services: klz-app: build: context: . dockerfile: Dockerfile args: NEXT_PUBLIC_BASE_URL: ${NEXT_PUBLIC_BASE_URL} DIRECTUS_URL: ${DIRECTUS_URL} image: registry.infra.mintel.me/mintel/klz-cables.com:${IMAGE_TAG:-latest} restart: unless-stopped networks: default: infra: aliases: - klz.localhost env_file: - ${ENV_FILE:-.env} labels: - "traefik.enable=true" # HTTP ⇒ HTTPS redirect - "traefik.http.routers.klz-web.rule=${TRAEFIK_HOST_RULE:-Host(`${TRAEFIK_HOST:-klz-cables.com}`)}" - "traefik.http.routers.klz-web.entrypoints=web" - "traefik.http.routers.klz-web.middlewares=redirect-https" # HTTPS router (Standard) - "traefik.http.routers.klz.rule=${TRAEFIK_HOST_RULE:-Host(`${TRAEFIK_HOST:-klz-cables.com}`)}" - "traefik.http.routers.klz.entrypoints=${TRAEFIK_ENTRYPOINT:-web}" - "traefik.http.routers.klz.tls.certresolver=${TRAEFIK_CERT_RESOLVER:-}" - "traefik.http.routers.klz.tls=${TRAEFIK_TLS:-false}" - "traefik.http.routers.klz.service=klz-app-svc" - "traefik.http.routers.klz.middlewares=${AUTH_MIDDLEWARE:-klz-ratelimit,klz-forward,klz-compress}" # Public Router (Whitelist for OG Images, Sitemaps, Health) - "traefik.http.routers.klz-public.rule=(${TRAEFIK_HOST_RULE:-Host(`${TRAEFIK_HOST:-klz-cables.com}`)}) && (PathPrefix(`/health`) || PathPrefix(`/sitemap.xml`) || PathPrefix(`/robots.txt`) || PathPrefix(`/manifest.webmanifest`) || PathRegexp(`^/([a-z]{2}/)?api/og`) || PathRegexp(`^/([a-z]{2}/)?opengraph-image$`) || PathRegexp(`^/([a-z]{2}/)?blog/opengraph-image$`) || PathRegexp(`^/sitemap(-[0-9]+)?\\.xml$`))" - "traefik.http.routers.klz-public.entrypoints=${TRAEFIK_ENTRYPOINT:-web}" - "traefik.http.routers.klz-public.tls.certresolver=${TRAEFIK_CERT_RESOLVER:-}" - "traefik.http.routers.klz-public.tls=${TRAEFIK_TLS:-false}" - "traefik.http.routers.klz-public.service=klz-app-svc" - "traefik.http.routers.klz-public.middlewares=${AUTH_MIDDLEWARE_UNPROTECTED:-klz-ratelimit,klz-forward,klz-compress}" - "traefik.http.routers.klz-public.priority=2000" - "traefik.http.services.klz-app-svc.loadbalancer.server.scheme=http" - "traefik.http.services.klz-app-svc.loadbalancer.server.port=3000" - "traefik.docker.network=infra" - "caddy=http://${TRAEFIK_HOST:-klz.localhost}" - "caddy.reverse_proxy={{upstreams 3000}}" # Middleware Definitions - "traefik.http.middlewares.klz-compress.compress=true" # Forwarded Headers - "traefik.http.middlewares.klz-forward.headers.customrequestheaders.X-Forwarded-Proto=https" - "traefik.http.middlewares.klz-forward.headers.customrequestheaders.X-Forwarded-Ssl=on" # Authentication Middleware (ForwardAuth) - "traefik.http.middlewares.klz-auth.forwardauth.address=http://klz-gatekeeper:3000/gatekeeper/api/verify" - "traefik.http.middlewares.klz-auth.forwardauth.trustForwardHeader=true" - "traefik.http.middlewares.klz-auth.forwardauth.authRequestHeaders=X-Forwarded-Host,X-Forwarded-Proto,X-Forwarded-For,Cookie" - "traefik.http.middlewares.klz-auth.forwardauth.authResponseHeaders=X-Auth-User" # Rate Limit Middleware - "traefik.http.middlewares.klz-ratelimit.ratelimit.average=100" - "traefik.http.middlewares.klz-ratelimit.ratelimit.burst=50" healthcheck: test: [ "CMD", "curl", "-f", "http://127.0.0.1:3000/health" ] interval: 15s timeout: 10s retries: 3 start_period: 45s klz-gatekeeper: profiles: [ "gatekeeper" ] image: registry.infra.mintel.me/mintel/gatekeeper:v1.7.12 restart: unless-stopped networks: infra: aliases: - klz-gatekeeper env_file: - ${ENV_FILE:-.env} environment: PORT: 3000 PROJECT_NAME: ${PROJECT_NAME:-KLZ Cables} PROJECT_COLOR: "#82ed20" COOKIE_DOMAIN: ${COOKIE_DOMAIN} AUTH_COOKIE_NAME: ${AUTH_COOKIE_NAME:-klz_gatekeeper_session} GATEKEEPER_PASSWORD: ${GATEKEEPER_PASSWORD} NEXT_PUBLIC_BASE_URL: ${GATEKEEPER_ORIGIN} labels: - "traefik.enable=true" - "traefik.docker.network=infra" - "traefik.http.routers.klz-gatekeeper.rule=(Host(`${TRAEFIK_HOST:-testing.klz-cables.com}`) && PathPrefix(`/gatekeeper`))" - "traefik.http.routers.klz-gatekeeper.entrypoints=${TRAEFIK_ENTRYPOINT:-web}" - "traefik.http.routers.klz-gatekeeper.tls.certresolver=${TRAEFIK_CERT_RESOLVER:-}" - "traefik.http.routers.klz-gatekeeper.tls=${TRAEFIK_TLS:-false}" - "traefik.http.routers.klz-gatekeeper.service=klz-gatekeeper-svc" - "traefik.http.services.klz-gatekeeper-svc.loadbalancer.server.port=3000" - "traefik.docker.network=infra" klz-cms: image: registry.infra.mintel.me/mintel/directus:latest restart: unless-stopped command: [ "node", "cli.js", "start" ] env_file: - ${ENV_FILE:-.env} environment: KEY: ${DIRECTUS_KEY} SECRET: ${DIRECTUS_SECRET} ADMIN_EMAIL: ${DIRECTUS_ADMIN_EMAIL} ADMIN_PASSWORD: ${DIRECTUS_ADMIN_PASSWORD} DB_CLIENT: 'pg' DB_HOST: 'klz-db' DB_PORT: '5432' DB_DATABASE: ${DIRECTUS_DB_NAME:-directus} DB_USER: ${DIRECTUS_DB_USER:-directus} DB_PASSWORD: ${DIRECTUS_DB_PASSWORD:-120in09oenaoinsd9iaidon} WEBSOCKETS_ENABLED: 'true' PUBLIC_URL: ${DIRECTUS_URL:-https://cms.klz-cables.com} HOST: '0.0.0.0' networks: - infra volumes: - ./directus/uploads:/directus/uploads - ./directus/extensions:/directus/extensions - ./directus/schema:/directus/schema - ./directus/migrations:/directus/migrations healthcheck: disable: true labels: - "traefik.enable=true" - "traefik.http.routers.klz-cms.rule=Host(`${DIRECTUS_HOST:-cms.klz-cables.com}`)" - "traefik.http.routers.klz-cms.entrypoints=websecure" - "traefik.http.routers.klz-cms.priority=5000" - "traefik.http.routers.klz-cms.tls=true" - "traefik.http.routers.klz-cms.tls.certresolver=le" - "traefik.http.routers.klz-cms.service=klz-cms-svc" - "traefik.http.services.klz-cms-svc.loadbalancer.server.port=8055" - "traefik.docker.network=infra" - "caddy=http://${DIRECTUS_HOST:-cms.klz-cables.com}" - "caddy.reverse_proxy={{upstreams 8055}}" klz-db: image: postgres:15-alpine restart: unless-stopped env_file: - ${ENV_FILE:-.env} environment: POSTGRES_DB: ${DIRECTUS_DB_NAME:-directus} POSTGRES_USER: ${DIRECTUS_DB_USER:-directus} POSTGRES_PASSWORD: ${DIRECTUS_DB_PASSWORD:-120in09oenaoinsd9iaidon} volumes: - directus-db-data:/var/lib/postgresql/data networks: - infra networks: default: name: ${PROJECT_NAME:-klz-cables}-internal infra: external: true volumes: directus-db-data: