mirror of
https://github.com/pomerium/pomerium.git
synced 2025-04-28 18:06:34 +02:00
ci: rename master to main (#3045)
Co-authored-by: alexfornuto <afornuto@pomerium.com>
This commit is contained in:
parent
1238fa86b7
commit
0b0fba06b3
69 changed files with 165 additions and 165 deletions
|
@ -1,8 +1,8 @@
|
|||
name: Docker Master
|
||||
name: Docker Main
|
||||
on:
|
||||
push:
|
||||
branches:
|
||||
- master
|
||||
- main
|
||||
|
||||
jobs:
|
||||
publish:
|
||||
|
@ -34,7 +34,8 @@ jobs:
|
|||
run: |
|
||||
IMAGE=pomerium/pomerium
|
||||
SHA_TAG=git-${GITHUB_SHA::8}
|
||||
TAGS=${IMAGE}:master
|
||||
TAGS=${IMAGE}:main
|
||||
TAGS=${TAGS},${IMAGE}:master
|
||||
TAGS=${TAGS},${IMAGE}:${SHA_TAG}
|
||||
TS=$(date +%Y%m%d%H%M%S)
|
||||
echo ::set-output name=tags::${TAGS}
|
||||
|
@ -43,7 +44,7 @@ jobs:
|
|||
echo ::set-output name=image::${IMAGE}
|
||||
echo ::set-output name=sha-tag::${SHA_TAG}
|
||||
|
||||
- name: Docker Publish - Master
|
||||
- name: Docker Publish - Main
|
||||
uses: docker/build-push-action@v2
|
||||
with:
|
||||
context: .
|
||||
|
@ -92,7 +93,6 @@ jobs:
|
|||
- name: Commit changes
|
||||
uses: stefanzweifel/git-auto-commit-action@v4
|
||||
with:
|
||||
branch: master
|
||||
commit_message: |
|
||||
Bump test environment pomerium/pomerium
|
||||
Image tag: ${{ needs.publish.outputs.sha-tag }}
|
2
.github/workflows/test.yaml
vendored
2
.github/workflows/test.yaml
vendored
|
@ -1,7 +1,7 @@
|
|||
on:
|
||||
push:
|
||||
branches:
|
||||
- master
|
||||
- main
|
||||
pull_request:
|
||||
|
||||
name: Test
|
||||
|
|
|
@ -4,7 +4,7 @@
|
|||
[](https://github.com/pomerium/pomerium/actions?query=workflow%3ARelease)
|
||||
[](https://goreportcard.com/report/github.com/pomerium/pomerium)
|
||||
[][godocs]
|
||||
[](https://github.com/pomerium/pomerium/blob/master/LICENSE)
|
||||
[](https://github.com/pomerium/pomerium/blob/main/LICENSE)
|
||||

|
||||
|
||||
Pomerium is an identity-aware proxy that enables secure access to internal applications. Pomerium provides a standardized interface to add access control to applications regardless of whether the application itself has authorization or authentication baked-in. Pomerium gateways both internal and external requests, and can be used in situations where you'd typically reach for a VPN.
|
||||
|
|
|
@ -7,7 +7,7 @@
|
|||
5. Update vuepress branch config in `config.js`
|
||||
1. Set new default text nav
|
||||
2. Add new branch to item list
|
||||
6. Create a new release branch for major/minor releases, eg `0-15-0`, off master. Patch releases use existing release branches.
|
||||
6. Create a new release branch for major/minor releases, eg `0-15-0`, off main. Patch releases use existing release branches.
|
||||
7. Create Github release with name and tag matching `v[version]` on the appropriate release branch.
|
||||
8. Copy/paste changelog from generated output into Github release notes
|
||||
9. GH automation should take it from there and build/upload artifacts
|
||||
|
@ -24,13 +24,13 @@ The changelog will be written to changelog.out
|
|||
## Major/minor release example
|
||||
|
||||
```bash
|
||||
GITHUB_TOKEN=XXXXXX ./changelog.sh v0.14.0 v0.15.0 master changelog.out
|
||||
GITHUB_TOKEN=XXXXXX ./changelog.sh v0.14.0 v0.15.0 main changelog.out
|
||||
```
|
||||
|
||||
## Patch release example
|
||||
|
||||
```bash
|
||||
GITHUB_TOKEN=XXXXXX ./changelog.sh v0.14.6 v0.14.7 master changelog.out
|
||||
GITHUB_TOKEN=XXXXXX ./changelog.sh v0.14.6 v0.14.7 main changelog.out
|
||||
```
|
||||
|
||||
# Release branches
|
||||
|
|
|
@ -65,7 +65,7 @@ module.exports = {
|
|||
text: "v0.16.x", // current tagged version
|
||||
ariaLabel: "Version menu",
|
||||
items: [
|
||||
{ text: "🚧Dev", link: "https://master.docs.pomerium.io/docs" },
|
||||
{ text: "🚧Dev", link: "https://main.docs.pomerium.io/docs" },
|
||||
{ text: "v0.16.x", link: "https://0-16-0.docs.pomerium.io/docs" },
|
||||
{ text: "v0.15.x", link: "https://0-15-0.docs.pomerium.io/docs" },
|
||||
{ text: "v0.14.x", link: "https://0-14-0.docs.pomerium.io/docs" },
|
||||
|
|
|
@ -58,7 +58,7 @@ export default {
|
|||
const {
|
||||
repo,
|
||||
docsDir = '',
|
||||
docsBranch = 'master',
|
||||
docsBranch = 'main',
|
||||
docsRepo = repo
|
||||
} = this.$site.themeConfig
|
||||
|
||||
|
|
|
@ -116,7 +116,7 @@ In general, Pomerium follows [Go's security policy](https://golang.org/security)
|
|||
1. Once the security report is received it is assigned a primary handler. This person coordinates the fix and release process.
|
||||
2. The issue is confirmed and a list of affected software is determined.
|
||||
3. Code is audited to find any potential similar problems.
|
||||
4. Fixes are prepared for the most recent major releases and the head/master revision.
|
||||
4. Fixes are prepared for the most recent major releases and the head/main revision.
|
||||
5. When the fixes are applied, announcements are sent to [pomerium-announce](https://groups.google.com/g/pomerium-announce).
|
||||
|
||||
This process can take some time. Every effort will be made to handle the bug in as timely a manner as possible, however it's important that we follow the process described above to ensure that disclosures are handled consistently.
|
||||
|
|
|
@ -19,7 +19,7 @@ Use Pomerium as a first-class secure-by-default Ingress Controller. The Pomerium
|
|||
### System Requirements
|
||||
|
||||
- Kubernetes v1.19.0+
|
||||
- Pomerium [Helm Chart](https://github.com/pomerium/pomerium-helm/tree/master/charts/pomerium) v25.0.0+
|
||||
- Pomerium [Helm Chart](https://github.com/pomerium/pomerium-helm/tree/main/charts/pomerium) v25.0.0+
|
||||
|
||||
### Limitations
|
||||
|
||||
|
@ -47,18 +47,18 @@ You may deploy the Ingress controller from your own manifests by using the `pome
|
|||
|
||||
## Configuration
|
||||
|
||||
| Flag | Description |
|
||||
| ------------------------------ | -------------------------------------------------------------------- |
|
||||
| `--databroker-service-url` | The databroker service url
|
||||
| `--databroker-tls-ca` | `base64` encoded TLS CA
|
||||
| `--databroker-tls-ca-file` | TLS CA file path for the databroker connection connection
|
||||
| `--health-probe-bind-address` | The address the probe endpoint binds to. (default ":8081")
|
||||
| `--metrics-bind-address` | The address the metric endpoint binds to. (default ":8080")
|
||||
| `--name` | IngressClass controller name (default "pomerium.io/ingress-controller")
|
||||
| `--namespaces` | Namespaces to watch, omit to watch all namespaces
|
||||
| `--prefix` | Ingress annotation prefix (default "ingress.pomerium.io")
|
||||
| `--shared-secret` | `base64` encoded shared secret for communicating with databroker
|
||||
| `--update-status-from-service` | Update ingress status from given service status (pomerium-proxy)|
|
||||
| Flag | Description |
|
||||
| ------------------------------ | ----------------------------------------------------------------------- |
|
||||
| `--databroker-service-url` | The databroker service url |
|
||||
| `--databroker-tls-ca` | `base64` encoded TLS CA |
|
||||
| `--databroker-tls-ca-file` | TLS CA file path for the databroker connection connection |
|
||||
| `--health-probe-bind-address` | The address the probe endpoint binds to. (default ":8081") |
|
||||
| `--metrics-bind-address` | The address the metric endpoint binds to. (default ":8080") |
|
||||
| `--name` | IngressClass controller name (default "pomerium.io/ingress-controller") |
|
||||
| `--namespaces` | Namespaces to watch, omit to watch all namespaces |
|
||||
| `--prefix` | Ingress annotation prefix (default "ingress.pomerium.io") |
|
||||
| `--shared-secret` | `base64` encoded shared secret for communicating with databroker |
|
||||
| `--update-status-from-service` | Update ingress status from given service status (pomerium-proxy) |
|
||||
|
||||
The helm chart exposes a subset of these flags for appropriate customization.
|
||||
|
||||
|
@ -160,13 +160,13 @@ Most configuration keys in non-Kubernetes deployments can be specified as annota
|
|||
|
||||
The remaining annotations are specific to or behave differently than they do when using Pomerium without the Ingress Controller:
|
||||
|
||||
| Annotation | Description |
|
||||
| --------------------------------- | ------------------------------------------------------------------------------------------- |
|
||||
| `ingress.pomerium.io/tls_custom_ca_secret` | Name of Kubernetes `tls` Secret containing a custom [CA certificate][`tls_custom_ca_secret`] for the upstream. |
|
||||
| `ingress.pomerium.io/tls_client_secret` | Name of Kubernetes `tls` Secret containing a [client certificate][tls_client_certificate] for connecting to the upstream. |
|
||||
| `ingress.pomerium.io/tls_downstream_client_ca_secret` | Name of Kubernetes `tls` Secret containing a [Client CA][client-certificate-authority] for validating downstream clients. |
|
||||
| `ingress.pomerium.io/secure_upstream` | When set to `"true"`, use `https` when connecting to the upstream endpoint. |
|
||||
| `ingress.pomerium.io/path_regex` | When set to `"true"` enables path regex matching. See the [Regular Expressions Path Matching](#regular-expressions-path-matching) section for more information. |
|
||||
| Annotation | Description |
|
||||
| ----------------------------------------------------- | --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- |
|
||||
| `ingress.pomerium.io/tls_custom_ca_secret` | Name of Kubernetes `tls` Secret containing a custom [CA certificate][`tls_custom_ca_secret`] for the upstream. |
|
||||
| `ingress.pomerium.io/tls_client_secret` | Name of Kubernetes `tls` Secret containing a [client certificate][tls_client_certificate] for connecting to the upstream. |
|
||||
| `ingress.pomerium.io/tls_downstream_client_ca_secret` | Name of Kubernetes `tls` Secret containing a [Client CA][client-certificate-authority] for validating downstream clients. |
|
||||
| `ingress.pomerium.io/secure_upstream` | When set to `"true"`, use `https` when connecting to the upstream endpoint. |
|
||||
| `ingress.pomerium.io/path_regex` | When set to `"true"` enables path regex matching. See the [Regular Expressions Path Matching](#regular-expressions-path-matching) section for more information. |
|
||||
| `ingress.pomerium.io/service_proxy_upstream` | When set to `"true"` forces Pomerium to connect to upstreams through the k8s service proxy, and not individual endpoints. <br/> This is useful when deploying Pomerium inside a service mesh. |
|
||||
|
||||
::: tip
|
||||
|
@ -372,7 +372,7 @@ If your domain has [HSTS] enabled and you visit an endpoint while Pomerium is us
|
|||
For more information on the Pomerium Ingress Controller or the Kubernetes concepts discussed, see:
|
||||
|
||||
- [Ingress (Kubernetes Docs)](https://kubernetes.io/docs/concepts/services-networking/ingress/)
|
||||
- [Pomerium Helm Chart README: Pomerium Ingress Controller](https://github.com/travisgroth/pomerium-helm/tree/master/charts/pomerium#pomerium-ingress-controller)
|
||||
- [Pomerium Helm Chart README: Pomerium Ingress Controller](https://github.com/pomerium/pomerium-helm/tree/main/charts/pomerium#pomerium-ingress-controller)
|
||||
- [Pomerium Kubernetes Ingress Controller (code repository)](https://github.com/pomerium/ingress-controller)
|
||||
|
||||
[`ingress.pomerium.io/allow_any_authenticated_user`]: /reference/readme.md#allow-any-authenticated-user
|
||||
|
|
|
@ -80,10 +80,10 @@ Pomerium utilizes a [minimal](https://github.com/GoogleContainerTools/distroless
|
|||
v0.2.0+87e214b
|
||||
```
|
||||
|
||||
- `:master` : which will pull an image in sync with git's [master](https://github.com/pomerium/pomerium/tree/master) branch.
|
||||
- `:main` : which will pull an image in sync with git's [main](https://github.com/pomerium/pomerium/tree/main) branch.
|
||||
|
||||
```bash{1}
|
||||
docker pull pomerium/pomerium:master
|
||||
docker pull pomerium/pomerium:main
|
||||
```
|
||||
|
||||
Rootless images for official releases are also published to provide additional security. In these images, Pomerium runs as the `nonroot` user. Depending on your deployment environment, you may need to grant the container additional [capabilities](https://linux-audit.com/linux-capabilities-hardening-linux-binaries-by-removing-setuid/) or change the listening port from `443`.
|
||||
|
@ -106,7 +106,7 @@ helm repo add pomerium https://helm.pomerium.io
|
|||
helm install pomerium/pomerium
|
||||
```
|
||||
|
||||
See the [README](https://github.com/pomerium/pomerium-helm/blob/master/charts/pomerium/README.md) for up to date install options.
|
||||
See the [README](https://github.com/pomerium/pomerium-helm/blob/main/charts/pomerium/README.md) for up to date install options.
|
||||
|
||||
### Source
|
||||
|
||||
|
|
|
@ -51,7 +51,7 @@ Some clients, like Remmina, support running commands before and after connection
|
|||
|
||||
```bash
|
||||
cd ~/
|
||||
wget https://github.com/pomerium/pomerium/blob/master/examples/tcp/pomerium-tunnel.sh
|
||||
wget https://github.com/pomerium/pomerium/blob/main/examples/tcp/pomerium-tunnel.sh
|
||||
chmod +x pomerium-tunnel.sh
|
||||
```
|
||||
|
||||
|
|
|
@ -18,15 +18,15 @@ To secure your app with signed headers, you'll need the following:
|
|||
|
||||
If a [signing key] is set, the user's associated identity information will be included in a signed attestation JWT that will be added to each requests's upstream header `X-Pomerium-Jwt-Assertion`. You should verify that the JWT contains at least the following claims:
|
||||
|
||||
[JWT] | description
|
||||
:------: | -----------------------------------------------------------------------------------------
|
||||
`exp` | Expiration time in seconds since the UNIX epoch. Allow 1 minute for skew.
