From 05fa00a30a2ac2a7851874c5a88e622fb577b774 Mon Sep 17 00:00:00 2001 From: Jack Chen Date: Thu, 3 Oct 2024 10:22:25 +0800 Subject: [PATCH] feat: Update Compose Builder to Support PostgreSQL as Database (#464) * feat: Update Compose Builder to Support PostgreSQL as Database closes #463 Signed-off-by: Jack Chen --- README.md | 20 +- compose-builder/.env | 15 + compose-builder/Makefile | 43 +- compose-builder/README.md | 8 +- compose-builder/add-cron-scheduler.yml | 44 ++ compose-builder/add-keeper.yml | 14 +- compose-builder/add-secure-keeper.yml | 3 +- compose-builder/add-secure-mqtt-broker.yml | 3 +- .../add-secure-mqtt-messagebus.yml | 3 +- compose-builder/add-secure-postgres.yml | 39 ++ compose-builder/add-security-postgres.yml | 232 ++++++++++ compose-builder/add-security-proxy.yml | 7 +- .../common-sec-stage-gate-postgres.env | 35 ++ .../docker-compose-base-postgres.yml | 291 ++++++++++++ docker-compose-arm64.yml | 6 +- docker-compose-no-secty-arm64.yml | 2 +- ...compose-no-secty-with-app-sample-arm64.yml | 2 +- docker-compose-no-secty-with-app-sample.yml | 2 +- docker-compose-no-secty.yml | 2 +- docker-compose-postgres-no-secty-arm64.yml | 429 ------------------ docker-compose-postgres-no-secty.yml | 429 ------------------ docker-compose-with-app-sample-arm64.yml | 6 +- docker-compose-with-app-sample.yml | 6 +- docker-compose-zero-trust-arm64.yml | 6 +- docker-compose-zero-trust.yml | 6 +- docker-compose.yml | 6 +- taf/docker-compose-taf-arm64.yml | 16 +- taf/docker-compose-taf-keeper-arm64.yml | 16 +- taf/docker-compose-taf-keeper.yml | 16 +- taf/docker-compose-taf-mqtt-bus-arm64.yml | 16 +- ...cker-compose-taf-mqtt-bus-keeper-arm64.yml | 16 +- taf/docker-compose-taf-mqtt-bus-keeper.yml | 16 +- taf/docker-compose-taf-mqtt-bus.yml | 16 +- taf/docker-compose-taf-no-secty-arm64.yml | 12 +- ...cker-compose-taf-no-secty-keeper-arm64.yml | 12 +- taf/docker-compose-taf-no-secty-keeper.yml | 12 +- ...er-compose-taf-no-secty-mqtt-bus-arm64.yml | 12 +- ...ose-taf-no-secty-mqtt-bus-keeper-arm64.yml | 12 +- ...r-compose-taf-no-secty-mqtt-bus-keeper.yml | 12 +- taf/docker-compose-taf-no-secty-mqtt-bus.yml | 12 +- taf/docker-compose-taf-no-secty.yml | 12 +- taf/docker-compose-taf-perf-arm64.yml | 6 +- ...docker-compose-taf-perf-no-secty-arm64.yml | 2 +- taf/docker-compose-taf-perf-no-secty.yml | 2 +- taf/docker-compose-taf-perf.yml | 6 +- taf/docker-compose-taf.yml | 16 +- 46 files changed, 957 insertions(+), 942 deletions(-) create mode 100644 compose-builder/add-cron-scheduler.yml create mode 100644 compose-builder/add-secure-postgres.yml create mode 100644 compose-builder/add-security-postgres.yml create mode 100644 compose-builder/common-sec-stage-gate-postgres.env create mode 100644 compose-builder/docker-compose-base-postgres.yml delete mode 100644 docker-compose-postgres-no-secty-arm64.yml delete mode 100644 docker-compose-postgres-no-secty.yml diff --git a/README.md b/README.md index dcab1f35..5b6cc83c 100644 --- a/README.md +++ b/README.md @@ -128,16 +128,16 @@ The compose files under the `taf` subfolder are used for the automated TAF tests Use `make portainer`and `make portainer-down` to start and stop Portainer. ### Use PostgreSQL as the persistence layer in EdgeX -- **docker-compose-postgres-no-secty.yml** Contains just the services needed to run in non-secure configuration. Includes Postgres, Redis, Device Virtual and MQTT Broker services using a mix of Postgres and Redis as the databases and MQTT as the message bus. -- **docker-compose-postgres-no-secty-arm64.yml** Contains just the services needed to run in non-secure configuration on `ARM64` system. Includes Postgres, Redis, Device Virtual and MQTT Broker services using a mix of Postgres and Redis as the databases and MQTT as the message bus. +EdgeX services can be configured to use PostgreSQL as the persistence layer. The compose builder now supports generating compose files that use PostgreSQL. -> **Note:** Only the services as listed below support Postgres as the database in EdgeX. More EdgeX services will support Postgres once the development work is done. -> - **Core Data** -> - **Core Keeper** -> - The Store and Forward capability of **app-mqtt-export** App Service +**To use PostgreSQL as the persistence layer, follow these steps** - **Start the EdgeX Services using Postgres and Redis as the databases** +- Go to `/compose-builder` folder +- `make run no-secty keeper mqtt-bus postgres` - - Use `docker compose -f docker-compose-postgres-no-secty.yml up -d` to start the services using this compose file. - - Use `docker compose -f docker-compose-postgres-no-secty.yml down` to stop the services. - - Replace **docker-compose-postgres-no-secty.yml** with **docker-compose-postgres-no-secty-arm64.yml** in the above commands on `ARM64` system. + Runs the services with PostgreSQL as the persistence layer in non-secure mode. +- `make run keeper mqtt-bus postgres` + + Runs the services with PostgreSQL as the persistence layer in secure mode. + +> **Note:** `keeper` and `mqtt-bus` are required services for EdgeX to run with PostgreSQL as the persistence layer. \ No newline at end of file diff --git a/compose-builder/.env b/compose-builder/.env index 3eaa3752..fef651a1 100644 --- a/compose-builder/.env +++ b/compose-builder/.env @@ -1,5 +1,6 @@ # /******************************************************************************* # * Copyright 2022 Intel +# * Copyright 2024 IOTech Ltd # * # * Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except # * in compliance with the License. You may obtain a copy of the License at @@ -45,6 +46,19 @@ CP_FLAGS='-cp=consul.http://edgex-core-consul:8500' REGISTRY_HOST=edgex-core-consul REGISTRY_PORT=8500 REGISTRY_TYPE=consul +DATABASE_HOST=edgex-redis +DATABASE_TYPE=redisdb +DATABASE_PORT=6379 +MESSAGEBUS_HOST=edgex-redis +MESSAGEBUS_SECRETNAME=redisdb +MESSAGEBUS_AUTHMODE=none +MESSAGEBUS_PORT=6379 +MESSAGEBUS_PROTOCOL=redis +MESSAGEBUS_TYPE=redis +WRITABLE_INSECURESECRETS_DB_SECRETNAME=redisdb +WRITABLE_INSECURESECRETS_DB_SECRETDATA_USERNAME= +WRITABLE_INSECURESECRETS_DB_SECRETDATA_PASSWORD= +COMMON_SEC_STAGE_GATE_FILE_NAME=common-sec-stage-gate.env # Lock on Vault 1.14 (last MPL-2.0 version) VAULT_VERSION=1.14 @@ -52,6 +66,7 @@ VAULT_VERSION=1.14 CONSUL_VERSION=1.16 # Lock on Redis 7.0 until EdgeX 4.0 REDIS_VERSION=7.0-alpine +POSTGRES_VERSION=16.3-alpine3.20 KUIPER_VERSION=v1.14.0-alpha.2 MOSQUITTO_VERSION=2.0 NANOMQ_VERSION=0.18 diff --git a/compose-builder/Makefile b/compose-builder/Makefile index 511e9a5f..12c3fca0 100644 --- a/compose-builder/Makefile +++ b/compose-builder/Makefile @@ -1,5 +1,6 @@ # /******************************************************************************* # * Copyright 2023 Intel +# * Copyright 2024 IOTech Ltd # * # * Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except # * in compliance with the License. You may obtain a copy of the License at @@ -43,7 +44,8 @@ export USERID:=$(shell id -u) export DOCKER_SOCKET_PATH=/var/run/docker.sock # Get total system memory in megabytes for vault config -export TOTAL_SYSTEM_MEMORY:=$(shell grep MemTotal /proc/meminfo | awk '{print $$2}')m +#export TOTAL_SYSTEM_MEMORY:=$(shell grep MemTotal /proc/meminfo | awk '{print $$2}')m +export TOTAL_SYSTEM_MEMORY:=327352832m BROKER_YAML=add-mqtt-broker-mosquitto.yml TAF_BROKER_YAML=add-taf-mqtt-broker-mosquitto.yml @@ -60,6 +62,7 @@ define OPTIONS - asc-http asc-mqtt asc-sample asc-metrics as-llrp as-record-replay asc-ex-mqtt - - modbus-sim zero-trust no-cleanup - - consul keeper - + - postgres - endef export OPTIONS @@ -139,6 +142,35 @@ ifeq (keeper, $(filter keeper,$(ARGS))) export STAGEGATE_REGISTRY_HOST=edgex-core-keeper export STAGEGATE_REGISTRY_PORT=59890 endif + + ifeq (postgres, $(filter postgres,$(ARGS))) + export DATABASE_HOST=edgex-postgres + export DATABASE_TYPE=postgres + export DATABASE_PORT=5432 + export MESSAGEBUS_HOST=edgex-mqtt-broker + export MESSAGEBUS_PORT=1883 + export MESSAGEBUS_PROTOCOL=tcp + export MESSAGEBUS_AUTHMODE=usernamepassword + export MESSAGEBUS_SECRETNAME=message-bus + export MESSAGEBUS_TYPE=mqtt + export WRITABLE_INSECURESECRETS_DB_SECRETNAME= + ifeq (no-secty, $(filter no-secty,$(ARGS))) + export MESSAGEBUS_AUTHMODE=none + export MESSAGEBUS_SECRETNAME= + export WRITABLE_INSECURESECRETS_DB_SECRETNAME=postgres + export WRITABLE_INSECURESECRETS_DB_SECRETDATA_USERNAME=postgres + export WRITABLE_INSECURESECRETS_DB_SECRETDATA_PASSWORD=postgres + endif + endif +endif + +ifeq (postgres, $(filter postgres,$(ARGS))) + # When using postgres, change the default compose file to use docker-compose-base-postgres.yml + COMPOSE_FILES:= -f docker-compose-base-postgres.yml + COMPOSE_FILES += -f add-cron-scheduler.yml + ifneq (no-secty, $(filter no-secty,$(ARGS))) + export COMMON_SEC_STAGE_GATE_FILE_NAME=common-sec-stage-gate-postgres.env + endif endif # When in delay-start mode, ensure support services are delay-start-compliant by adding runtime-token configuration @@ -828,7 +860,12 @@ endif ifeq (no-secty, $(filter no-secty,$(ARGS))) NO_SECURITY:=-no-secty else - COMPOSE_FILES:=$(COMPOSE_FILES) -f add-security.yml + ifeq (postgres, $(filter postgres,$(ARGS))) + COMPOSE_FILES:=$(COMPOSE_FILES) -f add-secure-postgres.yml + COMPOSE_FILES:=$(COMPOSE_FILES) -f add-security-postgres.yml + else + COMPOSE_FILES:=$(COMPOSE_FILES) -f add-security.yml + endif ifeq ($(BUS),) # if BUS not set, then we are using secure redis messagebus by default COMPOSE_FILES:=$(COMPOSE_FILES) -f add-secure-redis-messagebus.yml endif @@ -1059,6 +1096,8 @@ define COMPOSE_DOWN -f add-secure-consul.yml \ -f add-keeper.yml \ -f add-secure-keeper.yml \ + -f add-secure-postgres.yml \ + -f add-cron-scheduler.yml \ down $1 endef diff --git a/compose-builder/README.md b/compose-builder/README.md index c1946ada..ee303243 100644 --- a/compose-builder/README.md +++ b/compose-builder/README.md @@ -52,7 +52,9 @@ The `Extending using multiple Compose files` approach along with environment fil This folder contains the following compose files: - **docker-compose-base.yml**
- Base non-secure mode compose file. Contains all the services that run in the non-secure configuration, including the UI. + Base non-secure mode compose file. Contains all the services that run in the non-secure configuration, including the UI. +- **docker-compose-base-postgres.yml**
+ Base non-secure mode compose file with PostgreSQL as database. Contains all the services that run in the non-secure configuration, including the UI. - **add-security.yml**
Security **extending** compose file. Adds the additional security services and configuration of services so that all the services are running in the secure configuration. - **add-secure-redis-messagebus.yml**
