Compare commits
1 Commits
5.0.0+20.0
...
postgres
Author | SHA1 | Date | |
---|---|---|---|
c9ce66e7fa
|
@ -6,7 +6,6 @@ DOMAIN=keycloak.example.com
|
|||||||
LETS_ENCRYPT_ENV=production
|
LETS_ENCRYPT_ENV=production
|
||||||
|
|
||||||
ADMIN_USERNAME=admin
|
ADMIN_USERNAME=admin
|
||||||
WELCOME_THEME=keycloak
|
|
||||||
|
|
||||||
SECRET_DB_ROOT_PASSWORD_VERSION=v1
|
SECRET_DB_ROOT_PASSWORD_VERSION=v1
|
||||||
SECRET_DB_PASSWORD_VERSION=v1
|
SECRET_DB_PASSWORD_VERSION=v1
|
||||||
|
81
compose.mariadb.yml
Normal file
81
compose.mariadb.yml
Normal file
@ -0,0 +1,81 @@
|
|||||||
|
---
|
||||||
|
version: "3.8"
|
||||||
|
|
||||||
|
services:
|
||||||
|
app:
|
||||||
|
image: "jboss/keycloak:16.1.1"
|
||||||
|
networks:
|
||||||
|
- proxy
|
||||||
|
- internal
|
||||||
|
secrets:
|
||||||
|
- admin_password
|
||||||
|
- db_password
|
||||||
|
environment:
|
||||||
|
- DB_ADDR=db
|
||||||
|
- JBDC_PARAMS="useSSL=false"
|
||||||
|
- DB_DATABASE=keycloak
|
||||||
|
- DB_PASSWORD_FILE=/run/secrets/db_password
|
||||||
|
- DB_USER=keycloak
|
||||||
|
- DB_VENDOR=mariadb
|
||||||
|
- KEYCLOAK_PASSWORD_FILE=/run/secrets/admin_password
|
||||||
|
- KEYCLOAK_USER=${ADMIN_USERNAME}
|
||||||
|
- PROXY_ADDRESS_FORWARDING=true
|
||||||
|
healthcheck:
|
||||||
|
test: ["CMD", "curl", "-f", "http://localhost:8080"]
|
||||||
|
interval: 30s
|
||||||
|
timeout: 10s
|
||||||
|
retries: 10
|
||||||
|
start_period: 1m
|
||||||
|
volumes:
|
||||||
|
- "themes:/opt/jboss/keycloak/themes"
|
||||||
|
depends_on:
|
||||||
|
- mariadb
|
||||||
|
deploy:
|
||||||
|
update_config:
|
||||||
|
failure_action: rollback
|
||||||
|
order: start-first
|
||||||
|
labels:
|
||||||
|
- "traefik.enable=true"
|
||||||
|
- "traefik.http.services.${STACK_NAME}.loadbalancer.server.port=8080"
|
||||||
|
- "traefik.http.routers.${STACK_NAME}.rule=Host(`${DOMAIN}`${EXTRA_DOMAINS})"
|
||||||
|
- "traefik.http.routers.${STACK_NAME}.entrypoints=web-secure"
|
||||||
|
- "traefik.http.routers.${STACK_NAME}.tls.certresolver=${LETS_ENCRYPT_ENV}"
|
||||||
|
- "traefik.http.routers.${STACK_NAME}.middlewares=${STACK_NAME}-redirect"
|
||||||
|
- "traefik.http.middlewares.${STACK_NAME}-redirect.headers.SSLForceHost=true"
|
||||||
|
- "traefik.http.middlewares.${STACK_NAME}-redirect.headers.SSLHost=${DOMAIN}"
|
||||||
|
- "coop-cloud.${STACK_NAME}.version=4.0.1+16.1.1"
|
||||||
|
|
||||||
|
db:
|
||||||
|
image: "mariadb:10.8"
|
||||||
|
environment:
|
||||||
|
- MYSQL_DATABASE=keycloak
|
||||||
|
- MYSQL_USER=keycloak
|
||||||
|
- MYSQL_PASSWORD_FILE=/run/secrets/db_password
|
||||||
|
- MYSQL_ROOT_PASSWORD_FILE=/run/secrets/db_root_password
|
||||||
|
secrets:
|
||||||
|
- db_password
|
||||||
|
- db_root_password
|
||||||
|
volumes:
|
||||||
|
- "mariadb:/var/lib/mysql"
|
||||||
|
networks:
|
||||||
|
- internal
|
||||||
|
|
||||||
|
networks:
|
||||||
|
internal:
|
||||||
|
proxy:
|
||||||
|
external: true
|
||||||
|
|
||||||
|
secrets:
|
||||||
|
admin_password:
|
||||||
|
name: ${STACK_NAME}_admin_password_${SECRET_ADMIN_PASSWORD_VERSION}
|
||||||
|
external: true
|
||||||
|
db_password:
|
||||||
|
name: ${STACK_NAME}_db_password_${SECRET_DB_PASSWORD_VERSION}
|
||||||
|
external: true
|
||||||
|
db_root_password:
|
||||||
|
name: ${STACK_NAME}_db_root_password_${SECRET_DB_ROOT_PASSWORD_VERSION}
|
||||||
|
external: true
|
||||||
|
|
||||||
|
volumes:
|
||||||
|
mariadb:
|
||||||
|
themes:
|
49
compose.yml
49
compose.yml
@ -3,9 +3,7 @@ version: "3.8"
|
|||||||
|
|
||||||
services:
|
services:
|
||||||
app:
|
app:
|
||||||
image: "keycloak/keycloak:20.0.1"
|
image: "jboss/keycloak:16.1.1"
