docker-compose.yaml 6.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134
  1. {% set tpl = ix_lib.base.render.Render(values) %}
  2. {% set server = tpl.add_container(values.consts.server_container_name, "image") %}
  3. {% set worker = tpl.add_container(values.consts.worker_container_name, "image") %}
  4. {% set perm_container = tpl.deps.perms(values.consts.perms_container_name) %}
  5. {% set perm_config = {"uid": values.run_as.user, "gid": values.run_as.group, "mode": "check"} %}
  6. {% set pg_config = {
  7. "user": values.consts.db_user,
  8. "password": values.authentik.db_password,
  9. "database": values.consts.db_name,
  10. "volume": values.storage.postgres_data,
  11. } %}
  12. {% set postgres = tpl.deps.postgres(
  13. values.consts.postgres_container_name,
  14. values.authentik.postgres_image_selector,
  15. pg_config, perm_container
  16. ) %}
  17. {% set redis_config = {
  18. "password": values.authentik.redis_password,
  19. "volume": {"type": "temporary", "volume_config": {"volume_name": "redis-data"}},
  20. } %}
  21. {% set redis = tpl.deps.redis(values.consts.redis_container_name, "redis_image", redis_config, perm_container) %}
  22. {% do server.set_command(["server"]) %}
  23. {% do worker.set_command(["worker"]) %}
  24. {% do server.set_user(values.run_as.user, values.run_as.group) %}
  25. {% do worker.set_user(values.run_as.user, values.run_as.group) %}
  26. {% do server.healthcheck.set_custom_test("/lifecycle/ak healthcheck") %}
  27. {% do worker.healthcheck.set_custom_test("/lifecycle/ak healthcheck") %}
  28. {% do server.depends.add_dependency(values.consts.postgres_container_name, "service_healthy") %}
  29. {% do worker.depends.add_dependency(values.consts.postgres_container_name, "service_healthy") %}
  30. {% do server.depends.add_dependency(values.consts.redis_container_name, "service_healthy") %}
  31. {% do worker.depends.add_dependency(values.consts.redis_container_name, "service_healthy") %}
  32. {% do server.environment.add_env("AUTHENTIK_LISTEN__HTTP", "0.0.0.0:%d"|format(values.network.http_port.port_number)) %}
  33. {% do server.environment.add_env("AUTHENTIK_LISTEN__HTTPS", "0.0.0.0:%d"|format(values.network.https_port.port_number)) %}
  34. {% do server.environment.add_env("AUTHENTIK_POSTGRESQL__HOST", values.consts.postgres_container_name) %}
  35. {% do worker.environment.add_env("AUTHENTIK_POSTGRESQL__HOST", values.consts.postgres_container_name) %}
  36. {% do server.environment.add_env("AUTHENTIK_POSTGRESQL__PORT", 5432) %}
  37. {% do worker.environment.add_env("AUTHENTIK_POSTGRESQL__PORT", 5432) %}
  38. {% do server.environment.add_env("AUTHENTIK_POSTGRESQL__NAME", values.consts.db_name) %}
  39. {% do worker.environment.add_env("AUTHENTIK_POSTGRESQL__NAME", values.consts.db_name) %}
  40. {% do server.environment.add_env("AUTHENTIK_POSTGRESQL__USER", values.consts.db_user) %}
  41. {% do worker.environment.add_env("AUTHENTIK_POSTGRESQL__USER", values.consts.db_user) %}
  42. {% do server.environment.add_env("AUTHENTIK_POSTGRESQL__PASSWORD", values.authentik.db_password) %}
  43. {% do worker.environment.add_env("AUTHENTIK_POSTGRESQL__PASSWORD", values.authentik.db_password) %}
  44. {% do server.environment.add_env("AUTHENTIK_REDIS__HOST", values.consts.redis_container_name) %}
  45. {% do worker.environment.add_env("AUTHENTIK_REDIS__HOST", values.consts.redis_container_name) %}
  46. {% do server.environment.add_env("AUTHENTIK_REDIS__PORT", 6379) %}
  47. {% do worker.environment.add_env("AUTHENTIK_REDIS__PORT", 6379) %}
  48. {% do server.environment.add_env("AUTHENTIK_REDIS__PASSWORD", values.authentik.redis_password) %}
  49. {% do worker.environment.add_env("AUTHENTIK_REDIS__PASSWORD", values.authentik.redis_password) %}
