docker-compose.yaml 3.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778
  1. {% set tpl = ix_lib.base.render.Render(values) %}
  2. {% set c1 = tpl.add_container(values.consts.versity_container_name, "image") %}
  3. {% set perm_container = tpl.deps.perms(values.consts.perms_container_name) %}
  4. {% set perms_config = {"uid": values.run_as.user, "gid": values.run_as.group, "mode": "check"} %}
  5. {% do c1.set_user(values.run_as.user, values.run_as.group) %}
  6. {% set scheme = "https" if values.network.certificate_id else "http" %}
  7. {% do c1.healthcheck.set_test("wget", {"port": values.network.api_port.port_number, "path": "/healthz", "scheme": scheme}) %}
  8. {% do c1.environment.add_user_envs(values.versity.additional_envs) %}
  9. {% set cmd = namespace(x=[
  10. "--port", ":%d" | format(values.network.api_port.port_number),
  11. "--health", "/healthz",
  12. "--access", values.versity.root_user_access_key,
  13. "--secret", values.versity.root_user_secret_access_key,
  14. ]) %}
  15. {% if values.network.certificate_id %}
  16. {% set cert = values.ix_certificates[values.network.certificate_id] %}
  17. {% do c1.configs.add("public", cert.certificate, values.consts.ssl_cert_path) %}
  18. {% do c1.configs.add("private", cert.privatekey, values.consts.ssl_key_path) %}
  19. {% do cmd.x.extend(["--cert", values.consts.ssl_cert_path]) %}
  20. {% do cmd.x.extend(["--key", values.consts.ssl_key_path]) %}
  21. {% endif %}
  22. {% if values.network.admin_port.bind_mode %}
  23. {% do cmd.x.extend(["--admin-port", ":%d" | format(values.network.admin_port.port_number)]) %}
  24. {% if values.network.admin_certificate_id %}
  25. {% set cert = values.ix_certificates[values.network.admin_certificate_id] %}
  26. {% do c1.configs.add("admin-public", cert.certificate, values.consts.admin_ssl_cert_path) %}
  27. {% do c1.configs.add("admin-private", cert.privatekey, values.consts.admin_ssl_key_path) %}
  28. {% do cmd.x.extend(["--admin-cert", values.consts.admin_ssl_cert_path]) %}
  29. {% do cmd.x.extend(["--admin-cert-key", values.consts.admin_ssl_key_path]) %}
  30. {% endif %}
  31. {% endif %}
  32. {% set global_flags = values.versity.additional_global_flags|map(attribute="flag") %}
  33. {% do tpl.funcs.require_no_reserved(global_flags, "Additional Global Flags", values.consts.restricted_global_flags, "=") %}
  34. {% for f in values.versity.additional_global_flags %}
  35. {% if not f.flag.startswith("--") %}{% do tpl.funcs.fail("Flags must start with --") %}{% endif %}
  36. {% do cmd.x.append(f.flag) %}
  37. {% if f.value %}{% do cmd.x.append(f.value) %}{% endif %}
  38. {% endfor %}
  39. {% do cmd.x.extend(["posix", values.consts.buckets_path]) %}
  40. {% for f in values.versity.additional_posix_flags %}
  41. {% if not f.flag.startswith("--") %}{% do tpl.funcs.fail("Flags must start with --") %}{% endif %}
  42. {% do cmd.x.append(f.flag) %}
  43. {% if f.value %}{% do cmd.x.append(f.value) %}{% endif %}
  44. {% endfor %}
  45. {% do c1.set_command(cmd.x) %}
  46. {% if not values.network.host_network %}
  47. {% do c1.add_port(values.network.api_port) %}
  48. {% do c1.add_port(values.network.admin_port) %}
  49. {% endif %}
  50. {% do c1.add_storage(values.consts.buckets_path, values.storage.buckets) %}
  51. {% do perm_container.add_or_skip_action("buckets", values.storage.buckets, perms_config) %}
  52. {% for store in values.storage.additional_storage %}
  53. {% do c1.add_storage(store.mount_path, store) %}
  54. {% do perm_container.add_or_skip_action(store.mount_path, store, perms_config) %}
  55. {% endfor %}
  56. {% if perm_container.has_actions() %}
  57. {% do perm_container.activate() %}
  58. {% do c1.depends.add_dependency(values.consts.perms_container_name, "service_completed_successfully") %}
  59. {% endif %}
  60. {{ tpl.render() | tojson }}