|
||||
`iat` | Issued-at time in seconds since the UNIX epoch. Allow 1 minute for skew.
|
||||
`aud` | The client's final domain e.g. `httpbin.corp.example.com`.
|
||||
`iss` | Issuer must be the URL of your authentication domain e.g. `authenticate.corp.example`.
|
||||
`sub` | Subject is the user's id. Can be used instead of the `X-Pomerium-Claim-Sub` header.
|
||||
`email` | Email is the user's email. Can be used instead of the `X-Pomerium-Claim-Email` header.
|
||||
`groups` | Groups is the user's groups. Can be used instead of the `X-Pomerium-Claim-Groups` header.
|
||||
| [JWT] | description |
|
||||
| :------: | ----------------------------------------------------------------------------------------- |
|
||||
| `exp` | Expiration time in seconds since the UNIX epoch. Allow 1 minute for skew. |
|
||||
| `iat` | Issued-at time in seconds since the UNIX epoch. Allow 1 minute for skew. |
|
||||
| `aud` | The client's final domain e.g. `httpbin.corp.example.com`. |
|
||||
| `iss` | Issuer must be the URL of your authentication domain e.g. `authenticate.corp.example`. |
|
||||
| `sub` | Subject is the user's id. Can be used instead of the `X-Pomerium-Claim-Sub` header. |
|
||||
| `email` | Email is the user's email. Can be used instead of the `X-Pomerium-Claim-Email` header. |
|
||||
| `groups` | Groups is the user's groups. Can be used instead of the `X-Pomerium-Claim-Groups` header. |
|
||||
|
||||
The attestation JWT's signature can be verified using the public key which can be retrieved at Pomerium's `/.well-known/pomerium/jwks.json` endpoint which lives on the authenticate service. A `jwks_uri` is useful when integrating with other systems like [istio](https://istio.io/docs/reference/config/security/istio.authentication.v1alpha1/). For example:
|
||||
|
||||
|
@ -120,7 +120,7 @@ In the future, we will add implementations for:
|
|||
- .NET
|
||||
|
||||
[developer tools]: https://developers.google.com/web/tools/chrome-devtools/open
|
||||
[docker-compose.yml]: https://github.com/pomerium/pomerium/blob/master/docker-compose.yml
|
||||
[docker-compose.yml]: https://github.com/pomerium/pomerium/blob/main/docker-compose.yml
|
||||
[httpbin]: https://httpbin.org/
|
||||
[jwt]: https://jwt.io/introduction/
|
||||
[jwt.io]: https://jwt.io/
|
||||
|
|
|
@ -196,7 +196,7 @@ There are two [storage backend types] available: `memory` or `redis`. You can se
|
|||
|
||||
#### Memory Storage Backend
|
||||
|
||||
For `memory` storage, restarting the cache service will result in all users having to re-login. Code for the in-memory database used by the cache service can be found here: [internal/databroker/memory](https://github.com/pomerium/pomerium/tree/master/internal/databroker/memory).
|
||||
For `memory` storage, restarting the cache service will result in all users having to re-login. Code for the in-memory database used by the cache service can be found here: [internal/databroker/memory](https://github.com/pomerium/pomerium/tree/main/internal/databroker/memory).
|
||||
|
||||
:::warning
|
||||
|
||||
|
@ -212,8 +212,8 @@ In production deployments, we recommend using the `redis` storage backend. Unlik
|
|||
|
||||
Please see the following interfaces for reference to implement your storage backend interface.
|
||||
|
||||
- [databroker gRPC interface](https://github.com/pomerium/pomerium/blob/master/pkg/grpc/databroker/databroker.proto)
|
||||
- [storage backend interface](https://github.com/pomerium/pomerium/blob/master/pkg/storage/storage.go)
|
||||
- [databroker gRPC interface](https://github.com/pomerium/pomerium/blob/main/pkg/grpc/databroker/databroker.proto)
|
||||
- [storage backend interface](https://github.com/pomerium/pomerium/blob/main/pkg/storage/storage.go)
|
||||
|
||||
### Identity headers
|
||||
|
||||
|
|
|
@ -11,7 +11,7 @@ description: >-
|
|||
|
||||
# Securing Cloud Run endpoints
|
||||
|
||||
This recipe's sources can be found [on github](https://github.com/pomerium/pomerium/tree/master/examples/cloudrun)
|
||||
This recipe's sources can be found [on github](https://github.com/pomerium/pomerium/tree/main/examples/cloudrun)
|
||||
|
||||
## Background
|
||||
|
||||
|
@ -38,7 +38,7 @@ This guide assumes you have Editor access to a Google Cloud project which can be
|
|||
|
||||
To deploy Pomerium to Cloud Run securely and easily, a special [image](https://console.cloud.google.com/gcr/images/pomerium-io/GLOBAL/pomerium) is available at `gcr.io/pomerium-io/pomerium:[version]-cloudrun`. It allows sourcing configuration from GCP Secrets Manager, and sets some defaults for Cloud Run to keep configuration minimal. We will be leveraging it in this example to store IdP credentials. Our policy contains no secrets so we can place it directly in an ENV var.
|
||||
|
||||
[Dockerfile](https://github.com/pomerium/pomerium/blob/master/.github/Dockerfile-cloudrun) Based on [vals-entrypoint](https://github.com/pomerium/vals-entrypoint)
|
||||
[Dockerfile](https://github.com/pomerium/pomerium/blob/main/.github/Dockerfile-cloudrun) Based on [vals-entrypoint](https://github.com/pomerium/vals-entrypoint)
|
||||
|
||||
The image expects a config file at `/pomerium/config.yaml`. Set `VALS_FILES=[secretref]:/pomerium/config.yaml` and set any other Pomerium Environment Variables directly or with secret refs such as `ref+gcpsecrets://PROJECT/SECRET(#/key])`.
|
||||
|
||||
|
|
|
@ -19,7 +19,7 @@ In this guide, we'll demonstrate how to configure Pomerium and Istio in a Kubern
|
|||
## Before You Begin
|
||||
|
||||
- You will need a Kubernetes environment with Istio installed. Refer to their [Getting Started](https://istio.io/latest/docs/setup/getting-started/) guide for more information.
|
||||
- This configuration uses the Pomerium Ingress Controller for [north-south traffic]. This guide uses our [Helm chart](https://github.com/pomerium/pomerium-helm/tree/master/charts/pomerium) as detailed in [Install Pomerium using Helm]. We'll cover the values needed to configure the controller with an Istio service mesh, but you can refer to the [documentation][Pomerium Ingress Controller] for a complete overview of the controller spec.
|
||||
- This configuration uses the Pomerium Ingress Controller for [north-south traffic]. This guide uses our [Helm chart](https://github.com/pomerium/pomerium-helm/tree/main/charts/pomerium) as detailed in [Install Pomerium using Helm]. We'll cover the values needed to configure the controller with an Istio service mesh, but you can refer to the [documentation][Pomerium Ingress Controller] for a complete overview of the controller spec.
|
||||
|
||||
## How it Works
|
||||
|
||||
|
|
|
@ -11,7 +11,7 @@ description: >-
|
|||
|
||||
# Securing Nginx
|
||||
|
||||
This recipe's sources can be found [on github](https://github.com/pomerium/pomerium/tree/master/examples/nginx)
|
||||
This recipe's sources can be found [on github](https://github.com/pomerium/pomerium/tree/main/examples/nginx)
|
||||
|
||||
At the end, you will have a locally running install of [verify](https://verify.pomerium.com/) behind nginx with policy enforced by Pomerium.
|
||||
|
||||
|
@ -36,7 +36,7 @@ This recipe is designed to run on a local docker-compose instance. The included
|
|||
|
||||
- docker
|
||||
- docker-compose
|
||||
- A copy of the [example repo](https://github.com/pomerium/pomerium/tree/master/examples/nginx) checked out
|
||||
- A copy of the [example repo](https://github.com/pomerium/pomerium/tree/main/examples/nginx) checked out
|
||||
- Valid credentials for your OIDC provider
|
||||
- (Optional) `mkcert` to generate locally trusted certificates
|
||||
|
||||
|
|
|
@ -12,7 +12,7 @@ description: >-
|
|||
|
||||
The following guide demonstrates how to use Pomerium's [TCP Proxying](/docs/tcp/readme.md) support with various TCP services such as databases and other non-HTTP protocols. It also covers integration points with them when possible.
|
||||
|
||||
The source files from this guide can be found on [GitHub](https://github.com/pomerium/pomerium/tree/master/examples/tcp/).
|
||||
The source files from this guide can be found on [GitHub](https://github.com/pomerium/pomerium/tree/main/examples/tcp/).
|
||||
|
||||
## Background
|
||||
|
||||
|
@ -37,7 +37,7 @@ This recipe is designed to run on a local docker-compose instance. The included
|
|||
|
||||
* docker
|
||||
* docker-compose
|
||||
* A copy of the [example repo](https://github.com/pomerium/pomerium/tree/master/examples/tcp/) checked out
|
||||
* A copy of the [example repo](https://github.com/pomerium/pomerium/tree/main/examples/tcp/) checked out
|
||||
* Valid credentials for your OIDC provider
|
||||
* The [Pomerium Client](/docs/releases.md#pomerium-cli) installed
|
||||
* (Optional) `mkcert` to generate locally trusted certificates
|
||||
|
|
|
@ -10,7 +10,7 @@ description: >-
|
|||
|
||||
# Securing Traefik Ingress
|
||||
|
||||
This guide's sources can be found [on github](https://github.com/pomerium/pomerium/tree/master/examples/traefik-ingress).
|
||||
This guide's sources can be found [on github](https://github.com/pomerium/pomerium/tree/main/examples/traefik-ingress).
|
||||
|
||||
At the end, you will have an install of a hello-world app proxied by [Traefik](https://containo.us/traefik/) with authorization policy enforced by Pomerium.
|
||||
|
||||
|
@ -37,7 +37,7 @@ For more information on using Pomerium as an external authorization endpoint, se
|
|||
|
||||
- Access to a Kubernetes cluster
|
||||
- [Helm](https://helm.sh/) (already initialized if using helm v2)
|
||||
- A copy of the [example repo](https://github.com/pomerium/pomerium/tree/master/examples/traefik-ingress) checked out
|
||||
- A copy of the [example repo](https://github.com/pomerium/pomerium/tree/main/examples/traefik-ingress) checked out
|
||||
- Valid credentials for your OIDC provider
|
||||
- (Optional) `mkcert` to generate locally trusted certificates
|
||||
|
||||
|
|
|
@ -1088,11 +1088,11 @@ By default, the `databroker` service uses an in-memory databroker.
|
|||
|
||||
To create your own data broker, implement the following gRPC interface:
|
||||
|
||||
- [pkg/grpc/databroker/databroker.proto](https://github.com/pomerium/pomerium/blob/master/pkg/grpc/databroker/databroker.proto)
|
||||
- [pkg/grpc/databroker/databroker.proto](https://github.com/pomerium/pomerium/blob/main/pkg/grpc/databroker/databroker.proto)
|
||||
|
||||
For an example implementation, the in-memory database used by the databroker service can be found here:
|
||||
|
||||
- [pkg/databroker/memory](https://github.com/pomerium/pomerium/tree/master/pkg/databroker/memory)
|
||||
- [pkg/databroker/memory](https://github.com/pomerium/pomerium/tree/main/pkg/databroker/memory)
|
||||
|
||||
|
||||
### Data Broker Internal Service URL
|
||||
|
@ -1669,7 +1669,7 @@ See [Client-Side mTLS With Pomerium](/guides/mtls.md) for more information.
|
|||
|
||||
If specified, Pomerium will present this client certificate to upstream services when requested to enforce [mutual authentication](https://en.wikipedia.org/wiki/Mutual_authentication) (mTLS).
|
||||
|
||||
For more details, see our [mTLS example repository](https://github.com/pomerium/pomerium/tree/master/examples/mutual-tls) and the [Upstream mTLS With Pomerium](/guides/upstream-mtls.md) guide.
|
||||
For more details, see our [mTLS example repository](https://github.com/pomerium/pomerium/tree/main/examples/mutual-tls) and the [Upstream mTLS With Pomerium](/guides/upstream-mtls.md) guide.
|
||||
|
||||
|
||||
### Pass Identity Headers
|
||||
|
@ -1802,7 +1802,7 @@ Signing Key is the private key used to sign a user's attestation JWT which can b
|
|||
|
||||
If set, the signing key's public key will can retrieved by hitting Pomerium's `/.well-known/pomerium/jwks.json` endpoint which lives on the authenticate service. Otherwise, the endpoint will return an empty keyset.
|
||||
|
||||
For example, assuming you have [generated an ES256 key](https://github.com/pomerium/pomerium/blob/master/scripts/generate_self_signed_signing_key.sh) as follows.
|
||||
For example, assuming you have [generated an ES256 key](https://github.com/pomerium/pomerium/blob/main/scripts/generate_self_signed_signing_key.sh) as follows.
|
||||
|
||||
```bash
|
||||
# Generates an P-256 (ES256) signing key
|
||||
|
@ -1844,7 +1844,7 @@ If no certificate is specified, one will be generated and the base64'd public ke
|
|||
[letsencrypt]: https://letsencrypt.org/
|
||||
[oidc rfc]: https://openid.net/specs/openid-connect-core-1_0.html#AuthRequest
|
||||
[okta]: /docs/identity-providers/okta.md
|
||||
[script]: https://github.com/pomerium/pomerium/blob/master/scripts/generate_wildcard_cert.sh
|
||||
[script]: https://github.com/pomerium/pomerium/blob/main/scripts/generate_wildcard_cert.sh
|
||||
[signed headers]: /docs/topics/getting-users-identity.md
|
||||
[toml]: https://en.wikipedia.org/wiki/TOML
|
||||
[yaml]: https://en.wikipedia.org/wiki/YAML
|
||||
|
|
|
@ -34,7 +34,7 @@ postamble: |
|
|||
[letsencrypt]: https://letsencrypt.org/
|
||||
[oidc rfc]: https://openid.net/specs/openid-connect-core-1_0.html#AuthRequest
|
||||
[okta]: /docs/identity-providers/okta.md
|
||||
[script]: https://github.com/pomerium/pomerium/blob/master/scripts/generate_wildcard_cert.sh
|
||||
[script]: https://github.com/pomerium/pomerium/blob/main/scripts/generate_wildcard_cert.sh
|
||||
[signed headers]: /docs/topics/getting-users-identity.md
|
||||
[toml]: https://en.wikipedia.org/wiki/TOML
|
||||
[yaml]: https://en.wikipedia.org/wiki/YAML
|
||||
|
@ -1221,11 +1221,11 @@ settings:
|
|||
|
||||
To create your own data broker, implement the following gRPC interface:
|
||||
|
||||
- [pkg/grpc/databroker/databroker.proto](https://github.com/pomerium/pomerium/blob/master/pkg/grpc/databroker/databroker.proto)
|
||||
- [pkg/grpc/databroker/databroker.proto](https://github.com/pomerium/pomerium/blob/main/pkg/grpc/databroker/databroker.proto)
|
||||
|
||||
For an example implementation, the in-memory database used by the databroker service can be found here:
|
||||
|
||||
- [pkg/databroker/memory](https://github.com/pomerium/pomerium/tree/master/pkg/databroker/memory)
|
||||
- [pkg/databroker/memory](https://github.com/pomerium/pomerium/tree/main/pkg/databroker/memory)
|
||||
- name: "Data Broker Internal Service URL"
|
||||
keys: ["databroker_internal_service_url"]
|
||||
attributes: |
|
||||
|
@ -1823,7 +1823,7 @@ settings:
|
|||
doc: |
|
||||
If specified, Pomerium will present this client certificate to upstream services when requested to enforce [mutual authentication](https://en.wikipedia.org/wiki/Mutual_authentication) (mTLS).
