-compose.yaml 2.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051
  1. {% set tpl = ix_lib.base.render.Render(values) %}
  2. {% set c1 = tpl.add_container(values.consts.notifiarr_container_name, "image") %}
  3. {% set perm_container = tpl.deps.perms(values.consts.perms_container_name) %}
  4. {% set perms_config = {"uid": values.run_as.user, "gid": values.run_as.group, "mode": "check"} %}
  5. {% set proto = "https" if values.network.certificate_id else "http" %}
  6. {% do c1.set_user(values.run_as.user, values.run_as.group) %}
  7. {% if values.notifiarr.monitor_disks %}{% do c1.set_privileged(true) %}{% endif %}
  8. {% do c1.set_hostname(values.notifiarr.hostname) %}
  9. {% do c1.healthcheck.set_custom_test(["CMD", "/notifiarr", "--curl", "http://localhost:%d"|format(values.network.web_port.port_number)]) %}
  10. {% do c1.environment.add_env("DN_MODE", "production") %}
  11. {% do c1.environment.add_env("DN_AUTO_UPDATE", false) %}
  12. {% do c1.environment.add_env("DN_BIND_ADDR", "0.0.0.0:%d"|format(values.network.web_port.port_number)) %}
  13. {% do c1.environment.add_env("DN_API_KEY", values.notifiarr.api_key) %}
  14. {% if values.network.certificate_id %}
  15. {% do c1.environment.add_env("DN_SSL_KEY_FILE", values.consts.ssl_key_path) %}
  16. {% do c1.environment.add_env("DN_SSL_CERT_FILE", values.consts.ssl_cert_path) %}
  17. {% set cert = values.ix_certificates[values.network.certificate_id] %}
  18. {% do c1.configs.add("private", cert.privatekey, values.consts.ssl_key_path) %}
  19. {% do c1.configs.add("public", cert.certificate, values.consts.ssl_cert_path) %}
  20. {% endif %}
  21. {% do c1.environment.add_user_envs(values.notifiarr.additional_envs) %}
  22. {% do c1.add_port(values.network.web_port) %}
  23. {% do c1.add_storage("/config", values.storage.config) %}
  24. {% do perm_container.add_or_skip_action("config", values.storage.config, perms_config) %}
  25. {% if values.notifiarr.mount_utmp %}
  26. {% do c1.add_storage("/var/run/utmp", {"type": "host_path", "host_path_config": {"path": "/var/run/utmp", "read_only": true}}) %}
  27. {% endif %}
  28. {% for store in values.storage.additional_storage %}
  29. {% do c1.add_storage(store.mount_path, store) %}
  30. {% do perm_container.add_or_skip_action(store.mount_path, store, perms_config) %}
  31. {% endfor %}
  32. {% if perm_container.has_actions() %}
  33. {% do perm_container.activate() %}
  34. {% do c1.depends.add_dependency(values.consts.perms_container_name, "service_completed_successfully") %}
  35. {% endif %}
  36. {% do tpl.portals.add(values.network.web_port, {"scheme": proto}) %}
  37. {{ tpl.render() | tojson }}