mirror of
https://github.com/btouchard/ackify-ce.git
synced 2026-02-07 22:39:46 -06:00
- Add 'health' subcommand to ackify binary for Docker HEALTHCHECK - Add HEALTHCHECK directive to Dockerfile - Add healthcheck configuration to all compose files - Supports custom port via ACKIFY_LISTEN_ADDR Closes #21
143 lines
5.7 KiB
Plaintext
143 lines
5.7 KiB
Plaintext
## SPDX-License-Identifier: AGPL-3.0-or-later
|
|
name: ackify-ce
|
|
|
|
services:
|
|
ackify-migrate:
|
|
image: btouchard/ackify-ce:latest
|
|
container_name: ackify-migrate
|
|
environment:
|
|
ACKIFY_DB_DSN: "postgres://postgres:${POSTGRES_PASSWORD}@ackify-db:5432/ackify?sslmode=disable"
|
|
ACKIFY_APP_PASSWORD: "${ACKIFY_APP_PASSWORD}"
|
|
depends_on:
|
|
ackify-db:
|
|
condition: service_healthy
|
|
networks:
|
|
- internal
|
|
command: ["/app/migrate", "up"]
|
|
entrypoint: []
|
|
restart: "no"
|
|
|
|
ackify-ce:
|
|
image: btouchard/ackify-ce:latest
|
|
container_name: ackify-ce
|
|
restart: unless-stopped
|
|
environment:
|
|
ACKIFY_LOG_LEVEL: "${ACKIFY_LOG_LEVEL}"
|
|
ACKIFY_LOG_FORMAT: "${ACKIFY_LOG_FORMAT:-classic}"
|
|
ACKIFY_BASE_URL: "${ACKIFY_BASE_URL}"
|
|
ACKIFY_ORGANISATION: "${ACKIFY_ORGANISATION}"
|
|
ACKIFY_ADMIN_EMAILS: "${ACKIFY_ADMIN_EMAILS}"
|
|
ACKIFY_ONLY_ADMIN_CAN_CREATE: "${ACKIFY_ONLY_ADMIN_CAN_CREATE:-false}"
|
|
ACKIFY_LISTEN_ADDR: ":8080"
|
|
ACKIFY_DB_DSN: "postgres://ackify_app:${ACKIFY_APP_PASSWORD}@ackify-db:5432/ackify?sslmode=disable"
|
|
ACKIFY_OAUTH_PROVIDER: "${ACKIFY_OAUTH_PROVIDER:-}"
|
|
ACKIFY_OAUTH_CLIENT_ID: "${ACKIFY_OAUTH_CLIENT_ID:-}"
|
|
ACKIFY_OAUTH_CLIENT_SECRET: "${ACKIFY_OAUTH_CLIENT_SECRET:-}"
|
|
ACKIFY_OAUTH_AUTH_URL: "${ACKIFY_OAUTH_AUTH_URL:-}"
|
|
ACKIFY_OAUTH_TOKEN_URL: "${ACKIFY_OAUTH_TOKEN_URL:-}"
|
|
ACKIFY_OAUTH_USERINFO_URL: "${ACKIFY_OAUTH_USERINFO_URL:-}"
|
|
ACKIFY_OAUTH_LOGOUT_URL: "${ACKIFY_OAUTH_LOGOUT_URL:-}"
|
|
ACKIFY_OAUTH_ALLOWED_DOMAIN: "${ACKIFY_OAUTH_ALLOWED_DOMAIN:-}"
|
|
ACKIFY_OAUTH_SCOPES: "${ACKIFY_OAUTH_SCOPES:-}"
|
|
ACKIFY_OAUTH_GITLAB_URL: "${ACKIFY_OAUTH_GITLAB_URL:-}"
|
|
ACKIFY_OAUTH_AUTO_LOGIN: "${ACKIFY_OAUTH_AUTO_LOGIN:-}"
|
|
ACKIFY_OAUTH_COOKIE_SECRET: "${ACKIFY_OAUTH_COOKIE_SECRET}"
|
|
ACKIFY_AUTH_OAUTH_ENABLED: "${ACKIFY_AUTH_OAUTH_ENABLED:-}"
|
|
ACKIFY_AUTH_MAGICLINK_ENABLED: "${ACKIFY_AUTH_MAGICLINK_ENABLED:-}"
|
|
ACKIFY_AUTH_MAGICLINK_RATE_LIMIT_EMAIL: "${ACKIFY_AUTH_MAGICLINK_RATE_LIMIT_EMAIL:-3}"
|
|
ACKIFY_AUTH_MAGICLINK_RATE_LIMIT_IP: "${ACKIFY_AUTH_MAGICLINK_RATE_LIMIT_IP:-10}"
|
|
ACKIFY_AUTH_RATE_LIMIT: "${ACKIFY_AUTH_RATE_LIMIT:-5}"
|
|
ACKIFY_DOCUMENT_RATE_LIMIT: "${ACKIFY_DOCUMENT_RATE_LIMIT:-10}"
|
|
ACKIFY_GENERAL_RATE_LIMIT: "${ACKIFY_GENERAL_RATE_LIMIT:-100}"
|
|
ACKIFY_ED25519_PRIVATE_KEY: "${ACKIFY_ED25519_PRIVATE_KEY}"
|
|
ACKIFY_MAIL_HOST: "${ACKIFY_MAIL_HOST:-}"
|
|
ACKIFY_MAIL_PORT: "${ACKIFY_MAIL_PORT:-}"
|
|
ACKIFY_MAIL_USERNAME: "${ACKIFY_MAIL_USERNAME:-}"
|
|
ACKIFY_MAIL_PASSWORD: "${ACKIFY_MAIL_PASSWORD:-}"
|
|
ACKIFY_MAIL_TLS: "${ACKIFY_MAIL_TLS:-}"
|
|
ACKIFY_MAIL_STARTTLS: "${ACKIFY_MAIL_STARTTLS:-}"
|
|
ACKIFY_MAIL_INSECURE_SKIP_VERIFY: "${ACKIFY_MAIL_INSECURE_SKIP_VERIFY:-false}"
|
|
ACKIFY_MAIL_TIMEOUT: "${ACKIFY_MAIL_TIMEOUT:-}"
|
|
ACKIFY_MAIL_FROM: "${ACKIFY_MAIL_FROM:-}"
|
|
ACKIFY_MAIL_FROM_NAME: "${ACKIFY_MAIL_FROM_NAME:-}"
|
|
ACKIFY_MAIL_SUBJECT_PREFIX: "${ACKIFY_MAIL_SUBJECT_PREFIX:-}"
|
|
ACKIFY_MAIL_TEMPLATE_DIR: "${ACKIFY_MAIL_TEMPLATE_DIR:-}"
|
|
ACKIFY_MAIL_DEFAULT_LOCALE: "${ACKIFY_MAIL_DEFAULT_LOCALE:-}"
|
|
ACKIFY_CHECKSUM_MAX_BYTES: "${ACKIFY_CHECKSUM_MAX_BYTES:-10485760}"
|
|
ACKIFY_CHECKSUM_TIMEOUT_MS: "${ACKIFY_CHECKSUM_TIMEOUT_MS:-5000}"
|
|
ACKIFY_CHECKSUM_MAX_REDIRECTS: "${ACKIFY_CHECKSUM_MAX_REDIRECTS:-3}"
|
|
ACKIFY_CHECKSUM_ALLOWED_TYPES: "${ACKIFY_CHECKSUM_ALLOWED_TYPES:-}"
|
|
ACKIFY_IMPORT_MAX_SIGNERS: "${ACKIFY_IMPORT_MAX_SIGNERS:-500}"
|
|
ACKIFY_TELEMETRY: "${ACKIFY_TELEMETRY:-false}"
|
|
ACKIFY_TELEMETRY_DATA_DIR: "${ACKIFY_TELEMETRY_DATA_DIR:-/data/telemetry}"
|
|
ACKIFY_STORAGE_TYPE: "${ACKIFY_STORAGE_TYPE:-}"
|
|
ACKIFY_STORAGE_LOCAL_PATH: "${ACKIFY_STORAGE_LOCAL_PATH:-/data/documents}"
|
|
ACKIFY_STORAGE_MAX_SIZE_MB: "${ACKIFY_STORAGE_MAX_SIZE_MB:-50}"
|
|
ACKIFY_STORAGE_S3_ENDPOINT: "${ACKIFY_STORAGE_S3_ENDPOINT:-}"
|
|
ACKIFY_STORAGE_S3_BUCKET: "${ACKIFY_STORAGE_S3_BUCKET:-}"
|
|
ACKIFY_STORAGE_S3_ACCESS_KEY: "${ACKIFY_STORAGE_S3_ACCESS_KEY:-}"
|
|
ACKIFY_STORAGE_S3_SECRET_KEY: "${ACKIFY_STORAGE_S3_SECRET_KEY:-}"
|
|
ACKIFY_STORAGE_S3_REGION: "${ACKIFY_STORAGE_S3_REGION:-}"
|
|
ACKIFY_STORAGE_S3_USE_SSL: "${ACKIFY_STORAGE_S3_USE_SSL:-true}"
|
|
volumes:
|
|
- ackify_storage:/data/documents
|
|
- ./telemetry:/data/telemetry
|
|
depends_on:
|
|
ackify-migrate:
|
|
condition: service_completed_successfully
|
|
ackify-db:
|
|
condition: service_healthy
|
|
#BEGIN:traefik
|
|
labels:
|
|
- traefik.enable=true
|
|
- traefik.http.routers.${APP_NAME}.entrypoints=websecure
|
|
- traefik.http.routers.${APP_NAME}.rule=Host(`${APP_DNS}`)
|
|
- traefik.http.routers.${APP_NAME}.tls.certresolver=${TRAEFIK_CERTRESOLVER}
|
|
- traefik.http.services.${APP_NAME}.loadbalancer.server.port=8080
|
|
#END:traefik
|
|
networks:
|
|
- internal
|
|
#BEGIN:traefik
|
|
- traefik
|
|
#END:traefik
|
|
#BEGIN:ports
|
|
ports:
|
|
- "8080:8080"
|
|
#END:ports
|
|
healthcheck:
|
|
test: ["CMD", "/app/ackify", "health"]
|
|
interval: 30s
|
|
timeout: 5s
|
|
start_period: 10s
|
|
retries: 3
|
|
|
|
ackify-db:
|
|
image: postgres:16-alpine
|
|
container_name: ackify-db
|
|
restart: unless-stopped
|
|
environment:
|
|
POSTGRES_USER: postgres
|
|
POSTGRES_PASSWORD: ${POSTGRES_PASSWORD}
|
|
POSTGRES_DB: ackify
|
|
volumes:
|
|
- ackify_data:/var/lib/postgresql/data
|
|
networks:
|
|
- internal
|
|
healthcheck:
|
|
test: ["CMD-SHELL", "pg_isready -U postgres -d ackify"]
|
|
interval: 10s
|
|
timeout: 5s
|
|
retries: 5
|
|
|
|
networks:
|
|
internal:
|
|
#BEGIN:traefik
|
|
traefik:
|
|
name: ${TRAEFIK_NETWORK:-traefik}
|
|
external: true
|
|
#END:traefik
|
|
|
|
volumes:
|
|
ackify_data:
|
|
ackify_storage:
|