services: keycloak: image: quay.io/keycloak/keycloak:latest container_name: keycloak_keycloak networks: keycloak: aliases: - keycloak web: aliases: - keycloak restart: "no" depends_on: - postgres command: start --hostname=keycloak.jafner.net environment: KC_DB: postgres KC_DB_URL: jdbc:postgresql://postgres/keycloak KC_DB_USERNAME: keycloak KC_PROXY_HEADERS: xforwarded KC_HTTP_ENABLED: true KC_HEALTH_ENABLED: true KC_METRICS_ENABLED: true KEYCLOAK_ADMIN: Jafner env_file: - path: ./keycloak.secrets required: true labels: traefik.http.routers.keycloak.rule: Host(`keycloak.jafner.net`) traefik.http.routers.keycloak.tls.certresolver: lets-encrypt traefik.http.routers.keycloak.middlewares: keycloak-redirect traefik.http.services.keycloak.loadbalancer.server.port: 8080 traefik.http.middlewares.keycloak-redirect.redirectregex.regex: ^https:\\/\\/([^\\//]+)\\/?$$" traefik.http.middlewares.keycloak-redirect.redirectregex.replacement: https://$$1/admin" forwardauth: image: mesosphere/traefik-forward-auth:latest container_name: keycloak_forwardauth networks: web: aliases: - forwardauth restart: "always" command: "./traefik-forward-auth" depends_on: - keycloak environment: PROVIDER_URI: "https://keycloak.jafner.net/realms/Jafner.net" CLIENT_ID: "traefik-forward-auth" LOG_LEVEL: "debug" env_file: - path: ./forwardauth.secrets required: true labels: - "traefik.enable=false" - "traefik.http.routers.forwardauth.rule=Path(`/_oauth`)" - "traefik.http.routers.forwardauth.tls.certresolver=lets-encrypt" forwardauth-privileged: image: mesosphere/traefik-forward-auth:latest container_name: keycloak_forwardauth-privileged networks: web: aliases: - forwardauth-privileged restart: "always" command: "./traefik-forward-auth --whitelist=jafner425@gmail.com" depends_on: - keycloak environment: PROVIDER_URI: "https://keycloak.jafner.net/realms/Jafner.net" CLIENT_ID: "traefik-forward-auth-privileged" LOG_LEVEL: "debug" env_file: - path: ./forwardauth-privileged.secrets required: true labels: - "traefik.enable=false" - "traefik.http.routers.forwardauth-privileged.rule=Path(`/_oauth`)" - "traefik.http.routers.forwardauth-privileged.tls.certresolver=lets-encrypt" postgres: image: postgres:latest container_name: keycloak_postgres networks: - keycloak environment: POSTGRES_DB: keycloak POSTGRES_USER: keycloak env_file: - path: ./postgres.secrets required: true volumes: - postgres_data:/var/lib/postgresql/data networks: web: external: true keycloak: volumes: postgres_data: