docker-compose.yaml 4.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899
  1. {% set tpl = ix_lib.base.render.Render(values) %}
  2. {% set c1 = tpl.add_container(values.consts.briefkasten_container_name, "image") %}
  3. {% set init = tpl.add_container(values.consts.init_container_name, "image") %}
  4. {% set perm_container = tpl.deps.perms(values.consts.perms_container_name) %}
  5. {% set pg_config = {
  6. "user": values.consts.db_user,
  7. "password": values.briefkasten.postgres_password,
  8. "database": values.consts.db_name,
  9. "volume": values.storage.postgres_data,
  10. } %}
  11. {% set postgres = tpl.deps.postgres(
  12. values.consts.pg_container_name,
  13. values.briefkasten.postgres_image_selector,
  14. pg_config, perm_container
  15. ) %}
  16. {% set envs = namespace(x={
  17. "PORT": values.network.web_port.port_number,
  18. "NODE_ENV": "production",
  19. "DATABASE_URL": postgres.get_url("postgres"),
  20. "NEXTAUTH_SECRET": values.briefkasten.nextauth_secret,
  21. "NEXTAUTH_URL": values.briefkasten.nextauth_url,
  22. "NEXTAUTH_URL_INTERNAL": "http://127.0.0.1:%d"|format(values.network.web_port.port_number),
  23. }) %}
  24. {% if values.briefkasten.smtp.enabled and envs.x.update({
  25. "SMTP_HOST": values.briefkasten.smtp.server,
  26. "SMTP_FROM": values.briefkasten.smtp.from
  27. }) %}{% endif %}
  28. {% if values.briefkasten.github.enabled and envs.x.update({
  29. "GITHUB_ID": values.briefkasten.github.id,
  30. "GITHUB_SECRET": values.briefkasten.github.secret
  31. }) %}{% endif %}
  32. {% if values.briefkasten.google.enabled and envs.x.update({
  33. "GOOGLE_ID": values.briefkasten.google.id,
  34. "GOOGLE_SECRET": values.briefkasten.google.secret
  35. }) %}{% endif %}
  36. {% if values.briefkasten.keycloak.enabled and envs.x.update({
  37. "KEYCLOAK_NAME": values.briefkasten.keycloak.name,
  38. "KEYCLOAK_ID": values.briefkasten.keycloak.id,
  39. "KEYCLOAK_SECRET": values.briefkasten.keycloak.secret,
  40. "KEYCLOAK_ISSUER": values.briefkasten.keycloak.issuer
  41. }) %}{% endif %}
  42. {% if values.briefkasten.authentik.enabled and envs.x.update({
  43. "AUTHENTIK_NAME": values.briefkasten.authentik.name,
  44. "AUTHENTIK_ID": values.briefkasten.authentik.id,
  45. "AUTHENTIK_SECRET": values.briefkasten.authentik.secret,
  46. "AUTHENTIK_ISSUER": values.briefkasten.authentik.issuer
  47. }) %}{% endif %}
  48. {% do init.set_user(values.consts.run_user, values.consts.run_group) %}
  49. {% do init.depends.add_dependency(values.consts.pg_container_name, "service_healthy") %}
  50. {% do init.restart.set_policy("on-failure", 1) %}
  51. {% do init.deploy.resources.set_profile("low") %}
  52. {% do init.healthcheck.disable() %}
  53. {% do init.set_entrypoint(["/bin/sh", "-c"]) %}
  54. {% do init.set_command([
  55. "echo 'Migrating database...'\n"
  56. "pnpm db:push || (echo 'DB migration failed...' && exit 1)\n"
  57. "echo 'Database migration complete. Application will now start'\n"
  58. ]) %}
  59. {% do c1.set_user(values.consts.run_user, values.consts.run_group) %}
  60. {% do c1.depends.add_dependency(values.consts.pg_container_name, "service_healthy") %}
  61. {% do c1.depends.add_dependency(values.consts.init_container_name, "service_completed_successfully") %}
  62. {% do c1.healthcheck.set_test("tcp", {"port": values.network.web_port.port_number}) %}
  63. {% for key, value in envs.x.items() %}
  64. {% do init.environment.add_env(key, value) %}
  65. {% do c1.environment.add_env(key, value) %}
  66. {% endfor %}
  67. {% do init.environment.add_user_envs(values.briefkasten.additional_envs) %}
  68. {% do c1.environment.add_user_envs(values.briefkasten.additional_envs) %}
  69. {% set perms_config = {"uid": values.consts.run_user, "gid": values.consts.run_group, "mode": "check"} %}
  70. {% for store in values.storage.additional_storage %}
  71. {% do c1.add_storage(store.mount_path, store) %}
  72. {% do init.add_storage(store.mount_path, store) %}
  73. {% do perm_container.add_or_skip_action(store.mount_path, store, perms_config) %}
  74. {% endfor %}
  75. {% do c1.add_port(values.network.web_port) %}
  76. {% if perm_container.has_actions() %}
  77. {% do perm_container.activate() %}
  78. {% do c1.depends.add_dependency(values.consts.perms_container_name, "service_completed_successfully") %}
  79. {% do init.depends.add_dependency(values.consts.perms_container_name, "service_completed_successfully") %}
  80. {% do postgres.add_dependency(values.consts.perms_container_name, "service_completed_successfully") %}
  81. {% endif %}
  82. {% do tpl.portals.add(values.network.web_port) %}
  83. {{ tpl.render() | tojson }}