|
||||
|
||||
For more details, see our [mTLS example repository](https://github.com/pomerium/pomerium/tree/master/examples/mutual-tls) and the [Upstream mTLS With Pomerium](/guides/upstream-mtls.md) guide.
|
||||
For more details, see our [mTLS example repository](https://github.com/pomerium/pomerium/tree/main/examples/mutual-tls) and the [Upstream mTLS With Pomerium](/guides/upstream-mtls.md) guide.
|
||||
- name: "Pass Identity Headers"
|
||||
keys: ["pass_identity_headers"]
|
||||
attributes: |
|
||||
|
@ -1960,7 +1960,7 @@ settings:
|
|||
|
||||
If set, the signing key's public key will can retrieved by hitting Pomerium's `/.well-known/pomerium/jwks.json` endpoint which lives on the authenticate service. Otherwise, the endpoint will return an empty keyset.
|
||||
|
||||
For example, assuming you have [generated an ES256 key](https://github.com/pomerium/pomerium/blob/master/scripts/generate_self_signed_signing_key.sh) as follows.
|
||||
For example, assuming you have [generated an ES256 key](https://github.com/pomerium/pomerium/blob/main/scripts/generate_self_signed_signing_key.sh) as follows.
|
||||
|
||||
```bash
|
||||
# Generates an P-256 (ES256) signing key
|
||||
|
|
|
@ -27,7 +27,7 @@ spec:
|
|||
app: pomerium-authenticate
|
||||
spec:
|
||||
containers:
|
||||
- image: pomerium/pomerium:master
|
||||
- image: pomerium/pomerium:main
|
||||
name: pomerium-authenticate
|
||||
args:
|
||||
- --config=/etc/pomerium/config.yaml
|
||||
|
|
|
@ -27,7 +27,7 @@ spec:
|
|||
app: pomerium-authorize
|
||||
spec:
|
||||
containers:
|
||||
- image: pomerium/pomerium:master
|
||||
- image: pomerium/pomerium:main
|
||||
name: pomerium-authorize
|
||||
args:
|
||||
- --config=/etc/pomerium/config.yaml
|
||||
|
|
|
@ -28,7 +28,7 @@ spec:
|
|||
app: pomerium-databroker
|
||||
spec:
|
||||
containers:
|
||||
- image: pomerium/pomerium:master
|
||||
- image: pomerium/pomerium:main
|
||||
name: pomerium-databroker
|
||||
args:
|
||||
- --config=/etc/pomerium/config.yaml
|
||||
|
|
|
@ -29,7 +29,7 @@ spec:
|
|||
app: pomerium-proxy
|
||||
spec:
|
||||
containers:
|
||||
- image: pomerium/pomerium:master
|
||||
- image: pomerium/pomerium:main
|
||||
name: pomerium-proxy
|
||||
args:
|
||||
- --config=/etc/pomerium/config.yaml
|
||||
|
|
|
@ -1,7 +1,7 @@
|
|||
version: "3"
|
||||
services:
|
||||
pomerium:
|
||||
image: pomerium/pomerium:master
|
||||
image: pomerium/pomerium:main
|
||||
volumes:
|
||||
- ./_wildcard.localhost.pomerium.io.pem:/pomerium/cert.pem:ro
|
||||
- ./_wildcard.localhost.pomerium.io-key.pem:/pomerium/key.pem:ro
|
||||
|
|
|
@ -8,7 +8,7 @@ services:
|
|||
- |
|
||||
set -x
|
||||
# the dev image is only available locally, so load it first
|
||||
if [ "${POMERIUM_TAG:-master}" = "dev" ]; then
|
||||
if [ "${POMERIUM_TAG:-main}" = "dev" ]; then
|
||||
sh -c '
|
||||
while true ; do
|
||||
ctr --connect-timeout=1s --timeout=60s images import /k3s-tmp/pomerium-dev.tar && break
|
||||
|
@ -200,7 +200,7 @@ services:
|
|||
"value": "ES256"
|
||||
}
|
||||
],
|
||||
"image": "pomerium/pomerium:${POMERIUM_TAG:-master}",
|
||||
"image": "pomerium/pomerium:${POMERIUM_TAG:-main}",
|
||||
"imagePullPolicy": "IfNotPresent",
|
||||
"name": "pomerium",
|
||||
"ports": [
|
||||
|
@ -1012,7 +1012,7 @@ services:
|
|||
- |
|
||||
set -x
|
||||
# the dev image is only available locally, so load it first
|
||||
if [ "${POMERIUM_TAG:-master}" = "dev" ]; then
|
||||
if [ "${POMERIUM_TAG:-main}" = "dev" ]; then
|
||||
sh -c '
|
||||
while true ; do
|
||||
ctr --connect-timeout=1s --timeout=60s images import /k3s-tmp/pomerium-dev.tar && break
|
||||
|
|
|
@ -178,7 +178,7 @@ services:
|
|||
SHARED_SECRET: UYgnt8bxxK5G2sFaNzyqi5Z+OgF8m2akNc0xdQx718w=
|
||||
SIGNING_KEY: LS0tLS1CRUdJTiBFQyBQUklWQVRFIEtFWS0tLS0tCk1IY0NBUUVFSVBSR1d3TGg3NW5OWG5razM3ekRmTjhvbkx3ZkNpYUxQVEQrbmM4THg1aGNvQW9HQ0NxR1NNNDkKQXdFSG9VUURRZ0FFa3BCa08wVEttaDRKZFFmTE9lZU1kNTNLbmdhMVdkUVhyNUZjZXBrK2RMVktkVkt4WENHcQpoMW9qdWh1VzExR0lvT3pTOUdvU0tsTlZTUkZXVkVXRHZ3PT0KLS0tLS1FTkQgRUMgUFJJVkFURSBLRVktLS0tLQo=
|
||||
SIGNING_KEY_ALGORITHM: ES256
|
||||
image: pomerium/pomerium:${POMERIUM_TAG:-master}
|
||||
image: pomerium/pomerium:${POMERIUM_TAG:-main}
|
||||
networks:
|
||||
main:
|
||||
aliases:
|
||||
|
@ -237,7 +237,7 @@ services:
|
|||
SHARED_SECRET: UYgnt8bxxK5G2sFaNzyqi5Z+OgF8m2akNc0xdQx718w=
|
||||
SIGNING_KEY: LS0tLS1CRUdJTiBFQyBQUklWQVRFIEtFWS0tLS0tCk1IY0NBUUVFSVBSR1d3TGg3NW5OWG5razM3ekRmTjhvbkx3ZkNpYUxQVEQrbmM4THg1aGNvQW9HQ0NxR1NNNDkKQXdFSG9VUURRZ0FFa3BCa08wVEttaDRKZFFmTE9lZU1kNTNLbmdhMVdkUVhyNUZjZXBrK2RMVktkVkt4WENHcQpoMW9qdWh1VzExR0lvT3pTOUdvU0tsTlZTUkZXVkVXRHZ3PT0KLS0tLS1FTkQgRUMgUFJJVkFURSBLRVktLS0tLQo=
|
||||
SIGNING_KEY_ALGORITHM: ES256
|
||||
image: pomerium/pomerium:${POMERIUM_TAG:-master}
|
||||
image: pomerium/pomerium:${POMERIUM_TAG:-main}
|
||||
networks:
|
||||
main:
|
||||
aliases:
|
||||
|
@ -295,7 +295,7 @@ services:
|
|||
SHARED_SECRET: UYgnt8bxxK5G2sFaNzyqi5Z+OgF8m2akNc0xdQx718w=
|
||||
SIGNING_KEY: LS0tLS1CRUdJTiBFQyBQUklWQVRFIEtFWS0tLS0tCk1IY0NBUUVFSVBSR1d3TGg3NW5OWG5razM3ekRmTjhvbkx3ZkNpYUxQVEQrbmM4THg1aGNvQW9HQ0NxR1NNNDkKQXdFSG9VUURRZ0FFa3BCa08wVEttaDRKZFFmTE9lZU1kNTNLbmdhMVdkUVhyNUZjZXBrK2RMVktkVkt4WENHcQpoMW9qdWh1VzExR0lvT3pTOUdvU0tsTlZTUkZXVkVXRHZ3PT0KLS0tLS1FTkQgRUMgUFJJVkFURSBLRVktLS0tLQo=
|
||||
SIGNING_KEY_ALGORITHM: ES256
|
||||
image: pomerium/pomerium:${POMERIUM_TAG:-master}
|
||||
image: pomerium/pomerium:${POMERIUM_TAG:-main}
|
||||
networks:
|
||||
main:
|
||||
aliases:
|
||||
|
@ -353,7 +353,7 @@ services:
|
|||
SHARED_SECRET: UYgnt8bxxK5G2sFaNzyqi5Z+OgF8m2akNc0xdQx718w=
|
||||
SIGNING_KEY: LS0tLS1CRUdJTiBFQyBQUklWQVRFIEtFWS0tLS0tCk1IY0NBUUVFSVBSR1d3TGg3NW5OWG5razM3ekRmTjhvbkx3ZkNpYUxQVEQrbmM4THg1aGNvQW9HQ0NxR1NNNDkKQXdFSG9VUURRZ0FFa3BCa08wVEttaDRKZFFmTE9lZU1kNTNLbmdhMVdkUVhyNUZjZXBrK2RMVktkVkt4WENHcQpoMW9qdWh1VzExR0lvT3pTOUdvU0tsTlZTUkZXVkVXRHZ3PT0KLS0tLS1FTkQgRUMgUFJJVkFURSBLRVktLS0tLQo=
|
||||
SIGNING_KEY_ALGORITHM: ES256
|
||||
image: pomerium/pomerium:${POMERIUM_TAG:-master}
|
||||
image: pomerium/pomerium:${POMERIUM_TAG:-main}
|
||||
networks:
|
||||
main:
|
||||
aliases:
|
||||
|
|
|
@ -397,7 +397,7 @@ services:
|
|||
SHARED_SECRET: UYgnt8bxxK5G2sFaNzyqi5Z+OgF8m2akNc0xdQx718w=
|
||||
SIGNING_KEY: LS0tLS1CRUdJTiBFQyBQUklWQVRFIEtFWS0tLS0tCk1IY0NBUUVFSVBSR1d3TGg3NW5OWG5razM3ekRmTjhvbkx3ZkNpYUxQVEQrbmM4THg1aGNvQW9HQ0NxR1NNNDkKQXdFSG9VUURRZ0FFa3BCa08wVEttaDRKZFFmTE9lZU1kNTNLbmdhMVdkUVhyNUZjZXBrK2RMVktkVkt4WENHcQpoMW9qdWh1VzExR0lvT3pTOUdvU0tsTlZTUkZXVkVXRHZ3PT0KLS0tLS1FTkQgRUMgUFJJVkFURSBLRVktLS0tLQo=
|
||||
SIGNING_KEY_ALGORITHM: ES256
|
||||
image: pomerium/pomerium:${POMERIUM_TAG:-master}
|
||||
image: pomerium/pomerium:${POMERIUM_TAG:-main}
|
||||
networks:
|
||||
main:
|
||||
aliases:
|
||||
|
|
|
@ -172,7 +172,7 @@ services:
|
|||
SHARED_SECRET: UYgnt8bxxK5G2sFaNzyqi5Z+OgF8m2akNc0xdQx718w=
|
||||
SIGNING_KEY: LS0tLS1CRUdJTiBFQyBQUklWQVRFIEtFWS0tLS0tCk1IY0NBUUVFSVBSR1d3TGg3NW5OWG5razM3ekRmTjhvbkx3ZkNpYUxQVEQrbmM4THg1aGNvQW9HQ0NxR1NNNDkKQXdFSG9VUURRZ0FFa3BCa08wVEttaDRKZFFmTE9lZU1kNTNLbmdhMVdkUVhyNUZjZXBrK2RMVktkVkt4WENHcQpoMW9qdWh1VzExR0lvT3pTOUdvU0tsTlZTUkZXVkVXRHZ3PT0KLS0tLS1FTkQgRUMgUFJJVkFURSBLRVktLS0tLQo=
|
||||
SIGNING_KEY_ALGORITHM: ES256
|
||||
image: pomerium/pomerium:${POMERIUM_TAG:-master}
|
||||
image: pomerium/pomerium:${POMERIUM_TAG:-main}
|
||||
networks:
|
||||
main:
|
||||
aliases:
|
||||
|
|
|
@ -173,7 +173,7 @@ services:
|
|||
SHARED_SECRET: UYgnt8bxxK5G2sFaNzyqi5Z+OgF8m2akNc0xdQx718w=
|
||||
SIGNING_KEY: LS0tLS1CRUdJTiBFQyBQUklWQVRFIEtFWS0tLS0tCk1IY0NBUUVFSVBSR1d3TGg3NW5OWG5razM3ekRmTjhvbkx3ZkNpYUxQVEQrbmM4THg1aGNvQW9HQ0NxR1NNNDkKQXdFSG9VUURRZ0FFa3BCa08wVEttaDRKZFFmTE9lZU1kNTNLbmdhMVdkUVhyNUZjZXBrK2RMVktkVkt4WENHcQpoMW9qdWh1VzExR0lvT3pTOUdvU0tsTlZTUkZXVkVXRHZ3PT0KLS0tLS1FTkQgRUMgUFJJVkFURSBLRVktLS0tLQo=
|
||||
SIGNING_KEY_ALGORITHM: ES256
|
||||
image: pomerium/pomerium:${POMERIUM_TAG:-master}
|
||||
image: pomerium/pomerium:${POMERIUM_TAG:-main}
|
||||
networks:
|
||||
main:
|
||||
aliases:
|
||||
|
|
|
@ -8,7 +8,7 @@ services:
|
|||
- |
|
||||
set -x
|
||||
# the dev image is only available locally, so load it first
|
||||
if [ "${POMERIUM_TAG:-master}" = "dev" ]; then
|
||||
if [ "${POMERIUM_TAG:-main}" = "dev" ]; then
|
||||
sh -c '
|
||||
while true ; do
|
||||
ctr --connect-timeout=1s --timeout=60s images import /k3s-tmp/pomerium-dev.tar && break
|
||||
|
@ -200,7 +200,7 @@ services:
|
|||
"value": "ES256"
|
||||
}
|
||||
],
|
||||
"image": "pomerium/pomerium:${POMERIUM_TAG:-master}",
|
||||
"image": "pomerium/pomerium:${POMERIUM_TAG:-main}",
|
||||
"imagePullPolicy": "IfNotPresent",
|
||||
"name": "pomerium",
|
||||
"ports": [
|
||||
|
@ -1012,7 +1012,7 @@ services:
|
|||
- |
|
||||
set -x
|
||||
# the dev image is only available locally, so load it first
|
||||
if [ "${POMERIUM_TAG:-master}" = "dev" ]; then
|
||||
if [ "${POMERIUM_TAG:-main}" = "dev" ]; then
|
||||
sh -c '
|
||||
while true ; do
|
||||
ctr --connect-timeout=1s --timeout=60s images import /k3s-tmp/pomerium-dev.tar && break
|
||||
|
|
|
@ -178,7 +178,7 @@ services:
|
|||
SHARED_SECRET: UYgnt8bxxK5G2sFaNzyqi5Z+OgF8m2akNc0xdQx718w=
|
||||
SIGNING_KEY: LS0tLS1CRUdJTiBFQyBQUklWQVRFIEtFWS0tLS0tCk1IY0NBUUVFSVBSR1d3TGg3NW5OWG5razM3ekRmTjhvbkx3ZkNpYUxQVEQrbmM4THg1aGNvQW9HQ0NxR1NNNDkKQXdFSG9VUURRZ0FFa3BCa08wVEttaDRKZFFmTE9lZU1kNTNLbmdhMVdkUVhyNUZjZXBrK2RMVktkVkt4WENHcQpoMW9qdWh1VzExR0lvT3pTOUdvU0tsTlZTUkZXVkVXRHZ3PT0KLS0tLS1FTkQgRUMgUFJJVkFURSBLRVktLS0tLQo=
|
||||
SIGNING_KEY_ALGORITHM: ES256
|
||||
image: pomerium/pomerium:${POMERIUM_TAG:-master}
|
||||
image: pomerium/pomerium:${POMERIUM_TAG:-main}
|
||||
networks:
|
||||
main:
|
||||
aliases:
|
||||
|
@ -237,7 +237,7 @@ services:
|
|||
SHARED_SECRET: UYgnt8bxxK5G2sFaNzyqi5Z+OgF8m2akNc0xdQx718w=
|
||||
SIGNING_KEY: LS0tLS1CRUdJTiBFQyBQUklWQVRFIEtFWS0tLS0tCk1IY0NBUUVFSVBSR1d3TGg3NW5OWG5razM3ekRmTjhvbkx3ZkNpYUxQVEQrbmM4THg1aGNvQW9HQ0NxR1NNNDkKQXdFSG9VUURRZ0FFa3BCa08wVEttaDRKZFFmTE9lZU1kNTNLbmdhMVdkUVhyNUZjZXBrK2RMVktkVkt4WENHcQpoMW9qdWh1VzExR0lvT3pTOUdvU0tsTlZTUkZXVkVXRHZ3PT0KLS0tLS1FTkQgRUMgUFJJVkFURSBLRVktLS0tLQo=
|
||||
SIGNING_KEY_ALGORITHM: ES256
|
||||
image: pomerium/pomerium:${POMERIUM_TAG:-master}
|
||||
image: pomerium/pomerium:${POMERIUM_TAG:-main}
|
||||
networks:
|
||||
main:
|
||||
aliases:
|
||||
|
@ -295,7 +295,7 @@ services:
|
|||
SHARED_SECRET: UYgnt8bxxK5G2sFaNzyqi5Z+OgF8m2akNc0xdQx718w=
|
||||
SIGNING_KEY: LS0tLS1CRUdJTiBFQyBQUklWQVRFIEtFWS0tLS0tCk1IY0NBUUVFSVBSR1d3TGg3NW5OWG5razM3ekRmTjhvbkx3ZkNpYUxQVEQrbmM4THg1aGNvQW9HQ0NxR1NNNDkKQXdFSG9VUURRZ0FFa3BCa08wVEttaDRKZFFmTE9lZU1kNTNLbmdhMVdkUVhyNUZjZXBrK2RMVktkVkt4WENHcQpoMW9qdWh1VzExR0lvT3pTOUdvU0tsTlZTUkZXVkVXRHZ3PT0KLS0tLS1FTkQgRUMgUFJJVkFURSBLRVktLS0tLQo=
|
||||
SIGNING_KEY_ALGORITHM: ES256
|
||||
image: pomerium/pomerium:${POMERIUM_TAG:-master}
|
||||
image: pomerium/pomerium:${POMERIUM_TAG:-main}
|
||||
networks:
|
||||
main:
|
||||
aliases:
|
||||
|
@ -353,7 +353,7 @@ services:
|
|||
SHARED_SECRET: UYgnt8bxxK5G2sFaNzyqi5Z+OgF8m2akNc0xdQx718w=
|
||||
SIGNING_KEY: LS0tLS1CRUdJTiBFQyBQUklWQVRFIEtFWS0tLS0tCk1IY0NBUUVFSVBSR1d3TGg3NW5OWG5razM3ekRmTjhvbkx3ZkNpYUxQVEQrbmM4THg1aGNvQW9HQ0NxR1NNNDkKQXdFSG9VUURRZ0FFa3BCa08wVEttaDRKZFFmTE9lZU1kNTNLbmdhMVdkUVhyNUZjZXBrK2RMVktkVkt4WENHcQpoMW9qdWh1VzExR0lvT3pTOUdvU0tsTlZTUkZXVkVXRHZ3PT0KLS0tLS1FTkQgRUMgUFJJVkFURSBLRVktLS0tLQo=
|
||||
SIGNING_KEY_ALGORITHM: ES256
|
||||
image: pomerium/pomerium:${POMERIUM_TAG:-master}
|
||||
image: pomerium/pomerium:${POMERIUM_TAG:-main}
|
||||
networks:
|
||||
main:
|
||||
aliases:
|
||||
|
|
|
@ -397,7 +397,7 @@ services:
|
|||
SHARED_SECRET: UYgnt8bxxK5G2sFaNzyqi5Z+OgF8m2akNc0xdQx718w=
|
||||
SIGNING_KEY: LS0tLS1CRUdJTiBFQyBQUklWQVRFIEtFWS0tLS0tCk1IY0NBUUVFSVBSR1d3TGg3NW5OWG5razM3ekRmTjhvbkx3ZkNpYUxQVEQrbmM4THg1aGNvQW9HQ0NxR1NNNDkKQXdFSG9VUURRZ0FFa3BCa08wVEttaDRKZFFmTE9lZU1kNTNLbmdhMVdkUVhyNUZjZXBrK2RMVktkVkt4WENHcQpoMW9qdWh1VzExR0lvT3pTOUdvU0tsTlZTUkZXVkVXRHZ3PT0KLS0tLS1FTkQgRUMgUFJJVkFURSBLRVktLS0tLQo=
|
||||
SIGNING_KEY_ALGORITHM: ES256
|
||||
image: pomerium/pomerium:${POMERIUM_TAG:-master}
|
||||
image: pomerium/pomerium:${POMERIUM_TAG:-main}
|
||||
networks:
|
||||
main:
|
||||
aliases:
|
||||
|
|
|
@ -172,7 +172,7 @@ services:
|
|||
SHARED_SECRET: UYgnt8bxxK5G2sFaNzyqi5Z+OgF8m2akNc0xdQx718w=
|
||||
SIGNING_KEY: LS0tLS1CRUdJTiBFQyBQUklWQVRFIEtFWS0tLS0tCk1IY0NBUUVFSVBSR1d3TGg3NW5OWG5razM3ekRmTjhvbkx3ZkNpYUxQVEQrbmM4THg1aGNvQW9HQ0NxR1NNNDkKQXdFSG9VUURRZ0FFa3BCa08wVEttaDRKZFFmTE9lZU1kNTNLbmdhMVdkUVhyNUZjZXBrK2RMVktkVkt4WENHcQpoMW9qdWh1VzExR0lvT3pTOUdvU0tsTlZTUkZXVkVXRHZ3PT0KLS0tLS1FTkQgRUMgUFJJVkFURSBLRVktLS0tLQo=
|
||||
SIGNING_KEY_ALGORITHM: ES256
|
||||
image: pomerium/pomerium:${POMERIUM_TAG:-master}
|
||||
image: pomerium/pomerium:${POMERIUM_TAG:-main}
|
||||
networks:
|
||||
main:
|
||||
aliases:
|
||||
|
|
|
@ -173,7 +173,7 @@ services:
|
|||
SHARED_SECRET: UYgnt8bxxK5G2sFaNzyqi5Z+OgF8m2akNc0xdQx718w=
|
||||
SIGNING_KEY: LS0tLS1CRUdJTiBFQyBQUklWQVRFIEtFWS0tLS0tCk1IY0NBUUVFSVBSR1d3TGg3NW5OWG5razM3ekRmTjhvbkx3ZkNpYUxQVEQrbmM4THg1aGNvQW9HQ0NxR1NNNDkKQXdFSG9VUURRZ0FFa3BCa08wVEttaDRKZFFmTE9lZU1kNTNLbmdhMVdkUVhyNUZjZXBrK2RMVktkVkt4WENHcQpoMW9qdWh1VzExR0lvT3pTOUdvU0tsTlZTUkZXVkVXRHZ3PT0KLS0tLS1FTkQgRUMgUFJJVkFURSBLRVktLS0tLQo=
|
||||
SIGNING_KEY_ALGORITHM: ES256
|
||||
image: pomerium/pomerium:${POMERIUM_TAG:-master}
|
||||
image: pomerium/pomerium:${POMERIUM_TAG:-main}
|
||||
networks:
|
||||
main:
|
||||
aliases:
|
||||
|
|
|
@ -8,7 +8,7 @@ services:
|
|||
- |
|
||||
set -x
|
||||
# the dev image is only available locally, so load it first
|
||||
if [ "${POMERIUM_TAG:-master}" = "dev" ]; then
|
||||
if [ "${POMERIUM_TAG:-main}" = "dev" ]; then
|
||||
sh -c '
|
||||
while true ; do
|
||||
ctr --connect-timeout=1s --timeout=60s images import /k3s-tmp/pomerium-dev.tar && break
|
||||
|
@ -200,7 +200,7 @@ services:
|
|||
"value": "ES256"
|
||||
}
|
||||
],
|
||||
"image": "pomerium/pomerium:${POMERIUM_TAG:-master}",
|
||||
"image": "pomerium/pomerium:${POMERIUM_TAG:-main}",
|
||||
"imagePullPolicy": "IfNotPresent",
|
||||
"name": "pomerium",
|
||||
"ports": [
|
||||
|
@ -1012,7 +1012,7 @@ services:
|
|||
- |
|
||||
set -x
|
||||
# the dev image is only available locally, so load it first
|
||||
if [ "${POMERIUM_TAG:-master}" = "dev" ]; then
|
||||
if [ "${POMERIUM_TAG:-main}" = "dev" ]; then
|
||||
sh -c '
|
||||
while true ; do
|
||||
ctr --connect-timeout=1s --timeout=60s images import /k3s-tmp/pomerium-dev.tar && break
|
||||
|
|
|
@ -178,7 +178,7 @@ services:
|
|||
SHARED_SECRET: UYgnt8bxxK5G2sFaNzyqi5Z+OgF8m2akNc0xdQx718w=
|
||||
SIGNING_KEY: LS0tLS1CRUdJTiBFQyBQUklWQVRFIEtFWS0tLS0tCk1IY0NBUUVFSVBSR1d3TGg3NW5OWG5razM3ekRmTjhvbkx3ZkNpYUxQVEQrbmM4THg1aGNvQW9HQ0NxR1NNNDkKQXdFSG9VUURRZ0FFa3BCa08wVEttaDRKZFFmTE9lZU1kNTNLbmdhMVdkUVhyNUZjZXBrK2RMVktkVkt4WENHcQpoMW9qdWh1VzExR0lvT3pTOUdvU0tsTlZTUkZXVkVXRHZ3PT0KLS0tLS1FTkQgRUMgUFJJVkFURSBLRVktLS0tLQo=
|
||||
SIGNING_KEY_ALGORITHM: ES256
|
||||
image: pomerium/pomerium:${POMERIUM_TAG:-master}
|
||||
image: pomerium/pomerium:${POMERIUM_TAG:-main}
|
||||
networks:
|
||||
main:
|
||||
aliases:
|
||||
|
@ -237,7 +237,7 @@ services:
|
|||
SHARED_SECRET: UYgnt8bxxK5G2sFaNzyqi5Z+OgF8m2akNc0xdQx718w=
|
||||
SIGNING_KEY: LS0tLS1CRUdJTiBFQyBQUklWQVRFIEtFWS0tLS0tCk1IY0NBUUVFSVBSR1d3TGg3NW5OWG5razM3ekRmTjhvbkx3ZkNpYUxQVEQrbmM4THg1aGNvQW9HQ0NxR1NNNDkKQXdFSG9VUURRZ0FFa3BCa08wVEttaDRKZFFmTE9lZU1kNTNLbmdhMVdkUVhyNUZjZXBrK2RMVktkVkt4WENHcQpoMW9qdWh1VzExR0lvT3pTOUdvU0tsTlZTUkZXVkVXRHZ3PT0KLS0tLS1FTkQgRUMgUFJJVkFURSBLRVktLS0tLQo=
|
||||
SIGNING_KEY_ALGORITHM: ES256
|
||||
image: pomerium/pomerium:${POMERIUM_TAG:-master}
|
||||
image: pomerium/pomerium:${POMERIUM_TAG:-main}
|
||||
networks:
|
||||
main:
|
||||
aliases:
|
||||
|
@ -295,7 +295,7 @@ services:
|
|||
SHARED_SECRET: UYgnt8bxxK5G2sFaNzyqi5Z+OgF8m2akNc0xdQx718w=
|
||||
SIGNING_KEY: LS0tLS1CRUdJTiBFQyBQUklWQVRFIEtFWS0tLS0tCk1IY0NBUUVFSVBSR1d3TGg3NW5OWG5razM3ekRmTjhvbkx3ZkNpYUxQVEQrbmM4THg1aGNvQW9HQ0NxR1NNNDkKQXdFSG9VUURRZ0FFa3BCa08wVEttaDRKZFFmTE9lZU1kNTNLbmdhMVdkUVhyNUZjZXBrK2RMVktkVkt4WENHcQpoMW9qdWh1VzExR0lvT3pTOUdvU0tsTlZTUkZXVkVXRHZ3PT0KLS0tLS1FTkQgRUMgUFJJVkFURSBLRVktLS0tLQo=
|
||||
SIGNING_KEY_ALGORITHM: ES256
