DEV-1213 Add external (sub)domain oes.netgo.de
parent
42bfe6f408
commit
7b67ee1a0d
@ -1,15 +0,0 @@
|
|||||||
---
|
|
||||||
server_hcloud_firewall_objects:
|
|
||||||
- name: "customer-access-to-{{ inventory_hostname }}"
|
|
||||||
state: present
|
|
||||||
rules:
|
|
||||||
- direction: in
|
|
||||||
protocol: tcp
|
|
||||||
port: "443"
|
|
||||||
source_ips: "{{ additional_ip_adresses_vault }}"
|
|
||||||
destination_ips: []
|
|
||||||
description: customer specific access to https services
|
|
||||||
apply_to:
|
|
||||||
- type: server
|
|
||||||
server:
|
|
||||||
id: "{{ stage_server_id }}"
|
|
||||||
@ -1,8 +0,0 @@
|
|||||||
$ANSIBLE_VAULT;1.1;AES256
|
|
||||||
31396666646138353139636535636563613531356430336362386265636465656638656661613135
|
|
||||||
6331373138383964363266383331633532383537613837310a366531363137656566306565346263
|
|
||||||
32653430646463356464653939363431363666373637633332323430303934316439326234663532
|
|
||||||
6661373662663836660a663138613564623237666434353561366366353936363063313831333165
|
|
||||||
64333464333061336337393762343362373362353462346236323965653666343264343438306132
|
|
||||||
32653561656337636365663531333066666663623738643463653865663961303239376262306362
|
|
||||||
373762363465613031666565383535313033
|
|
||||||
@ -0,0 +1,6 @@
|
|||||||
|
---
|
||||||
|
connect_customer_urls_extern:
|
||||||
|
- oes.netgo.de
|
||||||
|
|
||||||
|
connect_customer_networks:
|
||||||
|
- 0.0.0.0/0
|
||||||
@ -1,15 +0,0 @@
|
|||||||
---
|
|
||||||
server_hcloud_firewall_objects:
|
|
||||||
- name: "customer-access-to-{{ inventory_hostname }}"
|
|
||||||
state: present
|
|
||||||
rules:
|
|
||||||
- direction: in
|
|
||||||
protocol: tcp
|
|
||||||
port: "443"
|
|
||||||
source_ips: "{{ additional_ip_adresses_vault }}"
|
|
||||||
destination_ips: []
|
|
||||||
description: customer specific access to https services
|
|
||||||
apply_to:
|
|
||||||
- type: server
|
|
||||||
server:
|
|
||||||
id: "{{ stage_server_id }}"
|
|
||||||
@ -1,8 +0,0 @@
|
|||||||
$ANSIBLE_VAULT;1.1;AES256
|
|
||||||
31396666646138353139636535636563613531356430336362386265636465656638656661613135
|
|
||||||
6331373138383964363266383331633532383537613837310a366531363137656566306565346263
|
|
||||||
32653430646463356464653939363431363666373637633332323430303934316439326234663532
|
|
||||||
6661373662663836660a663138613564623237666434353561366366353936363063313831333165
|
|
||||||
64333464333061336337393762343362373362353462346236323965653666343264343438306132
|
|
||||||
32653561656337636365663531333066666663623738643463653865663961303239376262306362
|
|
||||||
373762363465613031666565383535313033
|
|
||||||
@ -1,17 +1,17 @@
|
|||||||
$ANSIBLE_VAULT;1.1;AES256
|
$ANSIBLE_VAULT;1.1;AES256
|
||||||
33623661396231316264336334366662616361383165643162333435636164376537633634353831
|
39633034643831306530346439333466323839303039373564643166373063326634653738393066
|
||||||
6330346162656138303539323433353034376635363731640a666263336165643661633039343131
|
6632613237323364323265333866393533353830376261380a346564613639383931356238346336
|
||||||
32376432373666363639336465363835636139663963666433623266663965623063636236393135
|
37363032316138393136626137346633353963643933373933653432353330333832346362376238
|
||||||
6163313838323639300a643236656466613463633332383033376466373362306239333034343633
|
3538356439303732330a316364613762396330373166323830363439353464396233346665646135
|
||||||
31386235326366306238373664633338303233336134333537373930663333383536343465373161
|
38343139636265343338383265316564663131613463356139333063663931316137373335666562
|
||||||
38336666343765356463383934373939306338376465623266323735643535363339383733396364
|
31303061303732343662316564383662396265363439626336383666376564326461303935343230
|
||||||
66373937663432663765326437376465326566303863333033643833663734613061333066663134
|
32643138316461373963623437346232386237356239313566326262313062376663633161613031
|
||||||
30306563376536646538616361653630646463316334373634336435613537663238666235323766
|
61666161623930666638656337623937353766393866303830353536306466376466356636663663
|
||||||
33333538326639353366363736393735306238383466653834636531623233613639393732613466
|
31653937386336616661616631653234326138316239623835333238393034356232613963663363
|
||||||
39333266396531326166346566353533613536646637613131663462663934623363663363653163
|
32316631353061666162643832613263373537323937626361373335353864306663343332663238
|
||||||
61336139653036373566616335396565353537366263396236306261363439623236316430633532
|
35393732386135343165656366356366646663623762313538636432306266646531326536666234
|
||||||
37663137313437326534646230613561343435343266666665383561666365323863316464393839
|
34303038323830623964653461653133366235643962346465643634386433653661653230353138
|
||||||
34303665623265383064313965643630613938656538363162656139613365616633346666353761
|
39633537316664613164666533303263393430636465303239353935646462626166353965376462
|
||||||
63363864666163633661616664623937616366383138333763636135356334346337323132656538
|
34356235343462616266383966613137656462393262306166646337373161323863376566653063
|
||||||
36316565383935363136666437393133393063636230366237303030386665373133306665623933
|
62336531313031346436313131363361323134323964643838336338343363313330386533313865
|
||||||
62326562333931373764
|
66333164303634363132
|
||||||
|
|||||||
Binary file not shown.
@ -1,58 +0,0 @@
|
|||||||
---
|
|
||||||
|
|
||||||
connect_id: "{{ inventory_hostname }}-connect"
|
|
||||||
connect_admin_username: "connect-admin"
|
|
||||||
connect_admin_password: "{{ connect_admin_password_vault }}"
|
|
||||||
connect_postgres_username: "connect-postgres-username"
|
|
||||||
connect_postgres_password: "{{ connect_postgres_password_vault }}"
|
|
||||||
connect_image_name: "{{ shared_service_hostname_harbor }}/smardigo/connect-whitelabel-app"
|
|
||||||
|
|
||||||
iam_image_name: "{{ shared_service_hostname_harbor }}/smardigo/iam-app"
|
|
||||||
|
|
||||||
elasticsearch_username: "elastic"
|
|
||||||
elasticsearch_password: "{{ elasticsearch_password_vault }}"
|
|
||||||
|
|
||||||
keycloak_id: "{{ inventory_hostname }}-keycloak"
|
|
||||||
keycloak_admin_username: "keycloak-admin"
|
|
||||||
keycloak_admin_password: "{{ keycloak_admin_password_vault }}"
|
|
||||||
keycloak_postgres_username: "keycloak_postgres"
|
|
||||||
keycloak_postgres_password: "{{ keycloak_postgres_password_vault }}"
|
|
