Daniel García
3 years ago
committed by
GitHub
19 changed files with 1170 additions and 193 deletions
@ -0,0 +1,126 @@ |
|||||
|
# syntax=docker/dockerfile:1 |
||||
|
|
||||
|
# This file was generated using a Jinja2 template. |
||||
|
# Please make your changes in `Dockerfile.j2` and then `make` the individual Dockerfiles. |
||||
|
|
||||
|
# Using multistage build: |
||||
|
# https://docs.docker.com/develop/develop-images/multistage-build/ |
||||
|
# https://whitfin.io/speeding-up-rust-docker-builds/ |
||||
|
####################### VAULT BUILD IMAGE ####################### |
||||
|
# The web-vault digest specifies a particular web-vault build on Docker Hub. |
||||
|
# Using the digest instead of the tag name provides better security, |
||||
|
# as the digest of an image is immutable, whereas a tag name can later |
||||
|
# be changed to point to a malicious image. |
||||
|
# |
||||
|
# To verify the current digest for a given tag name: |
||||
|
# - From https://hub.docker.com/r/vaultwarden/web-vault/tags, |
||||
|
# click the tag name to view the digest of the image it currently points to. |
||||
|
# - From the command line: |
||||
|
# $ docker pull vaultwarden/web-vault:v2.21.1 |
||||
|
# $ docker image inspect --format "{{.RepoDigests}}" vaultwarden/web-vault:v2.21.1 |
||||
|
# [vaultwarden/web-vault@sha256:29a4fa7bf3790fff9d908b02ac5a154913491f4bf30c95b87b06d8cf1c5516b5] |
||||
|
# |
||||
|
# - Conversely, to get the tag name from the digest: |
||||
|
# $ docker image inspect --format "{{.RepoTags}}" vaultwarden/web-vault@sha256:29a4fa7bf3790fff9d908b02ac5a154913491f4bf30c95b87b06d8cf1c5516b5 |
||||
|
# [vaultwarden/web-vault:v2.21.1] |
||||
|
# |
||||
|
FROM vaultwarden/web-vault@sha256:29a4fa7bf3790fff9d908b02ac5a154913491f4bf30c95b87b06d8cf1c5516b5 as vault |
||||
|
|
||||
|
########################## BUILD IMAGE ########################## |
||||
|
FROM rust:1.54-bullseye as build |
||||
|
|
||||
|
# Debian-based builds support multidb |
||||
|
ARG DB=sqlite,mysql,postgresql |
||||
|
|
||||
|
# Build time options to avoid dpkg warnings and help with reproducible builds. |
||||
|
ENV DEBIAN_FRONTEND=noninteractive \ |
||||
|
LANG=C.UTF-8 \ |
||||
|
TZ=UTC \ |
||||
|
TERM=xterm-256color \ |
||||
|
CARGO_HOME="/root/.cargo" \ |
||||
|
USER="root" |
||||
|
|
||||
|
|
||||
|
# Create CARGO_HOME folder and don't download rust docs |
||||
|
RUN --mount=type=cache,target=/root/.cargo/git --mount=type=cache,target=/root/.cargo/registry mkdir -pv "${CARGO_HOME}" \ |
||||
|
&& rustup set profile minimal |
||||
|
|
||||
|
# Install DB packages |
||||
|
RUN apt-get update \ |
||||
|
&& apt-get install -y \ |
||||
|
--no-install-recommends \ |
||||
|
libmariadb-dev \ |
||||
|
libpq-dev \ |
||||
|
&& apt-get clean \ |
||||
|
&& rm -rf /var/lib/apt/lists/* |
||||
|
|
||||
|
# Creates a dummy project used to grab dependencies |
||||
|
RUN USER=root cargo new --bin /app |
||||
|
WORKDIR /app |
||||
|
|
||||
|
# Copies over *only* your manifests and build files |
||||
|
COPY ./Cargo.* ./ |
||||
|
COPY ./rust-toolchain ./rust-toolchain |
||||
|
COPY ./build.rs ./build.rs |
||||
|
|
||||
|
|
||||
|
# Builds your dependencies and removes the |
||||
|
# dummy project, except the target folder |
||||
|
# This folder contains the compiled dependencies |
||||
|
RUN --mount=type=cache,target=/root/.cargo/git --mount=type=cache,target=/root/.cargo/registry cargo build --features ${DB} --release \ |
||||
|
&& find . -not -path "./target*" -delete |
||||
|
|
||||
|
# Copies the complete project |
||||
|
# To avoid copying unneeded files, use .dockerignore |
||||
|
COPY . . |
||||
|
|
||||
|
# Make sure that we actually build the project |
||||
|
RUN touch src/main.rs |
||||
|
|
||||
|
# Builds again, this time it'll just be |
||||
|
# your actual source files being built |
||||
|
RUN --mount=type=cache,target=/root/.cargo/git --mount=type=cache,target=/root/.cargo/registry cargo build --features ${DB} --release |
||||
|
|
||||
|
######################## RUNTIME IMAGE ######################## |
||||
|
# Create a new stage with a minimal image |
||||
|
# because we already have a binary built |
||||
|
FROM debian:bullseye-slim |
||||
|
|
||||
|
ENV ROCKET_ENV "staging" |
||||
|
ENV ROCKET_PORT=80 |
||||
|
ENV ROCKET_WORKERS=10 |
||||
|
|
||||
|
|
||||
|
# Create data folder and Install needed libraries |
||||
|
RUN mkdir /data \ |
||||
|
&& apt-get update && apt-get install -y \ |
||||
|
--no-install-recommends \ |
||||
|
openssl \ |
||||
|
ca-certificates \ |
||||
|
curl \ |
||||
|
dumb-init \ |
||||
|
libmariadb-dev-compat \ |
||||
|
libpq5 \ |
||||
|
&& apt-get clean \ |
||||
|
&& rm -rf /var/lib/apt/lists/* |
||||
|
|
||||
|
|
||||
|
VOLUME /data |
||||
|
EXPOSE 80 |
||||
|
EXPOSE 3012 |
||||
|
|
||||
|
# Copies the files from the context (Rocket.toml file and web-vault) |
||||
|
# and the binary from the "build" stage to the current stage |
||||
|
WORKDIR / |
||||
|
COPY Rocket.toml . |
||||
|
COPY --from=vault /web-vault ./web-vault |
||||
|
COPY --from=build /app/target/release/vaultwarden . |
||||
|
|
||||
|