|
||||
image: pomerium/pomerium:${POMERIUM_TAG:-master}
|
||||
image: pomerium/pomerium:${POMERIUM_TAG:-main}
|
||||
networks:
|
||||
main:
|
||||
aliases:
|
||||
|
@ -353,7 +353,7 @@ services:
|
|||
SHARED_SECRET: UYgnt8bxxK5G2sFaNzyqi5Z+OgF8m2akNc0xdQx718w=
|
||||
SIGNING_KEY: LS0tLS1CRUdJTiBFQyBQUklWQVRFIEtFWS0tLS0tCk1IY0NBUUVFSVBSR1d3TGg3NW5OWG5razM3ekRmTjhvbkx3ZkNpYUxQVEQrbmM4THg1aGNvQW9HQ0NxR1NNNDkKQXdFSG9VUURRZ0FFa3BCa08wVEttaDRKZFFmTE9lZU1kNTNLbmdhMVdkUVhyNUZjZXBrK2RMVktkVkt4WENHcQpoMW9qdWh1VzExR0lvT3pTOUdvU0tsTlZTUkZXVkVXRHZ3PT0KLS0tLS1FTkQgRUMgUFJJVkFURSBLRVktLS0tLQo=
|
||||
SIGNING_KEY_ALGORITHM: ES256
|
||||
image: pomerium/pomerium:${POMERIUM_TAG:-master}
|
||||
image: pomerium/pomerium:${POMERIUM_TAG:-main}
|
||||
networks:
|
||||
main:
|
||||
aliases:
|
||||
|
|
|
@ -397,7 +397,7 @@ services:
|
|||
SHARED_SECRET: UYgnt8bxxK5G2sFaNzyqi5Z+OgF8m2akNc0xdQx718w=
|
||||
SIGNING_KEY: LS0tLS1CRUdJTiBFQyBQUklWQVRFIEtFWS0tLS0tCk1IY0NBUUVFSVBSR1d3TGg3NW5OWG5razM3ekRmTjhvbkx3ZkNpYUxQVEQrbmM4THg1aGNvQW9HQ0NxR1NNNDkKQXdFSG9VUURRZ0FFa3BCa08wVEttaDRKZFFmTE9lZU1kNTNLbmdhMVdkUVhyNUZjZXBrK2RMVktkVkt4WENHcQpoMW9qdWh1VzExR0lvT3pTOUdvU0tsTlZTUkZXVkVXRHZ3PT0KLS0tLS1FTkQgRUMgUFJJVkFURSBLRVktLS0tLQo=
|
||||
SIGNING_KEY_ALGORITHM: ES256
|
||||
image: pomerium/pomerium:${POMERIUM_TAG:-master}
|
||||
image: pomerium/pomerium:${POMERIUM_TAG:-main}
|
||||
networks:
|
||||
main:
|
||||
aliases:
|
||||
|
|
|
@ -172,7 +172,7 @@ services:
|
|||
SHARED_SECRET: UYgnt8bxxK5G2sFaNzyqi5Z+OgF8m2akNc0xdQx718w=
|
||||
SIGNING_KEY: LS0tLS1CRUdJTiBFQyBQUklWQVRFIEtFWS0tLS0tCk1IY0NBUUVFSVBSR1d3TGg3NW5OWG5razM3ekRmTjhvbkx3ZkNpYUxQVEQrbmM4THg1aGNvQW9HQ0NxR1NNNDkKQXdFSG9VUURRZ0FFa3BCa08wVEttaDRKZFFmTE9lZU1kNTNLbmdhMVdkUVhyNUZjZXBrK2RMVktkVkt4WENHcQpoMW9qdWh1VzExR0lvT3pTOUdvU0tsTlZTUkZXVkVXRHZ3PT0KLS0tLS1FTkQgRUMgUFJJVkFURSBLRVktLS0tLQo=
|
||||
SIGNING_KEY_ALGORITHM: ES256
|
||||
image: pomerium/pomerium:${POMERIUM_TAG:-master}
|
||||
image: pomerium/pomerium:${POMERIUM_TAG:-main}
|
||||
networks:
|
||||
main:
|
||||
aliases:
|
||||
|
|
|
@ -173,7 +173,7 @@ services:
|
|||
SHARED_SECRET: UYgnt8bxxK5G2sFaNzyqi5Z+OgF8m2akNc0xdQx718w=
|
||||
SIGNING_KEY: LS0tLS1CRUdJTiBFQyBQUklWQVRFIEtFWS0tLS0tCk1IY0NBUUVFSVBSR1d3TGg3NW5OWG5razM3ekRmTjhvbkx3ZkNpYUxQVEQrbmM4THg1aGNvQW9HQ0NxR1NNNDkKQXdFSG9VUURRZ0FFa3BCa08wVEttaDRKZFFmTE9lZU1kNTNLbmdhMVdkUVhyNUZjZXBrK2RMVktkVkt4WENHcQpoMW9qdWh1VzExR0lvT3pTOUdvU0tsTlZTUkZXVkVXRHZ3PT0KLS0tLS1FTkQgRUMgUFJJVkFURSBLRVktLS0tLQo=
|
||||
SIGNING_KEY_ALGORITHM: ES256
|
||||
image: pomerium/pomerium:${POMERIUM_TAG:-master}
|
||||
image: pomerium/pomerium:${POMERIUM_TAG:-main}
|
||||
networks:
|
||||
main:
|
||||
aliases:
|
||||
|
|
|
@ -8,7 +8,7 @@ services:
|
|||
- |
|
||||
set -x
|
||||
# the dev image is only available locally, so load it first
|
||||
if [ "${POMERIUM_TAG:-master}" = "dev" ]; then
|
||||
if [ "${POMERIUM_TAG:-main}" = "dev" ]; then
|
||||
sh -c '
|
||||
while true ; do
|
||||
ctr --connect-timeout=1s --timeout=60s images import /k3s-tmp/pomerium-dev.tar && break
|
||||
|
@ -200,7 +200,7 @@ services:
|
|||
"value": "ES256"
|
||||
}
|
||||
],
|
||||
"image": "pomerium/pomerium:${POMERIUM_TAG:-master}",
|
||||
"image": "pomerium/pomerium:${POMERIUM_TAG:-main}",
|
||||
"imagePullPolicy": "IfNotPresent",
|
||||
"name": "pomerium",
|
||||
"ports": [
|
||||
|
@ -1012,7 +1012,7 @@ services:
|
|||
- |
|
||||
set -x
|
||||
# the dev image is only available locally, so load it first
|
||||
if [ "${POMERIUM_TAG:-master}" = "dev" ]; then
|
||||
if [ "${POMERIUM_TAG:-main}" = "dev" ]; then
|
||||
sh -c '
|
||||
while true ; do
|
||||
ctr --connect-timeout=1s --timeout=60s images import /k3s-tmp/pomerium-dev.tar && break
|
||||
|
|
|
@ -178,7 +178,7 @@ services:
|
|||
SHARED_SECRET: UYgnt8bxxK5G2sFaNzyqi5Z+OgF8m2akNc0xdQx718w=
|
||||
SIGNING_KEY: LS0tLS1CRUdJTiBFQyBQUklWQVRFIEtFWS0tLS0tCk1IY0NBUUVFSVBSR1d3TGg3NW5OWG5razM3ekRmTjhvbkx3ZkNpYUxQVEQrbmM4THg1aGNvQW9HQ0NxR1NNNDkKQXdFSG9VUURRZ0FFa3BCa08wVEttaDRKZFFmTE9lZU1kNTNLbmdhMVdkUVhyNUZjZXBrK2RMVktkVkt4WENHcQpoMW9qdWh1VzExR0lvT3pTOUdvU0tsTlZTUkZXVkVXRHZ3PT0KLS0tLS1FTkQgRUMgUFJJVkFURSBLRVktLS0tLQo=
|
||||
SIGNING_KEY_ALGORITHM: ES256
|
||||
image: pomerium/pomerium:${POMERIUM_TAG:-master}
|
||||
image: pomerium/pomerium:${POMERIUM_TAG:-main}
|
||||
networks:
|
||||
main:
|
||||
aliases:
|
||||
|
@ -237,7 +237,7 @@ services:
|
|||
SHARED_SECRET: UYgnt8bxxK5G2sFaNzyqi5Z+OgF8m2akNc0xdQx718w=
|
||||
SIGNING_KEY: LS0tLS1CRUdJTiBFQyBQUklWQVRFIEtFWS0tLS0tCk1IY0NBUUVFSVBSR1d3TGg3NW5OWG5razM3ekRmTjhvbkx3ZkNpYUxQVEQrbmM4THg1aGNvQW9HQ0NxR1NNNDkKQXdFSG9VUURRZ0FFa3BCa08wVEttaDRKZFFmTE9lZU1kNTNLbmdhMVdkUVhyNUZjZXBrK2RMVktkVkt4WENHcQpoMW9qdWh1VzExR0lvT3pTOUdvU0tsTlZTUkZXVkVXRHZ3PT0KLS0tLS1FTkQgRUMgUFJJVkFURSBLRVktLS0tLQo=
|
||||
SIGNING_KEY_ALGORITHM: ES256
|
||||
image: pomerium/pomerium:${POMERIUM_TAG:-master}
|
||||
image: pomerium/pomerium:${POMERIUM_TAG:-main}
|
||||
networks:
|
||||
main:
|
||||
aliases:
|
||||
|
@ -295,7 +295,7 @@ services:
|
|||
SHARED_SECRET: UYgnt8bxxK5G2sFaNzyqi5Z+OgF8m2akNc0xdQx718w=
|
||||
SIGNING_KEY: LS0tLS1CRUdJTiBFQyBQUklWQVRFIEtFWS0tLS0tCk1IY0NBUUVFSVBSR1d3TGg3NW5OWG5razM3ekRmTjhvbkx3ZkNpYUxQVEQrbmM4THg1aGNvQW9HQ0NxR1NNNDkKQXdFSG9VUURRZ0FFa3BCa08wVEttaDRKZFFmTE9lZU1kNTNLbmdhMVdkUVhyNUZjZXBrK2RMVktkVkt4WENHcQpoMW9qdWh1VzExR0lvT3pTOUdvU0tsTlZTUkZXVkVXRHZ3PT0KLS0tLS1FTkQgRUMgUFJJVkFURSBLRVktLS0tLQo=
|
||||
SIGNING_KEY_ALGORITHM: ES256
|
||||
image: pomerium/pomerium:${POMERIUM_TAG:-master}
|
||||
image: pomerium/pomerium:${POMERIUM_TAG:-main}
|
||||
networks:
|
||||
main:
|
||||
aliases:
|
||||
|
@ -353,7 +353,7 @@ services:
|
|||
SHARED_SECRET: UYgnt8bxxK5G2sFaNzyqi5Z+OgF8m2akNc0xdQx718w=
|
||||
SIGNING_KEY: LS0tLS1CRUdJTiBFQyBQUklWQVRFIEtFWS0tLS0tCk1IY0NBUUVFSVBSR1d3TGg3NW5OWG5razM3ekRmTjhvbkx3ZkNpYUxQVEQrbmM4THg1aGNvQW9HQ0NxR1NNNDkKQXdFSG9VUURRZ0FFa3BCa08wVEttaDRKZFFmTE9lZU1kNTNLbmdhMVdkUVhyNUZjZXBrK2RMVktkVkt4WENHcQpoMW9qdWh1VzExR0lvT3pTOUdvU0tsTlZTUkZXVkVXRHZ3PT0KLS0tLS1FTkQgRUMgUFJJVkFURSBLRVktLS0tLQo=
|
||||
SIGNING_KEY_ALGORITHM: ES256
|
||||
image: pomerium/pomerium:${POMERIUM_TAG:-master}
|
||||
image: pomerium/pomerium:${POMERIUM_TAG:-main}
|
||||
networks:
|
||||
main:
|
||||
aliases:
|
||||
|
|
|
@ -397,7 +397,7 @@ services:
|
|||
SHARED_SECRET: UYgnt8bxxK5G2sFaNzyqi5Z+OgF8m2akNc0xdQx718w=
|
||||
SIGNING_KEY: LS0tLS1CRUdJTiBFQyBQUklWQVRFIEtFWS0tLS0tCk1IY0NBUUVFSVBSR1d3TGg3NW5OWG5razM3ekRmTjhvbkx3ZkNpYUxQVEQrbmM4THg1aGNvQW9HQ0NxR1NNNDkKQXdFSG9VUURRZ0FFa3BCa08wVEttaDRKZFFmTE9lZU1kNTNLbmdhMVdkUVhyNUZjZXBrK2RMVktkVkt4WENHcQpoMW9qdWh1VzExR0lvT3pTOUdvU0tsTlZTUkZXVkVXRHZ3PT0KLS0tLS1FTkQgRUMgUFJJVkFURSBLRVktLS0tLQo=
|
||||
SIGNING_KEY_ALGORITHM: ES256
|
||||
image: pomerium/pomerium:${POMERIUM_TAG:-master}
|
||||
image: pomerium/pomerium:${POMERIUM_TAG:-main}
|
||||
networks:
|
||||
main:
|
||||
aliases:
|
||||
|
|
|
@ -172,7 +172,7 @@ services:
|
|||
SHARED_SECRET: UYgnt8bxxK5G2sFaNzyqi5Z+OgF8m2akNc0xdQx718w=
|
||||
SIGNING_KEY: LS0tLS1CRUdJTiBFQyBQUklWQVRFIEtFWS0tLS0tCk1IY0NBUUVFSVBSR1d3TGg3NW5OWG5razM3ekRmTjhvbkx3ZkNpYUxQVEQrbmM4THg1aGNvQW9HQ0NxR1NNNDkKQXdFSG9VUURRZ0FFa3BCa08wVEttaDRKZFFmTE9lZU1kNTNLbmdhMVdkUVhyNUZjZXBrK2RMVktkVkt4WENHcQpoMW9qdWh1VzExR0lvT3pTOUdvU0tsTlZTUkZXVkVXRHZ3PT0KLS0tLS1FTkQgRUMgUFJJVkFURSBLRVktLS0tLQo=
|
||||
SIGNING_KEY_ALGORITHM: ES256
|
||||
image: pomerium/pomerium:${POMERIUM_TAG:-master}
|
||||
image: pomerium/pomerium:${POMERIUM_TAG:-main}
|
||||
networks:
|
||||
main:
|
||||
aliases:
|
||||
|
|
|
@ -173,7 +173,7 @@ services:
|
|||
SHARED_SECRET: UYgnt8bxxK5G2sFaNzyqi5Z+OgF8m2akNc0xdQx718w=
|
||||
SIGNING_KEY: LS0tLS1CRUdJTiBFQyBQUklWQVRFIEtFWS0tLS0tCk1IY0NBUUVFSVBSR1d3TGg3NW5OWG5razM3ekRmTjhvbkx3ZkNpYUxQVEQrbmM4THg1aGNvQW9HQ0NxR1NNNDkKQXdFSG9VUURRZ0FFa3BCa08wVEttaDRKZFFmTE9lZU1kNTNLbmdhMVdkUVhyNUZjZXBrK2RMVktkVkt4WENHcQpoMW9qdWh1VzExR0lvT3pTOUdvU0tsTlZTUkZXVkVXRHZ3PT0KLS0tLS1FTkQgRUMgUFJJVkFURSBLRVktLS0tLQo=
|
||||
SIGNING_KEY_ALGORITHM: ES256
|
||||
image: pomerium/pomerium:${POMERIUM_TAG:-master}
|
||||
image: pomerium/pomerium:${POMERIUM_TAG:-main}
|
||||
networks:
|
||||
main:
|
||||