||||||
keycloak_image_name: "{{ shared_service_hostname_harbor }}/smardigo/keycloak"
|
|
||||||
|
|
||||||
kibana_id: "{{ inventory_hostname }}-kibana"
|
|
||||||
|
|
||||||
shared_service_mail_hostname: "not_available"
|
|
||||||
|
|
||||||
current_realm_name: connect
|
|
||||||
connect_client_id: "{{ connect_id }}"
|
|
||||||
|
|
||||||
current_realm_clients: [
|
|
||||||
{
|
|
||||||
name: '{{ connect_client_id }}',
|
|
||||||
clientId: "{{ connect_client_id }}",
|
|
||||||
admin_url: '',
|
|
||||||
root_url: '',
|
|
||||||
redirect_uris: [
|
|
||||||
"{{ http_s }}://{{ connect_base_url }}/*",
|
|
||||||
"{{ http_s }}://{{ connect_external_subdomain }}.{{ domain }}/*",
|
|
||||||
],
|
|
||||||
secret: '{{ connect_client_id }}',
|
|
||||||
web_origins: [
|
|
||||||
"{{ http_s }}://{{ connect_base_url }}",
|
|
||||||
"{{ http_s }}://{{ connect_external_subdomain }}.{{ domain }}",
|
|
||||||
]
|
|
||||||
},{
|
|
||||||
name: 'mpm',
|
|
||||||
clientId: "mpm",
|
|
||||||
admin_url: '',
|
|
||||||
root_url: '',
|
|
||||||
redirect_uris: [
|
|
||||||
"{{ http_s }}://{{ connect_base_url }}/*",
|
|
||||||
],
|
|
||||||
secret: '9d9ca019-8245-4b72-b8eb-8020535eba8e',
|
|
||||||
web_origins: [
|
|
||||||
"{{ http_s }}://{{ connect_base_url }}",
|
|
||||||
]
|
|
||||||
},
|
|
||||||
]
|
|
||||||
connect_compact_tls_cert_resolver: letsencrypt-http
|
|
||||||
@ -1,61 +0,0 @@
|
|||||||
---
|
|
||||||
|
|
||||||
- name: "Setup DNS configuration for <{{ connect_id }}> to <{{ stage_server_ip }}>"
|
|
||||||
include_role:
|
|
||||||
name: hetzner-ansible-dns
|
|
||||||
vars:
|
|
||||||
record_data: "{{ stage_server_ip }}"
|
|
||||||
record_name: "{{ connect_id }}"
|
|
||||||
|
|
||||||
- name: "Setup DNS configuration for <{{ connect_external_subdomain }}> to <{{ stage_server_ip }}>"
|
|
||||||
include_role:
|
|
||||||
name: hetzner-ansible-dns
|
|
||||||
vars:
|
|
||||||
record_data: "{{ stage_server_ip }}"
|
|
||||||
record_name: "{{ connect_external_subdomain }}"
|
|
||||||
when: connect_external_subdomain is defined
|
|
||||||
|
|
||||||
- name: "Setup DNS configuration for <{{ kibana_id }}> to <{{ stage_server_ip }}>"
|
|
||||||
include_role:
|
|
||||||
name: hetzner-ansible-dns
|
|
||||||
vars:
|
|
||||||
record_data: "{{ stage_server_ip }}"
|
|
||||||
record_name: "{{ kibana_id }}"
|
|
||||||
|
|
||||||
- name: "Setup realm for {{ connect_id }}"
|
|
||||||
include_role:
|
|
||||||
name: keycloak
|
|
||||||
tasks_from: _configure_realm
|
|
||||||
apply:
|
|
||||||
tags:
|
|
||||||
- configure_realm
|
|
||||||
tags:
|
|
||||||
- configure_realm
|
|
||||||
|
|
||||||
- name: "Check if {{ connect_id }}/docker-compose.yml exists"
|
|
||||||
stat:
|
|
||||||
path: '{{ service_base_path }}/{{ connect_id }}/docker-compose.yml'
|
|
||||||
register: check_docker_compose_file_connect
|
|
||||||
|
|
||||||
- name: "Deploy docker templates for {{ connect_id }}"
|
|
||||||
include_role:
|
|
||||||
name: hetzner-ansible-sma-deploy
|
|
||||||
tasks_from: templates
|
|
||||||
vars:
|
|
||||||
current_config: "connect-compact"
|
|
||||||
current_base_path: "{{ service_base_path }}"
|
|
||||||
current_destination: "{{ connect_id }}"
|
|
||||||
current_owner: "{{ docker_owner }}"
|
|
||||||