@@ -256,6 +258,7 @@ Options: The NATS Server service is also included. no-cleanup: Leaves generated files behind for debugging purposes. keeper: Runs to registry service to core-keeper + postgres: Runs with PostgreSQL as database, 'mqtt-bus' is required when using this option Services: : Runs only services listed (and their dependent services) where 'name' matches a service name in one of the compose files used ``` @@ -315,6 +318,7 @@ Options: nats-bus: Pull includes additional services for NATS Message Bus no-cleanup: Leaves generated files behind for debugging purposes keeper: Pull includes core-keeper + postgres: Pull includes PostgreSQL Services: : Pulls only images for the service(s) listed @@ -373,6 +377,7 @@ Options: no-cleanup: Leaves generated files behind for debugging purposes. keeper: Generates compose file with services registry to core-keeper The core-keeper service is also included + postgres: Generates compose file with PostgreSQL as database, 'mqtt-bus' is required when using this option ``` #### Clean @@ -486,6 +491,7 @@ Options: The NATS Server service is also included. no-cleanup: Leaves generated files behind for debugging purposes. keeper: Generates compose file to registry service to core-keeper + postgres: Generates compose file with PostgreSQL as database, 'mqtt-bus' is required when using this option ``` #### TAF Compose diff --git a/compose-builder/add-cron-scheduler.yml b/compose-builder/add-cron-scheduler.yml new file mode 100644 index 00000000..39c945a6 --- /dev/null +++ b/compose-builder/add-cron-scheduler.yml @@ -0,0 +1,44 @@ +# /******************************************************************************* +# * Copyright 2024 IOTech Ltd +# * +# * Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except +# * in compliance with the License. You may obtain a copy of the License at +# * +# * http://www.apache.org/licenses/LICENSE-2.0 +# * +# * Unless required by applicable law or agreed to in writing, software distributed under the License +# * is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express +# * or implied. See the License for the specific language governing permissions and limitations under +# * the License. +# * +# *******************************************************************************/ + +# This file is used to add the support-cron-scheduler service to the base docker-compose.yml file. +# TODO: Remove this file and add this service into docker-compose-base.yml while deprecating the support-scheduler service. +services: + support-cron-scheduler: + image: ${CORE_EDGEX_REPOSITORY}/support-cron-scheduler${ARCH}:${CORE_EDGEX_VERSION} + command: --registry ${CP_FLAGS} + user: "${EDGEX_USER}:${EDGEX_GROUP}" + ports: + - "127.0.0.1:59863:59863" + container_name: edgex-support-cron-scheduler + hostname: edgex-support-cron-scheduler + read_only: true + restart: always + networks: + - edgex-network + env_file: + - common-non-security.env + environment: + SERVICE_HOST: edgex-support-cron-scheduler + DATABASE_HOST: edgex-postgres + depends_on: + - ${REGISTRY_TYPE} + - database + - core-common-config-bootstrapper + security_opt: + - no-new-privileges:true + volumes: + # use host timezone + - /etc/localtime:/etc/localtime:ro diff --git a/compose-builder/add-keeper.yml b/compose-builder/add-keeper.yml index ea3532b7..b2bcf7e7 100644 --- a/compose-builder/add-keeper.yml +++ b/compose-builder/add-keeper.yml @@ -28,8 +28,18 @@ services: env_file: - common-non-security.env environment: - DATABASE_HOST: edgex-redis - MESSAGEBUS_HOST: edgex-redis + DATABASE_HOST: ${DATABASE_HOST} + DATABASE_TYPE: ${DATABASE_TYPE} + DATABASE_PORT: ${DATABASE_PORT} + MESSAGEBUS_HOST: ${MESSAGEBUS_HOST} + MESSAGEBUS_AUTHMODE: ${MESSAGEBUS_AUTHMODE} + MESSAGEBUS_SECRETNAME: ${MESSAGEBUS_SECRETNAME} + MESSAGEBUS_PORT: ${MESSAGEBUS_PORT} + MESSAGEBUS_PROTOCOL: ${MESSAGEBUS_PROTOCOL} + MESSAGEBUS_TYPE: ${MESSAGEBUS_TYPE} + WRITABLE_INSECURESECRETS_DB_SECRETNAME: ${WRITABLE_INSECURESECRETS_DB_SECRETNAME} + WRITABLE_INSECURESECRETS_DB_SECRETDATA_USERNAME: ${WRITABLE_INSECURESECRETS_DB_SECRETDATA_USERNAME} + WRITABLE_INSECURESECRETS_DB_SECRETDATA_PASSWORD: ${WRITABLE_INSECURESECRETS_DB_SECRETDATA_PASSWORD} SERVICE_HOST: edgex-core-keeper security_opt: - no-new-privileges:true diff --git a/compose-builder/add-secure-keeper.yml b/compose-builder/add-secure-keeper.yml index c83ef305..12878f30 100644 --- a/compose-builder/add-secure-keeper.yml +++ b/compose-builder/add-secure-keeper.yml @@ -18,7 +18,7 @@ services: command: "/core-keeper" env_file: - common-security.env - - common-sec-stage-gate.env + - ${COMMON_SEC_STAGE_GATE_FILE_NAME} volumes: - edgex-init:/edgex-init:ro - /tmp/edgex/secrets/core-keeper:/tmp/edgex/secrets/core-keeper:ro,z @@ -26,4 +26,3 @@ services: - security-bootstrapper - security-secretstore-setup - database - diff --git a/compose-builder/add-secure-mqtt-broker.yml b/compose-builder/add-secure-mqtt-broker.yml index 9a923239..df1b4543 100644 --- a/compose-builder/add-secure-mqtt-broker.yml +++ b/compose-builder/add-secure-mqtt-broker.yml @@ -1,5 +1,6 @@ # /******************************************************************************* # * Copyright 2022 Intel Corporation. +# * Copyright 2024 IOTech Ltd # * # * Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except # * in compliance with the License. You may obtain a copy of the License at @@ -22,7 +23,7 @@ services: entrypoint: ["/edgex-init/messagebus_wait_install.sh"] env_file: - common-security.env - - common-sec-stage-gate.env + - ${COMMON_SEC_STAGE_GATE_FILE_NAME} environment: BROKER_TYPE: mosquitto CONF_DIR: /edgex-init/bootstrap-mosquitto/res diff --git a/compose-builder/add-secure-mqtt-messagebus.yml b/compose-builder/add-secure-mqtt-messagebus.yml index d003e3a2..ac0420cc 100644 --- a/compose-builder/add-secure-mqtt-messagebus.yml +++ b/compose-builder/add-secure-mqtt-messagebus.yml @@ -1,5 +1,6 @@ # /******************************************************************************* # * Copyright 2022 Intel Corporation. +# * Copyright 2024 IOTech Ltd # * # * Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except # * in compliance with the License. You may obtain a copy of the License at @@ -33,7 +34,7 @@ services: rules-engine: entrypoint: [ "/edgex-init/kuiper_wait_install.sh" ] env_file: - - common-sec-stage-gate.env + - ${COMMON_SEC_STAGE_GATE_FILE_NAME} volumes: - kuiper-sources:/kuiper/etc/sources - kuiper-connections:/kuiper/etc/connections diff --git a/compose-builder/add-secure-postgres.yml b/compose-builder/add-secure-postgres.yml new file mode 100644 index 00000000..6ce04990 --- /dev/null +++ b/compose-builder/add-secure-postgres.yml @@ -0,0 +1,39 @@ +# /******************************************************************************* +# * Copyright 2024 IOTech Ltd +# * +# * Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except +# * in compliance with the License. You may obtain a copy of the License at +# * +# * http://www.apache.org/licenses/LICENSE-2.0 +# * +# * Unless required by applicable law or agreed to in writing, software distributed under the License +# * is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express +# * or implied. See the License for the specific language governing permissions and limitations under +# * the License. +# * +# *******************************************************************************/ + +# TODO: Move the content of this Docker Compose file to add-security.yml when the redis database support is removed + +volumes: + postgres-data: + +services: + database: + entrypoint: ["/edgex-init/postgres_wait_install.sh"] + env_file: + - common-security.env + - common-sec-stage-gate-postgres.env + environment: + DATABASECONFIG_PATH: /tmp/postgres-init-scripts + DATABASECONFIG_NAME: create-users.sh + tmpfs: + - /run + - /tmp + volumes: + - edgex-init:/edgex-init:ro + - postgres-data:/var/lib/postgresql/data + - /tmp/edgex/secrets/security-bootstrapper-postgres:/tmp/edgex/secrets/security-bootstrapper-postgres:ro,z + depends_on: + - security-bootstrapper + - security-secretstore-setup diff --git a/compose-builder/add-security-postgres.yml b/compose-builder/add-security-postgres.yml new file mode 100644 index 00000000..d482aed2 --- /dev/null +++ b/compose-builder/add-security-postgres.yml @@ -0,0 +1,232 @@ +# /******************************************************************************* +# * Copyright 2024 IOTech Ltd +# * +# * Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except +# * in compliance with the License. You may obtain a copy of the License at +# * +# * http://www.apache.org/licenses/LICENSE-2.0 +# * +# * Unless required by applicable law or agreed to in writing, software distributed under the License +# * is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express +# * or implied. See the License for the specific language governing permissions and limitations under +# * the License. +# * +# *******************************************************************************/ + +# Note: this Docker Compose file is the postgres version of the add-security.yml file +# TODO: Move the content of this Docker Compose file to add-security.yml when the redis database support is removed + +volumes: + edgex-init: + vault-config: + vault-file: + vault-logs: + +services: + security-bootstrapper: + image: ${CORE_EDGEX_REPOSITORY}/security-bootstrapper${ARCH}:${CORE_EDGEX_VERSION} + user: "root:root" # Must run as root + container_name: edgex-security-bootstrapper + hostname: edgex-security-bootstrapper + networks: + - edgex-network + read_only: true + restart: always + env_file: + - common-sec-stage-gate-postgres.env + environment: + EDGEX_USER: ${EDGEX_USER} + EDGEX_GROUP: ${EDGEX_GROUP} + DATABASE_HOST: edgex-postgres + DATABASE_PORT: 5432 + REGISTRY_HOST: edgex-core-keeper + REGISTRY_PORT: 59890 + volumes: + # use host timezone + - /etc/localtime:/etc/localtime:ro + - edgex-init:/edgex-init + security_opt: + - no-new-privileges:true + + security-secretstore-setup: + image: ${CORE_EDGEX_REPOSITORY}/security-secretstore-setup${ARCH}:${CORE_EDGEX_VERSION} + user: "root:root" # must run as root + container_name: edgex-security-secretstore-setup + hostname: edgex-security-secretstore-setup + env_file: + - common-security.env + - common-sec-stage-gate-postgres.env + environment: + EDGEX_USER: ${EDGEX_USER} + EDGEX_GROUP: ${EDGEX_GROUP} + DATABASE_HOST: edgex-postgres + DATABASE_PORT: 5432 + DATABASE_TYPE: postgres + # Uncomment and modify the following "EDGEX_ADD_SECRETSTORE_TOKENS" to add the additional secret store tokens on the fly + # the secret store token is required if you have added registry acl roles from env "EDGEX_ADD_REGISTRY_ACL_ROLES" + # in service "consul". + #EDGEX_ADD_SECRETSTORE_TOKENS: app-sample,app-rules-engine-redis, app-rules-engine-mqtt, app-push-to-core + read_only: true + restart: always + networks: + - edgex-network + tmpfs: + - /run + - /vault + volumes: + # use host timezone + - /etc/localtime:/etc/localtime:ro + - edgex-init:/edgex-init:ro + - vault-config:/vault/config + - /tmp/edgex/secrets:/tmp/edgex/secrets:z + depends_on: + - security-bootstrapper + - vault + security_opt: + - no-new-privileges:true + + vault: + image: hashicorp/vault:${VAULT_VERSION} + user: "root:root" # Note that Vault is run under the 'vault' user, but entry point scripts need to first run as root + container_name: edgex-vault + hostname: edgex-vault + networks: + - edgex-network + ports: + - "127.0.0.1:8200:8200" + deploy: + resources: + limits: + memory: "${TOTAL_SYSTEM_MEMORY}" + memswap_limit: "${TOTAL_SYSTEM_MEMORY}" + tmpfs: + - /vault/config + entrypoint: [ "/edgex-init/vault_wait_install.sh" ] + env_file: + - common-sec-stage-gate-postgres.env + command: server + environment: + VAULT_ADDR: http://edgex-vault:8200 + VAULT_CONFIG_DIR: /vault/config + VAULT_UI: "true" + SKIP_SETCAP: "true" + VAULT_LOCAL_CONFIG: | + listener "tcp" { + address = "edgex-vault:8200" + tls_disable = "1" + cluster_address = "edgex-vault:8201" + } + backend "file" { + path = "/vault/file" + } + default_lease_ttl = "168h" + max_lease_ttl = "720h" + disable_mlock = true + volumes: + - edgex-init:/edgex-init:ro + - vault-file:/vault/file + - vault-logs:/vault/logs + depends_on: + - security-bootstrapper + restart: always + + support-notifications: + env_file: + - common-security.env + - common-sec-stage-gate-postgres.env + entrypoint: ["/edgex-init/ready_to_run_wait_install.sh"] + command: "/support-notifications --registry ${CP_FLAGS}" + volumes: + - edgex-init:/edgex-init:ro + - /tmp/edgex/secrets/support-notifications:/tmp/edgex/secrets/support-notifications:ro,z + depends_on: + - security-bootstrapper + - security-secretstore-setup + - database + + core-metadata: + env_file: + - common-security.env + - common-sec-stage-gate-postgres.env + entrypoint: ["/edgex-init/ready_to_run_wait_install.sh"] + command: "/core-metadata --registry ${CP_FLAGS}" + volumes: + - edgex-init:/edgex-init:ro + - /tmp/edgex/secrets/core-metadata:/tmp/edgex/secrets/core-metadata:ro,z + depends_on: + - security-bootstrapper + - security-secretstore-setup + - database + + core-data: + env_file: + - common-security.env + - common-sec-stage-gate-postgres.env + entrypoint: ["/edgex-init/ready_to_run_wait_install.sh"] + command: "/core-data --registry ${CP_FLAGS}" + volumes: + - edgex-init:/edgex-init:ro + - /tmp/edgex/secrets/core-data:/tmp/edgex/secrets/core-data:ro,z + depends_on: + - security-bootstrapper + - security-secretstore-setup + - database + + core-command: + env_file: + - common-security.env + - common-sec-stage-gate-postgres.env + entrypoint: ["/edgex-init/ready_to_run_wait_install.sh"] + command: "/core-command --registry ${CP_FLAGS}" + volumes: + - edgex-init:/edgex-init:ro + - /tmp/edgex/secrets/core-command:/tmp/edgex/secrets/core-command:ro,z + depends_on: + - security-bootstrapper + - security-secretstore-setup + - database + + core-common-config-bootstrapper: + env_file: + - common-security.env + - common-sec-stage-gate-postgres.env + entrypoint: ["/edgex-init/ready_to_run_wait_install.sh"] + command: /entrypoint.sh /core-common-config-bootstrapper --registry ${CP_FLAGS} + volumes: + - edgex-init:/edgex-init:ro + - /tmp/edgex/secrets/core-common-config-bootstrapper:/tmp/edgex/secrets/core-common-config-bootstrapper:ro,z + depends_on: + - security-bootstrapper + - security-secretstore-setup + + support-cron-scheduler: + env_file: + - common-security.env + - common-sec-stage-gate-postgres.env + entrypoint: ["/edgex-init/ready_to_run_wait_install.sh"] + command: "/support-cron-scheduler --registry ${CP_FLAGS}" + volumes: + - edgex-init:/edgex-init:ro + - /tmp/edgex/secrets/support-cron-scheduler:/tmp/edgex/secrets/support-cron-scheduler:ro,z + depends_on: + - security-bootstrapper + - security-secretstore-setup + - database + + # this is to make sure the service is started after security-bootstrapper process is done + # because it needs to await Consul roles to be created + app-rules-engine: + entrypoint: ["/edgex-init/ready_to_run_wait_install.sh"] + command: "/app-service-configurable --registry ${CP_FLAGS}" + env_file: + - common-security.env + - common-sec-stage-gate-postgres.env + volumes: + - edgex-init:/edgex-init:ro + - /tmp/edgex/secrets/app-rules-engine:/tmp/edgex/secrets/app-rules-engine:ro,z + depends_on: + - security-bootstrapper + + ui: + environment: + EDGEX_SECURITY_SECRET_STORE: "true" diff --git a/compose-builder/add-security-proxy.yml b/compose-builder/add-security-proxy.yml index fa251e67..b8de2ec1 100644 --- a/compose-builder/add-security-proxy.yml +++ b/compose-builder/add-security-proxy.yml @@ -1,5 +1,6 @@ # /******************************************************************************* # * Copyright 2024 Intel Corporation. +# * Copyright 2024 IOTech Ltd # * # * Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except # * in compliance with the License. You may obtain a copy of the License at @@ -38,7 +39,7 @@ services: - "-g" - "daemon off;" env_file: - - common-sec-stage-gate.env + - ${COMMON_SEC_STAGE_GATE_FILE_NAME} volumes: - edgex-init:/edgex-init:ro - nginx-templates:/etc/nginx/templates @@ -65,7 +66,7 @@ services: - edgex-network env_file: - common-security.env - - common-sec-stage-gate.env + - ${COMMON_SEC_STAGE_GATE_FILE_NAME} volumes: # use host timezone - /etc/localtime:/etc/localtime:ro @@ -95,7 +96,7 @@ services: command: entrypoint.sh /security-proxy-auth --registry ${CP_FLAGS} env_file: - common-security.env - - common-sec-stage-gate.env + - ${COMMON_SEC_STAGE_GATE_FILE_NAME} environment: SERVICE_HOST: edgex-proxy-auth volumes: diff --git a/compose-builder/common-sec-stage-gate-postgres.env b/compose-builder/common-sec-stage-gate-postgres.env new file mode 100644 index 00000000..1de4a07d --- /dev/null +++ b/compose-builder/common-sec-stage-gate-postgres.env @@ -0,0 +1,35 @@ +# /******************************************************************************* +# * Copyright 2024 IOTech Ltd +# * +# * Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except +# * in compliance with the License. You may obtain a copy of the License at +# * +# * http://www.apache.org/licenses/LICENSE-2.0 +# * +# * Unless required by applicable law or agreed to in writing, software distributed under the License +# * is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express +# * or implied. See the License for the specific language governing permissions and limitations under +# * the License. +# * +# *******************************************************************************/ +# +# This file contains the common security bootstrapper related environment overrides used many Edgex services. +# +# TODO: Move the content of this env file to common-sec-stage-gate.env when the redis database support is removed + +STAGEGATE_WAITFOR_TIMEOUT=60s +STAGEGATE_BOOTSTRAPPER_HOST=edgex-security-bootstrapper +STAGEGATE_BOOTSTRAPPER_STARTPORT=54321 +STAGEGATE_SECRETSTORESETUP_HOST=edgex-security-secretstore-setup +STAGEGATE_SECRETSTORESETUP_TOKENS_READYPORT=54322 +# this is intended to be the same as Database.Host/.Port for other services +STAGEGATE_DATABASE_HOST=edgex-postgres +STAGEGATE_DATABASE_PORT=5432 +STAGEGATE_DATABASE_READYPORT=5432 +# this is intended to be the same as Registry.Host/.Port for other services +STAGEGATE_REGISTRY_HOST=${REGISTRY_HOST} +STAGEGATE_REGISTRY_PORT=${REGISTRY_PORT} +STAGEGATE_REGISTRY_READYPORT=54324 +STAGEGATE_READY_TORUNPORT=54329 +PROXY_SETUP_HOST=edgex-security-proxy-setup +STAGEGATE_PROXYSETUP_READYPORT=54325 diff --git a/compose-builder/docker-compose-base-postgres.yml b/compose-builder/docker-compose-base-postgres.yml new file mode 100644 index 00000000..d8ef6af3 --- /dev/null +++ b/compose-builder/docker-compose-base-postgres.yml @@ -0,0 +1,291 @@ +# /******************************************************************************* +# * Copyright 2024 IOTech Ltd +# * +# * Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except +# * in compliance with the License. You may obtain a copy of the License at +# * +# * http://www.apache.org/licenses/LICENSE-2.0 +# * +# * Unless required by applicable law or agreed to in writing, software distributed under the License +# * is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express +# * or implied. See the License for the specific language governing permissions and limitations under +# * the License. +# *******************************************************************************/ + +# NOTE: this Docker Compose file does not contain the security services required to run in secure mode +# TODO: Move the content of this Docker Compose file to docker-comose-base.yml when the redis database support is removed + +networks: + edgex-network: + driver: "bridge" + +volumes: + db-data: + kuiper-data: + kuiper-etc: + kuiper-log: + kuiper-plugins: + +services: + database: + image: postgres:${POSTGRES_VERSION} + ports: + - "127.0.0.1:5432:5432" + container_name: edgex-postgres + hostname: edgex-postgres + read_only: true + restart: always + networks: + - edgex-network + environment: + POSTGRES_PASSWORD: postgres + POSTGRES_DB: edgex_db + volumes: + - db-data:/data + security_opt: + - no-new-privileges:true + tmpfs: + - /run + + core-metadata: + image: ${CORE_EDGEX_REPOSITORY}/core-metadata${ARCH}:${CORE_EDGEX_VERSION} + command: --registry ${CP_FLAGS} + user: "${EDGEX_USER}:${EDGEX_GROUP}" + ports: + - "127.0.0.1:59881:59881" + container_name: edgex-core-metadata + hostname: edgex-core-metadata + read_only: true + restart: always + networks: + - edgex-network + env_file: + - common-non-security.env + environment: + SERVICE_HOST: edgex-core-metadata + WRITABLE_INSECURESECRETS_DB_SECRETNAME: ${WRITABLE_INSECURESECRETS_DB_SECRETNAME} + WRITABLE_INSECURESECRETS_DB_SECRETDATA_USERNAME: ${WRITABLE_INSECURESECRETS_DB_SECRETDATA_USERNAME} + WRITABLE_INSECURESECRETS_DB_SECRETDATA_PASSWORD: ${WRITABLE_INSECURESECRETS_DB_SECRETDATA_PASSWORD} + DATABASE_HOST: edgex-postgres + DATABASE_PORT: 5432 + DATABASE_TYPE: postgres + depends_on: + - ${REGISTRY_TYPE} + - database + security_opt: + - no-new-privileges:true + volumes: + # use host timezone + - /etc/localtime:/etc/localtime:ro + + core-data: + image: ${CORE_EDGEX_REPOSITORY}/core-data${ARCH}:${CORE_EDGEX_VERSION} + command: --registry ${CP_FLAGS} + user: "${EDGEX_USER}:${EDGEX_GROUP}" + ports: + - "127.0.0.1:59880:59880" + container_name: edgex-core-data + hostname: edgex-core-data + read_only: true + restart: always + networks: + - edgex-network + env_file: + - common-non-security.env + environment: + SERVICE_HOST: edgex-core-data + WRITABLE_INSECURESECRETS_DB_SECRETNAME: ${WRITABLE_INSECURESECRETS_DB_SECRETNAME} + WRITABLE_INSECURESECRETS_DB_SECRETDATA_USERNAME: ${WRITABLE_INSECURESECRETS_DB_SECRETDATA_USERNAME} + WRITABLE_INSECURESECRETS_DB_SECRETDATA_PASSWORD: ${WRITABLE_INSECURESECRETS_DB_SECRETDATA_PASSWORD} + DATABASE_HOST: edgex-postgres + DATABASE_PORT: 5432 + DATABASE_TYPE: postgres + depends_on: + - ${REGISTRY_TYPE} + - database + - core-common-config-bootstrapper + security_opt: + - no-new-privileges:true + volumes: + # use host timezone + - /etc/localtime:/etc/localtime:ro + + core-command: + image: ${CORE_EDGEX_REPOSITORY}/core-command${ARCH}:${CORE_EDGEX_VERSION} + command: --registry ${CP_FLAGS} + user: "${EDGEX_USER}:${EDGEX_GROUP}" + ports: + - "127.0.0.1:59882:59882" + container_name: edgex-core-command + hostname: edgex-core-command + read_only: true + restart: always + networks: + - edgex-network + env_file: + - common-non-security.env + environment: + SERVICE_HOST: edgex-core-command + EXTERNALMQTT_URL: tcp://edgex-mqtt-broker:1883 + depends_on: + - ${REGISTRY_TYPE} + - database + - core-metadata + - core-common-config-bootstrapper + security_opt: + - no-new-privileges:true + volumes: + # use host timezone + - /etc/localtime:/etc/localtime:ro + + core-common-config-bootstrapper: + image: ${CORE_EDGEX_REPOSITORY}/core-common-config-bootstrapper${ARCH}:${CORE_EDGEX_VERSION} + command: /core-common-config-bootstrapper --registry ${CP_FLAGS} + user: "${EDGEX_USER}:${EDGEX_GROUP}" + container_name: edgex-core-common-config-bootstrapper + hostname: edgex-core-common-config-bootstrapper + read_only: true + networks: + - edgex-network + env_file: + - common-non-security.env + environment: + ALL_SERVICES_REGISTRY_HOST: ${REGISTRY_HOST} + ALL_SERVICES_REGISTRY_PORT: ${REGISTRY_PORT} + ALL_SERVICES_REGISTRY_TYPE: ${REGISTRY_TYPE} + ALL_SERVICES_DATABASE_HOST: edgex-postgres + ALL_SERVICES_DATABASE_PORT: "5432" + ALL_SERVICES_DATABASE_TYPE: postgres + ALL_SERVICES_MESSAGEBUS_AUTHMODE: none + ALL_SERVICES_MESSAGEBUS_HOST: edgex-mqtt-broker + ALL_SERVICES_MESSAGEBUS_PORT: "1883" + ALL_SERVICES_MESSAGEBUS_PROTOCOL: tcp + ALL_SERVICES_MESSAGEBUS_TYPE: mqtt + ALL_SERVICES_WRITABLE_INSECURESECRETS_DB_SECRETNAME: ${WRITABLE_INSECURESECRETS_DB_SECRETNAME} + ALL_SERVICES_WRITABLE_INSECURESECRETS_DB_SECRETDATA_USERNAME: ${WRITABLE_INSECURESECRETS_DB_SECRETDATA_USERNAME} + ALL_SERVICES_WRITABLE_INSECURESECRETS_DB_SECRETDATA_PASSWORD: ${WRITABLE_INSECURESECRETS_DB_SECRETDATA_PASSWORD} + APP_SERVICES_CLIENTS_CORE_METADATA_HOST: edgex-core-metadata + DEVICE_SERVICES_CLIENTS_CORE_METADATA_HOST: edgex-core-metadata + depends_on: + - ${REGISTRY_TYPE} + security_opt: + - no-new-privileges:true + volumes: + # use host timezone + - /etc/localtime:/etc/localtime:ro + + support-notifications: + image: ${CORE_EDGEX_REPOSITORY}/support-notifications${ARCH}:${CORE_EDGEX_VERSION} + command: --registry ${CP_FLAGS} + user: "${EDGEX_USER}:${EDGEX_GROUP}" + ports: + - "127.0.0.1:59860:59860" + container_name: edgex-support-notifications + hostname: edgex-support-notifications + read_only: true + restart: always + networks: + - edgex-network + env_file: + - common-non-security.env + environment: + SERVICE_HOST: edgex-support-notifications + WRITABLE_INSECURESECRETS_DB_SECRETNAME: ${WRITABLE_INSECURESECRETS_DB_SECRETNAME} + WRITABLE_INSECURESECRETS_DB_SECRETDATA_USERNAME: ${WRITABLE_INSECURESECRETS_DB_SECRETDATA_USERNAME} + WRITABLE_INSECURESECRETS_DB_SECRETDATA_PASSWORD: ${WRITABLE_INSECURESECRETS_DB_SECRETDATA_PASSWORD} + DATABASE_HOST: edgex-postgres + DATABASE_PORT: 5432 + DATABASE_TYPE: postgres + depends_on: + - ${REGISTRY_TYPE} + - database + - core-common-config-bootstrapper + security_opt: + - no-new-privileges:true + volumes: + # use host timezone + - /etc/localtime:/etc/localtime:ro + + app-rules-engine: + image: ${APP_SVC_REPOSITORY}/app-service-configurable${ARCH}:${APP_SERVICE_CONFIG_VERSION} + command: --registry ${CP_FLAGS} + user: "${EDGEX_USER}:${EDGEX_GROUP}" + ports: + - "127.0.0.1:59701:59701" + container_name: edgex-app-rules-engine + hostname: edgex-app-rules-engine + read_only: true + restart: always + networks: + - edgex-network + env_file: + - common-non-security.env + environment: + EDGEX_PROFILE: rules-engine + SERVICE_HOST: edgex-app-rules-engine + depends_on: + - ${REGISTRY_TYPE} + - core-metadata + - core-common-config-bootstrapper + security_opt: + - no-new-privileges:true + volumes: + # use host timezone + - /etc/localtime:/etc/localtime:ro + + rules-engine: + image: lfedge/ekuiper:${KUIPER_VERSION} + user: "kuiper:kuiper" + ports: + - "127.0.0.1:59720:59720" + container_name: edgex-kuiper + hostname: edgex-kuiper + read_only: true + restart: always + networks: + - edgex-network + volumes: + # use host timezone + - /etc/localtime:/etc/localtime:ro + - kuiper-data:/kuiper/data + - kuiper-etc:/kuiper/etc + - kuiper-log:/kuiper/log + - kuiper-plugins:/kuiper/plugins + environment: +# KUIPER__BASIC__DEBUG: "true" + KUIPER__BASIC__CONSOLELOG: "true" + KUIPER__BASIC__ENABLEOPENZITI: false + KUIPER__BASIC__RESTPORT: 59720 + CONNECTION__EDGEX__MQTTMSGBUS__PORT: 1883 + CONNECTION__EDGEX__MQTTMSGBUS__PROTOCOL: tcp + CONNECTION__EDGEX__MQTTMSGBUS__SERVER: edgex-mqtt-broker + CONNECTION__EDGEX__MQTTMSGBUS__TYPE: mqtt + EDGEX__DEFAULT__PORT: "1883" + EDGEX__DEFAULT__PROTOCOL: tcp + EDGEX__DEFAULT__SERVER: edgex-mqtt-broker + EDGEX__DEFAULT__TYPE: mqtt + EDGEX__DEFAULT__TOPIC: edgex/rules-events + depends_on: + - database + security_opt: + - no-new-privileges:true + + ui: + image: ${UI_REPOSITORY}/edgex-ui${ARCH}:${EDGEX_UI_VERSION} + ports: + - "4000:4000" + container_name: edgex-ui-go + hostname: edgex-ui-go + environment: + EDGEX_SECURITY_SECRET_STORE: "false" + SERVICE_HOST: edgex-ui-go + read_only: true + restart: always + networks: + - edgex-network + security_opt: + - no-new-privileges:true + user: "${EDGEX_USER}:${EDGEX_GROUP}" + volumes: + # use host timezone + - /etc/localtime:/etc/localtime:ro diff --git a/docker-compose-arm64.yml b/docker-compose-arm64.yml index 5a140664..581f5811 100644 --- a/docker-compose-arm64.yml +++ b/docker-compose-arm64.yml @@ -24,7 +24,7 @@ # # From the compose-builder folder use `make build` to regenerate all standard compose files variations # -# Generated with: Docker Compose version v2.29.1 +# Generated with: Docker Compose version v2.29.2 name: edgex services: app-rules-engine: @@ -1303,7 +1303,7 @@ services: deploy: resources: limits: - memory: "34032716873728" + memory: "343254323167232" entrypoint: - /edgex-init/vault_wait_install.sh environment: @@ -1328,7 +1328,7 @@ services: VAULT_UI: "true" hostname: edgex-vault image: hashicorp/vault:1.14 - memswap_limit: "34032716873728" + memswap_limit: "343254323167232" networks: edgex-network: null ports: diff --git a/docker-compose-no-secty-arm64.yml b/docker-compose-no-secty-arm64.yml index 519e555d..a0a88c85 100644 --- a/docker-compose-no-secty-arm64.yml +++ b/docker-compose-no-secty-arm64.yml @@ -24,7 +24,7 @@ # # From the compose-builder folder use `make build` to regenerate all standard compose files variations # -# Generated with: Docker Compose version v2.29.1 +# Generated with: Docker Compose version v2.29.2 name: edgex services: app-rules-engine: diff --git a/docker-compose-no-secty-with-app-sample-arm64.yml b/docker-compose-no-secty-with-app-sample-arm64.yml index 22444bb1..3e6d014b 100644 --- a/docker-compose-no-secty-with-app-sample-arm64.yml +++ b/docker-compose-no-secty-with-app-sample-arm64.yml @@ -24,7 +24,7 @@ # # From the compose-builder folder use `make build` to regenerate all standard compose files variations # -# Generated with: Docker Compose version v2.29.1 +# Generated with: Docker Compose version v2.29.2 name: edgex services: app-rules-engine: diff --git a/docker-compose-no-secty-with-app-sample.yml b/docker-compose-no-secty-with-app-sample.yml index 7a6f3bbc..ac30267d 100644 --- a/docker-compose-no-secty-with-app-sample.yml +++ b/docker-compose-no-secty-with-app-sample.yml @@ -24,7 +24,7 @@ # # From the compose-builder folder use `make build` to regenerate all standard compose files variations # -# Generated with: Docker Compose version v2.29.1 +# Generated with: Docker Compose version v2.29.2 name: edgex services: app-rules-engine: diff --git a/docker-compose-no-secty.yml b/docker-compose-no-secty.yml index 1b80f704..5c29d492 100644 --- a/docker-compose-no-secty.yml +++ b/docker-compose-no-secty.yml @@ -24,7 +24,7 @@ # # From the compose-builder folder use `make build` to regenerate all standard compose files variations # -# Generated with: Docker Compose version v2.29.1 +# Generated with: Docker Compose version v2.29.2 name: edgex services: app-rules-engine: diff --git a/docker-compose-postgres-no-secty-arm64.yml b/docker-compose-postgres-no-secty-arm64.yml deleted file mode 100644 index c9796592..00000000 --- a/docker-compose-postgres-no-secty-arm64.yml +++ /dev/null @@ -1,429 +0,0 @@ -# Generated with: Docker Compose version v2.27.1 -name: edgex -services: - core-command: - command: - - --registry - - -cp=keeper.http://edgex-core-keeper:59890 - container_name: edgex-core-command - depends_on: - core-common-config-bootstrapper: - condition: service_started - required: true - core-metadata: - condition: service_started - required: true - database: - condition: service_started - required: true - keeper: - condition: service_started - required: true - environment: - EDGEX_SECURITY_SECRET_STORE: "false" - EXTERNALMQTT_URL: tcp://edgex-mqtt-broker:1883 - SERVICE_HOST: edgex-core-command - hostname: edgex-core-command - image: nexus3.edgexfoundry.org:10004/core-command-arm64:latest - networks: - edgex-network: null - ports: - - mode: ingress - host_ip: 127.0.0.1 - target: 59882 - published: "59882" - protocol: tcp - read_only: true - restart: always - security_opt: - - no-new-privileges:true - user: 2002:2001 - volumes: - - type: bind - source: /etc/localtime - target: /etc/localtime - read_only: true - bind: - create_host_path: true - core-common-config-bootstrapper: - command: - - /core-common-config-bootstrapper - - --registry - - -cp=keeper.http://edgex-core-keeper:59890 - container_name: edgex-core-common-config-bootstrapper - depends_on: - keeper: - condition: service_started - required: true - environment: - ALL_SERVICES_DATABASE_HOST: edgex-postgres - ALL_SERVICES_DATABASE_PORT: "5432" - ALL_SERVICES_DATABASE_TYPE: postgres - ALL_SERVICES_MESSAGEBUS_AUTHMODE: none - ALL_SERVICES_MESSAGEBUS_HOST: edgex-mqtt-broker - ALL_SERVICES_MESSAGEBUS_PORT: "1883" - ALL_SERVICES_MESSAGEBUS_PROTOCOL: tcp - ALL_SERVICES_MESSAGEBUS_TYPE: mqtt - ALL_SERVICES_REGISTRY_HOST: edgex-core-keeper - ALL_SERVICES_REGISTRY_PORT: "59890" - ALL_SERVICES_REGISTRY_TYPE: keeper - ALL_SERVICES_WRITABLE_INSECURESECRETS_DB_SECRETNAME: postgres - ALL_SERVICES_WRITABLE_INSECURESECRETS_DB_SECRETDATA_USERNAME: postgres - ALL_SERVICES_WRITABLE_INSECURESECRETS_DB_SECRETDATA_PASSWORD: postgres - APP_SERVICES_CLIENTS_CORE_METADATA_HOST: edgex-core-metadata - DEVICE_SERVICES_CLIENTS_CORE_METADATA_HOST: edgex-core-metadata - EDGEX_SECURITY_SECRET_STORE: "false" - hostname: edgex-core-common-config-bootstrapper - image: nexus3.edgexfoundry.org:10004/core-common-config-bootstrapper-arm64:latest - networks: - edgex-network: null - read_only: true - security_opt: - - no-new-privileges:true - user: 2002:2001 - volumes: - - type: bind - source: /etc/localtime - target: /etc/localtime - read_only: true - bind: - create_host_path: true - core-data: - command: - - --registry - - -cp=keeper.http://edgex-core-keeper:59890 - container_name: edgex-core-data - depends_on: - core-common-config-bootstrapper: - condition: service_started - required: true - edgex-postgres: - condition: service_started - required: true - keeper: - condition: service_started - required: true - environment: - EDGEX_SECURITY_SECRET_STORE: "false" - WRITABLE_INSECURESECRETS_DB_SECRETNAME: postgres - WRITABLE_INSECURESECRETS_DB_SECRETDATA_USERNAME: postgres - WRITABLE_INSECURESECRETS_DB_SECRETDATA_PASSWORD: postgres - SERVICE_HOST: edgex-core-data - DATABASE_HOST: edgex-postgres - DATABASE_TYPE: postgres - DATABASE_PORT: "5432" - hostname: edgex-core-data - image: nexus3.edgexfoundry.org:10004/core-data-arm64:latest - networks: - edgex-network: null - ports: - - mode: ingress - host_ip: 127.0.0.1 - target: 59880 - published: "59880" - protocol: tcp - read_only: true - restart: always - security_opt: - - no-new-privileges:true - user: 2002:2001 - volumes: - - type: bind - source: /etc/localtime - target: /etc/localtime - read_only: true - bind: - create_host_path: true - core-metadata: - command: - - --registry - - -cp=keeper.http://edgex-core-keeper:59890 - container_name: edgex-core-metadata - depends_on: - database: - condition: service_started - required: true - keeper: - condition: service_started - required: true - environment: - EDGEX_SECURITY_SECRET_STORE: "false" - SERVICE_HOST: edgex-core-metadata - DATABASE_HOST: edgex-redis - hostname: edgex-core-metadata - image: nexus3.edgexfoundry.org:10004/core-metadata-arm64:latest - networks: - edgex-network: null - ports: - - mode: ingress - host_ip: 127.0.0.1 - target: 59881 - published: "59881" - protocol: tcp - read_only: true - restart: always - security_opt: - - no-new-privileges:true - user: 2002:2001 - volumes: - - type: bind - source: /etc/localtime - target: /etc/localtime - read_only: true - bind: - create_host_path: true - database: - container_name: edgex-redis - hostname: edgex-redis - image: redis:7.0-alpine - networks: - edgex-network: null - ports: - - mode: ingress - host_ip: 127.0.0.1 - target: 6379 - published: "6379" - protocol: tcp - read_only: true - restart: always - security_opt: - - no-new-privileges:true - user: root:root - volumes: - - type: volume - source: db-data - target: /data - volume: {} - device-virtual: - command: - - -cp=keeper.http://edgex-core-keeper:59890 - - --registry - container_name: edgex-device-virtual - depends_on: - core-common-config-bootstrapper: - condition: service_started - required: true - core-data: - condition: service_started - required: true - core-metadata: - condition: service_started - required: true - keeper: - condition: service_started - required: true - environment: - EDGEX_SECURITY_SECRET_STORE: "false" - SERVICE_HOST: edgex-device-virtual - hostname: edgex-device-virtual - image: nexus3.edgexfoundry.org:10004/device-virtual-arm64:latest - networks: - edgex-network: null - ports: - - mode: ingress - host_ip: 127.0.0.1 - target: 59900 - published: "59900" - protocol: tcp - read_only: true - restart: always - security_opt: - - no-new-privileges:true - user: 2002:2001 - volumes: - - type: bind - source: /etc/localtime - target: /etc/localtime - read_only: true - bind: - create_host_path: true - keeper: - container_name: edgex-core-keeper - depends_on: - edgex-postgres: - condition: service_started - required: true - environment: - EDGEX_SECURITY_SECRET_STORE: "false" - MESSAGEBUS_HOST: edgex-mqtt-broker - MESSAGEBUS_AUTHMODE: none - MESSAGEBUS_PORT: "1883" - MESSAGEBUS_PROTOCOL: tcp - MESSAGEBUS_TYPE: mqtt - SERVICE_HOST: edgex-core-keeper - WRITABLE_INSECURESECRETS_DB_SECRETNAME: postgres - WRITABLE_INSECURESECRETS_DB_SECRETDATA_USERNAME: postgres - WRITABLE_INSECURESECRETS_DB_SECRETDATA_PASSWORD: postgres - DATABASE_HOST: edgex-postgres - DATABASE_TYPE: postgres - DATABASE_PORT: "5432" - hostname: edgex-core-keeper - image: nexus3.edgexfoundry.org:10004/core-keeper-arm64:latest - networks: - edgex-network: null - ports: - - mode: ingress - host_ip: 127.0.0.1 - target: 59890 - published: "59890" - protocol: tcp - read_only: true - restart: always - security_opt: - - no-new-privileges:true - user: 2002:2001 - volumes: - - type: bind - source: /etc/localtime - target: /etc/localtime - read_only: true - bind: - create_host_path: true - mqtt-broker: - command: - - /usr/sbin/mosquitto - - -c - - /mosquitto-no-auth.conf - container_name: edgex-mqtt-broker - hostname: edgex-mqtt-broker - image: eclipse-mosquitto:2.0 - networks: - edgex-network: null - ports: - - mode: ingress - host_ip: 127.0.0.1 - target: 1883 - published: "1883" - protocol: tcp - read_only: true - restart: always - security_opt: - - no-new-privileges:true - user: 2002:2001 - edgex-postgres: - container_name: edgex-postgres - environment: - POSTGRES_PASSWORD: postgres - POSTGRES_DB: edgex_db - hostname: postgres - image: postgres:16.3-alpine3.20 - networks: - edgex-network: null - ports: - - mode: ingress - host_ip: 127.0.0.1 - target: 5432 - published: "5432" - protocol: tcp - read_only: true - restart: always - security_opt: - - no-new-privileges:true - tmpfs: - - /run - volumes: - - type: volume - source: postgres-data - target: /var/lib/postgresql/data - volume: {} - support-cron-scheduler: - command: - - --registry - - -cp=keeper.http://edgex-core-keeper:59890 - container_name: edgex-support-cron-scheduler - depends_on: - core-common-config-bootstrapper: - condition: service_started - required: true - edgex-postgres: - condition: service_started - required: true - keeper: - condition: service_started - required: true - environment: - EDGEX_SECURITY_SECRET_STORE: "false" - WRITABLE_INSECURESECRETS_DB_SECRETNAME: postgres - WRITABLE_INSECURESECRETS_DB_SECRETDATA_USERNAME: postgres - WRITABLE_INSECURESECRETS_DB_SECRETDATA_PASSWORD: postgres - SERVICE_HOST: edgex-support-cron-scheduler - DATABASE_HOST: edgex-postgres - DATABASE_TYPE: postgres - DATABASE_PORT: "5432" - hostname: edgex-core-data - image: nexus3.edgexfoundry.org:10004/support-cron-scheduler-arm64:latest - networks: - edgex-network: null - ports: - - mode: ingress - host_ip: 127.0.0.1 - target: 59863 - published: "59863" - protocol: tcp - read_only: true - restart: always - security_opt: - - no-new-privileges:true - user: 2002:2001 - volumes: - - type: bind - source: /etc/localtime - target: /etc/localtime - read_only: true - bind: - create_host_path: true - app-mqtt-export: - command: - - --registry - - -cp=keeper.http://edgex-core-keeper:59890 - container_name: edgex-app-mqtt-export - depends_on: - core-common-config-bootstrapper: - condition: service_started - required: true - core-metadata: - condition: service_started - required: true - keeper: - condition: service_started - required: true - environment: - EDGEX_PROFILE: mqtt-export - EDGEX_SECURITY_SECRET_STORE: "false" - SERVICE_HOST: edgex-app-mqtt-export - WRITABLE_LOGLEVEL: INFO - WRITABLE_PIPELINE_FUNCTIONS_MQTTEXPORT_PARAMETERS_BROKERADDRESS: MQTT_BROKER_ADDRESS_PLACE_HOLDER - WRITABLE_PIPELINE_FUNCTIONS_MQTTEXPORT_PARAMETERS_TOPIC: edgex-events - WRITABLE_PIPELINE_FUNCTIONS_MQTTEXPORT_PARAMETERS_PERSISTONERROR: true - WRITABLE_STOREANDFORWARD_ENABLED: true - hostname: edgex-app-mqtt-export - image: nexus3.edgexfoundry.org:10004/app-service-configurable-arm64:latest - networks: - edgex-network: null - ports: - - mode: ingress - host_ip: 127.0.0.1 - target: 59703 - published: "59703" - protocol: tcp - read_only: true - restart: always - security_opt: - - no-new-privileges:true - user: 2002:2001 - volumes: - - type: bind - source: /etc/localtime - target: /etc/localtime - read_only: true - bind: - create_host_path: true -networks: - edgex-network: - name: edgex_edgex-network - driver: bridge -volumes: - db-data: - name: edgex_db-data - postgres-data: - name: edgex_postgres-data diff --git a/docker-compose-postgres-no-secty.yml b/docker-compose-postgres-no-secty.yml deleted file mode 100644 index 984639d7..00000000 --- a/docker-compose-postgres-no-secty.yml +++ /dev/null @@ -1,429 +0,0 @@ -# Generated with: Docker Compose version v2.27.1 -name: edgex -services: - core-command: - command: - - --registry - - -cp=keeper.http://edgex-core-keeper:59890 - container_name: edgex-core-command - depends_on: - core-common-config-bootstrapper: - condition: service_started - required: true - core-metadata: - condition: service_started - required: true - database: - condition: service_started - required: true - keeper: - condition: service_started - required: true - environment: - EDGEX_SECURITY_SECRET_STORE: "false" - EXTERNALMQTT_URL: tcp://edgex-mqtt-broker:1883 - SERVICE_HOST: edgex-core-command - hostname: edgex-core-command - image: nexus3.edgexfoundry.org:10004/core-command:latest - networks: - edgex-network: null - ports: - - mode: ingress - host_ip: 127.0.0.1 - target: 59882 - published: "59882" - protocol: tcp - read_only: true - restart: always - security_opt: - - no-new-privileges:true - user: 2002:2001 - volumes: - - type: bind - source: /etc/localtime - target: /etc/localtime - read_only: true - bind: - create_host_path: true - core-common-config-bootstrapper: - command: - - /core-common-config-bootstrapper - - --registry - - -cp=keeper.http://edgex-core-keeper:59890 - container_name: edgex-core-common-config-bootstrapper - depends_on: - keeper: - condition: service_started - required: true - environment: - ALL_SERVICES_DATABASE_HOST: edgex-postgres - ALL_SERVICES_DATABASE_PORT: "5432" - ALL_SERVICES_DATABASE_TYPE: postgres - ALL_SERVICES_MESSAGEBUS_AUTHMODE: none - ALL_SERVICES_MESSAGEBUS_HOST: edgex-mqtt-broker - ALL_SERVICES_MESSAGEBUS_PORT: "1883" - ALL_SERVICES_MESSAGEBUS_PROTOCOL: tcp - ALL_SERVICES_MESSAGEBUS_TYPE: mqtt - ALL_SERVICES_REGISTRY_HOST: edgex-core-keeper - ALL_SERVICES_REGISTRY_PORT: "59890" - ALL_SERVICES_REGISTRY_TYPE: keeper - ALL_SERVICES_WRITABLE_INSECURESECRETS_DB_SECRETNAME: postgres - ALL_SERVICES_WRITABLE_INSECURESECRETS_DB_SECRETDATA_USERNAME: postgres - ALL_SERVICES_WRITABLE_INSECURESECRETS_DB_SECRETDATA_PASSWORD: postgres - APP_SERVICES_CLIENTS_CORE_METADATA_HOST: edgex-core-metadata - DEVICE_SERVICES_CLIENTS_CORE_METADATA_HOST: edgex-core-metadata - EDGEX_SECURITY_SECRET_STORE: "false" - hostname: edgex-core-common-config-bootstrapper - image: nexus3.edgexfoundry.org:10004/core-common-config-bootstrapper:latest - networks: - edgex-network: null - read_only: true - security_opt: - - no-new-privileges:true - user: 2002:2001 - volumes: - - type: bind - source: /etc/localtime - target: /etc/localtime - read_only: true - bind: - create_host_path: true - core-data: - command: - - --registry - - -cp=keeper.http://edgex-core-keeper:59890 - container_name: edgex-core-data - depends_on: - core-common-config-bootstrapper: - condition: service_started - required: true - edgex-postgres: - condition: service_started - required: true - keeper: - condition: service_started - required: true - environment: - EDGEX_SECURITY_SECRET_STORE: "false" - WRITABLE_INSECURESECRETS_DB_SECRETNAME: postgres - WRITABLE_INSECURESECRETS_DB_SECRETDATA_USERNAME: postgres - WRITABLE_INSECURESECRETS_DB_SECRETDATA_PASSWORD: postgres - SERVICE_HOST: edgex-core-data - DATABASE_HOST: edgex-postgres - DATABASE_TYPE: postgres - DATABASE_PORT: "5432" - hostname: edgex-core-data - image: nexus3.edgexfoundry.org:10004/core-data:latest - networks: - edgex-network: null - ports: - - mode: ingress - host_ip: 127.0.0.1 - target: 59880 - published: "59880" - protocol: tcp - read_only: true - restart: always - security_opt: - - no-new-privileges:true - user: 2002:2001 - volumes: - - type: bind - source: /etc/localtime - target: /etc/localtime - read_only: true - bind: - create_host_path: true - core-metadata: - command: - - --registry - - -cp=keeper.http://edgex-core-keeper:59890 - container_name: edgex-core-metadata - depends_on: - database: - condition: service_started - required: true - keeper: - condition: service_started - required: true - environment: - EDGEX_SECURITY_SECRET_STORE: "false" - SERVICE_HOST: edgex-core-metadata - DATABASE_HOST: edgex-redis - hostname: edgex-core-metadata - image: nexus3.edgexfoundry.org:10004/core-metadata:latest - networks: - edgex-network: null - ports: - - mode: ingress - host_ip: 127.0.0.1 - target: 59881 - published: "59881" - protocol: tcp - read_only: true - restart: always - security_opt: - - no-new-privileges:true - user: 2002:2001 - volumes: - - type: bind - source: /etc/localtime - target: /etc/localtime - read_only: true - bind: - create_host_path: true - database: - container_name: edgex-redis - hostname: edgex-redis - image: redis:7.0-alpine - networks: - edgex-network: null - ports: - - mode: ingress - host_ip: 127.0.0.1 - target: 6379 - published: "6379" - protocol: tcp - read_only: true - restart: always - security_opt: - - no-new-privileges:true - user: root:root - volumes: - - type: volume - source: db-data - target: /data - volume: {} - device-virtual: - command: - - -cp=keeper.http://edgex-core-keeper:59890 - - --registry - container_name: edgex-device-virtual - depends_on: - core-common-config-bootstrapper: - condition: service_started - required: true - core-data: - condition: service_started - required: true - core-metadata: - condition: service_started - required: true - keeper: - condition: service_started - required: true - environment: - EDGEX_SECURITY_SECRET_STORE: "false" - SERVICE_HOST: edgex-device-virtual - hostname: edgex-device-virtual - image: nexus3.edgexfoundry.org:10004/device-virtual:latest - networks: - edgex-network: null - ports: - - mode: ingress - host_ip: 127.0.0.1 - target: 59900 - published: "59900" - protocol: tcp - read_only: true - restart: always - security_opt: - - no-new-privileges:true - user: 2002:2001 - volumes: - - type: bind - source: /etc/localtime - target: /etc/localtime - read_only: true - bind: - create_host_path: true - keeper: - container_name: edgex-core-keeper - depends_on: - edgex-postgres: - condition: service_started - required: true - environment: - EDGEX_SECURITY_SECRET_STORE: "false" - MESSAGEBUS_HOST: edgex-mqtt-broker - MESSAGEBUS_AUTHMODE: none - MESSAGEBUS_PORT: "1883" - MESSAGEBUS_PROTOCOL: tcp - MESSAGEBUS_TYPE: mqtt - SERVICE_HOST: edgex-core-keeper - WRITABLE_INSECURESECRETS_DB_SECRETNAME: postgres - WRITABLE_INSECURESECRETS_DB_SECRETDATA_USERNAME: postgres - WRITABLE_INSECURESECRETS_DB_SECRETDATA_PASSWORD: postgres - DATABASE_HOST: edgex-postgres - DATABASE_TYPE: postgres - DATABASE_PORT: "5432" - hostname: edgex-core-keeper - image: nexus3.edgexfoundry.org:10004/core-keeper:latest - networks: - edgex-network: null - ports: - - mode: ingress - host_ip: 127.0.0.1 - target: 59890 - published: "59890" - protocol: tcp - read_only: true - restart: always - security_opt: - - no-new-privileges:true - user: 2002:2001 - volumes: - - type: bind - source: /etc/localtime - target: /etc/localtime - read_only: true - bind: - create_host_path: true - mqtt-broker: - command: - - /usr/sbin/mosquitto - - -c - - /mosquitto-no-auth.conf - container_name: edgex-mqtt-broker - hostname: edgex-mqtt-broker - image: eclipse-mosquitto:2.0 - networks: - edgex-network: null - ports: - - mode: ingress - host_ip: 127.0.0.1 - target: 1883 - published: "1883" - protocol: tcp - read_only: true - restart: always - security_opt: - - no-new-privileges:true - user: 2002:2001 - edgex-postgres: - container_name: edgex-postgres - environment: - POSTGRES_PASSWORD: postgres - POSTGRES_DB: edgex_db - hostname: postgres - image: postgres:16.3-alpine3.20 - networks: - edgex-network: null - ports: - - mode: ingress - host_ip: 127.0.0.1 - target: 5432 - published: "5432" - protocol: tcp - read_only: true - restart: always - security_opt: - - no-new-privileges:true - tmpfs: - - /run - volumes: - - type: volume - source: postgres-data - target: /var/lib/postgresql/data - volume: { } - support-cron-scheduler: - command: - - --registry - - -cp=keeper.http://edgex-core-keeper:59890 - container_name: edgex-support-cron-scheduler - depends_on: - core-common-config-bootstrapper: - condition: service_started - required: true - edgex-postgres: - condition: service_started - required: true - keeper: - condition: service_started - required: true - environment: - EDGEX_SECURITY_SECRET_STORE: "false" - WRITABLE_INSECURESECRETS_DB_SECRETNAME: postgres - WRITABLE_INSECURESECRETS_DB_SECRETDATA_USERNAME: postgres - WRITABLE_INSECURESECRETS_DB_SECRETDATA_PASSWORD: postgres - SERVICE_HOST: edgex-support-cron-scheduler - DATABASE_HOST: edgex-postgres - DATABASE_TYPE: postgres - DATABASE_PORT: "5432" - hostname: edgex-core-data - image: nexus3.edgexfoundry.org:10004/support-cron-scheduler:latest - networks: - edgex-network: null - ports: - - mode: ingress - host_ip: 127.0.0.1 - target: 59863 - published: "59863" - protocol: tcp - read_only: true - restart: always - security_opt: - - no-new-privileges:true - user: 2002:2001 - volumes: - - type: bind - source: /etc/localtime - target: /etc/localtime - read_only: true - bind: - create_host_path: true - app-mqtt-export: - command: - - --registry - - -cp=keeper.http://edgex-core-keeper:59890 - container_name: edgex-app-mqtt-export - depends_on: - core-common-config-bootstrapper: - condition: service_started - required: true - core-metadata: - condition: service_started - required: true - keeper: - condition: service_started - required: true - environment: - EDGEX_PROFILE: mqtt-export - EDGEX_SECURITY_SECRET_STORE: "false" - SERVICE_HOST: edgex-app-mqtt-export - WRITABLE_LOGLEVEL: INFO - WRITABLE_PIPELINE_FUNCTIONS_MQTTEXPORT_PARAMETERS_BROKERADDRESS: MQTT_BROKER_ADDRESS_PLACE_HOLDER - WRITABLE_PIPELINE_FUNCTIONS_MQTTEXPORT_PARAMETERS_TOPIC: edgex-events - WRITABLE_PIPELINE_FUNCTIONS_MQTTEXPORT_PARAMETERS_PERSISTONERROR: true - WRITABLE_STOREANDFORWARD_ENABLED: true - hostname: edgex-app-mqtt-export - image: nexus3.edgexfoundry.org:10004/app-service-configurable:latest - networks: - edgex-network: null - ports: - - mode: ingress - host_ip: 127.0.0.1 - target: 59703 - published: "59703" - protocol: tcp - read_only: true - restart: always - security_opt: - - no-new-privileges:true - user: 2002:2001 - volumes: - - type: bind - source: /etc/localtime - target: /etc/localtime - read_only: true - bind: - create_host_path: true -networks: - edgex-network: - name: edgex_edgex-network - driver: bridge -volumes: - db-data: - name: edgex_db-data - postgres-data: - name: edgex_postgres-data diff --git a/docker-compose-with-app-sample-arm64.yml b/docker-compose-with-app-sample-arm64.yml index c624bfb4..82b76303 100644 --- a/docker-compose-with-app-sample-arm64.yml +++ b/docker-compose-with-app-sample-arm64.yml @@ -24,7 +24,7 @@ # # From the compose-builder folder use `make build` to regenerate all standard compose files variations # -# Generated with: Docker Compose version v2.29.1 +# Generated with: Docker Compose version v2.29.2 name: edgex services: app-rules-engine: @@ -1380,7 +1380,7 @@ services: deploy: resources: limits: - memory: "34032716873728" + memory: "343254323167232" entrypoint: - /edgex-init/vault_wait_install.sh environment: @@ -1405,7 +1405,7 @@ services: VAULT_UI: "true" hostname: edgex-vault image: hashicorp/vault:1.14 - memswap_limit: "34032716873728" + memswap_limit: "343254323167232" networks: edgex-network: null ports: diff --git a/docker-compose-with-app-sample.yml b/docker-compose-with-app-sample.yml index d29ec0cc..351a3e19 100644 --- a/docker-compose-with-app-sample.yml +++ b/docker-compose-with-app-sample.yml @@ -24,7 +24,7 @@ # # From the compose-builder folder use `make build` to regenerate all standard compose files variations # -# Generated with: Docker Compose version v2.29.1 +# Generated with: Docker Compose version v2.29.2 name: edgex services: app-rules-engine: @@ -1380,7 +1380,7 @@ services: deploy: resources: limits: - memory: "34032716873728" + memory: "343254323167232" entrypoint: - /edgex-init/vault_wait_install.sh environment: @@ -1405,7 +1405,7 @@ services: VAULT_UI: "true" hostname: edgex-vault image: hashicorp/vault:1.14 - memswap_limit: "34032716873728" + memswap_limit: "343254323167232" networks: edgex-network: null ports: diff --git a/docker-compose-zero-trust-arm64.yml b/docker-compose-zero-trust-arm64.yml index 56090136..bbff0c3f 100644 --- a/docker-compose-zero-trust-arm64.yml +++ b/docker-compose-zero-trust-arm64.yml @@ -24,7 +24,7 @@ # # From the compose-builder folder use `make build` to regenerate all standard compose files variations # -# Generated with: Docker Compose version v2.29.1 +# Generated with: Docker Compose version v2.29.2 name: edgex services: app-rules-engine: @@ -1134,7 +1134,7 @@ services: deploy: resources: limits: - memory: "34032716873728" + memory: "343254323167232" entrypoint: - /edgex-init/vault_wait_install.sh environment: @@ -1159,7 +1159,7 @@ services: VAULT_UI: "true" hostname: edgex-vault image: hashicorp/vault:1.14 - memswap_limit: "34032716873728" + memswap_limit: "343254323167232" networks: edgex-network: null ports: diff --git a/docker-compose-zero-trust.yml b/docker-compose-zero-trust.yml index 6ac5ecda..1acdad58 100644 --- a/docker-compose-zero-trust.yml +++ b/docker-compose-zero-trust.yml @@ -24,7 +24,7 @@ # # From the compose-builder folder use `make build` to regenerate all standard compose files variations # -# Generated with: Docker Compose version v2.29.1 +# Generated with: Docker Compose version v2.29.2 name: edgex services: app-rules-engine: @@ -1134,7 +1134,7 @@ services: deploy: resources: limits: - memory: "34032716873728" + memory: "343254323167232" entrypoint: - /edgex-init/vault_wait_install.sh environment: @@ -1159,7 +1159,7 @@ services: VAULT_UI: "true" hostname: edgex-vault image: hashicorp/vault:1.14 - memswap_limit: "34032716873728" + memswap_limit: "343254323167232" networks: edgex-network: null ports: diff --git a/docker-compose.yml b/docker-compose.yml index a19d406d..4cc68e66 100644 --- a/docker-compose.yml +++ b/docker-compose.yml @@ -24,7 +24,7 @@ # # From the compose-builder folder use `make build` to regenerate all standard compose files variations # -# Generated with: Docker Compose version v2.29.1 +# Generated with: Docker Compose version v2.29.2 name: edgex services: app-rules-engine: @@ -1303,7 +1303,7 @@ services: deploy: resources: limits: - memory: "34032716873728" + memory: "343254323167232" entrypoint: - /edgex-init/vault_wait_install.sh environment: @@ -1328,7 +1328,7 @@ services: VAULT_UI: "true" hostname: edgex-vault image: hashicorp/vault:1.14 - memswap_limit: "34032716873728" + memswap_limit: "343254323167232" networks: edgex-network: null ports: diff --git a/taf/docker-compose-taf-arm64.yml b/taf/docker-compose-taf-arm64.yml index 36ec2d48..326ec661 100644 --- a/taf/docker-compose-taf-arm64.yml +++ b/taf/docker-compose-taf-arm64.yml @@ -24,7 +24,7 @@ # # From the compose-builder folder use `make build` to regenerate all standard compose files variations # -# Generated with: Docker Compose version v2.29.1 +# Generated with: Docker Compose version v2.29.2 name: edgex services: app-external-mqtt-trigger: @@ -1352,8 +1352,15 @@ services: required: true environment: DATABASE_HOST: edgex-redis + DATABASE_PORT: "6379" + DATABASE_TYPE: redisdb EDGEX_SECURITY_SECRET_STORE: "true" + MESSAGEBUS_AUTHMODE: none MESSAGEBUS_HOST: edgex-redis + MESSAGEBUS_PORT: "6379" + MESSAGEBUS_PROTOCOL: redis + MESSAGEBUS_SECRETNAME: redisdb + MESSAGEBUS_TYPE: redis PROXY_SETUP_HOST: edgex-security-proxy-setup SECRETSTORE_HOST: edgex-vault SERVICE_HOST: edgex-core-keeper @@ -1370,6 +1377,9 @@ services: STAGEGATE_SECRETSTORESETUP_HOST: edgex-security-secretstore-setup STAGEGATE_SECRETSTORESETUP_TOKENS_READYPORT: "54322" STAGEGATE_WAITFOR_TIMEOUT: 60s + WRITABLE_INSECURESECRETS_DB_SECRETDATA_PASSWORD: "" + WRITABLE_INSECURESECRETS_DB_SECRETDATA_USERNAME: "" + WRITABLE_INSECURESECRETS_DB_SECRETNAME: redisdb hostname: edgex-core-keeper image: nexus3.edgexfoundry.org:10004/core-keeper-arm64:latest networks: @@ -2341,7 +2351,7 @@ services: deploy: resources: limits: - memory: "34032716873728" + memory: "343254323167232" entrypoint: - /edgex-init/vault_wait_install.sh environment: @@ -2366,7 +2376,7 @@ services: VAULT_UI: "true" hostname: edgex-vault image: hashicorp/vault:1.14 - memswap_limit: "34032716873728" + memswap_limit: "343254323167232" networks: edgex-network: null ports: diff --git a/taf/docker-compose-taf-keeper-arm64.yml b/taf/docker-compose-taf-keeper-arm64.yml index d5be2d9d..e474a2cb 100644 --- a/taf/docker-compose-taf-keeper-arm64.yml +++ b/taf/docker-compose-taf-keeper-arm64.yml @@ -24,7 +24,7 @@ # # From the compose-builder folder use `make build` to regenerate all standard compose files variations # -# Generated with: Docker Compose version v2.29.1 +# Generated with: Docker Compose version v2.29.2 name: edgex services: app-external-mqtt-trigger: @@ -1271,8 +1271,15 @@ services: required: true environment: DATABASE_HOST: edgex-redis + DATABASE_PORT: "6379" + DATABASE_TYPE: redisdb EDGEX_SECURITY_SECRET_STORE: "true" + MESSAGEBUS_AUTHMODE: none MESSAGEBUS_HOST: edgex-redis + MESSAGEBUS_PORT: "6379" + MESSAGEBUS_PROTOCOL: redis + MESSAGEBUS_SECRETNAME: redisdb + MESSAGEBUS_TYPE: redis PROXY_SETUP_HOST: edgex-security-proxy-setup SECRETSTORE_HOST: edgex-vault SERVICE_HOST: edgex-core-keeper @@ -1289,6 +1296,9 @@ services: STAGEGATE_SECRETSTORESETUP_HOST: edgex-security-secretstore-setup STAGEGATE_SECRETSTORESETUP_TOKENS_READYPORT: "54322" STAGEGATE_WAITFOR_TIMEOUT: 60s + WRITABLE_INSECURESECRETS_DB_SECRETDATA_PASSWORD: "" + WRITABLE_INSECURESECRETS_DB_SECRETDATA_USERNAME: "" + WRITABLE_INSECURESECRETS_DB_SECRETNAME: redisdb hostname: edgex-core-keeper image: nexus3.edgexfoundry.org:10004/core-keeper-arm64:latest networks: @@ -2260,7 +2270,7 @@ services: deploy: resources: limits: - memory: "34032716873728" + memory: "343254323167232" entrypoint: - /edgex-init/vault_wait_install.sh environment: @@ -2285,7 +2295,7 @@ services: VAULT_UI: "true" hostname: edgex-vault image: hashicorp/vault:1.14 - memswap_limit: "34032716873728" + memswap_limit: "343254323167232" networks: edgex-network: null ports: diff --git a/taf/docker-compose-taf-keeper.yml b/taf/docker-compose-taf-keeper.yml index 419d7a1c..61cc803a 100644 --- a/taf/docker-compose-taf-keeper.yml +++ b/taf/docker-compose-taf-keeper.yml @@ -24,7 +24,7 @@ # # From the compose-builder folder use `make build` to regenerate all standard compose files variations # -# Generated with: Docker Compose version v2.29.1 +# Generated with: Docker Compose version v2.29.2 name: edgex services: app-external-mqtt-trigger: @@ -1271,8 +1271,15 @@ services: required: true environment: DATABASE_HOST: edgex-redis + DATABASE_PORT: "6379" + DATABASE_TYPE: redisdb EDGEX_SECURITY_SECRET_STORE: "true" + MESSAGEBUS_AUTHMODE: none MESSAGEBUS_HOST: edgex-redis + MESSAGEBUS_PORT: "6379" + MESSAGEBUS_PROTOCOL: redis + MESSAGEBUS_SECRETNAME: redisdb + MESSAGEBUS_TYPE: redis PROXY_SETUP_HOST: edgex-security-proxy-setup SECRETSTORE_HOST: edgex-vault SERVICE_HOST: edgex-core-keeper @@ -1289,6 +1296,9 @@ services: STAGEGATE_SECRETSTORESETUP_HOST: edgex-security-secretstore-setup STAGEGATE_SECRETSTORESETUP_TOKENS_READYPORT: "54322" STAGEGATE_WAITFOR_TIMEOUT: 60s + WRITABLE_INSECURESECRETS_DB_SECRETDATA_PASSWORD: "" + WRITABLE_INSECURESECRETS_DB_SECRETDATA_USERNAME: "" + WRITABLE_INSECURESECRETS_DB_SECRETNAME: redisdb hostname: edgex-core-keeper image: nexus3.edgexfoundry.org:10004/core-keeper:latest networks: @@ -2260,7 +2270,7 @@ services: deploy: resources: limits: - memory: "34032716873728" + memory: "343254323167232" entrypoint: - /edgex-init/vault_wait_install.sh environment: @@ -2285,7 +2295,7 @@ services: VAULT_UI: "true" hostname: edgex-vault image: hashicorp/vault:1.14 - memswap_limit: "34032716873728" + memswap_limit: "343254323167232" networks: edgex-network: null ports: diff --git a/taf/docker-compose-taf-mqtt-bus-arm64.yml b/taf/docker-compose-taf-mqtt-bus-arm64.yml index 1b230c1b..2ba270e7 100644 --- a/taf/docker-compose-taf-mqtt-bus-arm64.yml +++ b/taf/docker-compose-taf-mqtt-bus-arm64.yml @@ -24,7 +24,7 @@ # # From the compose-builder folder use `make build` to regenerate all standard compose files variations # -# Generated with: Docker Compose version v2.29.1 +# Generated with: Docker Compose version v2.29.2 name: edgex services: app-external-mqtt-trigger: @@ -1359,8 +1359,15 @@ services: required: true environment: DATABASE_HOST: edgex-redis + DATABASE_PORT: "6379" + DATABASE_TYPE: redisdb EDGEX_SECURITY_SECRET_STORE: "true" + MESSAGEBUS_AUTHMODE: none MESSAGEBUS_HOST: edgex-redis + MESSAGEBUS_PORT: "6379" + MESSAGEBUS_PROTOCOL: redis + MESSAGEBUS_SECRETNAME: redisdb + MESSAGEBUS_TYPE: redis PROXY_SETUP_HOST: edgex-security-proxy-setup SECRETSTORE_HOST: edgex-vault SERVICE_HOST: edgex-core-keeper @@ -1377,6 +1384,9 @@ services: STAGEGATE_SECRETSTORESETUP_HOST: edgex-security-secretstore-setup STAGEGATE_SECRETSTORESETUP_TOKENS_READYPORT: "54322" STAGEGATE_WAITFOR_TIMEOUT: 60s + WRITABLE_INSECURESECRETS_DB_SECRETDATA_PASSWORD: "" + WRITABLE_INSECURESECRETS_DB_SECRETDATA_USERNAME: "" + WRITABLE_INSECURESECRETS_DB_SECRETNAME: redisdb hostname: edgex-core-keeper image: nexus3.edgexfoundry.org:10004/core-keeper-arm64:latest networks: @@ -2406,7 +2416,7 @@ services: deploy: resources: limits: - memory: "34032716873728" + memory: "343254323167232" entrypoint: - /edgex-init/vault_wait_install.sh environment: @@ -2431,7 +2441,7 @@ services: VAULT_UI: "true" hostname: edgex-vault image: hashicorp/vault:1.14 - memswap_limit: "34032716873728" + memswap_limit: "343254323167232" networks: edgex-network: null ports: diff --git a/taf/docker-compose-taf-mqtt-bus-keeper-arm64.yml b/taf/docker-compose-taf-mqtt-bus-keeper-arm64.yml index aaf63ca8..092f5dde 100644 --- a/taf/docker-compose-taf-mqtt-bus-keeper-arm64.yml +++ b/taf/docker-compose-taf-mqtt-bus-keeper-arm64.yml @@ -24,7 +24,7 @@ # # From the compose-builder folder use `make build` to regenerate all standard compose files variations # -# Generated with: Docker Compose version v2.29.1 +# Generated with: Docker Compose version v2.29.2 name: edgex services: app-external-mqtt-trigger: @@ -1278,8 +1278,15 @@ services: required: true environment: DATABASE_HOST: edgex-redis + DATABASE_PORT: "6379" + DATABASE_TYPE: redisdb EDGEX_SECURITY_SECRET_STORE: "true" + MESSAGEBUS_AUTHMODE: none MESSAGEBUS_HOST: edgex-redis + MESSAGEBUS_PORT: "6379" + MESSAGEBUS_PROTOCOL: redis + MESSAGEBUS_SECRETNAME: redisdb + MESSAGEBUS_TYPE: redis PROXY_SETUP_HOST: edgex-security-proxy-setup SECRETSTORE_HOST: edgex-vault SERVICE_HOST: edgex-core-keeper @@ -1296,6 +1303,9 @@ services: STAGEGATE_SECRETSTORESETUP_HOST: edgex-security-secretstore-setup STAGEGATE_SECRETSTORESETUP_TOKENS_READYPORT: "54322" STAGEGATE_WAITFOR_TIMEOUT: 60s + WRITABLE_INSECURESECRETS_DB_SECRETDATA_PASSWORD: "" + WRITABLE_INSECURESECRETS_DB_SECRETDATA_USERNAME: "" + WRITABLE_INSECURESECRETS_DB_SECRETNAME: redisdb hostname: edgex-core-keeper image: nexus3.edgexfoundry.org:10004/core-keeper-arm64:latest networks: @@ -2325,7 +2335,7 @@ services: deploy: resources: limits: - memory: "34032716873728" + memory: "343254323167232" entrypoint: - /edgex-init/vault_wait_install.sh environment: @@ -2350,7 +2360,7 @@ services: VAULT_UI: "true" hostname: edgex-vault image: hashicorp/vault:1.14 - memswap_limit: "34032716873728" + memswap_limit: "343254323167232" networks: edgex-network: null ports: diff --git a/taf/docker-compose-taf-mqtt-bus-keeper.yml b/taf/docker-compose-taf-mqtt-bus-keeper.yml index 02878ede..6dc6ae43 100644 --- a/taf/docker-compose-taf-mqtt-bus-keeper.yml +++ b/taf/docker-compose-taf-mqtt-bus-keeper.yml @@ -24,7 +24,7 @@ # # From the compose-builder folder use `make build` to regenerate all standard compose files variations # -# Generated with: Docker Compose version v2.29.1 +# Generated with: Docker Compose version v2.29.2 name: edgex services: app-external-mqtt-trigger: @@ -1278,8 +1278,15 @@ services: required: true environment: DATABASE_HOST: edgex-redis + DATABASE_PORT: "6379" + DATABASE_TYPE: redisdb EDGEX_SECURITY_SECRET_STORE: "true" + MESSAGEBUS_AUTHMODE: none MESSAGEBUS_HOST: edgex-redis + MESSAGEBUS_PORT: "6379" + MESSAGEBUS_PROTOCOL: redis + MESSAGEBUS_SECRETNAME: redisdb + MESSAGEBUS_TYPE: redis PROXY_SETUP_HOST: edgex-security-proxy-setup SECRETSTORE_HOST: edgex-vault SERVICE_HOST: edgex-core-keeper @@ -1296,6 +1303,9 @@ services: STAGEGATE_SECRETSTORESETUP_HOST: edgex-security-secretstore-setup STAGEGATE_SECRETSTORESETUP_TOKENS_READYPORT: "54322" STAGEGATE_WAITFOR_TIMEOUT: 60s + WRITABLE_INSECURESECRETS_DB_SECRETDATA_PASSWORD: "" + WRITABLE_INSECURESECRETS_DB_SECRETDATA_USERNAME: "" + WRITABLE_INSECURESECRETS_DB_SECRETNAME: redisdb hostname: edgex-core-keeper image: nexus3.edgexfoundry.org:10004/core-keeper:latest networks: @@ -2325,7 +2335,7 @@ services: deploy: resources: limits: - memory: "34032716873728" + memory: "343254323167232" entrypoint: - /edgex-init/vault_wait_install.sh environment: @@ -2350,7 +2360,7 @@ services: VAULT_UI: "true" hostname: edgex-vault image: hashicorp/vault:1.14 - memswap_limit: "34032716873728" + memswap_limit: "343254323167232" networks: edgex-network: null ports: diff --git a/taf/docker-compose-taf-mqtt-bus.yml b/taf/docker-compose-taf-mqtt-bus.yml index b232d602..f07e9e80 100644 --- a/taf/docker-compose-taf-mqtt-bus.yml +++ b/taf/docker-compose-taf-mqtt-bus.yml @@ -24,7 +24,7 @@ # # From the compose-builder folder use `make build` to regenerate all standard compose files variations # -# Generated with: Docker Compose version v2.29.1 +# Generated with: Docker Compose version v2.29.2 name: edgex services: app-external-mqtt-trigger: @@ -1359,8 +1359,15 @@ services: required: true environment: DATABASE_HOST: edgex-redis + DATABASE_PORT: "6379" + DATABASE_TYPE: redisdb EDGEX_SECURITY_SECRET_STORE: "true" + MESSAGEBUS_AUTHMODE: none MESSAGEBUS_HOST: edgex-redis + MESSAGEBUS_PORT: "6379" + MESSAGEBUS_PROTOCOL: redis + MESSAGEBUS_SECRETNAME: redisdb + MESSAGEBUS_TYPE: redis PROXY_SETUP_HOST: edgex-security-proxy-setup SECRETSTORE_HOST: edgex-vault SERVICE_HOST: edgex-core-keeper @@ -1377,6 +1384,9 @@ services: STAGEGATE_SECRETSTORESETUP_HOST: edgex-security-secretstore-setup STAGEGATE_SECRETSTORESETUP_TOKENS_READYPORT: "54322" STAGEGATE_WAITFOR_TIMEOUT: 60s + WRITABLE_INSECURESECRETS_DB_SECRETDATA_PASSWORD: "" + WRITABLE_INSECURESECRETS_DB_SECRETDATA_USERNAME: "" + WRITABLE_INSECURESECRETS_DB_SECRETNAME: redisdb hostname: edgex-core-keeper image: nexus3.edgexfoundry.org:10004/core-keeper:latest networks: @@ -2406,7 +2416,7 @@ services: deploy: resources: limits: - memory: "34032716873728" + memory: "343254323167232" entrypoint: - /edgex-init/vault_wait_install.sh environment: @@ -2431,7 +2441,7 @@ services: VAULT_UI: "true" hostname: edgex-vault image: hashicorp/vault:1.14 - memswap_limit: "34032716873728" + memswap_limit: "343254323167232" networks: edgex-network: null ports: diff --git a/taf/docker-compose-taf-no-secty-arm64.yml b/taf/docker-compose-taf-no-secty-arm64.yml index 6fa48de7..16070321 100644 --- a/taf/docker-compose-taf-no-secty-arm64.yml +++ b/taf/docker-compose-taf-no-secty-arm64.yml @@ -24,7 +24,7 @@ # # From the compose-builder folder use `make build` to regenerate all standard compose files variations # -# Generated with: Docker Compose version v2.29.1 +# Generated with: Docker Compose version v2.29.2 name: edgex services: app-external-mqtt-trigger: @@ -739,9 +739,19 @@ services: container_name: edgex-core-keeper environment: DATABASE_HOST: edgex-redis + DATABASE_PORT: "6379" + DATABASE_TYPE: redisdb EDGEX_SECURITY_SECRET_STORE: "false" + MESSAGEBUS_AUTHMODE: none MESSAGEBUS_HOST: edgex-redis + MESSAGEBUS_PORT: "6379" + MESSAGEBUS_PROTOCOL: redis + MESSAGEBUS_SECRETNAME: redisdb + MESSAGEBUS_TYPE: redis SERVICE_HOST: edgex-core-keeper + WRITABLE_INSECURESECRETS_DB_SECRETDATA_PASSWORD: "" + WRITABLE_INSECURESECRETS_DB_SECRETDATA_USERNAME: "" + WRITABLE_INSECURESECRETS_DB_SECRETNAME: redisdb hostname: edgex-core-keeper image: nexus3.edgexfoundry.org:10004/core-keeper-arm64:latest networks: diff --git a/taf/docker-compose-taf-no-secty-keeper-arm64.yml b/taf/docker-compose-taf-no-secty-keeper-arm64.yml index eb8c1663..e94e6044 100644 --- a/taf/docker-compose-taf-no-secty-keeper-arm64.yml +++ b/taf/docker-compose-taf-no-secty-keeper-arm64.yml @@ -24,7 +24,7 @@ # # From the compose-builder folder use `make build` to regenerate all standard compose files variations # -# Generated with: Docker Compose version v2.29.1 +# Generated with: Docker Compose version v2.29.2 name: edgex services: app-external-mqtt-trigger: @@ -706,9 +706,19 @@ services: container_name: edgex-core-keeper environment: DATABASE_HOST: edgex-redis + DATABASE_PORT: "6379" + DATABASE_TYPE: redisdb EDGEX_SECURITY_SECRET_STORE: "false" + MESSAGEBUS_AUTHMODE: none MESSAGEBUS_HOST: edgex-redis + MESSAGEBUS_PORT: "6379" + MESSAGEBUS_PROTOCOL: redis + MESSAGEBUS_SECRETNAME: redisdb + MESSAGEBUS_TYPE: redis SERVICE_HOST: edgex-core-keeper + WRITABLE_INSECURESECRETS_DB_SECRETDATA_PASSWORD: "" + WRITABLE_INSECURESECRETS_DB_SECRETDATA_USERNAME: "" + WRITABLE_INSECURESECRETS_DB_SECRETNAME: redisdb hostname: edgex-core-keeper image: nexus3.edgexfoundry.org:10004/core-keeper-arm64:latest networks: diff --git a/taf/docker-compose-taf-no-secty-keeper.yml b/taf/docker-compose-taf-no-secty-keeper.yml index 29e4e82c..dd6dd30e 100644 --- a/taf/docker-compose-taf-no-secty-keeper.yml +++ b/taf/docker-compose-taf-no-secty-keeper.yml @@ -24,7 +24,7 @@ # # From the compose-builder folder use `make build` to regenerate all standard compose files variations # -# Generated with: Docker Compose version v2.29.1 +# Generated with: Docker Compose version v2.29.2 name: edgex services: app-external-mqtt-trigger: @@ -706,9 +706,19 @@ services: container_name: edgex-core-keeper environment: DATABASE_HOST: edgex-redis + DATABASE_PORT: "6379" + DATABASE_TYPE: redisdb EDGEX_SECURITY_SECRET_STORE: "false" + MESSAGEBUS_AUTHMODE: none MESSAGEBUS_HOST: edgex-redis + MESSAGEBUS_PORT: "6379" + MESSAGEBUS_PROTOCOL: redis + MESSAGEBUS_SECRETNAME: redisdb + MESSAGEBUS_TYPE: redis SERVICE_HOST: edgex-core-keeper + WRITABLE_INSECURESECRETS_DB_SECRETDATA_PASSWORD: "" + WRITABLE_INSECURESECRETS_DB_SECRETDATA_USERNAME: "" + WRITABLE_INSECURESECRETS_DB_SECRETNAME: redisdb hostname: edgex-core-keeper image: nexus3.edgexfoundry.org:10004/core-keeper:latest networks: diff --git a/taf/docker-compose-taf-no-secty-mqtt-bus-arm64.yml b/taf/docker-compose-taf-no-secty-mqtt-bus-arm64.yml index c22ae76b..29d790bd 100644 --- a/taf/docker-compose-taf-no-secty-mqtt-bus-arm64.yml +++ b/taf/docker-compose-taf-no-secty-mqtt-bus-arm64.yml @@ -24,7 +24,7 @@ # # From the compose-builder folder use `make build` to regenerate all standard compose files variations # -# Generated with: Docker Compose version v2.29.1 +# Generated with: Docker Compose version v2.29.2 name: edgex services: app-external-mqtt-trigger: @@ -743,9 +743,19 @@ services: container_name: edgex-core-keeper environment: DATABASE_HOST: edgex-redis + DATABASE_PORT: "6379" + DATABASE_TYPE: redisdb EDGEX_SECURITY_SECRET_STORE: "false" + MESSAGEBUS_AUTHMODE: none MESSAGEBUS_HOST: edgex-redis + MESSAGEBUS_PORT: "6379" + MESSAGEBUS_PROTOCOL: redis + MESSAGEBUS_SECRETNAME: redisdb + MESSAGEBUS_TYPE: redis SERVICE_HOST: edgex-core-keeper + WRITABLE_INSECURESECRETS_DB_SECRETDATA_PASSWORD: "" + WRITABLE_INSECURESECRETS_DB_SECRETDATA_USERNAME: "" + WRITABLE_INSECURESECRETS_DB_SECRETNAME: redisdb hostname: edgex-core-keeper image: nexus3.edgexfoundry.org:10004/core-keeper-arm64:latest networks: diff --git a/taf/docker-compose-taf-no-secty-mqtt-bus-keeper-arm64.yml b/taf/docker-compose-taf-no-secty-mqtt-bus-keeper-arm64.yml index cc626886..34f749af 100644 --- a/taf/docker-compose-taf-no-secty-mqtt-bus-keeper-arm64.yml +++ b/taf/docker-compose-taf-no-secty-mqtt-bus-keeper-arm64.yml @@ -24,7 +24,7 @@ # # From the compose-builder folder use `make build` to regenerate all standard compose files variations # -# Generated with: Docker Compose version v2.29.1 +# Generated with: Docker Compose version v2.29.2 name: edgex services: app-external-mqtt-trigger: @@ -710,9 +710,19 @@ services: container_name: edgex-core-keeper environment: DATABASE_HOST: edgex-redis + DATABASE_PORT: "6379" + DATABASE_TYPE: redisdb EDGEX_SECURITY_SECRET_STORE: "false" + MESSAGEBUS_AUTHMODE: none MESSAGEBUS_HOST: edgex-redis + MESSAGEBUS_PORT: "6379" + MESSAGEBUS_PROTOCOL: redis + MESSAGEBUS_SECRETNAME: redisdb + MESSAGEBUS_TYPE: redis SERVICE_HOST: edgex-core-keeper + WRITABLE_INSECURESECRETS_DB_SECRETDATA_PASSWORD: "" + WRITABLE_INSECURESECRETS_DB_SECRETDATA_USERNAME: "" + WRITABLE_INSECURESECRETS_DB_SECRETNAME: redisdb hostname: edgex-core-keeper image: nexus3.edgexfoundry.org:10004/core-keeper-arm64:latest networks: diff --git a/taf/docker-compose-taf-no-secty-mqtt-bus-keeper.yml b/taf/docker-compose-taf-no-secty-mqtt-bus-keeper.yml index 1ad82dfa..eda7e900 100644 --- a/taf/docker-compose-taf-no-secty-mqtt-bus-keeper.yml +++ b/taf/docker-compose-taf-no-secty-mqtt-bus-keeper.yml @@ -24,7 +24,7 @@ # # From the compose-builder folder use `make build` to regenerate all standard compose files variations # -# Generated with: Docker Compose version v2.29.1 +# Generated with: Docker Compose version v2.29.2 name: edgex services: app-external-mqtt-trigger: @@ -710,9 +710,19 @@ services: container_name: edgex-core-keeper environment: DATABASE_HOST: edgex-redis + DATABASE_PORT: "6379" + DATABASE_TYPE: redisdb EDGEX_SECURITY_SECRET_STORE: "false" + MESSAGEBUS_AUTHMODE: none MESSAGEBUS_HOST: edgex-redis + MESSAGEBUS_PORT: "6379" + MESSAGEBUS_PROTOCOL: redis + MESSAGEBUS_SECRETNAME: redisdb + MESSAGEBUS_TYPE: redis SERVICE_HOST: edgex-core-keeper + WRITABLE_INSECURESECRETS_DB_SECRETDATA_PASSWORD: "" + WRITABLE_INSECURESECRETS_DB_SECRETDATA_USERNAME: "" + WRITABLE_INSECURESECRETS_DB_SECRETNAME: redisdb hostname: edgex-core-keeper image: nexus3.edgexfoundry.org:10004/core-keeper:latest networks: diff --git a/taf/docker-compose-taf-no-secty-mqtt-bus.yml b/taf/docker-compose-taf-no-secty-mqtt-bus.yml index e688ba28..645d8308 100644 --- a/taf/docker-compose-taf-no-secty-mqtt-bus.yml +++ b/taf/docker-compose-taf-no-secty-mqtt-bus.yml @@ -24,7 +24,7 @@ # # From the compose-builder folder use `make build` to regenerate all standard compose files variations # -# Generated with: Docker Compose version v2.29.1 +# Generated with: Docker Compose version v2.29.2 name: edgex services: app-external-mqtt-trigger: @@ -743,9 +743,19 @@ services: container_name: edgex-core-keeper environment: DATABASE_HOST: edgex-redis + DATABASE_PORT: "6379" + DATABASE_TYPE: redisdb EDGEX_SECURITY_SECRET_STORE: "false" + MESSAGEBUS_AUTHMODE: none MESSAGEBUS_HOST: edgex-redis + MESSAGEBUS_PORT: "6379" + MESSAGEBUS_PROTOCOL: redis + MESSAGEBUS_SECRETNAME: redisdb + MESSAGEBUS_TYPE: redis SERVICE_HOST: edgex-core-keeper + WRITABLE_INSECURESECRETS_DB_SECRETDATA_PASSWORD: "" + WRITABLE_INSECURESECRETS_DB_SECRETDATA_USERNAME: "" + WRITABLE_INSECURESECRETS_DB_SECRETNAME: redisdb hostname: edgex-core-keeper image: nexus3.edgexfoundry.org:10004/core-keeper:latest networks: diff --git a/taf/docker-compose-taf-no-secty.yml b/taf/docker-compose-taf-no-secty.yml index ce1935d6..9cd6c9ed 100644 --- a/taf/docker-compose-taf-no-secty.yml +++ b/taf/docker-compose-taf-no-secty.yml @@ -24,7 +24,7 @@ # # From the compose-builder folder use `make build` to regenerate all standard compose files variations # -# Generated with: Docker Compose version v2.29.1 +# Generated with: Docker Compose version v2.29.2 name: edgex services: app-external-mqtt-trigger: @@ -739,9 +739,19 @@ services: container_name: edgex-core-keeper environment: DATABASE_HOST: edgex-redis + DATABASE_PORT: "6379" + DATABASE_TYPE: redisdb EDGEX_SECURITY_SECRET_STORE: "false" + MESSAGEBUS_AUTHMODE: none MESSAGEBUS_HOST: edgex-redis + MESSAGEBUS_PORT: "6379" + MESSAGEBUS_PROTOCOL: redis + MESSAGEBUS_SECRETNAME: redisdb + MESSAGEBUS_TYPE: redis SERVICE_HOST: edgex-core-keeper + WRITABLE_INSECURESECRETS_DB_SECRETDATA_PASSWORD: "" + WRITABLE_INSECURESECRETS_DB_SECRETDATA_USERNAME: "" + WRITABLE_INSECURESECRETS_DB_SECRETNAME: redisdb hostname: edgex-core-keeper image: nexus3.edgexfoundry.org:10004/core-keeper:latest networks: diff --git a/taf/docker-compose-taf-perf-arm64.yml b/taf/docker-compose-taf-perf-arm64.yml index 843664b2..9bdeb377 100644 --- a/taf/docker-compose-taf-perf-arm64.yml +++ b/taf/docker-compose-taf-perf-arm64.yml @@ -24,7 +24,7 @@ # # From the compose-builder folder use `make build` to regenerate all standard compose files variations # -# Generated with: Docker Compose version v2.29.1 +# Generated with: Docker Compose version v2.29.2 name: edgex services: app-mqtt-export: @@ -1693,7 +1693,7 @@ services: deploy: resources: limits: - memory: "34032716873728" + memory: "343254323167232" entrypoint: - /edgex-init/vault_wait_install.sh environment: @@ -1718,7 +1718,7 @@ services: VAULT_UI: "true" hostname: edgex-vault image: hashicorp/vault:1.14 - memswap_limit: "34032716873728" + memswap_limit: "343254323167232" networks: edgex-network: null ports: diff --git a/taf/docker-compose-taf-perf-no-secty-arm64.yml b/taf/docker-compose-taf-perf-no-secty-arm64.yml index 3d67841d..e3aeb478 100644 --- a/taf/docker-compose-taf-perf-no-secty-arm64.yml +++ b/taf/docker-compose-taf-perf-no-secty-arm64.yml @@ -24,7 +24,7 @@ # # From the compose-builder folder use `make build` to regenerate all standard compose files variations # -# Generated with: Docker Compose version v2.29.1 +# Generated with: Docker Compose version v2.29.2 name: edgex services: app-mqtt-export: diff --git a/taf/docker-compose-taf-perf-no-secty.yml b/taf/docker-compose-taf-perf-no-secty.yml index ef4a00ec..8d778296 100644 --- a/taf/docker-compose-taf-perf-no-secty.yml +++ b/taf/docker-compose-taf-perf-no-secty.yml @@ -24,7 +24,7 @@ # # From the compose-builder folder use `make build` to regenerate all standard compose files variations # -# Generated with: Docker Compose version v2.29.1 +# Generated with: Docker Compose version v2.29.2 name: edgex services: app-mqtt-export: diff --git a/taf/docker-compose-taf-perf.yml b/taf/docker-compose-taf-perf.yml index a38d3540..8204dbc0 100644 --- a/taf/docker-compose-taf-perf.yml +++ b/taf/docker-compose-taf-perf.yml @@ -24,7 +24,7 @@ # # From the compose-builder folder use `make build` to regenerate all standard compose files variations # -# Generated with: Docker Compose version v2.29.1 +# Generated with: Docker Compose version v2.29.2 name: edgex services: app-mqtt-export: @@ -1693,7 +1693,7 @@ services: deploy: resources: limits: - memory: "34032716873728" + memory: "343254323167232" entrypoint: - /edgex-init/vault_wait_install.sh environment: @@ -1718,7 +1718,7 @@ services: VAULT_UI: "true" hostname: edgex-vault image: hashicorp/vault:1.14 - memswap_limit: "34032716873728" + memswap_limit: "343254323167232" networks: edgex-network: null ports: diff --git a/taf/docker-compose-taf.yml b/taf/docker-compose-taf.yml index 16c4e788..eb274743 100644 --- a/taf/docker-compose-taf.yml +++ b/taf/docker-compose-taf.yml @@ -24,7 +24,7 @@ # # From the compose-builder folder use `make build` to regenerate all standard compose files variations # -# Generated with: Docker Compose version v2.29.1 +# Generated with: Docker Compose version v2.29.2 name: edgex services: app-external-mqtt-trigger: @@ -1352,8 +1352,15 @@ services: required: true environment: DATABASE_HOST: edgex-redis + DATABASE_PORT: "6379" + DATABASE_TYPE: redisdb EDGEX_SECURITY_SECRET_STORE: "true" + MESSAGEBUS_AUTHMODE: none MESSAGEBUS_HOST: edgex-redis + MESSAGEBUS_PORT: "6379" + MESSAGEBUS_PROTOCOL: redis + MESSAGEBUS_SECRETNAME: redisdb + MESSAGEBUS_TYPE: redis PROXY_SETUP_HOST: edgex-security-proxy-setup SECRETSTORE_HOST: edgex-vault SERVICE_HOST: edgex-core-keeper @@ -1370,6 +1377,9 @@ services: STAGEGATE_SECRETSTORESETUP_HOST: edgex-security-secretstore-setup STAGEGATE_SECRETSTORESETUP_TOKENS_READYPORT: "54322" STAGEGATE_WAITFOR_TIMEOUT: 60s + WRITABLE_INSECURESECRETS_DB_SECRETDATA_PASSWORD: "" + WRITABLE_INSECURESECRETS_DB_SECRETDATA_USERNAME: "" + WRITABLE_INSECURESECRETS_DB_SECRETNAME: redisdb hostname: edgex-core-keeper image: nexus3.edgexfoundry.org:10004/core-keeper:latest networks: @@ -2341,7 +2351,7 @@ services: deploy: resources: limits: - memory: "34032716873728" + memory: "343254323167232" entrypoint: - /edgex-init/vault_wait_install.sh environment: @@ -2366,7 +2376,7 @@ services: VAULT_UI: "true" hostname: edgex-vault image: hashicorp/vault:1.14 - memswap_limit: "34032716873728" + memswap_limit: "343254323167232" networks: edgex-network: null ports: