docker-compose.yaml 3.3 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667
  1. {% set tpl = ix_lib.base.render.Render(values) %}
  2. {% set c1 = tpl.add_container(values.consts.linkding_container_name, values.linkding.image_selector) %}
  3. {% set perm_container = tpl.deps.perms(values.consts.perms_container_name) %}
  4. {% set pg_config = {
  5. "user": values.consts.db_user,
  6. "password": values.linkding.db_password,
  7. "database": values.consts.db_name,
  8. "volume": values.storage.postgres_data,
  9. } %}
  10. {% set postgres = tpl.deps.postgres(
  11. values.consts.postgres_container_name,
  12. values.linkding.postgres_image_selector,
  13. pg_config, perm_container
  14. ) %}
  15. {% do c1.set_user(values.run_as.user, values.run_as.group) %}
  16. {% do c1.healthcheck.set_test("curl", {"port": values.network.web_port.port_number, "path": "/health"}) %}
  17. {% do c1.depends.add_dependency(values.consts.postgres_container_name, "service_healthy") %}
  18. {% do c1.environment.add_env("LD_DB_ENGINE", "postgres") %}
  19. {% do c1.environment.add_env("LD_DB_DATABASE", values.consts.db_name) %}
  20. {% do c1.environment.add_env("LD_DB_USER", values.consts.db_user) %}
  21. {% do c1.environment.add_env("LD_DB_HOST", values.consts.postgres_container_name) %}
  22. {% do c1.environment.add_env("LD_DB_PORT", 5432) %}
  23. {% do c1.environment.add_env("LD_DB_PASSWORD", values.linkding.db_password) %}
  24. {% do c1.environment.add_env("LD_SERVER_PORT", values.network.web_port.port_number) %}
  25. {% do c1.environment.add_env("LD_DISABLE_BACKGROUND_TASKS", "True" if values.linkding.disable_background_tasks else "False") %}
  26. {% do c1.environment.add_env("LD_DISABLE_URL_VALIDATION", "True" if values.linkding.disable_url_validation else "False") %}
  27. {% do c1.environment.add_env("LD_ENABLE_AUTH_PROXY", "True" if values.linkding.enable_auth_proxy else "False") %}
  28. {% if values.linkding.username and values.linkding.password %}
  29. {% do c1.environment.add_env("LD_SUPERUSER_NAME", values.linkding.username) %}
  30. {% do c1.environment.add_env("LD_SUPERUSER_PASSWORD", values.linkding.password) %}
  31. {% endif %}
  32. {% if values.linkding.csrf_trusted_origins %}
  33. {% do c1.environment.add_env("LD_CSRF_TRUSTED_ORIGINS", values.linkding.csrf_trusted_origins|join(",")) %}
  34. {% endif %}
  35. {% if values.linkding.enable_auth_proxy %}
  36. {% do c1.environment.add_env("LD_AUTH_PROXY_USERNAME_HEADER", values.linkding.auth_proxy_username_header) %}
  37. {% endif %}
  38. {% if values.linkding.auth_proxy_logout_url %}
  39. {% do c1.environment.add_env("LD_AUTH_PROXY_LOGOUT_URL", values.linkding.auth_proxy_logout_url) %}
  40. {% endif %}
  41. {% do c1.environment.add_user_envs(values.linkding.additional_envs) %}
  42. {% set perms_config = {"uid": values.run_as.user, "gid": values.run_as.group, "mode": "check"} %}
  43. {% do c1.add_storage("/etc/linkding/data", values.storage.data) %}
  44. {% do perm_container.add_or_skip_action("data", values.storage.data, perms_config) %}
  45. {% for store in values.storage.additional_storage %}
  46. {% do c1.add_storage(store.mount_path, store) %}
  47. {% do perm_container.add_or_skip_action(store.mount_path, store, perms_config) %}
  48. {% endfor %}
  49. {% do c1.add_port(values.network.web_port) %}
  50. {% if perm_container.has_actions() %}
  51. {% do perm_container.activate() %}
  52. {% do c1.depends.add_dependency(values.consts.perms_container_name, "service_completed_successfully") %}
  53. {% do postgres.add_dependency(values.consts.perms_container_name, "service_completed_successfully") %}
  54. {% endif %}
  55. {% do tpl.portals.add(values.network.web_port) %}
  56. {{ tpl.render() | tojson }}