current_group: "{{ docker_group }}"
|
|
||||||
|
|
||||||
- name: "Stop {{ connect_id }}"
|
|
||||||
community.docker.docker_compose:
|
|
||||||
project_src: '{{ service_base_path }}/{{ connect_id }}'
|
|
||||||
state: absent
|
|
||||||
when: check_docker_compose_file_connect.stat.exists
|
|
||||||
|
|
||||||
- name: "Restart {{ connect_id }}"
|
|
||||||
community.docker.docker_compose:
|
|
||||||
project_src: '{{ service_base_path }}/{{ connect_id }}'
|
|
||||||
state: present
|
|
||||||
pull: no
|
|
||||||
@ -1,12 +0,0 @@
|
|||||||
---
|
|
||||||
|
|
||||||
keycloak_id: "{{ inventory_hostname }}-keycloak"
|
|
||||||
keycloak_admin_username: "keycloak-admin"
|
|
||||||
keycloak_admin_password: "{{ keycloak_admin_password_vault }}"
|
|
||||||
keycloak_postgres_username: "keycloak_postgres"
|
|
||||||
keycloak_postgres_password: "{{ keycloak_postgres_password_vault }}"
|
|
||||||
keycloak_image_name: "{{ shared_service_hostname_harbor }}/smardigo/keycloak"
|
|
||||||
|
|
||||||
keycloak_compact_tls_cert_resolver: letsencrypt-http
|
|
||||||
|
|
||||||
service_port_keycloak_external: 8110
|
|
||||||
@ -1,56 +0,0 @@
|
|||||||
---
|
|
||||||
|
|
||||||
### tags:
|
|
||||||
### configure_realm
|
|
||||||
|
|
||||||
- name: "Setup DNS configuration for <{{ keycloak_id }}> to <{{ stage_server_ip }}>"
|
|
||||||
include_role:
|
|
||||||
name: hetzner-ansible-dns
|
|
||||||
vars:
|
|
||||||
record_data: "{{ stage_server_ip }}"
|
|
||||||
record_name: "{{ keycloak_id }}"
|
|
||||||
|
|
||||||
- name: "Setup DNS configuration for <{{ keycloak_external_subdomain }}> to <{{ stage_server_ip }}>"
|
|
||||||
include_role:
|
|
||||||
name: hetzner-ansible-dns
|
|
||||||
vars:
|
|
||||||
record_data: "{{ stage_server_ip }}"
|
|
||||||
record_name: "{{ keycloak_external_subdomain }}"
|
|
||||||
when: keycloak_external_subdomain is defined
|
|
||||||
|
|
||||||
- name: "Check if {{ keycloak_id }}/docker-compose.yml exists"
|
|
||||||
stat:
|
|
||||||
path: '{{ service_base_path }}/{{ keycloak_id }}/docker-compose.yml'
|
|
||||||
register: check_docker_compose_file
|
|
||||||
|
|
||||||
- name: "Deploy docker templates for {{ keycloak_id }}"
|
|
||||||
include_role:
|
|
||||||
name: hetzner-ansible-sma-deploy
|
|
||||||
tasks_from: templates
|
|
||||||
vars:
|
|
||||||
current_config: "keycloak-compact"
|
|
||||||
current_base_path: "{{ service_base_path }}"
|
|
||||||
current_destination: "{{ keycloak_id }}"
|
|
||||||
current_owner: "{{ docker_owner }}"
|
|
||||||
current_group: "{{ docker_group }}"
|
|
||||||
|
|
||||||
- name: "Stop {{ keycloak_id }}"
|
|
||||||
community.docker.docker_compose:
|
|
||||||
project_src: '{{ service_base_path }}/{{ keycloak_id }}'
|
|
||||||
state: absent
|
|
||||||
when: check_docker_compose_file.stat.exists
|
|
||||||
|
|
||||||
- name: "Start {{ keycloak_id }}"
|
|
||||||
community.docker.docker_compose:
|
|
||||||
project_src: '{{ service_base_path }}/{{ keycloak_id }}'
|
|
||||||
state: present
|
|
||||||
|
|
||||||
- name: "Setting local keycloak url"
|
|
||||||
set_fact:
|
|
||||||
shared_service_url_keycloak: "http://localhost:{{ service_port_keycloak_external }}"
|
|
||||||
|
|
||||||
- name: "Wait for <localhost:{{ service_port_keycloak_external }}>"
