docker-compose.yaml 2.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960
  1. {% set tpl = ix_lib.base.render.Render(values) %}
  2. {% do tpl.funcs.require_no_reserved(values.rest_server.extra_options, "Extra Options", values.consts.reserved_options, starts_with=true) %}
  3. {% set c1 = tpl.add_container(values.consts.restic_rest_container_name, "image") %}
  4. {% set perm_container = tpl.deps.perms(values.consts.perms_container_name) %}
  5. {% set perms_config = {"uid": values.run_as.user, "gid": values.run_as.group, "mode": "check"} %}
  6. {% set scheme = "https" if values.network.certificate_id else "http" %}
  7. {% do c1.set_user(values.run_as.user, values.run_as.group) %}
  8. {% do c1.healthcheck.set_custom_test("pgrep rest-server") %}
  9. {% set options = namespace(x=[
  10. "--listen=:%d"|format(values.network.web_port.port_number),
  11. "--append-only=%s"|format(values.rest_server.append_only|string|lower),
  12. "--group-accessible-repos=%s"|format(values.rest_server.group_accessible_repos|string|lower),
  13. "--private-repos=%s"|format(values.rest_server.private_repos|string|lower),
  14. ]) %}
  15. {% if values.network.certificate_id %}
  16. {% set cert = values.ix_certificates[values.network.certificate_id] %}
  17. {% do c1.configs.add("private", cert.privatekey, values.consts.ssl_key_path) %}
  18. {% do c1.configs.add("public", cert.certificate, values.consts.ssl_cert_path) %}
  19. {% do options.x.extend(["--tls=true", "--tls-key=%s"|format(values.consts.ssl_key_path), "--tls-cert=%s"|format(values.consts.ssl_cert_path)]) %}
  20. {% endif %}
  21. {% if values.rest_server.no_auth %}
  22. {% do options.x.append("--no-auth") %}
  23. {% elif values.rest_server.users %}
  24. {% set users = namespace(x=[]) %}
  25. {% for user in values.rest_server.users %}
  26. {% do users.x.append(tpl.funcs.htpasswd(user.username, user.password)) %}
  27. {% endfor %}
  28. {% do c1.configs.add("htpasswd", users.x | join("\n"), values.consts.htpasswd_path) %}
  29. {% do c1.environment.add_env("PASSWORD_FILE", values.consts.htpasswd_path) %}
  30. {% elif values.rest_server.proxy_auth_username %}
  31. {% do options.x.extend(["--proxy-auth-username", values.rest_server.proxy_auth_username]) %}
  32. {% endif %}
  33. {% do options.x.extend(values.rest_server.extra_options) %}
  34. {% do c1.environment.add_env("OPTIONS", options.x | join(" ")) %}
  35. {% do c1.environment.add_env("DATA_DIRECTORY", values.consts.data_path) %}
  36. {% do c1.add_port(values.network.web_port) %}
  37. {% do c1.add_storage(values.consts.data_path, values.storage.data) %}
  38. {% do perm_container.add_or_skip_action("data", values.storage.data, perms_config) %}
  39. {% for store in values.storage.additional_storage %}
  40. {% do c1.add_storage(store.mount_path, store) %}
  41. {% do perm_container.add_or_skip_action(store.mount_path, store, perms_config) %}
  42. {% endfor %}
  43. {% if perm_container.has_actions() %}
  44. {% do perm_container.activate() %}
  45. {% do c1.depends.add_dependency(values.consts.perms_container_name, "service_completed_successfully") %}
  46. {% endif %}
  47. {{ tpl.render() | tojson }}