206 lines
7.2 KiB
YAML
206 lines
7.2 KiB
YAML
name: clarity-platform
|
|
|
|
# ─────────────────────────────────────────────────────────────────────────────
|
|
# Platform Infrastructure — run once, always on.
|
|
# This is NOT part of Aspire orchestration.
|
|
#
|
|
# Usage:
|
|
# docker compose up -d
|
|
# docker compose down (keeps volumes)
|
|
# docker compose down -v (destroys all data — careful!)
|
|
#
|
|
# Hardcoded dev credentials — do not use in production.
|
|
# ─────────────────────────────────────────────────────────────────────────────
|
|
|
|
networks:
|
|
clarity-net:
|
|
name: clarity-net
|
|
external: true
|
|
|
|
volumes:
|
|
postgres-data:
|
|
minio-data:
|
|
clarity-gitea-data:
|
|
external: true
|
|
|
|
services:
|
|
|
|
# ── Postgres ──────────────────────────────────────────────────────────────
|
|
# Single server for all platform databases.
|
|
# Databases: keycloakdb, giteadb, controlplanedb
|
|
# Tenant databases (clarity_{subdomain}) are created at provisioning time by ControlPlane.Worker.
|
|
postgres:
|
|
image: postgres:17.6
|
|
container_name: clarity-postgres
|
|
restart: unless-stopped
|
|
ports:
|
|
- "5432:5432"
|
|
environment:
|
|
POSTGRES_USER: postgres
|
|
POSTGRES_PASSWORD: postgres
|
|
POSTGRES_DB: postgres
|
|
volumes:
|
|
- postgres-data:/var/lib/postgresql/data
|
|
- ./postgres/init.sql:/docker-entrypoint-initdb.d/init.sql:ro
|
|
networks:
|
|
clarity-net:
|
|
aliases:
|
|
- postgres
|
|
healthcheck:
|
|
test: ["CMD-SHELL", "pg_isready -U postgres"]
|
|
interval: 5s
|
|
timeout: 5s
|
|
retries: 10
|
|
|
|
# ── Keycloak ──────────────────────────────────────────────────────────────
|
|
keycloak:
|
|
image: quay.io/keycloak/keycloak:26.2
|
|
container_name: clarity-keycloak
|
|
restart: unless-stopped
|
|
ports:
|
|
- "8080:8080"
|
|
environment:
|
|
KC_DB: postgres
|
|
KC_DB_URL: jdbc:postgresql://postgres:5432/keycloakdb
|
|
KC_DB_USERNAME: postgres
|
|
KC_DB_PASSWORD: postgres
|
|
KC_BOOTSTRAP_ADMIN_USERNAME: admin
|
|
KC_BOOTSTRAP_ADMIN_PASSWORD: Admin1234!
|
|
KC_HOSTNAME: keycloak.clarity.test
|
|
KC_HOSTNAME_URL: https://keycloak.clarity.test
|
|
KC_HOSTNAME_PORT: "443"
|
|
KC_HOSTNAME_STRICT: "false"
|
|
KC_PROXY_HEADERS: xforwarded
|
|
volumes:
|
|
- ./keycloak:/opt/keycloak/data/import:ro
|
|
command: start-dev --import-realm
|
|
depends_on:
|
|
postgres:
|
|
condition: service_healthy
|
|
networks:
|
|
clarity-net:
|
|
aliases:
|
|
- keycloak
|
|
healthcheck:
|
|
test: ["CMD-SHELL", "curl -sf http://localhost:8080/health/ready || exit 1"]
|
|
interval: 10s
|
|
timeout: 5s
|
|
retries: 15
|
|
|
|
# ── Vault ─────────────────────────────────────────────────────────────────
|
|
vault:
|
|
image: hashicorp/vault:latest
|
|
container_name: clarity-vault
|
|
restart: unless-stopped
|
|
ports:
|
|
- "8200:8200"
|
|
cap_add:
|
|
- IPC_LOCK
|
|
user: root
|
|
entrypoint: ["sh", "/vault/entrypoint.sh"]
|
|
volumes:
|
|
- ./vault/config/vault.hcl:/vault/config/vault.hcl:ro
|
|
- ./vault/entrypoint.sh:/vault/entrypoint.sh:ro
|
|
- ./vault/data:/vault/file
|
|
networks:
|
|
clarity-net:
|
|
aliases:
|
|
- vault
|
|
healthcheck:
|
|
test: ["CMD-SHELL", "vault status -address=http://127.0.0.1:8200 | grep -q 'Sealed' || vault status -address=http://127.0.0.1:8200 | grep -q 'false'"]
|
|
interval: 10s
|
|
timeout: 5s
|
|
retries: 10
|
|
|
|
# ── MinIO ─────────────────────────────────────────────────────────────────
|
|
minio:
|
|
image: minio/minio:latest
|
|
container_name: clarity-minio
|
|
restart: unless-stopped
|
|
ports:
|
|
- "9000:9000"
|
|
- "9001:9001"
|
|
environment:
|
|
MINIO_ROOT_USER: minioadmin
|
|
MINIO_ROOT_PASSWORD: minioadmin
|
|
command: server /data --console-address ":9001"
|
|
volumes:
|
|
- minio-data:/data
|
|
networks:
|
|
clarity-net:
|
|
aliases:
|
|
- minio
|
|
healthcheck:
|
|
test: ["CMD-SHELL", "curl -sf http://localhost:9000/minio/health/live || exit 1"]
|
|
interval: 10s
|
|
timeout: 5s
|
|
retries: 10
|
|
|
|
# ── Nginx (wildcard reverse proxy) ────────────────────────────────────────
|
|
# Routes {subdomain}.clarity.test → correct tenant container via Docker DNS.
|
|
# ControlPlane.Worker writes per-tenant configs into conf.d/ at provisioning time.
|
|
nginx:
|
|
image: nginx:alpine
|
|
container_name: clarity-nginx
|
|
restart: unless-stopped
|
|
ports:
|
|
- "80:80"
|
|
- "443:443"
|
|
volumes:
|
|
- ./nginx/nginx.conf:/etc/nginx/nginx.conf:ro
|
|
- ./nginx/conf.d:/etc/nginx/conf.d
|
|
- ./nginx/clarity.test.crt:/etc/nginx/certs/clarity.test.crt:ro
|
|
- ./nginx/clarity.test.key:/etc/nginx/certs/clarity.test.key:ro
|
|
networks:
|
|
clarity-net:
|
|
aliases:
|
|
- nginx
|
|
|
|
# ── Gitea ─────────────────────────────────────────────────────────────────
|
|
# Platform source control. Hosts OPC, Clarity, and Gateway repos.
|
|
# Accessible at https://opc.clarity.test (nginx terminates TLS).
|
|
gitea:
|
|
image: gitea/gitea:latest
|
|
container_name: clarity-gitea
|
|
restart: unless-stopped
|
|
ports:
|
|
- "3000:3000"
|
|
- "2222:22"
|
|
environment:
|
|
GITEA__database__DB_TYPE: postgres
|
|
GITEA__database__HOST: postgres:5432
|
|
GITEA__database__NAME: giteadb
|
|
GITEA__database__USER: postgres
|
|
GITEA__database__PASSWD: postgres
|
|
GITEA__server__DOMAIN: opc.clarity.test
|
|
GITEA__server__ROOT_URL: https://opc.clarity.test
|
|
GITEA__server__SSH_DOMAIN: opc.clarity.test
|
|
GITEA__server__SSH_PORT: "2222"
|
|
GITEA__service__DISABLE_REGISTRATION: "true"
|
|
GITEA__webhook__ALLOWED_HOST_LIST: "host.docker.internal,loopback,private"
|
|
volumes:
|
|
- clarity-gitea-data:/data
|
|
depends_on:
|
|
postgres:
|
|
condition: service_healthy
|
|
networks:
|
|
clarity-net:
|
|
aliases:
|
|
- gitea
|
|
|
|
# ── Dnsmasq ───────────────────────────────────────────────────────────────
|
|
# Resolves *.clarity.test → 127.0.0.1 so browser requests hit nginx on the host.
|
|
dnsmasq:
|
|
image: andyshinn/dnsmasq
|
|
container_name: clarity-dnsmasq
|
|
restart: unless-stopped
|
|
ports:
|
|
- "53:53/udp"
|
|
cap_add:
|
|
- NET_ADMIN
|
|
volumes:
|
|
- ./dnsmasq/dnsmasq.conf:/etc/dnsmasq.conf:ro
|
|
networks:
|
|
clarity-net:
|
|
aliases:
|
|
- dnsmasq |