|
||||||
entrypoint: >
|
|
||||||
bash -c "KC_DB_PASSWORD=\"$$(cat /run/secrets/db_password)\" /opt/keycloak/bin/kc.sh start"
|
|
||||||
networks:
|
networks:
|
||||||
- proxy
|
- proxy
|
||||||
- internal
|
- internal
|
||||||
@ -13,14 +11,15 @@ services:
|
|||||||
- admin_password
|
- admin_password
|
||||||
- db_password
|
- db_password
|
||||||
environment:
|
environment:
|
||||||
- KC_DB=mariadb
|
- DB_ADDR=db
|
||||||
- KC_DB_URL_DATABASE=keycloak
|
- JBDC_PARAMS="useSSL=false"
|
||||||
- KC_DB_URL_HOST=db
|
- DB_DATABASE=keycloak
|
||||||
- KC_HOSTNAME=${DOMAIN}
|
- DB_PASSWORD_FILE=/run/secrets/db_password
|
||||||
- KC_PROXY=edge
|
- DB_USER=keycloak
|
||||||
- KC_SPI_CONNECTIONS_JPA_LEGACY_MIGRATION_STRATEGY=update
|
- DB_VENDOR=postgres
|
||||||
- KEYCLOAK_ADMIN=${ADMIN_USERNAME}
|
- KEYCLOAK_PASSWORD_FILE=/run/secrets/admin_password
|
||||||
- KEYCLOAK_WELCOME_THEME=${WELCOME_THEME}
|
- KEYCLOAK_USER=${ADMIN_USERNAME}
|
||||||
|
- PROXY_ADDRESS_FORWARDING=true
|
||||||
healthcheck:
|
healthcheck:
|
||||||
test: ["CMD", "curl", "-f", "http://localhost:8080"]
|
test: ["CMD", "curl", "-f", "http://localhost:8080"]
|
||||||
interval: 30s
|
interval: 30s
|
||||||
@ -44,28 +43,25 @@ services:
|
|||||||
- "traefik.http.routers.${STACK_NAME}.middlewares=${STACK_NAME}-redirect"
|
- "traefik.http.routers.${STACK_NAME}.middlewares=${STACK_NAME}-redirect"
|
||||||
- "traefik.http.middlewares.${STACK_NAME}-redirect.headers.SSLForceHost=true"
|
- "traefik.http.middlewares.${STACK_NAME}-redirect.headers.SSLForceHost=true"
|
||||||
- "traefik.http.middlewares.${STACK_NAME}-redirect.headers.SSLHost=${DOMAIN}"
|
- "traefik.http.middlewares.${STACK_NAME}-redirect.headers.SSLHost=${DOMAIN}"
|
||||||
- "coop-cloud.${STACK_NAME}.version=5.0.0+20.0.1"
|
- "coop-cloud.${STACK_NAME}.version=4.0.1+16.1.1"
|
||||||
|
|
||||||
|
|
||||||
db:
|
db:
|
||||||
image: "mariadb:10.6"
|
image: postgres:11
|
||||||
environment:
|
networks:
|
||||||
- MYSQL_DATABASE=keycloak
|
- backend
|
||||||
- MYSQL_USER=keycloak
|
secrets:
|
||||||
- MYSQL_PASSWORD_FILE=/run/secrets/db_password
|
- db_password
|
||||||
- MYSQL_ROOT_PASSWORD_FILE=/run/secrets/db_root_password
|
environment:
|
||||||
|
POSTGRES_DB: keycloak
|
||||||
|
POSTGRES_USER: keycloak
|
||||||
|
POSTGRES_PASSWORD_FILE: /run/secrets/db_password
|
||||||
secrets:
|
secrets:
|
||||||
- db_password
|
- db_password
|
||||||
- db_root_password
|
|
||||||
volumes:
|
volumes:
|
||||||
- "mariadb:/var/lib/mysql"
|
- "postgres_data:/var/lib/postgresql/data"
|
||||||
networks:
|
networks:
|
||||||
- internal
|
- internal
|
||||||
deploy:
|
|
||||||
labels:
|
|
||||||
backupbot.backup: "true"
|
|
||||||
backupbot.backup.pre-hook: 'mkdir -p /tmp/backup/ && mysqldump --single-transaction -u root -p"$$(cat /run/secrets/db_root_password)" keycloak > /tmp/backup/backup.sql'
|
|
||||||
backupbot.backup.post-hook: "rm -rf /tmp/backup"
|
|
||||||
backupbot.backup.path: "/tmp/backup/"
|
|
||||||
|
|
||||||
networks:
|
networks:
|
||||||
internal:
|
internal:
|
||||||
@ -86,3 +82,4 @@ secrets:
|
|||||||
volumes:
|
volumes:
|
||||||
mariadb:
|
mariadb:
|
||||||
themes:
|
themes:
|
||||||
|
postgres_data:
|
||||||
|
@ -1,9 +0,0 @@
|
|||||||
You'll need to remove `/auth/` from your app SSO URLs, e.g.
|
|
||||||
|
|
||||||
https://foo.example.com/auth/realms/foo/protocol/openid-connect/auth
|
|
||||||
|
|
||||||
Would become:
|
|
||||||
|
|
||||||
https://foo.example.com/realms/foo/protocol/openid-connect/auth
|
|
||||||
|
|
||||||
-- decentral1se @ Autonomic
|
|
Reference in New Issue
Block a user