aliases:
|
||||
|
|
|
@ -8,7 +8,7 @@ services:
|
|||
- |
|
||||
set -x
|
||||
# the dev image is only available locally, so load it first
|
||||
if [ "${POMERIUM_TAG:-master}" = "dev" ]; then
|
||||
if [ "${POMERIUM_TAG:-main}" = "dev" ]; then
|
||||
sh -c '
|
||||
while true ; do
|
||||
ctr --connect-timeout=1s --timeout=60s images import /k3s-tmp/pomerium-dev.tar && break
|
||||
|
@ -200,7 +200,7 @@ services:
|
|||
"value": "ES256"
|
||||
}
|
||||
],
|
||||
"image": "pomerium/pomerium:${POMERIUM_TAG:-master}",
|
||||
"image": "pomerium/pomerium:${POMERIUM_TAG:-main}",
|
||||
"imagePullPolicy": "IfNotPresent",
|
||||
"name": "pomerium",
|
||||
"ports": [
|
||||
|
@ -1012,7 +1012,7 @@ services:
|
|||
- |
|
||||
set -x
|
||||
# the dev image is only available locally, so load it first
|
||||
if [ "${POMERIUM_TAG:-master}" = "dev" ]; then
|
||||
if [ "${POMERIUM_TAG:-main}" = "dev" ]; then
|
||||
sh -c '
|
||||
while true ; do
|
||||
ctr --connect-timeout=1s --timeout=60s images import /k3s-tmp/pomerium-dev.tar && break
|
||||
|
|
|
@ -178,7 +178,7 @@ services:
|
|||
SHARED_SECRET: UYgnt8bxxK5G2sFaNzyqi5Z+OgF8m2akNc0xdQx718w=
|
||||
SIGNING_KEY: LS0tLS1CRUdJTiBFQyBQUklWQVRFIEtFWS0tLS0tCk1IY0NBUUVFSVBSR1d3TGg3NW5OWG5razM3ekRmTjhvbkx3ZkNpYUxQVEQrbmM4THg1aGNvQW9HQ0NxR1NNNDkKQXdFSG9VUURRZ0FFa3BCa08wVEttaDRKZFFmTE9lZU1kNTNLbmdhMVdkUVhyNUZjZXBrK2RMVktkVkt4WENHcQpoMW9qdWh1VzExR0lvT3pTOUdvU0tsTlZTUkZXVkVXRHZ3PT0KLS0tLS1FTkQgRUMgUFJJVkFURSBLRVktLS0tLQo=
|
||||
SIGNING_KEY_ALGORITHM: ES256
|
||||
image: pomerium/pomerium:${POMERIUM_TAG:-master}
|
||||
image: pomerium/pomerium:${POMERIUM_TAG:-main}
|
||||
networks:
|
||||
main:
|
||||
aliases:
|
||||
|
@ -237,7 +237,7 @@ services:
|
|||
SHARED_SECRET: UYgnt8bxxK5G2sFaNzyqi5Z+OgF8m2akNc0xdQx718w=
|
||||
SIGNING_KEY: LS0tLS1CRUdJTiBFQyBQUklWQVRFIEtFWS0tLS0tCk1IY0NBUUVFSVBSR1d3TGg3NW5OWG5razM3ekRmTjhvbkx3ZkNpYUxQVEQrbmM4THg1aGNvQW9HQ0NxR1NNNDkKQXdFSG9VUURRZ0FFa3BCa08wVEttaDRKZFFmTE9lZU1kNTNLbmdhMVdkUVhyNUZjZXBrK2RMVktkVkt4WENHcQpoMW9qdWh1VzExR0lvT3pTOUdvU0tsTlZTUkZXVkVXRHZ3PT0KLS0tLS1FTkQgRUMgUFJJVkFURSBLRVktLS0tLQo=
|
||||
SIGNING_KEY_ALGORITHM: ES256
|
||||
image: pomerium/pomerium:${POMERIUM_TAG:-master}
|
||||
image: pomerium/pomerium:${POMERIUM_TAG:-main}
|
||||
networks:
|
||||
main:
|
||||
aliases:
|
||||
|
@ -295,7 +295,7 @@ services:
|
|||
SHARED_SECRET: UYgnt8bxxK5G2sFaNzyqi5Z+OgF8m2akNc0xdQx718w=
|
||||
SIGNING_KEY: LS0tLS1CRUdJTiBFQyBQUklWQVRFIEtFWS0tLS0tCk1IY0NBUUVFSVBSR1d3TGg3NW5OWG5razM3ekRmTjhvbkx3ZkNpYUxQVEQrbmM4THg1aGNvQW9HQ0NxR1NNNDkKQXdFSG9VUURRZ0FFa3BCa08wVEttaDRKZFFmTE9lZU1kNTNLbmdhMVdkUVhyNUZjZXBrK2RMVktkVkt4WENHcQpoMW9qdWh1VzExR0lvT3pTOUdvU0tsTlZTUkZXVkVXRHZ3PT0KLS0tLS1FTkQgRUMgUFJJVkFURSBLRVktLS0tLQo=
|
||||
SIGNING_KEY_ALGORITHM: ES256
|
||||
image: pomerium/pomerium:${POMERIUM_TAG:-master}
|
||||
image: pomerium/pomerium:${POMERIUM_TAG:-main}
|
||||
networks:
|
||||
main:
|
||||
aliases:
|
||||
|
@ -353,7 +353,7 @@ services:
|
|||
SHARED_SECRET: UYgnt8bxxK5G2sFaNzyqi5Z+OgF8m2akNc0xdQx718w=
|
||||
SIGNING_KEY: LS0tLS1CRUdJTiBFQyBQUklWQVRFIEtFWS0tLS0tCk1IY0NBUUVFSVBSR1d3TGg3NW5OWG5razM3ekRmTjhvbkx3ZkNpYUxQVEQrbmM4THg1aGNvQW9HQ0NxR1NNNDkKQXdFSG9VUURRZ0FFa3BCa08wVEttaDRKZFFmTE9lZU1kNTNLbmdhMVdkUVhyNUZjZXBrK2RMVktkVkt4WENHcQpoMW9qdWh1VzExR0lvT3pTOUdvU0tsTlZTUkZXVkVXRHZ3PT0KLS0tLS1FTkQgRUMgUFJJVkFURSBLRVktLS0tLQo=
|
||||
SIGNING_KEY_ALGORITHM: ES256
|
||||
image: pomerium/pomerium:${POMERIUM_TAG:-master}
|
||||
image: pomerium/pomerium:${POMERIUM_TAG:-main}
|
||||
networks:
|
||||
main:
|
||||
aliases:
|
||||
|
|
|
@ -397,7 +397,7 @@ services:
|
|||
SHARED_SECRET: UYgnt8bxxK5G2sFaNzyqi5Z+OgF8m2akNc0xdQx718w=
|
||||
SIGNING_KEY: LS0tLS1CRUdJTiBFQyBQUklWQVRFIEtFWS0tLS0tCk1IY0NBUUVFSVBSR1d3TGg3NW5OWG5razM3ekRmTjhvbkx3ZkNpYUxQVEQrbmM4THg1aGNvQW9HQ0NxR1NNNDkKQXdFSG9VUURRZ0FFa3BCa08wVEttaDRKZFFmTE9lZU1kNTNLbmdhMVdkUVhyNUZjZXBrK2RMVktkVkt4WENHcQpoMW9qdWh1VzExR0lvT3pTOUdvU0tsTlZTUkZXVkVXRHZ3PT0KLS0tLS1FTkQgRUMgUFJJVkFURSBLRVktLS0tLQo=
|
||||
SIGNING_KEY_ALGORITHM: ES256
|
||||
image: pomerium/pomerium:${POMERIUM_TAG:-master}
|
||||
image: pomerium/pomerium:${POMERIUM_TAG:-main}
|
||||
networks:
|
||||
main:
|
||||
aliases:
|
||||
|
|
|
@ -172,7 +172,7 @@ services:
|
|||
SHARED_SECRET: UYgnt8bxxK5G2sFaNzyqi5Z+OgF8m2akNc0xdQx718w=
|
||||
SIGNING_KEY: LS0tLS1CRUdJTiBFQyBQUklWQVRFIEtFWS0tLS0tCk1IY0NBUUVFSVBSR1d3TGg3NW5OWG5razM3ekRmTjhvbkx3ZkNpYUxQVEQrbmM4THg1aGNvQW9HQ0NxR1NNNDkKQXdFSG9VUURRZ0FFa3BCa08wVEttaDRKZFFmTE9lZU1kNTNLbmdhMVdkUVhyNUZjZXBrK2RMVktkVkt4WENHcQpoMW9qdWh1VzExR0lvT3pTOUdvU0tsTlZTUkZXVkVXRHZ3PT0KLS0tLS1FTkQgRUMgUFJJVkFURSBLRVktLS0tLQo=
|
||||
SIGNING_KEY_ALGORITHM: ES256
|
||||
image: pomerium/pomerium:${POMERIUM_TAG:-master}
|
||||
image: pomerium/pomerium:${POMERIUM_TAG:-main}
|
||||
networks:
|
||||
main:
|
||||
aliases:
|
||||
|
|
|
@ -173,7 +173,7 @@ services:
|
|||
SHARED_SECRET: UYgnt8bxxK5G2sFaNzyqi5Z+OgF8m2akNc0xdQx718w=
|
||||
SIGNING_KEY: LS0tLS1CRUdJTiBFQyBQUklWQVRFIEtFWS0tLS0tCk1IY0NBUUVFSVBSR1d3TGg3NW5OWG5razM3ekRmTjhvbkx3ZkNpYUxQVEQrbmM4THg1aGNvQW9HQ0NxR1NNNDkKQXdFSG9VUURRZ0FFa3BCa08wVEttaDRKZFFmTE9lZU1kNTNLbmdhMVdkUVhyNUZjZXBrK2RMVktkVkt4WENHcQpoMW9qdWh1VzExR0lvT3pTOUdvU0tsTlZTUkZXVkVXRHZ3PT0KLS0tLS1FTkQgRUMgUFJJVkFURSBLRVktLS0tLQo=
|
||||
SIGNING_KEY_ALGORITHM: ES256
|
||||
image: pomerium/pomerium:${POMERIUM_TAG:-master}
|
||||
image: pomerium/pomerium:${POMERIUM_TAG:-main}
|
||||
networks:
|
||||
main:
|
||||
aliases:
|
||||
|
|
|
@ -8,7 +8,7 @@ services:
|
|||
- |
|
||||
set -x
|
||||
# the dev image is only available locally, so load it first
|
||||
if [ "${POMERIUM_TAG:-master}" = "dev" ]; then
|
||||
if [ "${POMERIUM_TAG:-main}" = "dev" ]; then
|
||||
sh -c '
|
||||
while true ; do
|
||||
ctr --connect-timeout=1s --timeout=60s images import /k3s-tmp/pomerium-dev.tar && break
|
||||
|
@ -200,7 +200,7 @@ services:
|
|||
"value": "ES256"
|
||||
}
|
||||
],
|
||||
"image": "pomerium/pomerium:${POMERIUM_TAG:-master}",
|
||||
"image": "pomerium/pomerium:${POMERIUM_TAG:-main}",
|
||||
"imagePullPolicy": "IfNotPresent",
|
||||
"name": "pomerium",
|
||||
"ports": [
|
||||
|
@ -1012,7 +1012,7 @@ services:
|
|||
- |
|
||||
set -x
|
||||
# the dev image is only available locally, so load it first
|
||||
if [ "${POMERIUM_TAG:-master}" = "dev" ]; then
|
||||
if [ "${POMERIUM_TAG:-main}" = "dev" ]; then
|
||||
sh -c '
|
||||
while true ; do
|
||||
ctr --connect-timeout=1s --timeout=60s images import /k3s-tmp/pomerium-dev.tar && break
|
||||
|
|
|
@ -178,7 +178,7 @@ services:
|
|||
SHARED_SECRET: UYgnt8bxxK5G2sFaNzyqi5Z+OgF8m2akNc0xdQx718w=
|
||||
SIGNING_KEY: LS0tLS1CRUdJTiBFQyBQUklWQVRFIEtFWS0tLS0tCk1IY0NBUUVFSVBSR1d3TGg3NW5OWG5razM3ekRmTjhvbkx3ZkNpYUxQVEQrbmM4THg1aGNvQW9HQ0NxR1NNNDkKQXdFSG9VUURRZ0FFa3BCa08wVEttaDRKZFFmTE9lZU1kNTNLbmdhMVdkUVhyNUZjZXBrK2RMVktkVkt4WENHcQpoMW9qdWh1VzExR0lvT3pTOUdvU0tsTlZTUkZXVkVXRHZ3PT0KLS0tLS1FTkQgRUMgUFJJVkFURSBLRVktLS0tLQo=
|
||||
SIGNING_KEY_ALGORITHM: ES256
|
||||
image: pomerium/pomerium:${POMERIUM_TAG:-master}
|
||||
image: pomerium/pomerium:${POMERIUM_TAG:-main}
|
||||
networks:
|
||||
main:
|
||||
aliases:
|
||||
|
@ -237,7 +237,7 @@ services:
|
|||
SHARED_SECRET: UYgnt8bxxK5G2sFaNzyqi5Z+OgF8m2akNc0xdQx718w=
|
||||
SIGNING_KEY: LS0tLS1CRUdJTiBFQyBQUklWQVRFIEtFWS0tLS0tCk1IY0NBUUVFSVBSR1d3TGg3NW5OWG5razM3ekRmTjhvbkx3ZkNpYUxQVEQrbmM4THg1aGNvQW9HQ0NxR1NNNDkKQXdFSG9VUURRZ0FFa3BCa08wVEttaDRKZFFmTE9lZU1kNTNLbmdhMVdkUVhyNUZjZXBrK2RMVktkVkt4WENHcQpoMW9qdWh1VzExR0lvT3pTOUdvU0tsTlZTUkZXVkVXRHZ3PT0KLS0tLS1FTkQgRUMgUFJJVkFURSBLRVktLS0tLQo=
|
||||
SIGNING_KEY_ALGORITHM: ES256
|
||||
image: pomerium/pomerium:${POMERIUM_TAG:-master}
|
||||
image: pomerium/pomerium:${POMERIUM_TAG:-main}
|
||||
networks:
|
||||
main:
|
||||
aliases:
|
||||
|
@ -295,7 +295,7 @@ services:
|
|||
SHARED_SECRET: UYgnt8bxxK5G2sFaNzyqi5Z+OgF8m2akNc0xdQx718w=
|
||||
SIGNING_KEY: LS0tLS1CRUdJTiBFQyBQUklWQVRFIEtFWS0tLS0tCk1IY0NBUUVFSVBSR1d3TGg3NW5OWG5razM3ekRmTjhvbkx3ZkNpYUxQVEQrbmM4THg1aGNvQW9HQ0NxR1NNNDkKQXdFSG9VUURRZ0FFa3BCa08wVEttaDRKZFFmTE9lZU1kNTNLbmdhMVdkUVhyNUZjZXBrK2RMVktkVkt4WENHcQpoMW9qdWh1VzExR0lvT3pTOUdvU0tsTlZTUkZXVkVXRHZ3PT0KLS0tLS1FTkQgRUMgUFJJVkFURSBLRVktLS0tLQo=