COPY docker/healthcheck.sh /healthcheck.sh |
||||
|
COPY docker/start.sh /start.sh |
||||
|
|
||||
|
HEALTHCHECK --interval=60s --timeout=10s CMD ["/healthcheck.sh"] |
||||
|
|
||||
|
# Configures the startup! |
||||
|
ENTRYPOINT ["/usr/bin/dumb-init", "--"] |
||||
|
CMD ["/start.sh"] |
@ -0,0 +1,118 @@ |
|||||
|
# syntax=docker/dockerfile:1 |
||||
|
|
||||
|
# This file was generated using a Jinja2 template. |
||||
|
# Please make your changes in `Dockerfile.j2` and then `make` the individual Dockerfiles. |
||||
|
|
||||
|
# Using multistage build: |
||||
|
# https://docs.docker.com/develop/develop-images/multistage-build/ |
||||
|
# https://whitfin.io/speeding-up-rust-docker-builds/ |
||||
|
####################### VAULT BUILD IMAGE ####################### |
||||
|
# The web-vault digest specifies a particular web-vault build on Docker Hub. |
||||
|
# Using the digest instead of the tag name provides better security, |
||||
|
# as the digest of an image is immutable, whereas a tag name can later |
||||
|
# be changed to point to a malicious image. |
||||
|
# |
||||
|
# To verify the current digest for a given tag name: |
||||
|
# - From https://hub.docker.com/r/vaultwarden/web-vault/tags, |
||||
|
# click the tag name to view the digest of the image it currently points to. |
||||
|
# - From the command line: |
||||
|
# $ docker pull vaultwarden/web-vault:v2.21.1 |
||||
|
# $ docker image inspect --format "{{.RepoDigests}}" vaultwarden/web-vault:v2.21.1 |
||||
|
# [vaultwarden/web-vault@sha256:29a4fa7bf3790fff9d908b02ac5a154913491f4bf30c95b87b06d8cf1c5516b5] |
||||
|
# |
||||
|
# - Conversely, to get the tag name from the digest: |
||||
|
# $ docker image inspect --format "{{.RepoTags}}" vaultwarden/web-vault@sha256:29a4fa7bf3790fff9d908b02ac5a154913491f4bf30c95b87b06d8cf1c5516b5 |
||||
|
# [vaultwarden/web-vault:v2.21.1] |
||||
|
# |
||||
|
FROM vaultwarden/web-vault@sha256:29a4fa7bf3790fff9d908b02ac5a154913491f4bf30c95b87b06d8cf1c5516b5 as vault |
||||
|
|
||||
|
########################## BUILD IMAGE ########################## |
||||
|
FROM clux/muslrust:nightly-2021-08-22 as build |
||||
|
|
||||
|
# Alpine-based AMD64 (musl) does not support mysql/mariadb during compile time. |
||||
|
ARG DB=sqlite,postgresql |
||||
|
|
||||
|
# Build time options to avoid dpkg warnings and help with reproducible builds. |
||||
|
ENV DEBIAN_FRONTEND=noninteractive \ |
||||
|
LANG=C.UTF-8 \ |
||||
|
TZ=UTC \ |
||||
|
TERM=xterm-256color \ |
||||
|
CARGO_HOME="/root/.cargo" \ |
||||
|
USER="root" |
||||
|
|
||||
|
|
||||
|
# Create CARGO_HOME folder and don't download rust docs |
||||
|
RUN --mount=type=cache,target=/root/.cargo/git --mount=type=cache,target=/root/.cargo/registry mkdir -pv "${CARGO_HOME}" \ |
||||
|
&& rustup set profile minimal |
||||
|
|
||||
|
ENV RUSTFLAGS='-C link-arg=-s' |
||||
|
|
||||
|
# Creates a dummy project used to grab dependencies |
||||
|
RUN USER=root cargo new --bin /app |
||||
|
WORKDIR /app |
||||
|
|
||||
|
# Copies over *only* your manifests and build files |
||||
|
COPY ./Cargo.* ./ |
||||
|
COPY ./rust-toolchain ./rust-toolchain |
||||
|
COPY ./build.rs ./build.rs |
||||
|
|
||||
|
RUN --mount=type=cache,target=/root/.cargo/git --mount=type=cache,target=/root/.cargo/registry rustup target add x86_64-unknown-linux-musl |
||||
|
|
||||
|
# Builds your dependencies and removes the |
||||
|
# dummy project, except the target folder |
||||
|
# This folder contains the compiled dependencies |
||||
|
RUN --mount=type=cache,target=/root/.cargo/git --mount=type=cache,target=/root/.cargo/registry cargo build --features ${DB} --release --target=x86_64-unknown-linux-musl \ |
||||
|
&& find . -not -path "./target*" -delete |
||||
|
|
||||
|
# Copies the complete project |
||||
|
# To avoid copying unneeded files, use .dockerignore |
||||
|
COPY . . |
||||
|
|
||||
|
# Make sure that we actually build the project |
||||
|
RUN touch src/main.rs |
||||
|
|
||||
|
# Builds again, this time it'll just be |
||||
|
# your actual source files being built |
||||
|
RUN --mount=type=cache,target=/root/.cargo/git --mount=type=cache,target=/root/.cargo/registry cargo build --features ${DB} --release --target=x86_64-unknown-linux-musl |
||||
|
|
||||
|
######################## RUNTIME IMAGE ######################## |
||||
|
# Create a new stage with a minimal image |
||||
|
# because we already have a binary built |
||||
|
FROM alpine:3.14 |
||||
|
|
||||
|
ENV ROCKET_ENV "staging" |
||||
|
ENV ROCKET_PORT=80 |
||||
|
ENV ROCKET_WORKERS=10 |
||||
|
ENV SSL_CERT_DIR=/etc/ssl/certs |
||||
|
|
||||
|
|
||||
|
# Create data folder and Install needed libraries |
||||
|
RUN mkdir /data \ |
||||
|
&& apk add --no-cache \ |
||||
|
openssl \ |
||||
|
tzdata \ |
||||
|
curl \ |
||||
|
dumb-init \ |
||||
|
postgresql-libs \ |
||||
|
ca-certificates |
||||
|
|
||||
|
|
||||
|
VOLUME /data |
||||
|
EXPOSE 80 |
||||
|
EXPOSE 3012 |
||||
|
|
||||
|
# Copies the files from the context (Rocket.toml file and web-vault) |
||||
|
# and the binary from the "build" stage to the current stage |
||||
|
WORKDIR / |