|
|
||||||
wait_for:
|
|
||||||
host: "localhost"
|
|
||||||
port: '{{ service_port_keycloak_external }}'
|
|
||||||
delay: 30
|
|
||||||
@ -1,11 +0,0 @@
|
|||||||
smardigo:
|
|
||||||
linked-applications:
|
|
||||||
-
|
|
||||||
name: Password Change
|
|
||||||
url: https://{{ keycloak_external_subdomain }}.{{ domain }}/auth/realms/{{ current_realm_name }}/account/password
|
|
||||||
-
|
|
||||||
name: User Management
|
|
||||||
url: https://{{ keycloak_external_subdomain }}.{{ domain }}/auth/admin/{{ current_realm_name }}/console
|
|
||||||
-
|
|
||||||
name: MPM Process Mining
|
|
||||||
url: https://mehrwerk-demo.eu.qlikcloud.com
|
|
||||||
@ -1,10 +0,0 @@
|
|||||||
---
|
|
||||||
|
|
||||||
cluster.name: "{{ connect_id }}-elastic"
|
|
||||||
network.host: 0.0.0.0
|
|
||||||
|
|
||||||
discovery.type: single-node
|
|
||||||
|
|
||||||
xpack.security.enabled: true
|
|
||||||
xpack.license.self_generated.type: basic
|
|
||||||
xpack.monitoring.collection.enabled: true
|
|
||||||
@ -1,182 +0,0 @@
|
|||||||
version: '3.7'
|
|
||||||
|
|
||||||
networks:
|
|
||||||
back-tier:
|
|
||||||
external: True
|
|
||||||
front-tier:
|
|
||||||
external: True
|
|
||||||
|
|
||||||
volumes:
|
|
||||||
{{ connect_id }}-postgres-data: {}
|
|
||||||
{{ connect_id }}-elastic-data: {}
|
|
||||||
|
|
||||||
services:
|
|
||||||
{{ connect_id }}:
|
|
||||||
image: "{{ connect_image_name }}:{{ connect_version }}"
|
|
||||||
container_name: "{{ connect_id }}"
|
|
||||||
restart: always
|
|
||||||
labels:
|
|
||||||
- "traefik.enable=true"
|
|
||||||
- "traefik.http.routers.{{ connect_id }}.service={{ connect_id }}"
|
|
||||||
- "traefik.http.routers.{{ connect_id }}.rule=Host(`{{ connect_id }}.{{ domain }}`)"
|
|
||||||
- "traefik.http.routers.{{ connect_id }}.entrypoints=websecure"
|
|
||||||
- "traefik.http.routers.{{ connect_id }}.tls=true"
|
|
||||||
- "traefik.http.routers.{{ connect_id }}.tls.certresolver={{ connect_compact_tls_cert_resolver }}"
|
|
||||||
- "traefik.http.services.{{ connect_id }}.loadbalancer.server.port=8080"
|
|
||||||
|
|
||||||
- "traefik.http.routers.{{ connect_id }}-admin.service={{ connect_id }}-admin"
|
|
||||||
- "traefik.http.routers.{{ connect_id }}-admin.rule=Host(`{{ connect_id }}.{{ domain }}`)"
|
|
||||||
- "traefik.http.routers.{{ connect_id }}-admin.entrypoints=admin-service"
|
|
||||||
- "traefik.http.routers.{{ connect_id }}-admin.tls=true"
|
|
||||||
- "traefik.http.routers.{{ connect_id }}-admin.tls.certresolver={{ connect_compact_tls_cert_resolver }}"
|
|
||||||
- "traefik.http.services.{{ connect_id }}-admin.loadbalancer.server.port={{ management_port }}"
|
|
||||||
{% if
|
|
||||||
connect_external_subdomain is defined
|
|
||||||
%}
|
|
||||||
|
|
||||||
- "traefik.http.routers.{{ connect_id }}-extern.service={{ connect_id }}-extern"
|
|
||||||
- "traefik.http.routers.{{ connect_id }}-extern.rule=Host(`{{ connect_external_subdomain }}.{{ domain }}`)"
|
|
||||||
- "traefik.http.routers.{{ connect_id }}-extern.entrypoints=websecure"
|
|
||||||
- "traefik.http.routers.{{ connect_id }}-extern.tls=true"
|
|
||||||
- "traefik.http.routers.{{ connect_id }}-extern.tls.certresolver={{ connect_compact_tls_cert_resolver }}"
|
|
||||||
