docker-compose.yaml 2.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657
  1. {% set tpl = ix_lib.base.render.Render(values) %}
  2. {% set proto = "https" if values.network.certificate_id else "http" %}
  3. {% set c1 = tpl.add_container(values.consts.elastic_container_name, "image") %}
  4. {% set perm_container = tpl.deps.perms(values.consts.perms_container_name) %}
  5. {% set perms_config = {"uid": values.consts.user_id, "gid": values.consts.group_id, "mode": "check"} %}
  6. {% do c1.set_user(values.consts.user_id, values.consts.group_id) %}
  7. {% do c1.healthcheck.set_test("curl", {
  8. "port": values.network.web_port.port_number, "path": "/_cluster/health?local=true",
  9. "scheme": proto, "headers": [("Authorization", tpl.funcs.basic_auth_header("elastic", values.elastic.password))]
  10. }) %}
  11. {% do c1.environment.add_env("ES_HEAP_SIZE", values.elastic.heap_size) %}
  12. {% do c1.environment.add_env("ELASTIC_PASSWORD", values.elastic.password) %}
  13. {% do c1.environment.add_env("ES_SETTING_HTTP_PORT", values.network.web_port.port_number) %}
  14. {% do c1.environment.add_env("ES_SETTING_NODE_NAME", values.elastic.node_name) %}
  15. {% do c1.environment.add_env("ES_SETTING_DISCOVERY_TYPE", "single-node") %}
  16. {% do c1.environment.add_env("ES_SETTING_XPACK_SECURITY_ENABLED", true) %}
  17. {% do c1.environment.add_env("ES_SETTING_XPACK_SECURITY_TRANSPORT_SSL_ENABLED", false) %}
  18. {% if values.network.certificate_id %}
  19. {% set cert = values.ix_certificates[values.network.certificate_id] %}
  20. {% do c1.configs.add("private", cert.privatekey, values.consts.tls_key_path) %}
  21. {% do c1.configs.add("public", cert.certificate, values.consts.tls_cert_path) %}
  22. {% do c1.configs.add("public", cert.certificate, values.consts.tls_ca_path) %}
  23. {% do c1.environment.add_env("ES_SETTING_XPACK_SECURITY_HTTP_SSL_ENABLED", true) %}
  24. {% do c1.environment.add_env("ES_SETTING_XPACK_SECURITY_HTTP_SSL_KEY", values.consts.tls_key_path) %}
  25. {% do c1.environment.add_env("ES_SETTING_XPACK_SECURITY_HTTP_SSL_CERTIFICATE", values.consts.tls_cert_path) %}
  26. {% do c1.environment.add_env("ES_SETTING_XPACK_SECURITY_HTTP_SSL_CERTIFICATE__AUTHORITIES", values.consts.tls_ca_path) %}
  27. {% endif %}
  28. {% do c1.environment.add_user_envs(values.elastic.additional_envs) %}
  29. {% do c1.add_port(values.network.web_port) %}
  30. {% do c1.add_storage("/usr/share/elasticsearch/config/certs", {"type": "anonymous"}) %}
  31. {% do c1.add_storage("/usr/share/elasticsearch/data", values.storage.data) %}
  32. {% do perm_container.add_or_skip_action("data", values.storage.data, perms_config) %}
  33. {% for store in values.storage.additional_storage %}
  34. {% do c1.add_storage(store.mount_path, store) %}
  35. {% do perm_container.add_or_skip_action(store.mount_path, store, perms_config) %}
  36. {% endfor %}
  37. {% if perm_container.has_actions() %}
  38. {% do perm_container.activate() %}
  39. {% do c1.depends.add_dependency(values.consts.perms_container_name, "service_completed_successfully") %}
  40. {% endif %}
  41. {% do tpl.portals.add(values.network.web_port, {"scheme": proto}) %}
  42. {% do tpl.notes.set_body(values.consts.notes_body) %}
  43. {{ tpl.render() | tojson }}