docker-compose.yaml 3.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566
  1. {% set tpl = ix_lib.base.render.Render(values) %}
  2. {% set c1 = tpl.add_container(values.consts.onlyoffice_container_name, "image") %}
  3. {% set perm_container = tpl.deps.perms(values.consts.perms_container_name) %}
  4. {% set pg_config = {
  5. "user": values.consts.db_user,
  6. "password": values.onlyoffice.db_password,
  7. "database": values.consts.db_name,
  8. "volume": values.storage.postgres_data,
  9. } %}
  10. {% set postgres = tpl.deps.postgres(
  11. values.consts.postgres_container_name,
  12. values.onlyoffice.postgres_image_selector,
  13. pg_config, perm_container
  14. ) %}
  15. {% set redis_config = {
  16. "password": values.onlyoffice.redis_password,
  17. "volume": {"type": "temporary", "volume_config": {"volume_name": "redis-data"}},
  18. } %}
  19. {% set redis = tpl.deps.redis(values.consts.redis_container_name, "redis_image", redis_config, perm_container) %}
  20. {% do c1.add_caps(["CHOWN", "FOWNER", "DAC_OVERRIDE", "SETGID", "SETUID"]) %}
  21. {% do c1.healthcheck.set_test("wget", {"port": 80, "path": "/healthcheck"}) %}
  22. {% do c1.depends.add_dependency(values.consts.postgres_container_name, "service_healthy") %}
  23. {% do c1.depends.add_dependency(values.consts.redis_container_name, "service_healthy") %}
  24. {% do c1.environment.add_env("DB_TYPE", "postgres") %}
  25. {% do c1.environment.add_env("DB_HOST", values.consts.postgres_container_name) %}
  26. {% do c1.environment.add_env("DB_PORT", 5432) %}
  27. {% do c1.environment.add_env("DB_NAME", values.consts.db_name) %}
  28. {% do c1.environment.add_env("DB_USER", values.consts.db_user) %}
  29. {% do c1.environment.add_env("DB_PWD", values.onlyoffice.db_password) %}
  30. {% do c1.environment.add_env("REDIS_SERVER_HOST", values.consts.redis_container_name) %}
  31. {% do c1.environment.add_env("REDIS_SERVER_PORT", 6379) %}
  32. {% do c1.environment.add_env("REDIS_SERVER_PASS", values.onlyoffice.redis_password) %}
  33. {% do c1.environment.add_env("JWT_ENABLED", true) %}
  34. {% do c1.environment.add_env("JWT_SECRET", values.onlyoffice.jwt_secret) %}
  35. {% do c1.environment.add_env("WOPI_ENABLED", true) %}
  36. {% do c1.environment.add_user_envs(values.onlyoffice.additional_envs) %}
  37. {% if values.network.certificate_id %}
  38. {% set cert = values.ix_certificates[values.network.certificate_id] %}
  39. {% do c1.configs.add("private", cert.privatekey, values.consts.ssl_key_path) %}
  40. {% do c1.configs.add("public", cert.certificate, values.consts.ssl_cert_path) %}
  41. {% do c1.environment.add_env("SSL_KEY_PATH", values.consts.ssl_key_path) %}
  42. {% do c1.environment.add_env("SSL_CERTIFICATE_PATH", values.consts.ssl_cert_path) %}
  43. {% endif %}
  44. {% do c1.add_port(values.network.web_port, {"container_port": 443 if values.network.certificate_id else 80}) %}
  45. {% for store in values.storage.additional_storage %}
  46. {% do c1.add_storage(store.mount_path, store) %}
  47. {% endfor %}
  48. {% if perm_container.has_actions() %}
  49. {% do perm_container.activate() %}
  50. {% do c1.depends.add_dependency(values.consts.perms_container_name, "service_completed_successfully") %}
  51. {% do postgres.add_dependency(values.consts.perms_container_name, "service_completed_successfully") %}
  52. {% endif %}
  53. {% do tpl.portals.add(values.network.web_port, {"scheme": "https" if values.network.certificate_id else "http"}) %}
  54. {{ tpl.render() | tojson }}