- "traefik.http.services.{{ connect_id }}-extern.loadbalancer.server.port=8080"
|
|
||||||
{% endif %}
|
|
||||||
environment:
|
|
||||||
TZ: "Europe/Berlin"
|
|
||||||
NAME: "MPM eXecution 2.0"
|
|
||||||
|
|
||||||
TENANT_ID: "{{ connect_id }}"
|
|
||||||
ADMIN_LOGIN: "{{ connect_admin_username }}"
|
|
||||||
ADMIN_PASSWORD: "{{ connect_admin_password }}"
|
|
||||||
|
|
||||||
DATASOURCE_URL: "jdbc:postgresql://{{ connect_id }}-postgres:5432/connect-postgres"
|
|
||||||
DATASOURCE_USERNAME: "{{ connect_postgres_username }}"
|
|
||||||
DATASOURCE_PASSWORD: "{{ connect_postgres_password }}"
|
|
||||||
|
|
||||||
MAIL_PROTOCOL: "smtp"
|
|
||||||
MAIL_HOST: "smtp.web.de"
|
|
||||||
MAIL_PORT: "587"
|
|
||||||
MAIL_USER: "{{ connect_email_username }}"
|
|
||||||
MAIL_PASSWORD: "{{ connect_email_password }}"
|
|
||||||
MAIL_PROPERTIES_SIMULATION: "false"
|
|
||||||
MAIL_PROPERTIES_BASE_URL: "https://{{ connect_id }}.{{ domain }}"
|
|
||||||
MAIL_PROPERTIES_BASE_URL_EXTERN: "https://{{ connect_id }}.{{ domain }}"
|
|
||||||
MAIL_PROPERTIES_SENDER: "smardigo.email@web.de"
|
|
||||||
MAIL_PROPERTIES_SENDER_ALIAS: "noreply-connect"
|
|
||||||
MAIL_PROPERTIES_SMTP_AUTH: "true"
|
|
||||||
MAIL_PROPERTIES_SMTP_STARTTLS_ENABLE: "true"
|
|
||||||
MAIL_PROPERTIES_SMTP_STARTTLS_REQUIRED: "true"
|
|
||||||
|
|
||||||
AUTH_MODULE: "oidc"
|
|
||||||
OIDC_CLIENT_ID: "{{ connect_id }}"
|
|
||||||
OIDC_CLIENT_SECRET: "{{ connect_id }}"
|
|
||||||
OIDC_REGISTRATION_ID: "{{ connect_id }}"
|
|
||||||
OIDC_ISSUER_URI: "https://{{ keycloak_external_subdomain }}.{{ domain }}/auth/realms/{{ current_realm_name }}"
|
|
||||||
PASSWORD_CHANGE_URL: "https://{{ keycloak_external_subdomain }}.{{ domain }}/auth/realms/{{ current_realm_name }}/account/password"
|
|
||||||
USER_MANAGEMENT_URL: "https://{{ keycloak_external_subdomain }}.{{ domain }}/auth/admin/{{ current_realm_name }}/console"
|
|
||||||
|
|
||||||
IAM_MODULE: "external"
|
|
||||||
IAM_CLIENT_ENABLED: "true"
|
|
||||||
EXTERNAL_IAM_SERVER_URL: "http://{{ connect_id }}-iam:8080"
|
|
||||||
|
|
||||||
PROCESS_SEARCH_MODULE: "embedded"
|
|
||||||
ELASTIC_HOST: "{{ connect_id }}-elastic"
|
|
||||||
ELASTIC_PREFIX: "{{ connect_id }}"
|
|
||||||
ELASTIC_USERNAME: "{{ elasticsearch_username }}"
|
|
||||||
ELASTIC_PASSWORD: "{{ elasticsearch_password }}"
|
|
||||||
ELASTIC_SEARCH_INDEX: "search"
|
|
||||||
ELASTIC_MESSAGE_INDEX: "message"
|
|
||||||
ELASTIC_ANALYSIS_INDEX: "analysis"
|
|
||||||
|
|
||||||
SPRING_PROFILES_INCLUDE: "linked-applications, swagger, elastic"
|
|
||||||
PROCESS_SEARCH_MODULE: "external"
|
|
||||||
|
|
||||||
SPRINGDOC_SERVER_URL: "https://{{ connect_id }}.{{ domain }}"
|
|
||||||
SMA_CORS_ORIGINS: "https://{{ connect_id }}.{{ domain }}"
|
|
||||||
SMA_CORS_ALLOWED_METHODS: "*"
|
|
||||||
SMA_CORS_ALLOWED_HEADERS: "*"
|
|
||||||
SMA_CORS_PATH_PATTERN: "/**"
|
|
||||||
SMA_LANGUAGE_CODE: "en"
|
|
||||||
|
|
||||||
SMA_JWT_ENABLED: "True"
|
|
||||||
SMA_JWT_SECRET: "{{ sma_jwt_secret }}"
|
|
||||||
|
|
||||||
RESUBMISSION_ENABLED: "true"
|
|
||||||
ELEMENT_TEMPLATE_ENABLED: "true"
|
|
||||||
CONFIG_DELETE_SCOPE_ENABLED: "true"
|
|
||||||
EXTERNAL_TASK_SCRIPT_WORKER_ENABLED: "false"
|
|
||||||
CONFIG_DELETE_SCOPE_ENABLED: "true"
|
|
||||||
CONFIG_LOCAL_IMPORT_ENABLED: "true"
|
|
||||||
SMA_WORKFLOW_HEATMAP_ENABLED: "true"
|
|
||||||
|
|
||||||
LOG_LEVEL_CAMUNDA: "OFF"
|
|
||||||
LOG_LEVEL_JASYPT: "ERROR"
|
|
||||||
LOG_LEVEL_MESSAGE_QUEUE: "INFO"
|
|
||||||
LOG_LEVEL_DOCUMENT_INDEX: "INFO"
|
|
||||||
LOG_LEVEL_WORKFLOW_INDEX: "INFO"
|
|
||||||
LOG_LEVEL_WORKFLOW_ANALYSIS: "INFO"
|
|
||||||
volumes:
|
|
||||||
- "./config/application-linked-applications.yml:/config/application-linked-applications.yml"
|
|
||||||
networks:
|
|
||||||
- "back-tier"
|
|
||||||
- "front-tier"
|
|
||||||
{{ connect_id }}-postgres:
|
|
||||||
image: "postgres:12"
|
|
||||||
container_name: "{{ connect_id }}-postgres"
|
|
||||||
restart: always
|
|
||||||
environment:
|
|
||||||
POSTGRES_DB: "connect-postgres"
|
|
||||||
POSTGRES_USER: "{{ connect_postgres_username }}"
|
|
||||||
POSTGRES_PASSWORD: "{{ connect_postgres_password }}"
|
|
||||||
volumes:
|
|
||||||
- "{{ connect_id }}-postgres-data:/var/lib/postgresql/data"
|
|
||||||
networks:
|
|
||||||
- "back-tier"
|
|
||||||
{{ connect_id }}-elastic:
|
|
||||||
image: "docker.elastic.co/elasticsearch/elasticsearch:7.16.3"
|
|
||||||
container_name: "{{ connect_id }}-elastic"
|
|
||||||
restart: always
|
|
||||||
environment:
|
|
||||||
ES_JAVA_OPTS: "-Xmx2G -Xms2G"
|
|
||||||
ELASTIC_PASSWORD: "{{ elasticsearch_password }}"
|
|
||||||
volumes:
|
|
||||||
- "./config/elasticsearch/elasticsearch.yml:/usr/share/elasticsearch/config/elasticsearch.yml:ro"
|
|
||||||
- "{{ connect_id }}-elastic-data:/usr/share/elasticsearch/data"
|
|
||||||
networks:
|
|
||||||
- "back-tier"
|
|
||||||
{{ connect_id }}-kibana:
|
|
||||||
image: "docker.elastic.co/kibana/kibana:7.16.3"
|
|
||||||
container_name: "{{ connect_id }}-kibana"
|
|
||||||
restart: always
|
|
||||||
labels:
|
|
||||||
- "traefik.enable=true"
|
|
||||||
- "traefik.http.routers.{{ connect_id }}-kibana.service={{ connect_id }}-kibana"
|
|
||||||
- "traefik.http.routers.{{ connect_id }}-kibana.rule=Host(`{{ kibana_id }}.{{ domain }}`)"
|
|
||||||
- "traefik.http.routers.{{ connect_id }}-kibana.entrypoints=websecure"
|
|
||||||
- "traefik.http.routers.{{ connect_id }}-kibana.tls=true"
|
|
||||||
- "traefik.http.routers.{{ connect_id }}-kibana.tls.certresolver={{ connect_compact_tls_cert_resolver }}"
|
|
||||||
- "traefik.http.services.{{ connect_id }}-kibana.loadbalancer.server.port=5601"
|
|
||||||
- "traefik.http.routers.{{ connect_id }}-kibana.middlewares={{ connect_id }}-kibana-ipwhitelist"
|
|
||||||
- "traefik.http.middlewares.{{ connect_id }}-kibana-ipwhitelist.ipwhitelist.sourcerange={{ ( ip_whitelist_netgo ) | join(',') }}"
|
|
||||||
mem_limit: 1G
|
|
||||||
volumes:
|
|
||||||
- "./config/kibana/kibana.yml:/usr/share/kibana/config/kibana.yml:ro"
|
|
||||||
networks:
|
|
||||||
- "back-tier"
|
|
||||||
- "front-tier"
|
|
||||||
{{ connect_id }}-iam:
|
|
||||||
image: "{{ iam_image_name }}:{{ iam_version }}"
|
|
||||||
container_name: "{{ connect_id }}-iam"
|
|
||||||
restart: always
|
|
||||||
environment:
|
|
||||||
SERVER_ERROR_INCLUDE_MESSAGE: "always"
|
|
||||||
IAM_KEYCLOAK_AUTH_SERVER_URL: "https://{{ keycloak_external_subdomain }}.{{ domain }}/auth"
|
|
||||||
IAM_KEYCLOAK_ADMIN_USER: "{{ keycloak_admin_username }}"
