docker-compose.yaml 3.2 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768
  1. {% from "macros/setup.js" import setup %}
  2. {% set tpl = ix_lib.base.render.Render(values) %}
  3. {% set c1 = tpl.add_container(values.consts.zwave_container_name, "image") %}
  4. {% set perm_container = tpl.deps.perms(values.consts.perms_container_name) %}
  5. {% set perms_config = {"uid": values.run_as.user, "gid": values.run_as.group, "mode": "check"} %}
  6. {% set config = tpl.add_container(values.consts.config_container_name, "image") %}
  7. {% do config.set_user(values.run_as.user, values.run_as.group) %}
  8. {% do config.restart.set_policy("on-failure", 1) %}
  9. {% do config.healthcheck.disable() %}
  10. {% do config.deploy.resources.set_profile("low") %}
  11. {% do config.remove_devices() %}
  12. {% do config.configs.add("setup.js", setup(values), "/setup.js", "0755") %}
  13. {% do config.set_entrypoint(["node", "/setup.js"]) %}
  14. {% do c1.depends.add_dependency(values.consts.config_container_name, "service_completed_successfully") %}
  15. {% set proto = "https" if values.network.certificate_id else "http" %}
  16. {% do c1.set_user(values.run_as.user, values.run_as.group) %}
  17. {% do c1.healthcheck.set_test("wget", {"port": values.network.web_port.port_number, "path": "/health/", "scheme": proto}) %}
  18. {% do c1.environment.add_env("PORT", values.network.web_port.port_number) %}
  19. {% do c1.environment.add_env("SESSION_SECRET", values.zwave.session_secret) %}
  20. {% if values.network.certificate_id %}
  21. {% do c1.environment.add_env("HTTPS", true) %}
  22. {% do c1.environment.add_env("SSL_CERTIFICATE", values.consts.ssl_cert_path) %}
  23. {% do c1.environment.add_env("SSL_KEY", values.consts.ssl_key_path) %}
  24. {% set cert = values.ix_certificates[values.network.certificate_id] %}
  25. {% do c1.configs.add("private", cert.privatekey, values.consts.ssl_key_path) %}
  26. {% do c1.configs.add("public", cert.certificate, values.consts.ssl_cert_path) %}
  27. {% endif %}
  28. {% do c1.environment.add_user_envs(values.zwave.additional_envs) %}
  29. {% if values.zwave.serial_port %}
  30. {% if not values.zwave.serial_port.startswith("/dev/serial/by-id/") %}
  31. {% do tpl.funcs.fail("Z-Wave serial port must start with [/dev/serial/by-id/]") %}
  32. {% endif %}
  33. {% do c1.add_group(20) %} {# dialout group for usb devices #}
  34. {% do c1.add_udev(read_only=True) %}
  35. {% do c1.devices.add_device(values.zwave.serial_port, values.consts.zwave_serial_path) %}
  36. {% endif %}
  37. {% do c1.add_port(values.network.web_port) %}
  38. {% do c1.add_port(values.network.ws_port) %}
  39. {% do c1.add_storage(values.consts.data_path, values.storage.data) %}
  40. {% do config.add_storage(values.consts.data_path, values.storage.data) %}
  41. {% do perm_container.add_or_skip_action("data", values.storage.data, perms_config) %}
  42. {% for store in values.storage.additional_storage %}
  43. {% do c1.add_storage(store.mount_path, store) %}
  44. {% do perm_container.add_or_skip_action(store.mount_path, store, perms_config) %}
  45. {% endfor %}
  46. {% if perm_container.has_actions() %}
  47. {% do perm_container.activate() %}
  48. {% do c1.depends.add_dependency(values.consts.perms_container_name, "service_completed_successfully") %}
  49. {% do config.depends.add_dependency(values.consts.perms_container_name, "service_completed_successfully") %}
  50. {% endif %}
  51. {% do tpl.portals.add(values.network.web_port, {"scheme": proto}) %}
  52. {{ tpl.render() | tojson }}