mirror of
https://github.com/meienberger/runtipi.git
synced 2024-10-03 23:28:33 +03:00
8761e61c96
* chore: bump version to 3.6.1 * fix: use process.env in inversify container instead of getEnv * chore: allow to set log level manually * fix(worker): convert generateEnv function to sync and call it before everything else * test(worker): fix broken test due to method signature change * ci: use docker cloud build for official releases * fix(env): reload env after generating * ci: remove cache upload steps from docker builds * refactor: use classes in singleton scope * chore: remove test logs
192 lines
7.3 KiB
YAML
192 lines
7.3 KiB
YAML
services:
|
|
runtipi-reverse-proxy:
|
|
container_name: runtipi-reverse-proxy
|
|
depends_on:
|
|
runtipi:
|
|
condition: service_healthy
|
|
image: traefik:v3.0
|
|
restart: unless-stopped
|
|
ports:
|
|
- 80:80
|
|
- 443:443
|
|
- 8080:8080
|
|
command: --providers.docker
|
|
volumes:
|
|
- ./traefik:/etc/traefik
|
|
- ./traefik/shared:/shared
|
|
- /var/run/docker.sock:/var/run/docker.sock:ro
|
|
networks:
|
|
- tipi_main_network
|
|
|
|
runtipi-db:
|
|
container_name: runtipi-db
|
|
image: postgres:14
|
|
restart: unless-stopped
|
|
stop_grace_period: 1m
|
|
volumes:
|
|
- pgdata:/var/lib/postgresql/data
|
|
ports:
|
|
- 5432:5432
|
|
environment:
|
|
POSTGRES_PASSWORD: ${POSTGRES_PASSWORD}
|
|
POSTGRES_USER: tipi
|
|
POSTGRES_DB: tipi
|
|
healthcheck:
|
|
test: ["CMD-SHELL", "pg_isready -d tipi -U tipi"]
|
|
interval: 5s
|
|
timeout: 10s
|
|
retries: 120
|
|
networks:
|
|
- tipi_main_network
|
|
|
|
runtipi-redis:
|
|
container_name: runtipi-redis
|
|
image: redis:7.2.0
|
|
restart: unless-stopped
|
|
command: redis-server --requirepass ${REDIS_PASSWORD} --stop-writes-on-bgsave-error no
|
|
ports:
|
|
- 6379:6379
|
|
volumes:
|
|
- redisdata:/data
|
|
healthcheck:
|
|
test: ["CMD", "redis-cli", "ping"]
|
|
interval: 5s
|
|
timeout: 10s
|
|
retries: 120
|
|
networks:
|
|
- tipi_main_network
|
|
|
|
runtipi:
|
|
build:
|
|
context: .
|
|
dockerfile: Dockerfile
|
|
args:
|
|
LOCAL: true
|
|
TIPI_VERSION: development
|
|
container_name: runtipi
|
|
healthcheck:
|
|
test:
|
|
["CMD", "curl", "-f", "http://localhost:5000/worker-api/healthcheck"]
|
|
interval: 5s
|
|
timeout: 3s
|
|
retries: 20
|
|
restart: unless-stopped
|
|
depends_on:
|
|
runtipi-db:
|
|
condition: service_healthy
|
|
runtipi-redis:
|
|
condition: service_healthy
|
|
env_file:
|
|
- .env
|
|
volumes:
|
|
# Data
|
|
- ${RUNTIPI_MEDIA_PATH:-.}/media:/data/media
|
|
- ${RUNTIPI_STATE_PATH:-.}/state:/data/state
|
|
- ${RUNTIPI_REPOS_PATH:-.}/repos:/data/repos
|
|
- ${RUNTIPI_APPS_PATH:-.}/apps:/data/apps
|
|
- ${RUNTIPI_LOGS_PATH:-.}/logs:/data/logs
|
|
- ${RUNTIPI_TRAEFIK_PATH:-.}/traefik:/data/traefik
|
|
- ${RUNTIPI_USER_CONFIG_PATH:-.}/user-config:/data/user-config
|
|
- ${RUNTIPI_APP_DATA_PATH:-.}/app-data:/app-data
|
|
- ${RUNTIPI_BACKUPS_PATH:-.}/backups:/data/backups
|
|
# Static
|
|
- ./.env:/data/.env
|
|
- ./docker-compose.prod.yml:/data/docker-compose.yml
|
|
- /var/run/docker.sock:/var/run/docker.sock:ro
|
|
- /proc:/host/proc:ro
|
|
- /etc/localtime:/etc/localtime:ro
|
|
- /etc/timezone:/etc/timezone:ro
|
|
environment:
|
|
LOG_LEVEL: debug
|
|
LOCAL: true
|
|
NODE_ENV: production
|
|
networks:
|
|
- tipi_main_network
|
|
ports:
|
|
- 3000:3000
|
|
labels:
|
|
# ---- General ----- #
|
|
traefik.enable: true
|
|
traefik.http.middlewares.redirect-to-https.redirectscheme.scheme: https
|
|
|
|
# ---- Dashboard ----- #
|
|
traefik.http.services.dashboard.loadbalancer.server.port: 3000
|
|
# Local ip
|
|
traefik.http.routers.dashboard.rule: PathPrefix("/")
|
|
traefik.http.routers.dashboard.service: dashboard
|
|
traefik.http.routers.dashboard.entrypoints: web
|
|
# Websecure
|
|
traefik.http.routers.dashboard-insecure.rule: Host(`${DOMAIN}`) && PathPrefix(`/`)
|
|
traefik.http.routers.dashboard-insecure.service: dashboard
|
|
traefik.http.routers.dashboard-insecure.entrypoints: web
