forked from hashgraph/guardian
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathdocker-compose-DEV-ONLYSERVERS.yml
98 lines (91 loc) · 2.39 KB
/
docker-compose-DEV-ONLYSERVERS.yml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
version: "3.8"
services:
mongo:
image: mongo:6.0.3
command: "--setParameter allowDiskUseByDefault=true"
restart: always
expose:
- 27017
ports:
- 27017:27017
mongo-express:
image: mongo-express:1.0.0-alpha.4
expose:
- 8081
environment:
ME_CONFIG_MONGODB_SERVER: mongo
ME_CONFIG_MONGODB_PORT: 27017
ME_CONFIG_SITE_BASEURL: /mongo-admin
depends_on:
- mongo
# ipfs-node:
# image: ipfs/kubo:v0.18.1
# ports:
# - "5001:5001"
# - "5002:5002"
# - "4001:4001"
# - "4002:4002"
# - "8080:8080"
# - "8081:8081"
# volumes:
# - ./runtime-data/ipfs/staging:/export:rw
# - ./runtime-data/ipfs/data:/data/ipfs:rw
message-broker:
image: nats:2.9.8
expose:
- 4222
ports:
- '8222:8222'
- '4222:4222'
- '6222:6222'
command: '--http_port 8222'
consul:
image: consul:1.12.4
container_name: consul
restart: "on-failure"
volumes:
- ./vault/hashicorp/consul/config/consul.json:/consul/config/consul.json:ro
- ./vault/hashicorp/certs/consul/tls:/consul/tls
ports:
- 8500:8500
entrypoint:
- sh
- -ca
- |
chown consul:consul /consul/tls
consul agent -config-file=/consul/config/consul.json
vault:
image: vault:1.12.2
container_name: vault
restart: "on-failure"
tty: true
volumes:
- ./vault/hashicorp/vault/config/vault.json:/vault/config/vault.json
- ./vault/hashicorp/vault/repository/policies:/vault/policies
- ./vault/hashicorp/vault/repository/data:/vault/data
- ./vault/hashicorp/vault/repository/logs:/vault/logs
- ./vault/hashicorp/certs/vault/tls:/vault/tls:ro
- ./vault/hashicorp/certs/vault/client:/vault/client/tls
environment:
ROOT_TOKEN_PATH: /vault/.root
VAULT_ADDR: https://vault:8200
VAULT_CACERT: /vault/tls/ca.crt
VAULT_CLIENT_CERT: /vault/client/tls/tls.crt
VAULT_CLIENT_KEY: /vault/client/tls/tls.key
entrypoint:
- sh
- -c
- |
vault server -config=/vault/config/vault.json
expose:
- 8200
ports:
- 8200:8200
healthcheck:
test: [ "CMD", "curl", "-i", "https://127.0.0.1:8200/v1/sys/health?drsecondarycode=200" ]
interval: 10s
timeout: 3s
retries: 10
start_period: 5s
depends_on:
- consul