From 082a7b004e07fc1931edb2a686621d54538cc327 Mon Sep 17 00:00:00 2001 From: adas Date: Mon, 5 May 2025 22:00:07 +0200 Subject: [PATCH] use original port for demo app, change keycloak port to non standard 8081 --- docker-compose-keycloak.yml | 11 +++-------- keycloak.env | 17 ++++++++--------- keycloak/realm/realm-export.json | 6 +++--- 3 files changed, 14 insertions(+), 20 deletions(-) diff --git a/docker-compose-keycloak.yml b/docker-compose-keycloak.yml index 80e78c3..1e9001e 100644 --- a/docker-compose-keycloak.yml +++ b/docker-compose-keycloak.yml @@ -68,7 +68,7 @@ services: mailserver: condition: service_healthy ports: - - "8081:8080" + - "8080:8080" env_file: keycloak.env environment: SPRING_DATASOURCE_URL: jdbc:mariadb://myapp-db:3307/springuser?createDatabaseIfNotExist=true @@ -82,11 +82,6 @@ services: SPRING_MAIL_PROPERTIES_MAIL_SMTP_STARTTLS_REQUIRED: "false" DS_SPRING_USER_KEYCLOAK_CLIENT_ID: ds-spring-user-framework-demo DS_SPRING_USER_KEYCLOAK_CLIENT_SECRET: FTp1j7sGvc4g3MFdghEX4n7RPhbu86PQ - DS_SPRING_USER_KEYCLOAK_PROVIDER_ISSUER_URI: http://keycloak:8080/realms/master - DS_SPRING_USER_KEYCLOAK_PROVIDER_AUTHORIZATION_URI: http://keycloak:8080/realms/master/protocol/openid-connect/auth - DS_SPRING_USER_KEYCLOAK_PROVIDER_TOKEN_URI: http://keycloak:8080/realms/master/protocol/openid-connect/token - DS_SPRING_USER_KEYCLOAK_PROVIDER_USER_INFO_URI: http://keycloak:8080/realms/master/protocol/openid-connect/userinfo - DS_SPRING_USER_KEYCLOAK_PROVIDER_JWK_SET_URI: http://keycloak:8080/realms/master/protocol/openid-connect/certs healthcheck: test: ["CMD", "curl", "-f", "http://localhost:8080/actuator/health"] interval: 30s @@ -101,9 +96,9 @@ services: - --verbose - --import-realm ports: - - "8080:8080" + - "8081:8081" - "8443:8443" - - "9001:9000" + - "9000:9000" volumes: - ./keycloak/ssl:/opt/keycloak/ssl/ - ./keycloak/realm:/opt/keycloak/data/import/ diff --git a/keycloak.env b/keycloak.env index 4f8e07d..e5b621a 100644 --- a/keycloak.env +++ b/keycloak.env @@ -1,18 +1,17 @@ # Spring User Demo App -DS_SPRING_USER_KEYCLOAK_CLIENT_ID=ds-spring-user-framework-demo -DS_SPRING_USER_KEYCLOAK_CLIENT_SECRET=FTp1j7sGvc4g3MFdghEX4n7RPhbu86PQ -DS_SPRING_USER_KEYCLOAK_PROVIDER_ISSUER_URI=http://keycloak:8080/realms/master -DS_SPRING_USER_KEYCLOAK_PROVIDER_AUTHORIZATION_URI=http://keycloak:8080/realms/master/protocol/openid-connect/auth -DS_SPRING_USER_KEYCLOAK_PROVIDER_TOKEN_URI=http://keycloak:8080/realms/master/protocol/openid-connect/token -DS_SPRING_USER_KEYCLOAK_PROVIDER_USER_INFO_URI=http://keycloak:8080/realms/master/protocol/openid-connect/userinfo -DS_SPRING_USER_KEYCLOAK_PROVIDER_JWK_SET_URI=http://keycloak:8080/realms/master/protocol/openid-connect/certs +DS_SPRING_USER_KEYCLOAK_PROVIDER_ISSUER_URI=http://keycloak:8081/realms/master +DS_SPRING_USER_KEYCLOAK_PROVIDER_AUTHORIZATION_URI=http://keycloak:8081/realms/master/protocol/openid-connect/auth +DS_SPRING_USER_KEYCLOAK_PROVIDER_TOKEN_URI=http://keycloak:8081/realms/master/protocol/openid-connect/token +DS_SPRING_USER_KEYCLOAK_PROVIDER_USER_INFO_URI=http://keycloak:8081/realms/master/protocol/openid-connect/userinfo +DS_SPRING_USER_KEYCLOAK_PROVIDER_JWK_SET_URI=http://keycloak:8081/realms/master/protocol/openid-connect/certs # Keycloak KC_DB=mariadb KC_RUN_IN_CONTAINER=true -KC_HOSTNAME=0.0.0.0 +KC_HOSTNAME=keycloak KC_HTTP_ENABLED=true -KC_HTTP_HOST=0.0.0.0 +KC_HTTP_HOST=keycloak +KC_HTTP_PORT=8081 KC_HEALTH_ENABLED=true KC_METRICS_ENABLED=true KC_HTTPS_CERTIFICATE_FILE=/opt/keycloak/ssl/certificate.pem diff --git a/keycloak/realm/realm-export.json b/keycloak/realm/realm-export.json index f2e7bef..d93cd28 100644 --- a/keycloak/realm/realm-export.json +++ b/keycloak/realm/realm-export.json @@ -717,7 +717,7 @@ "*" ], "webOrigins": [ - "http://0.0.0.0:8081" + "http://0.0.0.0:8080" ], "notBefore": 0, "bearerOnly": false, @@ -734,7 +734,7 @@ "client.secret.creation.time": "1738208958", "client.introspection.response.allow.jwt.claim.enabled": "false", "token.endpoint.auth.signing.alg": "RS512", - "post.logout.redirect.uris": "http://0.0.0.0:8081", + "post.logout.redirect.uris": "http://0.0.0.0:8080", "oauth2.device.authorization.grant.enabled": "false", "use.jwks.url": "false", "backchannel.logout.revoke.offline.tokens": "false", @@ -742,7 +742,7 @@ "oidc.ciba.grant.enabled": "false", "client.use.lightweight.access.token.enabled": "false", "backchannel.logout.session.required": "true", - "backchannel.logout.url": "http://localhost:8081/logout/connect/back-channel/keycloak", + "backchannel.logout.url": "http://localhost:8080/logout/connect/back-channel/keycloak", "client_credentials.use_refresh_token": "false", "acr.loa.map": "{}", "require.pushed.authorization.requests": "false",