||||
|
COPY Rocket.toml . |
||||
|
COPY --from=vault /web-vault ./web-vault |
||||
|
COPY --from=build /app/target/x86_64-unknown-linux-musl/release/vaultwarden . |
||||
|
|
||||
|
COPY docker/healthcheck.sh /healthcheck.sh |
||||
|
COPY docker/start.sh /start.sh |
||||
|
|
||||
|
HEALTHCHECK --interval=60s --timeout=10s CMD ["/healthcheck.sh"] |
||||
|
|
||||
|
# Configures the startup! |
||||
|
ENTRYPOINT ["/usr/bin/dumb-init", "--"] |
||||
|
CMD ["/start.sh"] |
@ -0,0 +1,169 @@ |
|||||
|
# syntax=docker/dockerfile:1 |
||||
|
|
||||
|
# This file was generated using a Jinja2 template. |
||||
|
# Please make your changes in `Dockerfile.j2` and then `make` the individual Dockerfiles. |
||||
|
|
||||
|
# Using multistage build: |
||||
|
# https://docs.docker.com/develop/develop-images/multistage-build/ |
||||
|
# https://whitfin.io/speeding-up-rust-docker-builds/ |
||||
|
####################### VAULT BUILD IMAGE ####################### |
||||
|
# The web-vault digest specifies a particular web-vault build on Docker Hub. |
||||
|
# Using the digest instead of the tag name provides better security, |
||||
|
# as the digest of an image is immutable, whereas a tag name can later |
||||
|
# be changed to point to a malicious image. |
||||
|
# |
||||
|
# To verify the current digest for a given tag name: |
||||
|
# - From https://hub.docker.com/r/vaultwarden/web-vault/tags, |
||||
|
# click the tag name to view the digest of the image it currently points to. |
||||
|
# - From the command line: |
||||
|
# $ docker pull vaultwarden/web-vault:v2.21.1 |
||||
|
# $ docker image inspect --format "{{.RepoDigests}}" vaultwarden/web-vault:v2.21.1 |
||||
|
# [vaultwarden/web-vault@sha256:29a4fa7bf3790fff9d908b02ac5a154913491f4bf30c95b87b06d8cf1c5516b5] |
||||
|
# |
||||
|
# - Conversely, to get the tag name from the digest: |
||||
|
# $ docker image inspect --format "{{.RepoTags}}" vaultwarden/web-vault@sha256:29a4fa7bf3790fff9d908b02ac5a154913491f4bf30c95b87b06d8cf1c5516b5 |
||||
|
# [vaultwarden/web-vault:v2.21.1] |
||||
|
# |
||||
|
FROM vaultwarden/web-vault@sha256:29a4fa7bf3790fff9d908b02ac5a154913491f4bf30c95b87b06d8cf1c5516b5 as vault |
||||
|
|
||||
|
########################## BUILD IMAGE ########################## |
||||
|
FROM rust:1.54-bullseye as build |
||||
|
|
||||
|
# Debian-based builds support multidb |
||||
|
ARG DB=sqlite,mysql,postgresql |
||||
|
|
||||
|
# Build time options to avoid dpkg warnings and help with reproducible builds. |
||||
|
ENV DEBIAN_FRONTEND=noninteractive \ |
||||
|
LANG=C.UTF-8 \ |
||||
|
TZ=UTC \ |
||||
|
TERM=xterm-256color \ |
||||
|
CARGO_HOME="/root/.cargo" \ |
||||
|
USER="root" |
||||
|
|
||||
|
|
||||
|
# Create CARGO_HOME folder and don't download rust docs |
||||
|
RUN --mount=type=cache,target=/root/.cargo/git --mount=type=cache,target=/root/.cargo/registry mkdir -pv "${CARGO_HOME}" \ |
||||
|
&& rustup set profile minimal |
||||
|
|
||||
|
# NOTE: Any apt-get/dpkg after this stage will fail because of broken dependencies. |
||||
|
# For Diesel-RS migrations_macros to compile with MySQL/MariaDB we need to do some magic. |
||||
|
# We at least need libmariadb3:amd64 installed for the x86_64 version of libmariadb.so (client) |
||||
|
# We also need the libmariadb-dev-compat:amd64 but it can not be installed together with the :arm64 version. |
||||
|
# What we can do is a force install, because nothing important is overlapping each other. |
||||
|
# |
||||
|
# Install required build libs for arm64 architecture. |
||||
|
# To compile both mysql and postgresql we need some extra packages for both host arch and target arch |
||||
|
RUN sed 's/^deb/deb-src/' /etc/apt/sources.list > /etc/apt/sources.list.d/deb-src.list \ |
||||
|
&& dpkg --add-architecture arm64 \ |
||||
|
&& apt-get update \ |
||||
|
&& apt-get install -y \ |
||||
|
--no-install-recommends \ |
||||
|
libssl-dev:arm64 \ |
||||
|
libc6-dev:arm64 \ |
||||
|
libpq5:arm64 \ |
||||
|
libpq-dev \ |
||||
|
libmariadb3:amd64 \ |
||||
|
libmariadb-dev:arm64 \ |
||||
|
libmariadb-dev-compat:arm64 \ |
||||
|
gcc-aarch64-linux-gnu \ |
||||
|
# |
||||
|
# Manual install libmariadb-dev-compat:amd64 ( After this broken dependencies will break apt ) |
||||
|
&& apt-get download libmariadb-dev-compat:amd64 \ |
||||
|
&& dpkg --force-all -i ./libmariadb-dev-compat*.deb \ |
||||
|
&& rm -rvf ./libmariadb-dev-compat*.deb \ |
||||
|
&& apt-get clean \ |
||||
|
&& rm -rf /var/lib/apt/lists/* \ |
||||
|
# |
||||
|
# For Diesel-RS migrations_macros to compile with PostgreSQL we need to do some magic. |
||||
|
# The libpq5:arm64 package seems to not provide a symlink to libpq.so.5 with the name libpq.so. |
||||
|
# This is only provided by the libpq-dev package which can't be installed for both arch at the same time. |
||||
|
# Without this specific file the ld command will fail and compilation fails with it. |
||||
|
&& ln -sfnr /usr/lib/aarch64-linux-gnu/libpq.so.5 /usr/lib/aarch64-linux-gnu/libpq.so \ |
||||
|
# |
||||
|
# Make sure cargo has the right target config |
||||
|
&& echo '[target.aarch64-unknown-linux-gnu]' >> "${CARGO_HOME}/config" \ |
||||
|
&& echo 'linker = "aarch64-linux-gnu-gcc"' >> "${CARGO_HOME}/config" \ |
||||
|
&& echo 'rustflags = ["-L/usr/lib/aarch64-linux-gnu"]' >> "${CARGO_HOME}/config" |
||||
|
|
||||
|
# Set arm specific environment values |
||||
|
ENV CC_aarch64_unknown_linux_gnu="/usr/bin/aarch64-linux-gnu-gcc" |
||||
|
ENV CROSS_COMPILE="1" |
||||
|
ENV OPENSSL_INCLUDE_DIR="/usr/include/aarch64-linux-gnu" |
||||
|
ENV OPENSSL_LIB_DIR="/usr/lib/aarch64-linux-gnu" |
||||
|
|
||||
|
|
||||
|
# Creates a dummy project used to grab dependencies |
||||
|
RUN USER=root cargo new --bin /app |
||||
|
WORKDIR /app |
||||
|
|
||||
|
# Copies over *only* your manifests and build files |
||||
|
COPY ./Cargo.* ./ |
||||
|
COPY ./rust-toolchain ./rust-toolchain |
||||
|
COPY ./build.rs ./build.rs |
||||
|
|
||||
|
RUN --mount=type=cache,target=/root/.cargo/git --mount=type=cache,target=/root/.cargo/registry rustup target add aarch64-unknown-linux-gnu |
||||
|
|
||||
|
# Builds your dependencies and removes the |
||||
|
# dummy project, except the target folder |
||||
|
# This folder contains the compiled dependencies |
||||
|
RUN --mount=type=cache,target=/root/.cargo/git --mount=type=cache,target=/root/.cargo/registry cargo build --features ${DB} --release --target=aarch64-unknown-linux-gnu \ |
||||
|
&& find . -not -path "./target*" -delete |
||||
|
|
||||
|
# Copies the complete project |
||||
|
# To avoid copying unneeded files, use .dockerignore |
||||
|
COPY . . |
||||
|
|
||||
|
# Make sure that we actually build the project |
||||
|
RUN touch src/main.rs |
||||
|
|
||||
|
# Builds again, this time it'll just be |
||||
|
# your actual source files being built |
||||
|
RUN --mount=type=cache,target=/root/.cargo/git --mount=type=cache,target=/root/.cargo/registry cargo build --features ${DB} --release --target=aarch64-unknown-linux-gnu |
||||
|
|
||||
|
######################## RUNTIME IMAGE ######################## |
||||
|
# Create a new stage with a minimal image |
||||
|
# because we already have a binary built |
||||
|
FROM balenalib/aarch64-debian:bullseye |
||||
|
|
||||
|
ENV ROCKET_ENV "staging" |
||||
|
ENV ROCKET_PORT=80 |
||||
|
ENV ROCKET_WORKERS=10 |
||||
|
|
||||
|
# hadolint ignore=DL3059 |
||||
|
RUN [ "cross-build-start" ] |
||||
|
|
||||
|
# Create data folder and Install needed libraries |
||||
|
RUN mkdir /data \ |
||||
|
&& apt-get update && apt-get install -y \ |
||||
|
--no-install-recommends \ |
||||
|
openssl \ |
||||
|
ca-certificates \ |
||||
|
curl \ |
||||
|
dumb-init \ |
||||
|
libmariadb-dev-compat \ |
||||
|
libpq5 \ |
||||
|
&& apt-get clean \ |
||||
|
&& rm -rf /var/lib/apt/lists/* |
||||
|
|
||||
|
# hadolint ignore=DL3059 |
||||
|
RUN [ "cross-build-end" ] |
||||
|
|
||||
|
VOLUME /data |
||||
|
EXPOSE 80 |
||||
|
EXPOSE 3012 |
||||
|
|
||||
|
# Copies the files from the context (Rocket.toml file and web-vault) |
||||
|
# and the binary from the "build" stage to the current stage |
||||
|
WORKDIR / |
||||
|
COPY Rocket.toml . |
||||
|
COPY --from=vault /web-vault ./web-vault |
||||
|
COPY --from=build /app/target/aarch64-unknown-linux-gnu/release/vaultwarden . |
||||
|
|
||||
|
COPY docker/healthcheck.sh /healthcheck.sh |
||||
|
COPY docker/start.sh /start.sh |
||||
|
|
||||
|
HEALTHCHECK --interval=60s --timeout=10s CMD ["/healthcheck.sh"] |
||||
|
|
||||
|
# Configures the startup! |
||||
|
ENTRYPOINT ["/usr/bin/dumb-init", "--"] |
||||
|
CMD ["/start.sh"] |
@ -0,0 +1,169 @@ |
|||||
|
# syntax=docker/dockerfile:1 |
||||
|
|
||||
|
# This file was generated using a Jinja2 template. |
||||
|
# Please make your changes in `Dockerfile.j2` and then `make` the individual Dockerfiles. |
||||
|
|
||||
|
# Using multistage build: |
||||
|
# https://docs.docker.com/develop/develop-images/multistage-build/ |
||||
|
# https://whitfin.io/speeding-up-rust-docker-builds/ |
||||
|
####################### VAULT BUILD IMAGE ####################### |
||||
|
# The web-vault digest specifies a particular web-vault build on Docker Hub. |
||||
|
# Using the digest instead of the tag name provides better security, |
||||
|
# as the digest of an image is immutable, whereas a tag name can later |
||||
|
# be changed to point to a malicious image. |
||||
|
# |
||||
|
# To verify the current digest for a given tag name: |
||||
|
# - From https://hub.docker.com/r/vaultwarden/web-vault/tags, |
||||
|
# click the tag name to view the digest of the image it currently points to. |
||||
|
# - From the command line: |
||||
|
# $ docker pull vaultwarden/web-vault:v2.21.1 |
||||
|
# $ docker image inspect --format "{{.RepoDigests}}" vaultwarden/web-vault:v2.21.1 |
||||
|
# [vaultwarden/web-vault@sha256:29a4fa7bf3790fff9d908b02ac5a154913491f4bf30c95b87b06d8cf1c5516b5] |
||||
|
# |
||||
|
# - Conversely, to get the tag name from the digest: |
||||
|
# $ docker image inspect --format "{{.RepoTags}}" vaultwarden/web-vault@sha256:29a4fa7bf3790fff9d908b02ac5a154913491f4bf30c95b87b06d8cf1c5516b5 |
||||
|
# [vaultwarden/web-vault:v2.21.1] |
||||
|
# |
||||
|
FROM vaultwarden/web-vault@sha256:29a4fa7bf3790fff9d908b02ac5a154913491f4bf30c95b87b06d8cf1c5516b5 as vault |
||||
|
|
||||
|
########################## BUILD IMAGE ########################## |
||||
|
FROM rust:1.54-bullseye as build |
||||
|
|
||||
|
# Debian-based builds support multidb |
||||
|
ARG DB=sqlite,mysql,postgresql |
||||
|
|
||||
|
# Build time options to avoid dpkg warnings and help with reproducible builds. |
||||
|
ENV DEBIAN_FRONTEND=noninteractive \ |
||||
|
LANG=C.UTF-8 \ |
||||
|
TZ=UTC \ |
||||
|
TERM=xterm-256color \ |
||||
|
CARGO_HOME="/root/.cargo" \ |
||||
|
USER="root" |
||||
|
|
||||
|
|
||||
|
# Create CARGO_HOME folder and don't download rust docs |
||||
|
RUN --mount=type=cache,target=/root/.cargo/git --mount=type=cache,target=/root/.cargo/registry mkdir -pv "${CARGO_HOME}" \ |
||||
|
&& rustup set profile minimal |
||||
|
|
||||
|
# NOTE: Any apt-get/dpkg after this stage will fail because of broken dependencies. |
||||
|
# For Diesel-RS migrations_macros to compile with MySQL/MariaDB we need to do some magic. |
||||
|
# We at least need libmariadb3:amd64 installed for the x86_64 version of libmariadb.so (client) |
||||
|
# We also need the libmariadb-dev-compat:amd64 but it can not be installed together with the :armel version. |
||||
|
# What we can do is a force install, because nothing important is overlapping each other. |
||||
|
# |
||||
|
# Install required build libs for armel architecture. |
||||
|
# To compile both mysql and postgresql we need some extra packages for both host arch and target arch |
||||
|
RUN sed 's/^deb/deb-src/' /etc/apt/sources.list > /etc/apt/sources.list.d/deb-src.list \ |
||||
|
&& dpkg --add-architecture armel \ |
||||
|
&& apt-get update \ |
||||
|
&& apt-get install -y \ |
||||
|
--no-install-recommends \ |
||||
|
libssl-dev:armel \ |
||||
|
libc6-dev:armel \ |
||||
|
libpq5:armel \ |
||||
|
libpq-dev \ |
||||
|
libmariadb3:amd64 \ |
||||
|
libmariadb-dev:armel \ |
||||
|
libmariadb-dev-compat:armel \ |
||||
|
gcc-arm-linux-gnueabi \ |
||||
|
# |
||||
|
# Manual install libmariadb-dev-compat:amd64 ( After this broken dependencies will break apt ) |
||||
|
&& apt-get download libmariadb-dev-compat:amd64 \ |
||||
|
&& dpkg --force-all -i ./libmariadb-dev-compat*.deb \ |
||||
|
&& rm -rvf ./libmariadb-dev-compat*.deb \ |
||||
|
&& apt-get clean \ |
||||
|
&& rm -rf /var/lib/apt/lists/* \ |
||||
|
# |
||||
|
# For Diesel-RS migrations_macros to compile with PostgreSQL we need to do some magic. |
||||
|
# The libpq5:armel package seems to not provide a symlink to libpq.so.5 with the name libpq.so. |
||||
|
# This is only provided by the libpq-dev package which can't be installed for both arch at the same time. |
||||
|
# Without this specific file the ld command will fail and compilation fails with it. |
||||
|
&& ln -sfnr /usr/lib/arm-linux-gnueabi/libpq.so.5 /usr/lib/arm-linux-gnueabi/libpq.so \ |
||||
|
# |
||||
|
# Make sure cargo has the right target config |
||||
|
&& echo '[target.arm-unknown-linux-gnueabi]' >> "${CARGO_HOME}/config" \ |
||||
|
&& echo 'linker = "arm-linux-gnueabi-gcc"' >> "${CARGO_HOME}/config" \ |
||||
|
&& echo 'rustflags = ["-L/usr/lib/arm-linux-gnueabi"]' >> "${CARGO_HOME}/config" |
||||
|
|
||||
|
# Set arm specific environment values |
||||
|
ENV CC_arm_unknown_linux_gnueabi="/usr/bin/arm-linux-gnueabi-gcc" |
||||
|
ENV CROSS_COMPILE="1" |
||||
|
ENV OPENSSL_INCLUDE_DIR="/usr/include/arm-linux-gnueabi" |
||||
|
ENV OPENSSL_LIB_DIR="/usr/lib/arm-linux-gnueabi" |
||||
|
|
||||
|
|
||||
|
# Creates a dummy project used to grab dependencies |
||||
|
RUN USER=root cargo new --bin /app |
||||
|
WORKDIR /app |
||||
|
|
||||
|
# Copies over *only* your manifests and build files |
||||
|
COPY ./Cargo.* ./ |
||||
|
COPY ./rust-toolchain ./rust-toolchain |
||||
|
COPY ./build.rs ./build.rs |
||||
|
|
||||
|
RUN --mount=type=cache,target=/root/.cargo/git --mount=type=cache,target=/root/.cargo/registry rustup target add arm-unknown-linux-gnueabi |
||||
|
|
||||
|
# Builds your dependencies and removes the |
||||
|
# dummy project, except the target folder |
||||
|
# This folder contains the compiled dependencies |
||||
|
RUN --mount=type=cache,target=/root/.cargo/git --mount=type=cache,target=/root/.cargo/registry cargo build --features ${DB} --release --target=arm-unknown-linux-gnueabi \ |
||||
|
&& find . -not -path "./target*" -delete |
||||
|
|
||||
|
# Copies the complete project |
||||
|
# To avoid copying unneeded files, use .dockerignore |
||||
|
COPY . . |
||||
|
|
||||
|
# Make sure that we actually build the project |
||||
|
RUN touch src/main.rs |
||||
|
|
||||
|
# Builds again, this time it'll just be |
||||
|
# your actual source files being built |
||||
|
RUN --mount=type=cache,target=/root/.cargo/git --mount=type=cache,target=/root/.cargo/registry cargo build --features ${DB} --release --target=arm-unknown-linux-gnueabi |
||||
|
|
||||
|
######################## RUNTIME IMAGE ######################## |
||||
|
# Create a new stage with a minimal image |
||||
|
# because we already have a binary built |
||||
|
FROM balenalib/rpi-debian:bullseye |
||||
|
|
||||
|
ENV ROCKET_ENV "staging" |
||||
|
ENV ROCKET_PORT=80 |
||||
|
ENV ROCKET_WORKERS=10 |
||||
|
|
||||
|
# hadolint ignore=DL3059 |
||||
|
RUN [ "cross-build-start" ] |
||||
|
|
||||
|
# Create data folder and Install needed libraries |
||||
|
RUN mkdir /data \ |
||||
|
&& apt-get update && apt-get install -y \ |
||||
|
--no-install-recommends \ |
||||
|
openssl \ |
||||
|
ca-certificates \ |
||||
|
curl \ |
||||
|
dumb-init \ |
||||
|
libmariadb-dev-compat \ |
||||
|
libpq5 \ |
||||
|
&& apt-get clean \ |
||||
|
&& rm -rf /var/lib/apt/lists/* |
||||
|
|
||||
|
# hadolint ignore=DL3059 |
||||
|
RUN [ "cross-build-end" ] |
||||
|
|
||||
|
VOLUME /data |
||||
|
EXPOSE 80 |
||||
|
EXPOSE 3012 |
||||
|
|
||||
|
# Copies the files from the context (Rocket.toml file and web-vault) |
||||
|
# and the binary from the "build" stage to the current stage |
||||
|
WORKDIR / |
||||
|
COPY Rocket.toml . |
||||
|
COPY --from=vault /web-vault ./web-vault |
||||
|
COPY --from=build /app/target/arm-unknown-linux-gnueabi/release/vaultwarden . |
||||
|
|
||||
|
COPY docker/healthcheck.sh /healthcheck.sh |
||||
|
COPY docker/start.sh /start.sh |
||||
|
|
||||
|
HEALTHCHECK --interval=60s --timeout=10s CMD ["/healthcheck.sh"] |
||||
|
|
||||
|
# Configures the startup! |
||||
|
ENTRYPOINT ["/usr/bin/dumb-init", "--"] |
||||
|
CMD ["/start.sh"] |
@ -0,0 +1,169 @@ |
|||||
|
# syntax=docker/dockerfile:1 |
||||
|
|
||||
|
# This file was generated using a Jinja2 template. |
||||
|
# Please make your changes in `Dockerfile.j2` and then `make` the individual Dockerfiles. |
||||
|
|
||||
|
# Using multistage build: |
||||
|
# https://docs.docker.com/develop/develop-images/multistage-build/ |
||||
|
# https://whitfin.io/speeding-up-rust-docker-builds/ |
||||
|
####################### VAULT BUILD IMAGE ####################### |
||||
|
# The web-vault digest specifies a particular web-vault build on Docker Hub. |
||||
|
# Using the digest instead of the tag name provides better security, |
||||
|
# as the digest of an image is immutable, whereas a tag name can later |
||||
|
# be changed to point to a malicious image. |
||||
|
# |
||||
|
# To verify the current digest for a given tag name: |
||||
|
# - From https://hub.docker.com/r/vaultwarden/web-vault/tags, |
||||
|
# click the tag name to view the digest of the image it currently points to. |
||||
|
# - From the command line: |
||||
|
# $ docker pull vaultwarden/web-vault:v2.21.1 |
||||
|
# $ docker image inspect --format "{{.RepoDigests}}" vaultwarden/web-vault:v2.21.1 |
||||
|
# [vaultwarden/web-vault@sha256:29a4fa7bf3790fff9d908b02ac5a154913491f4bf30c95b87b06d8cf1c5516b5] |
||||
|
# |
||||
|
# - Conversely, to get the tag name from the digest: |
||||
|
# $ docker image inspect --format "{{.RepoTags}}" vaultwarden/web-vault@sha256:29a4fa7bf3790fff9d908b02ac5a154913491f4bf30c95b87b06d8cf1c5516b5 |
||||
|
# [vaultwarden/web-vault:v2.21.1] |
||||
|
# |
||||
|
FROM vaultwarden/web-vault@sha256:29a4fa7bf3790fff9d908b02ac5a154913491f4bf30c95b87b06d8cf1c5516b5 as vault |
||||
|
|
||||
|
########################## BUILD IMAGE ########################## |
||||
|
FROM rust:1.54-bullseye as build |
||||
|
|
||||
|
# Debian-based builds support multidb |
||||
|
ARG DB=sqlite,mysql,postgresql |
||||
|
|
||||
|
# Build time options to avoid dpkg warnings and help with reproducible builds. |
||||
|
ENV DEBIAN_FRONTEND=noninteractive \ |
||||
|
LANG=C.UTF-8 \ |
||||
|
TZ=UTC \ |
||||
|
TERM=xterm-256color \ |
||||
|
CARGO_HOME="/root/.cargo" \ |
||||
|
USER="root" |
||||
|
|
||||
|
|
||||
|
# Create CARGO_HOME folder and don't download rust docs |
||||
|
RUN --mount=type=cache,target=/root/.cargo/git --mount=type=cache,target=/root/.cargo/registry mkdir -pv "${CARGO_HOME}" \ |
||||
|
&& rustup set profile minimal |
||||
|
|
||||
|
# NOTE: Any apt-get/dpkg after this stage will fail because of broken dependencies. |
||||
|
# For Diesel-RS migrations_macros to compile with MySQL/MariaDB we need to do some magic. |
||||
|
# We at least need libmariadb3:amd64 installed for the x86_64 version of libmariadb.so (client) |
||||
|
# We also need the libmariadb-dev-compat:amd64 but it can not be installed together with the :armhf version. |
||||
|
# What we can do is a force install, because nothing important is overlapping each other. |
||||
|
# |
||||
|
# Install required build libs for armhf architecture. |
||||
|
# To compile both mysql and postgresql we need some extra packages for both host arch and target arch |
||||
|
RUN sed 's/^deb/deb-src/' /etc/apt/sources.list > /etc/apt/sources.list.d/deb-src.list \ |
||||
|
&& dpkg --add-architecture armhf \ |
||||
|
&& apt-get update \ |
||||
|
&& apt-get install -y \ |
||||
|
--no-install-recommends \ |
||||
|
libssl-dev:armhf \ |
||||
|
libc6-dev:armhf \ |
||||
|
libpq5:armhf \ |
||||
|
libpq-dev \ |
||||
|
libmariadb3:amd64 \ |
||||
|
libmariadb-dev:armhf \ |
||||
|
libmariadb-dev-compat:armhf \ |
||||
|
gcc-arm-linux-gnueabihf \ |
||||
|
# |
||||
|
# Manual install libmariadb-dev-compat:amd64 ( After this broken dependencies will break apt ) |
||||
|
&& apt-get download libmariadb-dev-compat:amd64 \ |
||||
|
&& dpkg --force-all -i ./libmariadb-dev-compat*.deb \ |
||||
|
&& rm -rvf ./libmariadb-dev-compat*.deb \ |
||||
|
&& apt-get clean \ |
||||
|
&& rm -rf /var/lib/apt/lists/* \ |
||||
|
# |
||||
|
# For Diesel-RS migrations_macros to compile with PostgreSQL we need to do some magic. |
||||
|
# The libpq5:armhf package seems to not provide a symlink to libpq.so.5 with the name libpq.so. |
||||
|
# This is only provided by the libpq-dev package which can't be installed for both arch at the same time. |
||||
|
# Without this specific file the ld command will fail and compilation fails with it. |
||||
|
&& ln -sfnr /usr/lib/arm-linux-gnueabihf/libpq.so.5 /usr/lib/arm-linux-gnueabihf/libpq.so \ |
||||
|
# |
||||
|
# Make sure cargo has the right target config |
||||
|
&& echo '[target.armv7-unknown-linux-gnueabihf]' >> "${CARGO_HOME}/config" \ |
||||
|
&& echo 'linker = "arm-linux-gnueabihf-gcc"' >> "${CARGO_HOME}/config" \ |
||||
|
&& echo 'rustflags = ["-L/usr/lib/arm-linux-gnueabihf"]' >> "${CARGO_HOME}/config" |
||||
|
|
||||
|
# Set arm specific environment values |
||||
|
ENV CC_armv7_unknown_linux_gnueabihf="/usr/bin/arm-linux-gnueabihf-gcc" |
||||
|
ENV CROSS_COMPILE="1" |
||||
|
ENV OPENSSL_INCLUDE_DIR="/usr/include/arm-linux-gnueabihf" |
||||
|
ENV OPENSSL_LIB_DIR="/usr/lib/arm-linux-gnueabihf" |
||||
|
|
||||
|
|
||||
|
# Creates a dummy project used to grab dependencies |
||||
|
RUN USER=root cargo new --bin /app |
||||
|
WORKDIR /app |
||||
|
|
||||
|
# Copies over *only* your manifests and build files |
||||
|
COPY ./Cargo.* ./ |
||||
|
COPY ./rust-toolchain ./rust-toolchain |
||||
|
COPY ./build.rs ./build.rs |
||||
|
|
||||
|
RUN --mount=type=cache,target=/root/.cargo/git --mount=type=cache,target=/root/.cargo/registry rustup target add armv7-unknown-linux-gnueabihf |
||||
|
|
||||
|
# Builds your dependencies and removes the |
||||
|
# dummy project, except the target folder |
||||
|
# This folder contains the compiled dependencies |
||||
|
RUN --mount=type=cache,target=/root/.cargo/git --mount=type=cache,target=/root/.cargo/registry cargo build --features ${DB} --release --target=armv7-unknown-linux-gnueabihf \ |
||||
|
&& find . -not -path "./target*" -delete |
||||
|
|
||||
|
# Copies the complete project |
||||
|
# To avoid copying unneeded files, use .dockerignore |
||||
|
COPY . . |
||||
|
|
||||
|
# Make sure that we actually build the project |
||||
|
RUN touch src/main.rs |
||||
|
|
||||
|
# Builds again, this time it'll just be |
||||
|
# your actual source files being built |
||||
|
RUN --mount=type=cache,target=/root/.cargo/git --mount=type=cache,target=/root/.cargo/registry cargo build --features ${DB} --release --target=armv7-unknown-linux-gnueabihf |
||||
|
|
||||
|
######################## RUNTIME IMAGE ######################## |
||||
|
# Create a new stage with a minimal image |
||||
|
# because we already have a binary built |
||||
|
FROM balenalib/armv7hf-debian:bullseye |
||||
|
|
||||
|
ENV ROCKET_ENV "staging" |
||||
|
ENV ROCKET_PORT=80 |
||||
|
ENV ROCKET_WORKERS=10 |
||||
|
|
||||
|
# hadolint ignore=DL3059 |
||||
|
RUN [ "cross-build-start" ] |
||||
|
|
||||
|
# Create data folder and Install needed libraries |
||||
|
RUN mkdir /data \ |
||||
|
&& apt-get update && apt-get install -y \ |
||||
|
--no-install-recommends \ |
||||
|
openssl \ |
||||
|
ca-certificates \ |
||||
|
curl \ |
||||
|
dumb-init \ |
||||
|
libmariadb-dev-compat \ |
||||
|
libpq5 \ |
||||
|
&& apt-get clean \ |
||||
|
&& rm -rf /var/lib/apt/lists/* |
||||
|
|
||||
|
# hadolint ignore=DL3059 |
||||
|
RUN [ "cross-build-end" ] |
||||
|
|
||||
|
VOLUME /data |
||||
|
EXPOSE 80 |
||||
|
EXPOSE 3012 |
||||
|
|
||||
|
# Copies the files from the context (Rocket.toml file and web-vault) |
||||
|
# and the binary from the "build" stage to the current stage |
||||
|
WORKDIR / |
||||
|
COPY Rocket.toml . |
||||
|
COPY --from=vault /web-vault ./web-vault |
||||
|
COPY --from=build /app/target/armv7-unknown-linux-gnueabihf/release/vaultwarden . |
||||
|
|
||||
|
COPY docker/healthcheck.sh /healthcheck.sh |
||||
|
COPY docker/start.sh /start.sh |
||||
|
|
||||
|
HEALTHCHECK --interval=60s --timeout=10s CMD ["/healthcheck.sh"] |
||||
|
|
||||
|
# Configures the startup! |
||||
|
ENTRYPOINT ["/usr/bin/dumb-init", "--"] |
||||
|
CMD ["/start.sh"] |
@ -0,0 +1,125 @@ |
|||||
|
# syntax=docker/dockerfile:1 |
||||
|
|
||||
|
# This file was generated using a Jinja2 template. |
||||
|
# Please make your changes in `Dockerfile.j2` and then `make` the individual Dockerfiles. |
||||
|
|
||||
|
# Using multistage build: |
||||
|
# https://docs.docker.com/develop/develop-images/multistage-build/ |
||||
|
# https://whitfin.io/speeding-up-rust-docker-builds/ |
||||
|
####################### VAULT BUILD IMAGE ####################### |
||||
|
# The web-vault digest specifies a particular web-vault build on Docker Hub. |
||||
|
# Using the digest instead of the tag name provides better security, |
||||
|
