docker-compose.yaml 4.2 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677
  1. {% set tpl = ix_lib.base.render.Render(values) %}
  2. {% set c1 = tpl.add_container(values.consts.mattermost_container_name, "image") %}
  3. {% set perm_container = tpl.deps.perms(values.consts.perms_container_name) %}
  4. {% set perms_config = {"uid": values.consts.run_as_user, "gid": values.consts.run_as_group, "mode": "check"} %}
  5. {% set scheme = "https" if values.network.certificate_id else "http" %}
  6. {% set pg_config = {
  7. "user": values.consts.db_user,
  8. "password": values.mattermost.db_password,
  9. "database": values.consts.db_name,
  10. "volume": values.storage.postgres_data,
  11. } %}
  12. {% set postgres = tpl.deps.postgres(values.consts.postgres_container_name, values.mattermost.postgres_image_selector, pg_config, perm_container) %}
  13. {#
  14. https://github.com/mattermost/mmctl/issues/313
  15. https://github.com/mattermost/docker/issues/172
  16. (Also any other mmctl commands fail)
  17. #}
  18. {% do c1.set_user(values.consts.run_as_user, values.consts.run_as_group) %}
  19. {% do c1.healthcheck.set_custom_test(["CMD", "/mattermost/bin/mmctl", "system", "status", "--local"]) %}
  20. {% do c1.depends.add_dependency(values.consts.postgres_container_name, "service_healthy") %}
  21. {% do c1.environment.add_env("MM_CONFIG", "") %}
  22. {% do c1.environment.add_env("MM_FILESETTINGS_DRIVERNAME", "local") %}
  23. {% do c1.environment.add_env("MM_CACHESETTINGS_CACHETYPE", "lru") %}
  24. {% do c1.environment.add_env("MM_CLUSTERSETTINGS_ENABLE", false) %}
  25. {% do c1.environment.add_env("MM_SERVICESETTINGS_LISTENADDRESS", ":%d"|format(values.network.web_port.port_number)) %}
  26. {% do c1.environment.add_env("MM_CALLS_TCP_SERVER_PORT", ":%d"|format(values.network.calls_port.port_number)) %}
  27. {% do c1.environment.add_env("MM_CALLS_UDP_SERVER_PORT", ":%d"|format(values.network.calls_port.port_number)) %}
  28. {% do c1.environment.add_env("MM_SQLSETTINGS_DRIVERNAME", "postgres") %}
  29. {% do c1.environment.add_env("MM_SQLSETTINGS_DATASOURCE", postgres.get_url("postgres")) %}
  30. {% do c1.environment.add_env("MM_SERVICESETTINGS_SITEURL", values.mattermost.site_url) %}
  31. {% if values.network.certificate_id %}
  32. {% do c1.environment.add_env("MM_SERVICESETTINGS_CONNECTIONSECURITY", "TLS") %}
  33. {% do c1.environment.add_env("MM_SERVICESETTINGS_TLSKEYFILE", values.consts.ssl_key_path) %}
  34. {% do c1.environment.add_env("MM_SERVICESETTINGS_TLSCERTFILE", values.consts.ssl_cert_path) %}
  35. {% set cert = values.ix_certificates[values.network.certificate_id] %}
  36. {% do c1.configs.add("private", cert.privatekey, values.consts.ssl_key_path) %}
  37. {% do c1.configs.add("public", cert.certificate, values.consts.ssl_cert_path) %}
  38. {% endif %}
  39. {% do c1.environment.add_user_envs(values.mattermost.additional_envs) %}
  40. {% do c1.add_port(values.network.web_port) %}
  41. {% do c1.add_storage("/mattermost/config", values.storage.config) %}
  42. {% do perm_container.add_or_skip_action("config", values.storage.config, perms_config) %}
  43. {% do c1.add_storage("/mattermost/data", values.storage.data) %}
  44. {% do perm_container.add_or_skip_action("data", values.storage.data, perms_config) %}
  45. {% do c1.add_storage("/mattermost/logs", values.storage.logs) %}
  46. {% do perm_container.add_or_skip_action("logs", values.storage.logs, perms_config) %}
  47. {% do c1.add_storage("/mattermost/plugins", values.storage.plugins) %}
  48. {% do perm_container.add_or_skip_action("plugins", values.storage.plugins, perms_config) %}
  49. {% do c1.add_storage("/mattermost/client/plugins", values.storage.client_plugins) %}
  50. {% do perm_container.add_or_skip_action("client-plugins", values.storage.client_plugins, perms_config) %}
  51. {% do c1.add_storage("/mattermost/bleve-indexes", values.storage.bleve_indexes) %}
  52. {% do perm_container.add_or_skip_action("bleve-indexes", values.storage.bleve_indexes, perms_config) %}
  53. {% for store in values.storage.additional_storage %}
  54. {% do c1.add_storage(store.mount_path, store) %}
  55. {% do perm_container.add_or_skip_action(store.mount_path, store, perms_config) %}
  56. {% endfor %}
  57. {% if perm_container.has_actions() %}
  58. {% do perm_container.activate() %}
  59. {% do c1.depends.add_dependency(values.consts.perms_container_name, "service_completed_successfully") %}
  60. {% do postgres.add_dependency(values.consts.perms_container_name, "service_completed_successfully") %}
  61. {% endif %}
  62. {% do tpl.portals.add(values.network.web_port, {"scheme": scheme}) %}
  63. {{ tpl.render() | tojson }}