  50. {% do server.environment.add_env("AUTHENTIK_SECRET_KEY", values.authentik.secret_key) %}
  51. {% do worker.environment.add_env("AUTHENTIK_SECRET_KEY", values.authentik.secret_key) %}
  52. {% if values.authentik.setup_email %}
  53. {% do server.environment.add_env("AUTHENTIK_EMAIL__HOST", values.authentik.email.host) %}
  54. {% do worker.environment.add_env("AUTHENTIK_EMAIL__HOST", values.authentik.email.host) %}
  55. {% do server.environment.add_env("AUTHENTIK_EMAIL__PORT", values.authentik.email.port) %}
  56. {% do worker.environment.add_env("AUTHENTIK_EMAIL__PORT", values.authentik.email.port) %}
  57. {% do server.environment.add_env("AUTHENTIK_EMAIL__FROM", values.authentik.email.from) %}
  58. {% do worker.environment.add_env("AUTHENTIK_EMAIL__FROM", values.authentik.email.from) %}
  59. {% do server.environment.add_env("AUTHENTIK_EMAIL__USERNAME", values.authentik.email.username) %}
  60. {% do worker.environment.add_env("AUTHENTIK_EMAIL__USERNAME", values.authentik.email.username) %}
  61. {% do server.environment.add_env("AUTHENTIK_EMAIL__PASSWORD", values.authentik.email.password) %}
  62. {% do worker.environment.add_env("AUTHENTIK_EMAIL__PASSWORD", values.authentik.email.password) %}
  63. {% if values.authentik.email.security == "ssl" %}
  64. {% do server.environment.add_env("AUTHENTIK_EMAIL__USE_SSL", true) %}
  65. {% do worker.environment.add_env("AUTHENTIK_EMAIL__USE_SSL", true) %}
  66. {% elif values.authentik.email.security == "tls" %}
  67. {% do server.environment.add_env("AUTHENTIK_EMAIL__USE_TLS", true) %}
  68. {% do worker.environment.add_env("AUTHENTIK_EMAIL__USE_TLS", true) %}
  69. {% endif %}
  70. {% endif %}
  71. {% do server.environment.add_user_envs(values.authentik.additional_envs) %}
  72. {% do worker.environment.add_user_envs(values.authentik.additional_envs) %}
  73. {% do server.add_port(values.network.http_port) %}
  74. {% do server.add_port(values.network.https_port) %}
  75. {% if values.authentik.mount_docker_socket %}
  76. {% do worker.add_docker_socket(read_only=False) %}
  77. {% endif %}
  78. {% do server.add_storage("/media", values.storage.media) %}
  79. {% do worker.add_storage("/media", values.storage.media) %}
  80. {% do perm_container.add_or_skip_action("media", values.storage.media, perm_config) %}
  81. {% do server.add_storage("/templates", values.storage.templates) %}
  82. {% do worker.add_storage("/templates", values.storage.templates) %}
  83. {% do perm_container.add_or_skip_action("templates", values.storage.templates, perm_config) %}
  84. {% do server.add_storage("/certs", values.storage.certs) %}
  85. {% do worker.add_storage("/certs", values.storage.certs) %}
  86. {% do perm_container.add_or_skip_action("certs", values.storage.certs, perm_config) %}
  87. {% for store in values.storage.additional_storage %}
  88. {% do server.add_storage(store.mount_path, store) %}
  89. {% do worker.add_storage(store.mount_path, store) %}
  90. {% do perm_container.add_or_skip_action(store.mount_path, store, perm_config) %}
  91. {% endfor %}
  92. {% if perm_container.has_actions() %}
  93. {% do perm_container.activate() %}
  94. {% do server.depends.add_dependency(values.consts.perms_container_name, "service_completed_successfully") %}
  95. {% do worker.depends.add_dependency(values.consts.perms_container_name, "service_completed_successfully") %}
  96. {% do postgres.add_dependency(values.consts.perms_container_name, "service_completed_successfully") %}
  97. {% endif %}
  98. {% do tpl.portals.add(values.network.http_port, {"name": "HTTP"}) %}
  99. {% do tpl.portals.add(values.network.https_port, {"name": "HTTPS", "scheme": "https"}) %}
  100. {{ tpl.render() | tojson }}