# as the digest of an image is immutable, whereas a tag name can later |
||||
|
# be changed to point to a malicious image. |
||||
|
# |
||||
|
# To verify the current digest for a given tag name: |
||||
|
# - From https://hub.docker.com/r/vaultwarden/web-vault/tags, |
||||
|
# click the tag name to view the digest of the image it currently points to. |
||||
|
# - From the command line: |
||||
|
# $ docker pull vaultwarden/web-vault:v2.21.1 |
||||
|
# $ docker image inspect --format "{{.RepoDigests}}" vaultwarden/web-vault:v2.21.1 |
||||
|
# [vaultwarden/web-vault@sha256:29a4fa7bf3790fff9d908b02ac5a154913491f4bf30c95b87b06d8cf1c5516b5] |
||||
|
# |
||||
|
# - Conversely, to get the tag name from the digest: |
||||
|
# $ docker image inspect --format "{{.RepoTags}}" vaultwarden/web-vault@sha256:29a4fa7bf3790fff9d908b02ac5a154913491f4bf30c95b87b06d8cf1c5516b5 |
||||
|
# [vaultwarden/web-vault:v2.21.1] |
||||
|
# |
||||
|
FROM vaultwarden/web-vault@sha256:29a4fa7bf3790fff9d908b02ac5a154913491f4bf30c95b87b06d8cf1c5516b5 as vault |
||||
|
|
||||
|
########################## BUILD IMAGE ########################## |
||||
|
FROM messense/rust-musl-cross:armv7-musleabihf as build |
||||
|
|
||||
|
# Alpine-based ARM (musl) only supports sqlite during compile time. |
||||
|
# We now also need to add vendored_openssl, because the current base image we use to build has OpenSSL removed. |
||||
|
ARG DB=sqlite,vendored_openssl |
||||
|
|
||||
|
# Build time options to avoid dpkg warnings and help with reproducible builds. |
||||
|
ENV DEBIAN_FRONTEND=noninteractive \ |
||||
|
LANG=C.UTF-8 \ |
||||
|
TZ=UTC \ |
||||
|
TERM=xterm-256color \ |
||||
|
CARGO_HOME="/root/.cargo" \ |
||||
|
USER="root" |
||||
|
|
||||
|
|
||||
|
# Create CARGO_HOME folder and don't download rust docs |
||||
|
RUN --mount=type=cache,target=/root/.cargo/git --mount=type=cache,target=/root/.cargo/registry mkdir -pv "${CARGO_HOME}" \ |
||||
|
&& rustup set profile minimal |
||||
|
|
||||
|
ENV RUSTFLAGS='-C link-arg=-s' |
||||
|
ENV CFLAGS_armv7_unknown_linux_musleabihf="-mfpu=vfpv3-d16" |
||||
|
|
||||
|
# Creates a dummy project used to grab dependencies |
||||
|
RUN USER=root cargo new --bin /app |
||||
|
WORKDIR /app |
||||
|
|
||||
|
# Copies over *only* your manifests and build files |
||||
|
COPY ./Cargo.* ./ |
||||
|
COPY ./rust-toolchain ./rust-toolchain |
||||
|
COPY ./build.rs ./build.rs |
||||
|
|
||||
|
RUN --mount=type=cache,target=/root/.cargo/git --mount=type=cache,target=/root/.cargo/registry rustup target add armv7-unknown-linux-musleabihf |
||||
|
|
||||
|
# Builds your dependencies and removes the |
||||
|
# dummy project, except the target folder |
||||
|
# This folder contains the compiled dependencies |
||||
|
RUN --mount=type=cache,target=/root/.cargo/git --mount=type=cache,target=/root/.cargo/registry cargo build --features ${DB} --release --target=armv7-unknown-linux-musleabihf \ |
||||
|
&& find . -not -path "./target*" -delete |
||||
|
|
||||
|
# Copies the complete project |
||||
|
# To avoid copying unneeded files, use .dockerignore |
||||
|
COPY . . |
||||
|
|
||||
|
# Make sure that we actually build the project |
||||
|
RUN touch src/main.rs |
||||
|
|
||||
|
# Builds again, this time it'll just be |
||||
|
# your actual source files being built |
||||
|
RUN --mount=type=cache,target=/root/.cargo/git --mount=type=cache,target=/root/.cargo/registry cargo build --features ${DB} --release --target=armv7-unknown-linux-musleabihf |
||||
|
# hadolint ignore=DL3059 |
||||
|
RUN musl-strip target/armv7-unknown-linux-musleabihf/release/vaultwarden |
||||
|
|
||||
|
######################## RUNTIME IMAGE ######################## |
||||
|
# Create a new stage with a minimal image |
||||
|
# because we already have a binary built |
||||
|
FROM balenalib/armv7hf-alpine:3.14 |
||||
|
|
||||
|
ENV ROCKET_ENV "staging" |
||||
|
ENV ROCKET_PORT=80 |
||||
|
ENV ROCKET_WORKERS=10 |
||||
|
ENV SSL_CERT_DIR=/etc/ssl/certs |
||||
|
|
||||
|
# hadolint ignore=DL3059 |
||||
|
RUN [ "cross-build-start" ] |
||||
|
|
||||
|
# Create data folder and Install needed libraries |
||||
|
RUN mkdir /data \ |
||||
|
&& apk add --no-cache \ |
||||
|
openssl \ |
||||
|
tzdata \ |
||||
|
curl \ |
||||
|
dumb-init \ |
||||
|
ca-certificates |
||||
|
|
||||
|
# hadolint ignore=DL3059 |
||||
|
RUN [ "cross-build-end" ] |
||||
|
|
||||
|
VOLUME /data |
||||
|
EXPOSE 80 |
||||
|
EXPOSE 3012 |
||||
|
|
||||
|
# Copies the files from the context (Rocket.toml file and web-vault) |
||||
|
# and the binary from the "build" stage to the current stage |
||||
|
WORKDIR / |
||||
|
COPY Rocket.toml . |
||||
|
COPY --from=vault /web-vault ./web-vault |
||||
|
COPY --from=build /app/target/armv7-unknown-linux-musleabihf/release/vaultwarden . |
||||
|
|
||||
|
COPY docker/healthcheck.sh /healthcheck.sh |
||||
|
COPY docker/start.sh /start.sh |
||||
|
|
||||
|
HEALTHCHECK --interval=60s --timeout=10s CMD ["/healthcheck.sh"] |
||||
|
|
||||
|
# Configures the startup! |
||||
|
ENTRYPOINT ["/usr/bin/dumb-init", "--"] |
||||
|
CMD ["/start.sh"] |
Loading…
Reference in new issue