|
|
traefik.http.routers.dashboard-insecure.middlewares: redirect-to-https
|
|
traefik.http.routers.dashboard-secure.rule: Host(`${DOMAIN}`) && PathPrefix(`/`)
|
|
traefik.http.routers.dashboard-secure.service: dashboard
|
|
traefik.http.routers.dashboard-secure.entrypoints: websecure
|
|
traefik.http.routers.dashboard-secure.tls.certresolver: myresolver
|
|
# Local domain
|
|
traefik.http.routers.dashboard-local-insecure.rule: Host(`${LOCAL_DOMAIN}`)
|
|
traefik.http.routers.dashboard-local-insecure.entrypoints: web
|
|
traefik.http.routers.dashboard-local-insecure.service: dashboard
|
|
traefik.http.routers.dashboard-local-insecure.middlewares: redirect-to-https
|
|
# Secure
|
|
traefik.http.routers.dashboard-local.rule: Host(`${LOCAL_DOMAIN}`)
|
|
traefik.http.routers.dashboard-local.entrypoints: websecure
|
|
traefik.http.routers.dashboard-local.tls: true
|
|
traefik.http.routers.dashboard-local.service: dashboard
|
|
|
|
# ---- Worker ----- #
|
|
traefik.http.services.worker.loadbalancer.server.port: 5001
|
|
traefik.http.services.worker-api.loadbalancer.server.port: 5000
|
|
# Local ip
|
|
traefik.http.routers.worker.rule: PathPrefix("/worker")
|
|
traefik.http.routers.worker.service: worker
|
|
traefik.http.routers.worker.entrypoints: web
|
|
traefik.http.routers.worker-api.rule: PathPrefix("/worker-api")
|
|
traefik.http.routers.worker-api.service: worker-api
|
|
traefik.http.routers.worker-api.entrypoints: web
|
|
# Websecure
|
|
traefik.http.routers.worker-insecure.rule: Host(`${DOMAIN}`) && PathPrefix(`/worker`)
|
|
traefik.http.routers.worker-insecure.service: worker
|
|
traefik.http.routers.worker-insecure.entrypoints: web
|
|
traefik.http.routers.worker-insecure.middlewares: redirect-to-https
|
|
traefik.http.routers.worker-secure.rule: Host(`${DOMAIN}`) && PathPrefix(`/worker`)
|
|
traefik.http.routers.worker-secure.service: worker
|
|
traefik.http.routers.worker-secure.entrypoints: websecure
|
|
traefik.http.routers.worker-secure.tls.certresolver: myresolver
|
|
traefik.http.routers.worker-api-insecure.rule: Host(`${DOMAIN}`) && PathPrefix(`/worker-api`)
|
|
traefik.http.routers.worker-api-insecure.service: worker-api
|
|
traefik.http.routers.worker-api-insecure.entrypoints: web
|
|
traefik.http.routers.worker-api-insecure.middlewares: redirect-to-https
|
|
traefik.http.routers.worker-api-secure.rule: Host(`${DOMAIN}`) && PathPrefix(`/worker-api`)
|
|
traefik.http.routers.worker-api-secure.service: worker-api
|
|
traefik.http.routers.worker-api-secure.entrypoints: websecure
|
|
traefik.http.routers.worker-api-secure.tls.certresolver: myresolver
|
|
# Local domain
|
|
traefik.http.routers.worker-local-insecure.rule: Host(`${LOCAL_DOMAIN}`) && PathPrefix("/worker")
|
|
traefik.http.routers.worker-local-insecure.entrypoints: web
|
|
traefik.http.routers.worker-local-insecure.service: worker
|
|
traefik.http.routers.worker-local-insecure.middlewares: redirect-to-https
|
|
traefik.http.routers.worker-api-local-insecure.rule: Host(`${LOCAL_DOMAIN}`) && PathPrefix("/worker-api")
|
|
traefik.http.routers.worker-api-local-insecure.entrypoints: web
|
|
traefik.http.routers.worker-api-local-insecure.service: worker-api
|
|
traefik.http.routers.worker-api-local-insecure.middlewares: redirect-to-https
|
|
# Secure
|
|
traefik.http.routers.worker-local.rule: Host(`${LOCAL_DOMAIN}`) && PathPrefix("/worker")
|
|
traefik.http.routers.worker-local.entrypoints: websecure
|
|
traefik.http.routers.worker-local.tls: true
|
|
traefik.http.routers.worker-local.service: worker
|
|
traefik.http.routers.worker-api-local.rule: Host(`${LOCAL_DOMAIN}`) && PathPrefix("/worker-api")
|
|
traefik.http.routers.worker-api-local.entrypoints: websecure
|
|
traefik.http.routers.worker-api-local.tls: true
|
|
traefik.http.routers.worker-api-local.service: worker-api
|
|
|
|
networks:
|
|
tipi_main_network:
|
|
driver: bridge
|
|
name: runtipi_tipi_main_network
|
|
|
|
volumes:
|
|
pgdata:
|
|
redisdata:
|