Compare commits
12 Commits
10.0.0+26.
...
master
Author | SHA1 | Date | |
---|---|---|---|
bd2ec2cd9d | |||
7af65faa5a | |||
636e81002d | |||
d3c9fc4784 | |||
|
41877e765a | ||
|
c08753a3ff | ||
1af583a429 | |||
ef9fbd5436 | |||
1ee9f5e5d7 | |||
88b9c3df1d | |||
9050321e50 | |||
d63bb8bc54 |
@ -35,7 +35,7 @@ steps:
|
|||||||
from_secret: drone_abra-bot_token
|
from_secret: drone_abra-bot_token
|
||||||
fork: true
|
fork: true
|
||||||
repositories:
|
repositories:
|
||||||
- coop-cloud/auto-recipes-catalogue-json
|
- toolshed/auto-recipes-catalogue-json
|
||||||
|
|
||||||
trigger:
|
trigger:
|
||||||
event: tag
|
event: tag
|
||||||
|
17
compose.yml
17
compose.yml
@ -3,7 +3,7 @@ version: "3.8"
|
|||||||
|
|
||||||
services:
|
services:
|
||||||
app:
|
app:
|
||||||
image: "keycloak/keycloak:26.0.1"
|
image: "keycloak/keycloak:26.2.1"
|
||||||
entrypoint: >
|
entrypoint: >
|
||||||
bash -c "KEYCLOAK_ADMIN_PASSWORD=\"$$(cat /run/secrets/admin_password)\" KC_DB_PASSWORD=\"$$(cat /run/secrets/db_password)\" /opt/keycloak/bin/kc.sh start"
|
bash -c "KEYCLOAK_ADMIN_PASSWORD=\"$$(cat /run/secrets/admin_password)\" KC_DB_PASSWORD=\"$$(cat /run/secrets/db_password)\" /opt/keycloak/bin/kc.sh start"
|
||||||
networks:
|
networks:
|
||||||
@ -16,11 +16,13 @@ services:
|
|||||||
- KC_DB=mariadb
|
- KC_DB=mariadb
|
||||||
- KC_DB_URL_DATABASE=keycloak
|
- KC_DB_URL_DATABASE=keycloak
|
||||||
- KC_DB_URL_HOST=db
|
- KC_DB_URL_HOST=db
|
||||||
- KC_HOSTNAME=${DOMAIN}
|
- KC_HOSTNAME=https://${DOMAIN}
|
||||||
- KC_PROXY=edge
|
- KC_PROXY=edge
|
||||||
- KC_SPI_CONNECTIONS_JPA_LEGACY_MIGRATION_STRATEGY=update
|
- KC_SPI_CONNECTIONS_JPA_LEGACY_MIGRATION_STRATEGY=update
|
||||||
- KEYCLOAK_ADMIN=${ADMIN_USERNAME}
|
- KEYCLOAK_ADMIN=${ADMIN_USERNAME}
|
||||||
- KEYCLOAK_WELCOME_THEME=${WELCOME_THEME}
|
- KEYCLOAK_WELCOME_THEME=${WELCOME_THEME}
|
||||||
|
- KC_PROXY_HEADERS=xforwarded
|
||||||
|
- KC_HTTP_ENABLED=true
|
||||||
# NOTE(3wc): disabled due to missing curl binary, see
|
# NOTE(3wc): disabled due to missing curl binary, see
|
||||||
# https://git.coopcloud.tech/coop-cloud/keycloak/issues/15
|
# https://git.coopcloud.tech/coop-cloud/keycloak/issues/15
|
||||||
# healthcheck:
|
# healthcheck:
|
||||||
@ -46,10 +48,13 @@ services:
|
|||||||
- "traefik.http.routers.${STACK_NAME}.middlewares=${STACK_NAME}-redirect"
|
- "traefik.http.routers.${STACK_NAME}.middlewares=${STACK_NAME}-redirect"
|
||||||
- "traefik.http.middlewares.${STACK_NAME}-redirect.headers.SSLForceHost=true"
|
- "traefik.http.middlewares.${STACK_NAME}-redirect.headers.SSLForceHost=true"
|
||||||
- "traefik.http.middlewares.${STACK_NAME}-redirect.headers.SSLHost=${DOMAIN}"
|
- "traefik.http.middlewares.${STACK_NAME}-redirect.headers.SSLHost=${DOMAIN}"
|
||||||
- "coop-cloud.${STACK_NAME}.version=10.0.0+26.0.1"
|
- "caddy=${DOMAIN}"
|
||||||
|
- "caddy.reverse_proxy={{upstreams 8080}}"
|
||||||
|
- "caddy.tls.on_demand="
|
||||||
|
- "coop-cloud.${STACK_NAME}.version=10.3.0+26.2.1"
|
||||||
|
|
||||||
db:
|
db:
|
||||||
image: "mariadb:11.5"
|
image: "mariadb:11.7"
|
||||||
environment:
|
environment:
|
||||||
- MYSQL_DATABASE=keycloak
|
- MYSQL_DATABASE=keycloak
|
||||||
- MYSQL_USER=keycloak
|
- MYSQL_USER=keycloak
|
||||||
@ -67,10 +72,10 @@ services:
|
|||||||
backupbot.backup: "true"
|
backupbot.backup: "true"
|
||||||
backupbot.backup.path: "/tmp/dump.sql.gz"
|
backupbot.backup.path: "/tmp/dump.sql.gz"
|
||||||
backupbot.backup.post-hook: "rm -f /tmp/dump.sql.gz"
|
backupbot.backup.post-hook: "rm -f /tmp/dump.sql.gz"
|
||||||
backupbot.backup.pre-hook: "sh -c 'mysqldump -u root -p\"$$(cat /run/secrets/db_root_password)\" keycloak | gzip > /tmp/dump.sql.gz'"
|
backupbot.backup.pre-hook: "sh -c 'mariadb-dump -u root -p\"$$(cat /run/secrets/db_root_password)\" keycloak | gzip > /tmp/dump.sql.gz'"
|
||||||
backupbot.restore.pre-hook: "sh -c 'cd /tmp && gzip -d dump.sql.gz'"
|
backupbot.restore.pre-hook: "sh -c 'cd /tmp && gzip -d dump.sql.gz'"
|
||||||
backupbot.restore: "true"
|
backupbot.restore: "true"
|
||||||
backupbot.restore.post-hook: "sh -c 'mysql -u root -p\"$$(cat /run/secrets/db_root_password)\" keycloak < /tmp/dump.sql && rm -f /tmp/dump.sql'"
|
backupbot.restore.post-hook: "sh -c 'mariadb -u root -p\"$$(cat /run/secrets/db_root_password)\" keycloak < /tmp/dump.sql && rm -f /tmp/dump.sql'"
|
||||||
|
|
||||||
networks:
|
networks:
|
||||||
internal:
|
internal:
|
||||||
|
Loading…
x
Reference in New Issue
Block a user