docker-compose.yaml 2.8 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859
  1. {% set tpl = ix_lib.base.render.Render(values) %}
  2. {% set c1 = tpl.add_container(values.consts.vaultwarden_container_name, "image") %}
  3. {% set perm_container = tpl.deps.perms(values.consts.perms_container_name) %}
  4. {% set pg_config = {
  5. "user": values.consts.db_user,
  6. "password": values.vaultwarden.db_password,
  7. "database": values.consts.db_name,
  8. "volume": values.storage.postgres_data,
  9. } %}
  10. {% set postgres = tpl.deps.postgres(
  11. values.consts.postgres_container_name,
  12. values.vaultwarden.postgres_image_selector,
  13. pg_config, perm_container
  14. ) %}
  15. {% do c1.set_user(values.run_as.user, values.run_as.group) %}
  16. {% do c1.depends.add_dependency(values.consts.postgres_container_name, "service_healthy") %}
  17. {% do c1.healthcheck.set_custom_test("/healthcheck.sh") %}
  18. {% do c1.environment.add_env("ROCKET_PORT", values.network.web_port.port_number) %}
  19. {% do c1.environment.add_env("ENABLE_WEBSOCKET", values.vaultwarden.enable_websocket) %}
  20. {% do c1.environment.add_env("ADMIN_TOKEN", values.vaultwarden.admin_token) %}
  21. {% do c1.environment.add_env("DATABASE_URL", postgres.get_url("postgres")) %}
  22. {% if values.network.domain %}
  23. {% do c1.environment.add_env("DOMAIN", values.network.domain) %}
  24. {% endif %}
  25. {% if values.network.certificate_id %}
  26. {% do c1.environment.add_env("ROCKET_TLS", '{certs="%s",key="%s"}'|format(values.consts.ssl_cert_path, values.consts.ssl_key_path)) %}
  27. {% do c1.configs.add("private", values.ix_certificates[values.network.certificate_id].privatekey, values.consts.ssl_key_path) %}
  28. {% do c1.configs.add("public", values.ix_certificates[values.network.certificate_id].certificate, values.consts.ssl_cert_path) %}
  29. {% endif %}
  30. {% do c1.environment.add_user_envs(values.vaultwarden.additional_envs) %}
  31. {% set perms_config = {"uid": values.run_as.user, "gid": values.run_as.group, "mode": "check"} %}
  32. {% do c1.add_storage("/data", values.storage.data) %}
  33. {% do perm_container.add_or_skip_action("data", values.storage.data, perms_config) %}
  34. {% for store in values.storage.additional_storage %}
  35. {% do c1.add_storage(store.mount_path, store) %}
  36. {% do perm_container.add_or_skip_action(store.mount_path, store, perms_config) %}
  37. {% endfor %}
  38. {% do c1.add_port(values.network.web_port) %}
  39. {% if perm_container.has_actions() %}
  40. {% do perm_container.activate() %}
  41. {% do c1.depends.add_dependency(values.consts.perms_container_name, "service_completed_successfully") %}
  42. {% do postgres.add_dependency(values.consts.perms_container_name, "service_completed_successfully") %}
  43. {% endif %}
  44. {% set portal_scheme = "https" if values.network.certificate_id else "http" %}
  45. {% do tpl.portals.add(values.network.web_port, {"scheme": portal_scheme}) %}
  46. {% if values.vaultwarden.admin_token %}
  47. {% do tpl.portals.add(values.network.web_port, {"name": "Admin Portal", "path": "/admin", "scheme": portal_scheme}) %}
  48. {% endif %}
  49. {{ tpl.render() | tojson }}