reenable healthcheck, formatting
This commit is contained in:
parent
d3dc008f5b
commit
9a7723167f
35
compose.yml
35
compose.yml
|
@ -3,11 +3,11 @@ version: "3.8"
|
|||
|
||||
services:
|
||||
api:
|
||||
image: vikunja/api
|
||||
image: vikunja/api
|
||||
environment:
|
||||
- DOMAIN
|
||||
- LOG_LEVEL
|
||||
volumes:
|
||||
volumes:
|
||||
- files:/app/vikunja/files
|
||||
networks:
|
||||
- proxy
|
||||
|
@ -27,13 +27,13 @@ services:
|
|||
- "traefik.http.routers.${STACK_NAME}_api.rule=Host(`${DOMAIN}`) && PathPrefix(`/api/v1`, `/dav/`, `/.well-known/`)"
|
||||
- "traefik.http.routers.${STACK_NAME}_api.entrypoints=web-secure"
|
||||
- "traefik.http.routers.${STACK_NAME}_api.tls.certresolver=${LETS_ENCRYPT_ENV}"
|
||||
# healthcheck:
|
||||
# test: ["CMD", "curl", "-f", "http://localhost:3456"]
|
||||
# interval: 30s
|
||||
# timeout: 10s
|
||||
# retries: 10
|
||||
# start_period: 1m
|
||||
|
||||
healthcheck:
|
||||
test: [ "CMD", "curl", "-f", "http://localhost:3456" ]
|
||||
interval: 30s
|
||||
timeout: 10s
|
||||
retries: 10
|
||||
start_period: 1m
|
||||
|
||||
app:
|
||||
image: vikunja/frontend
|
||||
networks:
|
||||
|
@ -49,7 +49,7 @@ services:
|
|||
- "traefik.http.routers.${STACK_NAME}.tls.certresolver=${LETS_ENCRYPT_ENV}"
|
||||
- "coop-cloud.${STACK_NAME}.version="
|
||||
healthcheck:
|
||||
test: ["CMD", "curl", "-f", "http://localhost"]
|
||||
test: [ "CMD", "curl", "-f", "http://localhost" ]
|
||||
interval: 30s
|
||||
timeout: 10s
|
||||
retries: 10
|
||||
|
@ -69,7 +69,7 @@ services:
|
|||
volumes:
|
||||
- db:/var/lib/postgresql/data
|
||||
healthcheck:
|
||||
test: ["CMD", "pg_isready", "-U", "vikunja"]
|
||||
test: [ "CMD", "pg_isready", "-U", "vikunja" ]
|
||||
networks:
|
||||
- internal
|
||||
secrets:
|
||||
|
@ -78,21 +78,22 @@ services:
|
|||
restart_policy:
|
||||
condition: on-failure
|
||||
labels:
|
||||
backupbot.backup: "true"
|
||||
backupbot.backup.pre-hook: "mkdir -p /tmp/backup/ && PGPASSWORD=$$(cat $${POSTGRES_PASSWORD_FILE}) pg_dump -U $${POSTGRES_USER} $${POSTGRES_DB} > /tmp/backup/backup.sql"
|
||||
backupbot.backup.post-hook: "rm -rf /tmp/backup"
|
||||
backupbot.backup.path: "/tmp/backup/"
|
||||
|
||||
backupbot.backup: "true"
|
||||
backupbot.backup.pre-hook: "mkdir -p /tmp/backup/ && PGPASSWORD=$$(cat $${POSTGRES_PASSWORD_FILE}) pg_dump -U $${POSTGRES_USER} $${POSTGRES_DB} > /tmp/backup/backup.sql"
|
||||
backupbot.backup.post-hook: "rm -rf /tmp/backup"
|
||||
backupbot.backup.path: "/tmp/backup/"
|
||||
|
||||
volumes:
|
||||
files:
|
||||
db:
|
||||
|
||||
|
||||
networks:
|
||||
proxy:
|
||||
external: true
|
||||
internal:
|
||||
|
||||
|
||||
configs:
|
||||
config_yml:
|
||||
name: ${STACK_NAME}_config_yml_${CONFIG_YML_VERSION}
|
||||
|
@ -105,4 +106,4 @@ secrets:
|
|||
name: ${STACK_NAME}_db_password_${SECRET_DB_PASSWORD_VERSION}
|
||||
jwt_secret:
|
||||
external: true
|
||||
name: ${STACK_NAME}_jwt_secret_${SECRET_JWT_SECRET_VERSION}
|
||||
name: ${STACK_NAME}_jwt_secret_${SECRET_JWT_SECRET_VERSION}
|
||||
|
|
Loading…
Reference in New Issue