|
||||
SIGNING_KEY_ALGORITHM: ES256
|
||||
image: pomerium/pomerium:${POMERIUM_TAG:-master}
|
||||
image: pomerium/pomerium:${POMERIUM_TAG:-main}
|
||||
networks:
|
||||
main:
|
||||
aliases:
|
||||
|
@ -353,7 +353,7 @@ services:
|
|||
SHARED_SECRET: UYgnt8bxxK5G2sFaNzyqi5Z+OgF8m2akNc0xdQx718w=
|
||||
SIGNING_KEY: LS0tLS1CRUdJTiBFQyBQUklWQVRFIEtFWS0tLS0tCk1IY0NBUUVFSVBSR1d3TGg3NW5OWG5razM3ekRmTjhvbkx3ZkNpYUxQVEQrbmM4THg1aGNvQW9HQ0NxR1NNNDkKQXdFSG9VUURRZ0FFa3BCa08wVEttaDRKZFFmTE9lZU1kNTNLbmdhMVdkUVhyNUZjZXBrK2RMVktkVkt4WENHcQpoMW9qdWh1VzExR0lvT3pTOUdvU0tsTlZTUkZXVkVXRHZ3PT0KLS0tLS1FTkQgRUMgUFJJVkFURSBLRVktLS0tLQo=
|
||||
SIGNING_KEY_ALGORITHM: ES256
|
||||
image: pomerium/pomerium:${POMERIUM_TAG:-master}
|
||||
image: pomerium/pomerium:${POMERIUM_TAG:-main}
|
||||
networks:
|
||||
main:
|
||||
aliases:
|
||||
|
|
|
@ -397,7 +397,7 @@ services:
|
|||
SHARED_SECRET: UYgnt8bxxK5G2sFaNzyqi5Z+OgF8m2akNc0xdQx718w=
|
||||
SIGNING_KEY: LS0tLS1CRUdJTiBFQyBQUklWQVRFIEtFWS0tLS0tCk1IY0NBUUVFSVBSR1d3TGg3NW5OWG5razM3ekRmTjhvbkx3ZkNpYUxQVEQrbmM4THg1aGNvQW9HQ0NxR1NNNDkKQXdFSG9VUURRZ0FFa3BCa08wVEttaDRKZFFmTE9lZU1kNTNLbmdhMVdkUVhyNUZjZXBrK2RMVktkVkt4WENHcQpoMW9qdWh1VzExR0lvT3pTOUdvU0tsTlZTUkZXVkVXRHZ3PT0KLS0tLS1FTkQgRUMgUFJJVkFURSBLRVktLS0tLQo=
|
||||
SIGNING_KEY_ALGORITHM: ES256
|
||||
image: pomerium/pomerium:${POMERIUM_TAG:-master}
|
||||
image: pomerium/pomerium:${POMERIUM_TAG:-main}
|
||||
networks:
|
||||
main:
|
||||
aliases:
|
||||
|
|
|
@ -172,7 +172,7 @@ services:
|
|||
SHARED_SECRET: UYgnt8bxxK5G2sFaNzyqi5Z+OgF8m2akNc0xdQx718w=
|
||||
SIGNING_KEY: LS0tLS1CRUdJTiBFQyBQUklWQVRFIEtFWS0tLS0tCk1IY0NBUUVFSVBSR1d3TGg3NW5OWG5razM3ekRmTjhvbkx3ZkNpYUxQVEQrbmM4THg1aGNvQW9HQ0NxR1NNNDkKQXdFSG9VUURRZ0FFa3BCa08wVEttaDRKZFFmTE9lZU1kNTNLbmdhMVdkUVhyNUZjZXBrK2RMVktkVkt4WENHcQpoMW9qdWh1VzExR0lvT3pTOUdvU0tsTlZTUkZXVkVXRHZ3PT0KLS0tLS1FTkQgRUMgUFJJVkFURSBLRVktLS0tLQo=
|
||||
SIGNING_KEY_ALGORITHM: ES256
|
||||
image: pomerium/pomerium:${POMERIUM_TAG:-master}
|
||||
image: pomerium/pomerium:${POMERIUM_TAG:-main}
|
||||
networks:
|
||||
main:
|
||||
aliases:
|
||||
|
|
|
@ -173,7 +173,7 @@ services:
|
|||
SHARED_SECRET: UYgnt8bxxK5G2sFaNzyqi5Z+OgF8m2akNc0xdQx718w=
|
||||
SIGNING_KEY: LS0tLS1CRUdJTiBFQyBQUklWQVRFIEtFWS0tLS0tCk1IY0NBUUVFSVBSR1d3TGg3NW5OWG5razM3ekRmTjhvbkx3ZkNpYUxQVEQrbmM4THg1aGNvQW9HQ0NxR1NNNDkKQXdFSG9VUURRZ0FFa3BCa08wVEttaDRKZFFmTE9lZU1kNTNLbmdhMVdkUVhyNUZjZXBrK2RMVktkVkt4WENHcQpoMW9qdWh1VzExR0lvT3pTOUdvU0tsTlZTUkZXVkVXRHZ3PT0KLS0tLS1FTkQgRUMgUFJJVkFURSBLRVktLS0tLQo=
|
||||
SIGNING_KEY_ALGORITHM: ES256
|
||||
image: pomerium/pomerium:${POMERIUM_TAG:-master}
|
||||
image: pomerium/pomerium:${POMERIUM_TAG:-main}
|
||||
networks:
|
||||
main:
|
||||
aliases:
|
||||
|
|
|
@ -8,7 +8,7 @@ services:
|
|||
- |
|
||||
set -x
|
||||
# the dev image is only available locally, so load it first
|
||||
if [ "${POMERIUM_TAG:-master}" = "dev" ]; then
|
||||
if [ "${POMERIUM_TAG:-main}" = "dev" ]; then
|
||||
sh -c '
|
||||
while true ; do
|
||||
ctr --connect-timeout=1s --timeout=60s images import /k3s-tmp/pomerium-dev.tar && break
|
||||
|
@ -200,7 +200,7 @@ services:
|
|||
"value": "ES256"
|
||||
}
|
||||
],
|
||||
"image": "pomerium/pomerium:${POMERIUM_TAG:-master}",
|
||||
"image": "pomerium/pomerium:${POMERIUM_TAG:-main}",
|
||||
"imagePullPolicy": "IfNotPresent",
|
||||
"name": "pomerium",
|
||||
"ports": [
|
||||
|
@ -1012,7 +1012,7 @@ services:
|
|||
- |
|
||||
set -x
|
||||
# the dev image is only available locally, so load it first
|
||||
if [ "${POMERIUM_TAG:-master}" = "dev" ]; then
|
||||
if [ "${POMERIUM_TAG:-main}" = "dev" ]; then
|
||||
sh -c '
|
||||
while true ; do
|
||||
ctr --connect-timeout=1s --timeout=60s images import /k3s-tmp/pomerium-dev.tar && break
|
||||
|
|
|
@ -178,7 +178,7 @@ services:
|
|||
SHARED_SECRET: UYgnt8bxxK5G2sFaNzyqi5Z+OgF8m2akNc0xdQx718w=
|
||||
SIGNING_KEY: LS0tLS1CRUdJTiBFQyBQUklWQVRFIEtFWS0tLS0tCk1IY0NBUUVFSVBSR1d3TGg3NW5OWG5razM3ekRmTjhvbkx3ZkNpYUxQVEQrbmM4THg1aGNvQW9HQ0NxR1NNNDkKQXdFSG9VUURRZ0FFa3BCa08wVEttaDRKZFFmTE9lZU1kNTNLbmdhMVdkUVhyNUZjZXBrK2RMVktkVkt4WENHcQpoMW9qdWh1VzExR0lvT3pTOUdvU0tsTlZTUkZXVkVXRHZ3PT0KLS0tLS1FTkQgRUMgUFJJVkFURSBLRVktLS0tLQo=
|
||||
SIGNING_KEY_ALGORITHM: ES256
|
||||
image: pomerium/pomerium:${POMERIUM_TAG:-master}
|
||||
image: pomerium/pomerium:${POMERIUM_TAG:-main}
|
||||
networks:
|
||||
main:
|
||||
aliases:
|
||||
|
@ -237,7 +237,7 @@ services:
|
|||
SHARED_SECRET: UYgnt8bxxK5G2sFaNzyqi5Z+OgF8m2akNc0xdQx718w=
|
||||
SIGNING_KEY: LS0tLS1CRUdJTiBFQyBQUklWQVRFIEtFWS0tLS0tCk1IY0NBUUVFSVBSR1d3TGg3NW5OWG5razM3ekRmTjhvbkx3ZkNpYUxQVEQrbmM4THg1aGNvQW9HQ0NxR1NNNDkKQXdFSG9VUURRZ0FFa3BCa08wVEttaDRKZFFmTE9lZU1kNTNLbmdhMVdkUVhyNUZjZXBrK2RMVktkVkt4WENHcQpoMW9qdWh1VzExR0lvT3pTOUdvU0tsTlZTUkZXVkVXRHZ3PT0KLS0tLS1FTkQgRUMgUFJJVkFURSBLRVktLS0tLQo=
|
||||
SIGNING_KEY_ALGORITHM: ES256
|
||||
image: pomerium/pomerium:${POMERIUM_TAG:-master}
|
||||
image: pomerium/pomerium:${POMERIUM_TAG:-main}
|
||||
networks:
|
||||
main:
|
||||
aliases:
|
||||
|
@ -295,7 +295,7 @@ services:
|
|||
SHARED_SECRET: UYgnt8bxxK5G2sFaNzyqi5Z+OgF8m2akNc0xdQx718w=
|
||||
SIGNING_KEY: LS0tLS1CRUdJTiBFQyBQUklWQVRFIEtFWS0tLS0tCk1IY0NBUUVFSVBSR1d3TGg3NW5OWG5razM3ekRmTjhvbkx3ZkNpYUxQVEQrbmM4THg1aGNvQW9HQ0NxR1NNNDkKQXdFSG9VUURRZ0FFa3BCa08wVEttaDRKZFFmTE9lZU1kNTNLbmdhMVdkUVhyNUZjZXBrK2RMVktkVkt4WENHcQpoMW9qdWh1VzExR0lvT3pTOUdvU0tsTlZTUkZXVkVXRHZ3PT0KLS0tLS1FTkQgRUMgUFJJVkFURSBLRVktLS0tLQo=
|
||||
SIGNING_KEY_ALGORITHM: ES256
|
||||
image: pomerium/pomerium:${POMERIUM_TAG:-master}
|
||||
image: pomerium/pomerium:${POMERIUM_TAG:-main}
|
||||
networks:
|
||||
main:
|
||||
aliases:
|
||||
|
@ -353,7 +353,7 @@ services:
|
|||
SHARED_SECRET: UYgnt8bxxK5G2sFaNzyqi5Z+OgF8m2akNc0xdQx718w=
|
||||
SIGNING_KEY: LS0tLS1CRUdJTiBFQyBQUklWQVRFIEtFWS0tLS0tCk1IY0NBUUVFSVBSR1d3TGg3NW5OWG5razM3ekRmTjhvbkx3ZkNpYUxQVEQrbmM4THg1aGNvQW9HQ0NxR1NNNDkKQXdFSG9VUURRZ0FFa3BCa08wVEttaDRKZFFmTE9lZU1kNTNLbmdhMVdkUVhyNUZjZXBrK2RMVktkVkt4WENHcQpoMW9qdWh1VzExR0lvT3pTOUdvU0tsTlZTUkZXVkVXRHZ3PT0KLS0tLS1FTkQgRUMgUFJJVkFURSBLRVktLS0tLQo=
|
||||
SIGNING_KEY_ALGORITHM: ES256
|
||||
image: pomerium/pomerium:${POMERIUM_TAG:-master}
|
||||
image: pomerium/pomerium:${POMERIUM_TAG:-main}
|
||||
networks:
|
||||
main:
|
||||
aliases:
|
||||
|
|
|
@ -397,7 +397,7 @@ services:
|
|||
SHARED_SECRET: UYgnt8bxxK5G2sFaNzyqi5Z+OgF8m2akNc0xdQx718w=
|
||||
SIGNING_KEY: LS0tLS1CRUdJTiBFQyBQUklWQVRFIEtFWS0tLS0tCk1IY0NBUUVFSVBSR1d3TGg3NW5OWG5razM3ekRmTjhvbkx3ZkNpYUxQVEQrbmM4THg1aGNvQW9HQ0NxR1NNNDkKQXdFSG9VUURRZ0FFa3BCa08wVEttaDRKZFFmTE9lZU1kNTNLbmdhMVdkUVhyNUZjZXBrK2RMVktkVkt4WENHcQpoMW9qdWh1VzExR0lvT3pTOUdvU0tsTlZTUkZXVkVXRHZ3PT0KLS0tLS1FTkQgRUMgUFJJVkFURSBLRVktLS0tLQo=
|
||||
SIGNING_KEY_ALGORITHM: ES256
|
||||
image: pomerium/pomerium:${POMERIUM_TAG:-master}
|
||||
image: pomerium/pomerium:${POMERIUM_TAG:-main}
|
||||
networks:
|
||||
main:
|
||||
aliases:
|
||||
|
|
|
@ -172,7 +172,7 @@ services:
|
|||
SHARED_SECRET: UYgnt8bxxK5G2sFaNzyqi5Z+OgF8m2akNc0xdQx718w=
|
||||
SIGNING_KEY: LS0tLS1CRUdJTiBFQyBQUklWQVRFIEtFWS0tLS0tCk1IY0NBUUVFSVBSR1d3TGg3NW5OWG5razM3ekRmTjhvbkx3ZkNpYUxQVEQrbmM4THg1aGNvQW9HQ0NxR1NNNDkKQXdFSG9VUURRZ0FFa3BCa08wVEttaDRKZFFmTE9lZU1kNTNLbmdhMVdkUVhyNUZjZXBrK2RMVktkVkt4WENHcQpoMW9qdWh1VzExR0lvT3pTOUdvU0tsTlZTUkZXVkVXRHZ3PT0KLS0tLS1FTkQgRUMgUFJJVkFURSBLRVktLS0tLQo=
|
||||
SIGNING_KEY_ALGORITHM: ES256
|
||||
image: pomerium/pomerium:${POMERIUM_TAG:-master}
|
||||
image: pomerium/pomerium:${POMERIUM_TAG:-main}
|
||||
networks:
|
||||
main:
|
||||
aliases:
|
||||
|
|
|
@ -173,7 +173,7 @@ services:
|
|||
SHARED_SECRET: UYgnt8bxxK5G2sFaNzyqi5Z+OgF8m2akNc0xdQx718w=
|
||||
SIGNING_KEY: LS0tLS1CRUdJTiBFQyBQUklWQVRFIEtFWS0tLS0tCk1IY0NBUUVFSVBSR1d3TGg3NW5OWG5razM3ekRmTjhvbkx3ZkNpYUxQVEQrbmM4THg1aGNvQW9HQ0NxR1NNNDkKQXdFSG9VUURRZ0FFa3BCa08wVEttaDRKZFFmTE9lZU1kNTNLbmdhMVdkUVhyNUZjZXBrK2RMVktkVkt4WENHcQpoMW9qdWh1VzExR0lvT3pTOUdvU0tsTlZTUkZXVkVXRHZ3PT0KLS0tLS1FTkQgRUMgUFJJVkFURSBLRVktLS0tLQo=
|
||||
SIGNING_KEY_ALGORITHM: ES256
|
||||
image: pomerium/pomerium:${POMERIUM_TAG:-master}
|