|
|
||||||
IAM_KEYCLOAK_ADMIN_PASSWORD: "{{ keycloak_admin_password }}"
|
|
||||||
IAM_JWT_CONFIG_READ_TIMEOUT: 3000
|
|
||||||
IAM_CACHE_TENANTS_TTL: "3600"
|
|
||||||
IAM_CACHE_ROLES_TTL: "60"
|
|
||||||
IAM_CACHE_USERS_TTL: "60"
|
|
||||||
IAM_CACHE_JWKS_TTL: "3600"
|
|
||||||
networks:
|
|
||||||
- "back-tier"
|
|
||||||
@ -1,61 +0,0 @@
|
|||||||
version: '3.7'
|
|
||||||
|
|
||||||
networks:
|
|
||||||
back-tier:
|
|
||||||
external: True
|
|
||||||
front-tier:
|
|
||||||
external: True
|
|
||||||
|
|
||||||
volumes:
|
|
||||||
{{ keycloak_id }}-postgres-data: {}
|
|
||||||
|
|
||||||
services:
|
|
||||||
{{ keycloak_id }}:
|
|
||||||
image: "{{ keycloak_image_name }}:{{ keycloak_version }}"
|
|
||||||
container_name: "{{ keycloak_id }}"
|
|
||||||
command: "start"
|
|
||||||
restart: always
|
|
||||||
labels:
|
|
||||||
- "traefik.enable=true"
|
|
||||||
- "traefik.http.routers.{{ keycloak_id }}.service={{ keycloak_id }}"
|
|
||||||
- "traefik.http.routers.{{ keycloak_id }}.rule=Host(`{{ keycloak_id }}.smardigo.digital`)"
|
|
||||||
- "traefik.http.routers.{{ keycloak_id }}.entrypoints=websecure"
|
|
||||||
- "traefik.http.routers.{{ keycloak_id }}.tls=true"
|
|
||||||
- "traefik.http.routers.{{ keycloak_id }}.tls.certresolver={{ keycloak_compact_tls_cert_resolver }}"
|
|
||||||
- "traefik.http.services.{{ keycloak_id }}.loadbalancer.server.port=8080"
|
|
||||||
{% if
|
|
||||||
keycloak_external_subdomain is defined
|
|
||||||
%}
|
|
||||||
- "traefik.http.routers.{{ keycloak_id }}-extern.service={{ keycloak_id }}-extern"
|
|
||||||
- "traefik.http.routers.{{ keycloak_id }}-extern.rule=Host(`{{ keycloak_external_subdomain }}.smardigo.digital`)"
|
|
||||||
- "traefik.http.routers.{{ keycloak_id }}-extern.entrypoints=websecure"
|
|
||||||
- "traefik.http.routers.{{ keycloak_id }}-extern.tls=true"
|
|
||||||
- "traefik.http.routers.{{ keycloak_id }}-extern.tls.certresolver={{ keycloak_compact_tls_cert_resolver }}"
|
|
||||||
- "traefik.http.services.{{ keycloak_id }}-extern.loadbalancer.server.port=8080"
|
|
||||||
{% endif %}
|
|
||||||
environment:
|
|
||||||
KEYCLOAK_USER: "{{ keycloak_admin_username }}"
|
|
||||||
KEYCLOAK_ADMIN_PASSWORD: "{{ keycloak_admin_password }}"
|
|
||||||
KC_PROXY: "edge"
|
|
||||||
KC_HOSTNAME: "{{ keycloak_id }}.{{ domain_env }}"
|
|
||||||
KC_DB: "postgres"
|
|
||||||
KC_DB_USERNAME: "{{ keycloak_postgres_username }}"
|
|
||||||
KC_DB_PASSWORD: "{{ keycloak_postgres_password }}"
|
|
||||||
KC_DB_URL: "jdbc:postgresql://{{ keycloak_id }}-postgres:{{ service_port_postgres }}/keycloak-postgres"
|
|
||||||
networks:
|
|
||||||
- "back-tier"
|
|
||||||
- "front-tier"
|
|
||||||
ports:
|
|
||||||
- "8110:8080"
|
|
||||||
{{ keycloak_id }}-postgres:
|
|
||||||
image: "postgres:12"
|
|
||||||
container_name: "{{ keycloak_id }}-postgres"
|
|
||||||
restart: always
|
|
||||||
environment:
|
|
||||||
POSTGRES_DB: "keycloak-postgres"
|
|
||||||
POSTGRES_USER: "{{ keycloak_postgres_username }}"
|
|
||||||
POSTGRES_PASSWORD: "{{ keycloak_postgres_password }}"
|
|
||||||
volumes:
|
|
||||||
- "{{ keycloak_id }}-postgres-data:/var/lib/postgresql/data"
|
|
||||||
networks:
|
|
||||||
- "back-tier"
|
|
||||||
Loading…
Reference in New Issue