145 lines
3.8 KiB
YAML
145 lines
3.8 KiB
YAML
---
|
|
services:
|
|
app:
|
|
image: directus/directus:${IMAGE_VERSION:-11}
|
|
|
|
environment:
|
|
DB_CLIENT: pg
|
|
DB_HOST: ${STACK_NAME}_db
|
|
DB_PORT: 5432
|
|
DB_DATABASE: directus
|
|
DB_USER: directus
|
|
DB_PASSWORD_FILE: /run/secrets/db_password
|
|
SECRET_FILE: /run/secrets/signing_secret
|
|
|
|
DB_POOL__MIN: 0
|
|
|
|
CACHE_ENABLED: "true"
|
|
CACHE_AUTO_PURGE: "true"
|
|
CACHE_STORE: "redis"
|
|
REDIS: "redis://${STACK_NAME}_cache:6379"
|
|
|
|
ADMIN_EMAIL: ${ADMIN_EMAIL}
|
|
ADMIN_PASSWORD_FILE: /run/secrets/admin_password
|
|
|
|
PUBLIC_URL: https://${DOMAIN}
|
|
|
|
networks:
|
|
- proxy
|
|
- internal
|
|
volumes:
|
|
- "uploads:/directus/uploads"
|
|
- "extensions:/directus/extensions"
|
|
|
|
depends_on:
|
|
- db
|
|
- cache
|
|
|
|
configs:
|
|
- source: directus_entrypoint
|
|
target: /abra-entrypoint.sh
|
|
mode: 0555
|
|
|
|
command: ["sh", "-c", "node cli.js bootstrap && pm2-runtime start ecosystem.config.cjs"]
|
|
entrypoint: /abra-entrypoint.sh
|
|
|
|
secrets:
|
|
- db_password
|
|
- admin_password
|
|
- signing_secret
|
|
|
|
deploy:
|
|
restart_policy:
|
|
condition: on-failure
|
|
labels:
|
|
- "traefik.enable=true"
|
|
- "traefik.http.services.${STACK_NAME}.loadbalancer.server.port=8055"
|
|
- "traefik.http.routers.${STACK_NAME}.rule=Host(`${DOMAIN}`${EXTRA_DOMAINS})"
|
|
- "traefik.http.routers.${STACK_NAME}.entrypoints=web-secure"
|
|
- "traefik.http.routers.${STACK_NAME}.tls.certresolver=${LETS_ENCRYPT_ENV}"
|
|
## Redirect from EXTRA_DOMAINS to DOMAIN
|
|
- "traefik.http.routers.${STACK_NAME}.middlewares=${STACK_NAME}-redirect"
|
|
## Redirect HTTP to HTTPS
|
|
- "traefik.http.middlewares.${STACK_NAME}-redirect.redirectscheme.scheme=https"
|
|
- "traefik.http.middlewares.${STACK_NAME}-redirect.redirectscheme.permanent=true"
|
|
- "coop-cloud.${STACK_NAME}.version=0.3.1+11"
|
|
|
|
healthcheck:
|
|
test: ["CMD-SHELL", "wget -qO- http://0.0.0.0:8055/server/health | grep -q '\"status\":\"ok\"'"]
|
|
timeout: 30s
|
|
retries: 10
|
|
start_interval: 5s
|
|
start_period: 90s
|
|
|
|
db:
|
|
image: postgis/postgis:13-master
|
|
volumes:
|
|
- "db:/var/lib/postgresql/data"
|
|
environment:
|
|
POSTGRES_USER: "directus"
|
|
POSTGRES_PASSWORD_FILE: /run/secrets/db_password
|
|
POSTGRES_DB: "directus"
|
|
secrets:
|
|
- db_password
|
|
networks:
|
|
- internal
|
|
deploy:
|
|
labels:
|
|
backupbot.backup: "${ENABLE_BACKUPS:-true}"
|
|
backupbot.backup.pre-hook: "/pg_backup.sh backup"
|
|
backupbot.backup.volumes.db.path: "backup.sql"
|
|
backupbot.restore.post-hook: '/pg_backup.sh restore'
|
|
backupbot.backup.volumes.cache: "false"
|
|
|
|
configs:
|
|
- source: pg_backup
|
|
target: /pg_backup.sh
|
|
mode: 0555
|
|
|
|
healthcheck:
|
|
test: ["CMD", "pg_isready", "--host=localhost", "--username=directus"]
|
|
interval: 30s
|
|
timeout: 10s
|
|
retries: 10
|
|
start_interval: 5s
|
|
start_period: 1m
|
|
cache:
|
|
image: redis:6
|
|
networks:
|
|
- internal
|
|
healthcheck:
|
|
test: ["CMD-SHELL", "[ $$(redis-cli ping) = 'PONG' ]"]
|
|
interval: 30s
|
|
timeout: 10s
|
|
retries: 10
|
|
start_interval: 5s
|
|
start_period: 1m
|
|
|
|
networks:
|
|
proxy:
|
|
external: true
|
|
internal:
|
|
|
|
volumes:
|
|
db:
|
|
uploads:
|
|
extensions:
|
|
|
|
secrets:
|
|
db_password:
|
|
name: ${STACK_NAME}_db_password_${SECRET_DB_PASSWORD_VERSION}
|
|
external: true
|
|
admin_password:
|
|
name: ${STACK_NAME}_admin_password_${SECRET_ADMIN_PASSWORD_VERSION}
|
|
external: true
|
|
signing_secret:
|
|
name: ${STACK_NAME}_signing_secret_${SECRET_SIGNING_SECRET_VERSION}
|
|
external: true
|
|
|
|
configs:
|
|
directus_entrypoint:
|
|
name: ${STACK_NAME}_directus_entrypoint_${DIRECTUS_ENTRYPOINT_VERSION}
|
|
file: entrypoint.sh
|
|
pg_backup:
|
|
name: ${STACK_NAME}_pg_backup_${PG_BACKUP_VERSION}
|
|
file: pg_backup.sh |