101 lines
3.5 KiB
YAML
101 lines
3.5 KiB
YAML
# Compose v2 - Tron Gateway
|
|
|
|
x-common-env: &common-env
|
|
env_file:
|
|
- ../env/.env.runtime
|
|
- ../env/.env.version
|
|
|
|
volumes:
|
|
tron-gateway-vault-run:
|
|
driver: local
|
|
driver_opts:
|
|
type: tmpfs
|
|
device: tmpfs
|
|
o: size=8m,uid=0,gid=0,mode=0700
|
|
|
|
networks:
|
|
sendico-net:
|
|
external: true
|
|
name: sendico-net
|
|
|
|
services:
|
|
sendico_tron_gateway:
|
|
<<: *common-env
|
|
container_name: sendico-tron-gateway
|
|
restart: unless-stopped
|
|
image: ${REGISTRY_URL}/gateway/tron:${APP_V}
|
|
pull_policy: always
|
|
environment:
|
|
TRON_GATEWAY_MONGO_HOST: ${TRON_GATEWAY_MONGO_HOST}
|
|
TRON_GATEWAY_MONGO_PORT: ${TRON_GATEWAY_MONGO_PORT}
|
|
TRON_GATEWAY_MONGO_DATABASE: ${TRON_GATEWAY_MONGO_DATABASE}
|
|
TRON_GATEWAY_MONGO_USER: ${TRON_GATEWAY_MONGO_USER}
|
|
TRON_GATEWAY_MONGO_PASSWORD: ${TRON_GATEWAY_MONGO_PASSWORD}
|
|
TRON_GATEWAY_MONGO_AUTH_SOURCE: ${TRON_GATEWAY_MONGO_AUTH_SOURCE}
|
|
TRON_GATEWAY_MONGO_REPLICA_SET: ${TRON_GATEWAY_MONGO_REPLICA_SET}
|
|
MONGO_HOSTS_0: ${MONGO_HOSTS_0}
|
|
MONGO_PORTS_0: ${MONGO_PORTS_0}
|
|
MONGO_HOSTS_1: ${MONGO_HOSTS_1}
|
|
MONGO_PORTS_1: ${MONGO_PORTS_1}
|
|
MONGO_HOSTS_2: ${MONGO_HOSTS_2}
|
|
MONGO_PORTS_2: ${MONGO_PORTS_2}
|
|
NATS_URL: ${NATS_URL}
|
|
NATS_HOST: ${NATS_HOST}
|
|
NATS_PORT: ${NATS_PORT}
|
|
NATS_USER: ${NATS_USER}
|
|
NATS_PASSWORD: ${NATS_PASSWORD}
|
|
TRON_GATEWAY_RPC_URL: ${TRON_GATEWAY_RPC_URL}
|
|
TRON_GATEWAY_GRPC_URL: ${TRON_GATEWAY_GRPC_URL}
|
|
TRON_GATEWAY_GRPC_TOKEN: ${TRON_GATEWAY_GRPC_TOKEN}
|
|
TRON_GATEWAY_SERVICE_WALLET_KEY: ${TRON_GATEWAY_SERVICE_WALLET_KEY}
|
|
TRON_GATEWAY_SERVICE_WALLET_ADDRESS: ${TRON_GATEWAY_SERVICE_WALLET_ADDRESS}
|
|
TRON_GATEWAY_GRPC_PORT: ${TRON_GATEWAY_GRPC_PORT}
|
|
TRON_GATEWAY_METRICS_PORT: ${TRON_GATEWAY_METRICS_PORT}
|
|
VAULT_TOKEN_FILE: /run/vault/token
|
|
command: ["--config.file", "/app/config.yml"]
|
|
ports:
|
|
- "0.0.0.0:${TRON_GATEWAY_GRPC_PORT}:50071"
|
|
- "0.0.0.0:${TRON_GATEWAY_METRICS_PORT}:9407"
|
|
volumes:
|
|
- tron-gateway-vault-run:/run/vault:ro
|
|
depends_on:
|
|
sendico_tron_gateway_vault_agent:
|
|
condition: service_healthy
|
|
healthcheck:
|
|
test: ["CMD-SHELL","wget -qO- http://localhost:9407/health | grep -q '\"status\":\"ok\"'"]
|
|
interval: 30s
|
|
timeout: 10s
|
|
retries: 3
|
|
start_period: 60s
|
|
networks:
|
|
- sendico-net
|
|
|
|
sendico_tron_gateway_vault_agent:
|
|
<<: *common-env
|
|
container_name: sendico-tron-gateway-vault-agent
|
|
restart: unless-stopped
|
|
image: hashicorp/vault:latest
|
|
pull_policy: always
|
|
cap_add: ["IPC_LOCK"]
|
|
environment:
|
|
VAULT_ADDR: ${VAULT_ADDR}
|
|
TRON_GATEWAY_VAULT_ROLE_ID: ${TRON_GATEWAY_VAULT_ROLE_ID}
|
|
TRON_GATEWAY_VAULT_SECRET_ID: ${TRON_GATEWAY_VAULT_SECRET_ID}
|
|
command: >
|
|
sh -lc 'set -euo pipefail; umask 077;
|
|
: "${TRON_GATEWAY_VAULT_ROLE_ID:?}"; : "${TRON_GATEWAY_VAULT_SECRET_ID:?}";
|
|
printf "%s" "$TRON_GATEWAY_VAULT_ROLE_ID" > /run/vault/role_id;
|
|
printf "%s" "$TRON_GATEWAY_VAULT_SECRET_ID" > /run/vault/secret_id;
|
|
unset TRON_GATEWAY_VAULT_ROLE_ID TRON_GATEWAY_VAULT_SECRET_ID;
|
|
exec vault agent -config=/etc/vault/agent/tron-gateway.hcl'
|
|
volumes:
|
|
- ./vault-agent/tron-gateway.hcl:/etc/vault/agent/tron-gateway.hcl:ro
|
|
- tron-gateway-vault-run:/run/vault
|
|
healthcheck:
|
|
test: ["CMD","test","-s","/run/vault/token"]
|
|
interval: 10s
|
|
timeout: 5s
|
|
retries: 6
|
|
networks:
|
|
- sendico-net
|