docker-compose.yaml 4.3 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576
  1. {% set tpl = ix_lib.base.render.Render(values) %}
  2. {% set c1 = tpl.add_container(values.consts.headscale_container_name, "image") %}
  3. {% set init = tpl.add_container(values.consts.init_container_name, "alpine_image") %}
  4. {% set perm_container = tpl.deps.perms(values.consts.perms_container_name) %}
  5. {% set perms_config = {"uid": values.run_as.user, "gid": values.run_as.group, "mode": "check"} %}
  6. {# FIXME: remove after https://github.com/juanfont/headscale/pull/2656 #}
  7. {% do init.set_user(values.run_as.user, values.run_as.group) %}
  8. {% do init.restart.set_policy("on-failure", 1) %}
  9. {% do init.healthcheck.disable() %}
  10. {% do init.deploy.resources.set_profile("low") %}
  11. {% do init.remove_devices() %}
  12. {# At least an empty config is required. #}
  13. {% do init.set_entrypoint(["touch", "%s/config.yaml"|format(values.consts.config_path)]) %}
  14. {% do c1.set_user(values.run_as.user, values.run_as.group) %}
  15. {# FIXME: Uncomment this after https://github.com/juanfont/headscale/pull/2659 #}
  16. {# {% do c1.healthcheck.set_custom_test(["CMD", "/ko-app/headscale", "health"]) %} #}
  17. {% do c1.healthcheck.disable() %}
  18. {% do c1.set_command(["serve"]) %}
  19. {% do c1.depends.add_dependency(values.consts.init_container_name, "service_completed_successfully") %}
  20. {% do c1.environment.add_env("HEADSCALE_LISTEN_ADDR", ":%d"|format(values.network.api_port.port_number)) %}
  21. {% do c1.environment.add_env("HEADSCALE_DATABASE_TYPE", "sqlite") %}
  22. {% do c1.environment.add_env("HEADSCALE_DATABASE_SQLITE_PATH", "%s/db.sqlite"|format(values.consts.lib_path)) %}
  23. {# FIXME: remove after https://github.com/juanfont/headscale/pull/2658 #}
  24. {% do c1.environment.add_env("HEADSCALE_NOISE", '{}') %}
  25. {% do c1.environment.add_env("HEADSCALE_NOISE_PRIVATE_KEY_PATH", "%s/noise_private.key"|format(values.consts.lib_path)) %}
  26. {% do c1.environment.add_env("HEADSCALE_UNIX_SOCKET", "%s/headscale.sock"|format(values.consts.run_path)) %}
  27. {% do c1.environment.add_env("HEADSCALE_UNIX_SOCKET_PERMISSION", "0770") %}
  28. {% do c1.environment.add_env("HEADSCALE_DERP_URLS", "https://controlplane.tailscale.com/derpmap/default") %}
  29. {% do c1.environment.add_env("HEADSCALE_DERP_SERVER_PRIVATE_KEY_PATH", "%s/derp_server_private.key"|format(values.consts.lib_path)) %}
  30. {% do c1.environment.add_env("HEADSCALE_SERVER_URL", values.headscale.server_url) %}
  31. {% do c1.environment.add_env("HEADSCALE_DNS_BASE_DOMAIN", values.headscale.dns.base_domain) %}
  32. {% do c1.environment.add_env("HEADSCALE_DNS_NAMESERVERS_GLOBAL", values.headscale.dns.nameservers_global | join(" ")) %}
  33. {# Those are not really configurable #}
  34. {% do c1.environment.add_env("HEADSCALE_PREFIXES_V4", "100.64.0.0/10") %}
  35. {% do c1.environment.add_env("HEADSCALE_PREFIXES_V6", "fd7a:115c:a1e0::/48") %}
  36. {% if values.network.certificate_id %}
  37. {% do c1.environment.add_env("HEADSCALE_SSL_KEY_PATH", values.consts.ssl_key_path) %}
  38. {% do c1.environment.add_env("HEADSCALE_SSL_CERT_PATH", values.consts.ssl_cert_path) %}
  39. {% set cert = values.ix_certificates[values.network.certificate_id] %}
  40. {% do c1.configs.add("private", cert.privatekey, values.consts.ssl_key_path) %}
  41. {% do c1.configs.add("public", cert.certificate, values.consts.ssl_cert_path) %}
  42. {% endif %}
  43. {% do c1.environment.add_user_envs(values.headscale.additional_envs) %}
  44. {% do c1.add_port(values.network.api_port) %}
  45. {% do c1.add_storage(values.consts.config_path, values.storage.config) %}
  46. {% do init.add_storage(values.consts.config_path, values.storage.config) %}
  47. {% do perm_container.add_or_skip_action("config", values.storage.config, perms_config) %}
  48. {% do c1.add_storage(values.consts.lib_path, values.storage.lib) %}
  49. {% do perm_container.add_or_skip_action("lib", values.storage.lib, perms_config) %}
  50. {% do c1.add_storage(values.consts.run_path, values.storage.run) %}
  51. {% do perm_container.add_or_skip_action("run", values.storage.run, perms_config) %}
  52. {% for store in values.storage.additional_storage %}
  53. {% do c1.add_storage(store.mount_path, store) %}
  54. {% do perm_container.add_or_skip_action(store.mount_path, store, perms_config) %}
  55. {% endfor %}
  56. {% if perm_container.has_actions() %}
  57. {% do perm_container.activate() %}
  58. {% do c1.depends.add_dependency(values.consts.perms_container_name, "service_completed_successfully") %}
  59. {% do init.depends.add_dependency(values.consts.perms_container_name, "service_completed_successfully") %}
  60. {% endif %}
  61. {{ tpl.render() | tojson }}