docker-compose.yaml 3.3 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859
  1. {% set tpl = ix_lib.base.render.Render(values) %}
  2. {% set proto = "https" if values.network.certificate_id else "http" %}
  3. {% set internal_port = values.consts.internal_https_port if values.network.certificate_id else values.consts.internal_http_port %}
  4. {% set perm_container = tpl.deps.perms(values.consts.perms_container_name) %}
  5. {% set mariadb_config = {
  6. "user": values.consts.db_user,
  7. "root_password": values.passbolt.db_root_password,
  8. "password": values.passbolt.db_password,
  9. "database": values.consts.db_name,
  10. "volume": values.storage.mariadb_data,
  11. } %}
  12. {% set mariadb_container = tpl.deps.mariadb(values.consts.mariadb_container_name, "mariadb_image", mariadb_config, perm_container) %}
  13. {% set perms_config = {"uid": values.consts.passbolt_run_user, "gid": values.consts.passbolt_run_group, "mode": "check"} %}
  14. {% set c1 = tpl.add_container(values.consts.passbolt_container_name, "image") %}
  15. {% do c1.set_user(values.consts.passbolt_run_user, values.consts.passbolt_run_group) %}
  16. {% do c1.depends.add_dependency(values.consts.mariadb_container_name, "service_healthy") %}
  17. {% do c1.healthcheck.set_test("curl", {"port": internal_port, "scheme": proto, "path": "/healthcheck/status"}) %}
  18. {% do c1.environment.add_env("DATASOURCES_DEFAULT_HOST", values.consts.mariadb_container_name) %}
  19. {% do c1.environment.add_env("DATASOURCES_DEFAULT_DATABASE", values.consts.db_name) %}
  20. {% do c1.environment.add_env("DATASOURCES_DEFAULT_USERNAME", values.consts.db_user) %}
  21. {% do c1.environment.add_env("DATASOURCES_DEFAULT_PASSWORD", values.passbolt.db_password) %}
  22. {% do c1.environment.add_env("DATASOURCES_DEFAULT_PORT", 3306) %}
  23. {% do c1.environment.add_env("GNUPGHOME", "/var/lib/passbolt/.gnupg") %}
  24. {% do c1.environment.add_env("PASSBOLT_GPG_SERVER_KEY_PUBLIC", "%s/serverkey.asc" | format(values.consts.gpg_path)) %}
  25. {% do c1.environment.add_env("PASSBOLT_GPG_SERVER_KEY_PRIVATE", "%s/serverkey_private.asc" | format(values.consts.gpg_path)) %}
  26. {% do c1.environment.add_env("APP_FULL_BASE_URL", values.passbolt.app_url) %}
  27. {% do c1.environment.add_user_envs(values.passbolt.additional_envs) %}
  28. {% if values.network.certificate_id %}
  29. {% set cert = values.ix_certificates[values.network.certificate_id] %}
  30. {% do c1.configs.add("private", cert.privatekey, "/etc/passbolt/certs/certificate.key") %}
  31. {% do c1.configs.add("public", cert.certificate, "/etc/passbolt/certs/certificate.crt") %}
  32. {% endif %}
  33. {% do c1.add_port(values.network.web_port, {"container_port": internal_port}) %}
  34. {% do c1.add_storage(values.consts.gpg_path, values.storage.gpg) %}
  35. {% do perm_container.add_or_skip_action("gpg", values.storage.gpg, perms_config) %}
  36. {% do c1.add_storage("/etc/passbolt/jwt", values.storage.jwt) %}
  37. {% do perm_container.add_or_skip_action("jwt", values.storage.jwt, perms_config) %}
  38. {% for store in values.storage.additional_storage %}
  39. {% do c1.add_storage(store.mount_path, store) %}
  40. {% endfor %}
  41. {% if perm_container.has_actions() %}
  42. {% do perm_container.activate() %}
  43. {% do c1.depends.add_dependency(values.consts.perms_container_name, "service_completed_successfully") %}
  44. {% do mariadb_container.container.depends.add_dependency(values.consts.perms_container_name, "service_completed_successfully") %}
  45. {% endif %}
  46. {% do tpl.portals.add(values.network.web_port, {"scheme": proto}) %}
  47. {% do tpl.notes.set_body(values.consts.notes_body) %}
  48. {{ tpl.render() | tojson }}