mirror of
				https://github.com/dani-garcia/vaultwarden.git
				synced 2025-10-30 09:48:20 +02:00 
			
		
		
		
	- Split Debian and Alpine into different build matrix This starts building both Debian and Alpine based images at the same time - Make use of Docker BuildKit, which improves speed also. - Use BuildKit caching for Rust Cargo across docker images. This prevents downloading the same crates multiple times. - Use Github Actions Services to start a docker registry, starting it via the build script sometimes caused issues. - Updated the Build workflow to use Ubuntu 20.04 which is more close to the Bullseye Debian release regarding package versions.
		
			
				
	
	
		
			119 lines
		
	
	
		
			3.9 KiB
		
	
	
	
		
			Docker
		
	
	
	
	
	
			
		
		
	
	
			119 lines
		
	
	
		
			3.9 KiB
		
	
	
	
		
			Docker
		
	
	
	
	
	
| # syntax=docker/dockerfile:1
 | |
| 
 | |
| # This file was generated using a Jinja2 template.
 | |
| # Please make your changes in `Dockerfile.j2` and then `make` the individual Dockerfiles.
 | |
| 
 | |
| # Using multistage build:
 | |
| # 	https://docs.docker.com/develop/develop-images/multistage-build/
 | |
| # 	https://whitfin.io/speeding-up-rust-docker-builds/
 | |
| ####################### VAULT BUILD IMAGE  #######################
 | |
| # The web-vault digest specifies a particular web-vault build on Docker Hub.
 | |
| # Using the digest instead of the tag name provides better security,
 | |
| # as the digest of an image is immutable, whereas a tag name can later
 | |
| # be changed to point to a malicious image.
 | |
| #
 | |
| # To verify the current digest for a given tag name:
 | |
| # - From https://hub.docker.com/r/vaultwarden/web-vault/tags,
 | |
| #   click the tag name to view the digest of the image it currently points to.
 | |
| # - From the command line:
 | |
| #     $ docker pull vaultwarden/web-vault:v2.21.1
 | |
| #     $ docker image inspect --format "{{.RepoDigests}}" vaultwarden/web-vault:v2.21.1
 | |
| #     [vaultwarden/web-vault@sha256:29a4fa7bf3790fff9d908b02ac5a154913491f4bf30c95b87b06d8cf1c5516b5]
 | |
| #
 | |
| # - Conversely, to get the tag name from the digest:
 | |
| #     $ docker image inspect --format "{{.RepoTags}}" vaultwarden/web-vault@sha256:29a4fa7bf3790fff9d908b02ac5a154913491f4bf30c95b87b06d8cf1c5516b5
 | |
| #     [vaultwarden/web-vault:v2.21.1]
 | |
| #
 | |
| FROM vaultwarden/web-vault@sha256:29a4fa7bf3790fff9d908b02ac5a154913491f4bf30c95b87b06d8cf1c5516b5 as vault
 | |
| 
 | |
| ########################## BUILD IMAGE  ##########################
 | |
| FROM clux/muslrust:nightly-2021-08-22 as build
 | |
| 
 | |
| # Alpine-based AMD64 (musl) does not support mysql/mariadb during compile time.
 | |
| ARG DB=sqlite,postgresql
 | |
| 
 | |
| # Build time options to avoid dpkg warnings and help with reproducible builds.
 | |
| ENV DEBIAN_FRONTEND=noninteractive \
 | |
|     LANG=C.UTF-8 \
 | |
|     TZ=UTC \
 | |
|     TERM=xterm-256color \
 | |
|     CARGO_HOME="/root/.cargo" \
 | |
|     USER="root"
 | |
| 
 | |
| 
 | |
| # Create CARGO_HOME folder and don't download rust docs
 | |
| RUN mkdir -pv "${CARGO_HOME}" \
 | |
|     && rustup set profile minimal
 | |
| 
 | |
| ENV RUSTFLAGS='-C link-arg=-s'
 | |
| 
 | |
| # Creates a dummy project used to grab dependencies
 | |
| RUN USER=root cargo new --bin /app
 | |
| WORKDIR /app
 | |
| 
 | |
| # Copies over *only* your manifests and build files
 | |
| COPY ./Cargo.* ./
 | |
| COPY ./rust-toolchain ./rust-toolchain
 | |
| COPY ./build.rs ./build.rs
 | |
| 
 | |
| RUN rustup target add x86_64-unknown-linux-musl
 | |
| 
 | |
| # Builds your dependencies and removes the
 | |
| # dummy project, except the target folder
 | |
| # This folder contains the compiled dependencies
 | |
| RUN cargo build --features ${DB} --release --target=x86_64-unknown-linux-musl \
 | |
|     && find . -not -path "./target*" -delete
 | |
| 
 | |
| # Copies the complete project
 | |
| # To avoid copying unneeded files, use .dockerignore
 | |
| COPY . .
 | |
| 
 | |
| # Make sure that we actually build the project
 | |
| RUN touch src/main.rs
 | |
| 
 | |
| # Builds again, this time it'll just be
 | |
| # your actual source files being built
 | |
| RUN cargo build --features ${DB} --release --target=x86_64-unknown-linux-musl
 | |
| 
 | |
| ######################## RUNTIME IMAGE  ########################
 | |
| # Create a new stage with a minimal image
 | |
| # because we already have a binary built
 | |
| FROM alpine:3.14
 | |
| 
 | |
| ENV ROCKET_ENV "staging"
 | |
| ENV ROCKET_PORT=80
 | |
| ENV ROCKET_WORKERS=10
 | |
| ENV SSL_CERT_DIR=/etc/ssl/certs
 | |
| 
 | |
| 
 | |
| # Create data folder and Install needed libraries
 | |
| RUN mkdir /data \
 | |
|     && apk add --no-cache \
 | |
|         openssl \
 | |
|         tzdata \
 | |
|         curl \
 | |
|         dumb-init \
 | |
|         postgresql-libs \
 | |
|         ca-certificates
 | |
| 
 | |
| 
 | |
| VOLUME /data
 | |
| EXPOSE 80
 | |
| EXPOSE 3012
 | |
| 
 | |
| # Copies the files from the context (Rocket.toml file and web-vault)
 | |
| # and the binary from the "build" stage to the current stage
 | |
| WORKDIR /
 | |
| COPY Rocket.toml .
 | |
| COPY --from=vault /web-vault ./web-vault
 | |
| COPY --from=build /app/target/x86_64-unknown-linux-musl/release/vaultwarden .
 | |
| 
 | |
| COPY docker/healthcheck.sh /healthcheck.sh
 | |
| COPY docker/start.sh /start.sh
 | |
| 
 | |
| HEALTHCHECK --interval=60s --timeout=10s CMD ["/healthcheck.sh"]
 | |
| 
 | |
| # Configures the startup!
 | |
| ENTRYPOINT ["/usr/bin/dumb-init", "--"]
 | |
| CMD ["/start.sh"]
 |