docker-compose.yaml 5.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103
  1. {% set tpl = ix_lib.base.render.Render(values) %}
  2. {% if values.n8n.web_host.startswith("https://") or values.n8n.web_host.startswith("http://") %}
  3. {% do tpl.funcs.fail("Expected [n8n.web_host] to not start with [http(s)://]") %}
  4. {% endif %}
  5. {% if values.n8n.web_host.endswith("/") %}
  6. {% do tpl.funcs.fail("Expected [n8n.web_host] to not end with [/]") %}
  7. {% endif %}
  8. {% if ":" in values.n8n.web_host %}
  9. {% do tpl.funcs.fail("Expected [n8n.web_host] to not contain port [:###]") %}
  10. {% endif %}
  11. {% set perm_container = tpl.deps.perms(values.consts.perms_container_name) %}
  12. {% set pg_config = {
  13. "user": values.consts.db_user,
  14. "password": values.n8n.db_password,
  15. "database": values.consts.db_name,
  16. "volume": values.storage.postgres_data,
  17. } %}
  18. {% set postgres = tpl.deps.postgres(
  19. values.consts.postgres_container_name,
  20. values.n8n.postgres_image_selector,
  21. pg_config, perm_container
  22. ) %}
  23. {% set redis_config = {
  24. "password": values.n8n.redis_password,
  25. "volume": {"type": "temporary", "volume_config": {"volume_name": "redis-data"}},
  26. } %}
  27. {% set redis = tpl.deps.redis(values.consts.redis_container_name, "redis_image", redis_config, perm_container) %}
  28. {% set proto = "https" if values.network.certificate_id else "http" %}
  29. {% set c1 = tpl.add_container(values.consts.n8n_container_name, "image") %}
  30. {% do c1.set_user(values.run_as.user, values.run_as.group) %}
  31. {% do c1.healthcheck.set_test("wget", {"port": values.network.web_port.port_number, "path": "/healthz", "scheme": proto}) %}
  32. {% do c1.environment.add_env("NODE_ENV", "production") %}
  33. {% do c1.environment.add_env("npm_config_cache", "/.cache/npm") %}
  34. {% do c1.environment.add_env("N8N_PATH", "/") %}
  35. {% do c1.environment.add_env("N8N_PORT", values.network.web_port.port_number) %}
  36. {% do c1.environment.add_env("N8N_HOST", values.n8n.web_host) %}
  37. {% do c1.environment.add_env("GENERIC_TIMEZONE", values.TZ) %}
  38. {% do c1.environment.add_env("N8N_SECURE_COOKIE", values.network.certificate_id != None) %}
  39. {% do c1.environment.add_env("N8N_PROTOCOL", "https" if values.network.certificate_id else "http") %}
  40. {% do c1.environment.add_env("N8N_USER_FOLDER", values.consts.data_path) %}
  41. {% do c1.environment.add_env("DB_TYPE", "postgresdb") %}
  42. {% do c1.environment.add_env("EXECUTIONS_MODE", "regular") %}
  43. {% do c1.environment.add_env("N8N_ENCRYPTION_KEY", values.n8n.encryption_key) %}
  44. {% do c1.environment.add_env("DB_POSTGRESDB_USER", values.consts.db_user) %}
  45. {% do c1.environment.add_env("DB_POSTGRESDB_PASSWORD", values.n8n.db_password) %}
  46. {% do c1.environment.add_env("DB_POSTGRESDB_DATABASE", values.consts.db_name) %}
  47. {% do c1.environment.add_env("DB_POSTGRESDB_HOST", values.consts.postgres_container_name) %}
  48. {% do c1.environment.add_env("DB_POSTGRESDB_PORT", 5432) %}
  49. {% do c1.environment.add_env("DEBUG", "true") %}
  50. {% do c1.environment.add_env("QUEUE_BULL_REDIS_USERNAME", "default") %}
  51. {% do c1.environment.add_env("QUEUE_BULL_REDIS_DB", 0) %}
  52. {% do c1.environment.add_env("QUEUE_BULL_REDIS_PORT", 6379) %}
  53. {% do c1.environment.add_env("QUEUE_BULL_REDIS_HOST", values.consts.redis_container_name) %}
  54. {% do c1.environment.add_env("QUEUE_BULL_REDIS_PASSWORD", values.n8n.redis_password) %}
  55. {% if values.network.certificate_id %}
  56. {% do c1.environment.add_env("N8N_SSL_KEY", values.consts.ssl_key_path) %}
  57. {% do c1.environment.add_env("N8N_SSL_CERT", values.consts.ssl_cert_path) %}
  58. {% endif %}
  59. {% do c1.environment.add_user_envs(values.n8n.additional_envs) %}
  60. {% do c1.depends.add_dependency(values.consts.postgres_container_name, "service_healthy") %}
  61. {% do c1.depends.add_dependency(values.consts.redis_container_name, "service_healthy") %}
  62. {% set perms_config = {"uid": values.run_as.user, "gid": values.run_as.group, "mode": "check"} %}
  63. {% do c1.add_storage(values.consts.data_path, values.storage.data) %}
  64. {% do perm_container.add_or_skip_action("data", values.storage.data, perms_config) %}
  65. {% do c1.add_storage("/tmp", {"type": "anonymous"}) %}
  66. {% set tmp_config = {"type": "temporary", "volume_config": {"volume_name": "tmp-n8n-npm-cache"}} %}
  67. {% do c1.add_storage("/.cache", tmp_config) %}
  68. {% do perm_container.add_or_skip_action("tmp-n8n-npm-cache", tmp_config, perms_config) %}
  69. {% for store in values.storage.additional_storage %}
  70. {% do c1.add_storage(store.mount_path, store) %}
  71. {% do perm_container.add_or_skip_action(store.mount_path, store, perms_config) %}
  72. {% endfor %}
  73. {% if values.network.certificate_id %}
  74. {% set cert = values.ix_certificates[values.network.certificate_id] %}
  75. {% do c1.configs.add("private", cert.privatekey, values.consts.ssl_key_path) %}
  76. {% do c1.configs.add("public", cert.certificate, values.consts.ssl_cert_path) %}
  77. {% endif %}
  78. {% do c1.add_port(values.network.web_port) %}
  79. {% if perm_container.has_actions() %}
  80. {% do perm_container.activate() %}
  81. {% do c1.depends.add_dependency(values.consts.perms_container_name, "service_completed_successfully") %}
  82. {% do redis.container.depends.add_dependency(values.consts.perms_container_name, "service_completed_successfully") %}
  83. {% do postgres.add_dependency(values.consts.perms_container_name, "service_completed_successfully") %}
  84. {% endif %}
  85. {% do tpl.portals.add(values.network.web_port, {"scheme": proto}) %}
  86. {{ tpl.render() | tojson }}