||||
image: pomerium/pomerium:${POMERIUM_TAG:-main}
|
||||
networks:
|
||||
main:
|
||||
aliases:
|
||||
|
|
|
@ -8,7 +8,7 @@ services:
|
|||
- |
|
||||
set -x
|
||||
# the dev image is only available locally, so load it first
|
||||
if [ "${POMERIUM_TAG:-master}" = "dev" ]; then
|
||||
if [ "${POMERIUM_TAG:-main}" = "dev" ]; then
|
||||
sh -c '
|
||||
while true ; do
|
||||
ctr --connect-timeout=1s --timeout=60s images import /k3s-tmp/pomerium-dev.tar && break
|
||||
|
@ -200,7 +200,7 @@ services:
|
|||
"value": "ES256"
|
||||
}
|
||||
],
|
||||
"image": "pomerium/pomerium:${POMERIUM_TAG:-master}",
|
||||
"image": "pomerium/pomerium:${POMERIUM_TAG:-main}",
|
||||
"imagePullPolicy": "IfNotPresent",
|
||||
"name": "pomerium",
|
||||
"ports": [
|
||||
|
@ -1012,7 +1012,7 @@ services:
|
|||
- |
|
||||
set -x
|
||||
# the dev image is only available locally, so load it first
|
||||
if [ "${POMERIUM_TAG:-master}" = "dev" ]; then
|
||||
if [ "${POMERIUM_TAG:-main}" = "dev" ]; then
|
||||
sh -c '
|
||||
while true ; do
|
||||
ctr --connect-timeout=1s --timeout=60s images import /k3s-tmp/pomerium-dev.tar && break
|
||||
|
|
|
@ -178,7 +178,7 @@ services:
|
|||
SHARED_SECRET: UYgnt8bxxK5G2sFaNzyqi5Z+OgF8m2akNc0xdQx718w=
|
||||
SIGNING_KEY: LS0tLS1CRUdJTiBFQyBQUklWQVRFIEtFWS0tLS0tCk1IY0NBUUVFSVBSR1d3TGg3NW5OWG5razM3ekRmTjhvbkx3ZkNpYUxQVEQrbmM4THg1aGNvQW9HQ0NxR1NNNDkKQXdFSG9VUURRZ0FFa3BCa08wVEttaDRKZFFmTE9lZU1kNTNLbmdhMVdkUVhyNUZjZXBrK2RMVktkVkt4WENHcQpoMW9qdWh1VzExR0lvT3pTOUdvU0tsTlZTUkZXVkVXRHZ3PT0KLS0tLS1FTkQgRUMgUFJJVkFURSBLRVktLS0tLQo=
|
||||
SIGNING_KEY_ALGORITHM: ES256
|
||||
image: pomerium/pomerium:${POMERIUM_TAG:-master}
|
||||
image: pomerium/pomerium:${POMERIUM_TAG:-main}
|
||||
networks:
|
||||
main:
|
||||
aliases:
|
||||
|
@ -237,7 +237,7 @@ services:
|
|||
SHARED_SECRET: UYgnt8bxxK5G2sFaNzyqi5Z+OgF8m2akNc0xdQx718w=
|
||||
SIGNING_KEY: LS0tLS1CRUdJTiBFQyBQUklWQVRFIEtFWS0tLS0tCk1IY0NBUUVFSVBSR1d3TGg3NW5OWG5razM3ekRmTjhvbkx3ZkNpYUxQVEQrbmM4THg1aGNvQW9HQ0NxR1NNNDkKQXdFSG9VUURRZ0FFa3BCa08wVEttaDRKZFFmTE9lZU1kNTNLbmdhMVdkUVhyNUZjZXBrK2RMVktkVkt4WENHcQpoMW9qdWh1VzExR0lvT3pTOUdvU0tsTlZTUkZXVkVXRHZ3PT0KLS0tLS1FTkQgRUMgUFJJVkFURSBLRVktLS0tLQo=
|
||||
SIGNING_KEY_ALGORITHM: ES256
|
||||
image: pomerium/pomerium:${POMERIUM_TAG:-master}
|
||||
image: pomerium/pomerium:${POMERIUM_TAG:-main}
|
||||
networks:
|
||||
main:
|
||||
aliases:
|
||||
|
@ -295,7 +295,7 @@ services:
|
|||
SHARED_SECRET: UYgnt8bxxK5G2sFaNzyqi5Z+OgF8m2akNc0xdQx718w=
|
||||
SIGNING_KEY: LS0tLS1CRUdJTiBFQyBQUklWQVRFIEtFWS0tLS0tCk1IY0NBUUVFSVBSR1d3TGg3NW5OWG5razM3ekRmTjhvbkx3ZkNpYUxQVEQrbmM4THg1aGNvQW9HQ0NxR1NNNDkKQXdFSG9VUURRZ0FFa3BCa08wVEttaDRKZFFmTE9lZU1kNTNLbmdhMVdkUVhyNUZjZXBrK2RMVktkVkt4WENHcQpoMW9qdWh1VzExR0lvT3pTOUdvU0tsTlZTUkZXVkVXRHZ3PT0KLS0tLS1FTkQgRUMgUFJJVkFURSBLRVktLS0tLQo=
|
||||
SIGNING_KEY_ALGORITHM: ES256
|
||||
image: pomerium/pomerium:${POMERIUM_TAG:-master}
|
||||
image: pomerium/pomerium:${POMERIUM_TAG:-main}
|
||||
networks:
|
||||
main:
|
||||
aliases:
|
||||
|
@ -353,7 +353,7 @@ services:
|
|||
SHARED_SECRET: UYgnt8bxxK5G2sFaNzyqi5Z+OgF8m2akNc0xdQx718w=
|
||||
SIGNING_KEY: LS0tLS1CRUdJTiBFQyBQUklWQVRFIEtFWS0tLS0tCk1IY0NBUUVFSVBSR1d3TGg3NW5OWG5razM3ekRmTjhvbkx3ZkNpYUxQVEQrbmM4THg1aGNvQW9HQ0NxR1NNNDkKQXdFSG9VUURRZ0FFa3BCa08wVEttaDRKZFFmTE9lZU1kNTNLbmdhMVdkUVhyNUZjZXBrK2RMVktkVkt4WENHcQpoMW9qdWh1VzExR0lvT3pTOUdvU0tsTlZTUkZXVkVXRHZ3PT0KLS0tLS1FTkQgRUMgUFJJVkFURSBLRVktLS0tLQo=
|
||||
SIGNING_KEY_ALGORITHM: ES256
|
||||
image: pomerium/pomerium:${POMERIUM_TAG:-master}
|
||||
image: pomerium/pomerium:${POMERIUM_TAG:-main}
|
||||
networks:
|
||||
main:
|
||||
aliases:
|
||||
|
|
|
@ -397,7 +397,7 @@ services:
|
|||
SHARED_SECRET: UYgnt8bxxK5G2sFaNzyqi5Z+OgF8m2akNc0xdQx718w=
|
||||
SIGNING_KEY: LS0tLS1CRUdJTiBFQyBQUklWQVRFIEtFWS0tLS0tCk1IY0NBUUVFSVBSR1d3TGg3NW5OWG5razM3ekRmTjhvbkx3ZkNpYUxQVEQrbmM4THg1aGNvQW9HQ0NxR1NNNDkKQXdFSG9VUURRZ0FFa3BCa08wVEttaDRKZFFmTE9lZU1kNTNLbmdhMVdkUVhyNUZjZXBrK2RMVktkVkt4WENHcQpoMW9qdWh1VzExR0lvT3pTOUdvU0tsTlZTUkZXVkVXRHZ3PT0KLS0tLS1FTkQgRUMgUFJJVkFURSBLRVktLS0tLQo=
|
||||
SIGNING_KEY_ALGORITHM: ES256
|
||||
image: pomerium/pomerium:${POMERIUM_TAG:-master}
|
||||
image: pomerium/pomerium:${POMERIUM_TAG:-main}
|
||||
networks:
|
||||
main:
|
||||
aliases:
|
||||
|
|
|
@ -172,7 +172,7 @@ services:
|
|||
SHARED_SECRET: UYgnt8bxxK5G2sFaNzyqi5Z+OgF8m2akNc0xdQx718w=
|
||||
SIGNING_KEY: LS0tLS1CRUdJTiBFQyBQUklWQVRFIEtFWS0tLS0tCk1IY0NBUUVFSVBSR1d3TGg3NW5OWG5razM3ekRmTjhvbkx3ZkNpYUxQVEQrbmM4THg1aGNvQW9HQ0NxR1NNNDkKQXdFSG9VUURRZ0FFa3BCa08wVEttaDRKZFFmTE9lZU1kNTNLbmdhMVdkUVhyNUZjZXBrK2RMVktkVkt4WENHcQpoMW9qdWh1VzExR0lvT3pTOUdvU0tsTlZTUkZXVkVXRHZ3PT0KLS0tLS1FTkQgRUMgUFJJVkFURSBLRVktLS0tLQo=
|
||||
SIGNING_KEY_ALGORITHM: ES256
|
||||
image: pomerium/pomerium:${POMERIUM_TAG:-master}
|
||||
image: pomerium/pomerium:${POMERIUM_TAG:-main}
|
||||
networks:
|
||||
main:
|
||||
aliases:
|
||||
|
|
|
@ -173,7 +173,7 @@ services:
|
|||
SHARED_SECRET: UYgnt8bxxK5G2sFaNzyqi5Z+OgF8m2akNc0xdQx718w=
|
||||
SIGNING_KEY: LS0tLS1CRUdJTiBFQyBQUklWQVRFIEtFWS0tLS0tCk1IY0NBUUVFSVBSR1d3TGg3NW5OWG5razM3ekRmTjhvbkx3ZkNpYUxQVEQrbmM4THg1aGNvQW9HQ0NxR1NNNDkKQXdFSG9VUURRZ0FFa3BCa08wVEttaDRKZFFmTE9lZU1kNTNLbmdhMVdkUVhyNUZjZXBrK2RMVktkVkt4WENHcQpoMW9qdWh1VzExR0lvT3pTOUdvU0tsTlZTUkZXVkVXRHZ3PT0KLS0tLS1FTkQgRUMgUFJJVkFURSBLRVktLS0tLQo=
|
||||
SIGNING_KEY_ALGORITHM: ES256
|
||||
image: pomerium/pomerium:${POMERIUM_TAG:-master}
|
||||
image: pomerium/pomerium:${POMERIUM_TAG:-main}
|
||||
networks:
|
||||
main:
|
||||
aliases:
|
||||
|
|
|
@ -8,7 +8,7 @@ services:
|
|||
- |
|
||||
set -x
|
||||
# the dev image is only available locally, so load it first
|
||||
if [ "${POMERIUM_TAG:-master}" = "dev" ]; then
|
||||
if [ "${POMERIUM_TAG:-main}" = "dev" ]; then
|
||||
sh -c '
|
||||
while true ; do
|
||||
ctr --connect-timeout=1s --timeout=60s images import /k3s-tmp/pomerium-dev.tar && break
|
||||
|
@ -200,7 +200,7 @@ services:
|
|||
"value": "ES256"
|
||||
}
|
||||
],
|
||||
"image": "pomerium/pomerium:${POMERIUM_TAG:-master}",
|
||||
"image": "pomerium/pomerium:${POMERIUM_TAG:-main}",
|
||||
"imagePullPolicy": "IfNotPresent",
|
||||
"name": "pomerium",
|
||||
"ports": [
|
||||
|
@ -1012,7 +1012,7 @@ services:
|
|||
- |
|
||||
set -x
|
||||
# the dev image is only available locally, so load it first
|
||||
if [ "${POMERIUM_TAG:-master}" = "dev" ]; then
|
||||
if [ "${POMERIUM_TAG:-main}" = "dev" ]; then
|
||||
sh -c '
|
||||
while true ; do
|
||||
ctr --connect-timeout=1s --timeout=60s images import /k3s-tmp/pomerium-dev.tar && break
|
||||
|
|
|
@ -178,7 +178,7 @@ services:
|
|||
SHARED_SECRET: UYgnt8bxxK5G2sFaNzyqi5Z+OgF8m2akNc0xdQx718w=
|
||||
SIGNING_KEY: LS0tLS1CRUdJTiBFQyBQUklWQVRFIEtFWS0tLS0tCk1IY0NBUUVFSVBSR1d3TGg3NW5OWG5razM3ekRmTjhvbkx3ZkNpYUxQVEQrbmM4THg1aGNvQW9HQ0NxR1NNNDkKQXdFSG9VUURRZ0FFa3BCa08wVEttaDRKZFFmTE9lZU1kNTNLbmdhMVdkUVhyNUZjZXBrK2RMVktkVkt4WENHcQpoMW9qdWh1VzExR0lvT3pTOUdvU0tsTlZTUkZXVkVXRHZ3PT0KLS0tLS1FTkQgRUMgUFJJVkFURSBLRVktLS0tLQo=
|
||||
SIGNING_KEY_ALGORITHM: ES256
|
||||
image: pomerium/pomerium:${POMERIUM_TAG:-master}
|
||||
image: pomerium/pomerium:${POMERIUM_TAG:-main}
|
||||
networks:
|
||||
main:
|
||||
aliases:
|
||||
|
@ -237,7 +237,7 @@ services:
|
|||
SHARED_SECRET: UYgnt8bxxK5G2sFaNzyqi5Z+OgF8m2akNc0xdQx718w=
|
||||
SIGNING_KEY: LS0tLS1CRUdJTiBFQyBQUklWQVRFIEtFWS0tLS0tCk1IY0NBUUVFSVBSR1d3TGg3NW5OWG5razM3ekRmTjhvbkx3ZkNpYUxQVEQrbmM4THg1aGNvQW9HQ0NxR1NNNDkKQXdFSG9VUURRZ0FFa3BCa08wVEttaDRKZFFmTE9lZU1kNTNLbmdhMVdkUVhyNUZjZXBrK2RMVktkVkt4WENHcQpoMW9qdWh1VzExR0lvT3pTOUdvU0tsTlZTUkZXVkVXRHZ3PT0KLS0tLS1FTkQgRUMgUFJJVkFURSBLRVktLS0tLQo=
|
||||
SIGNING_KEY_ALGORITHM: ES256
|
||||
image: pomerium/pomerium:${POMERIUM_TAG:-master}
|
||||
image: pomerium/pomerium:${POMERIUM_TAG:-main}
|
||||
networks:
|
||||
main:
|
||||
aliases:
|
||||
|
@ -295,7 +295,7 @@ services:
|
|||
SHARED_SECRET: UYgnt8bxxK5G2sFaNzyqi5Z+OgF8m2akNc0xdQx718w=
|
||||
SIGNING_KEY: LS0tLS1CRUdJTiBFQyBQUklWQVRFIEtFWS0tLS0tCk1IY0NBUUVFSVBSR1d3TGg3NW5OWG5razM3ekRmTjhvbkx3ZkNpYUxQVEQrbmM4THg1aGNvQW9HQ0NxR1NNNDkKQXdFSG9VUURRZ0FFa3BCa08wVEttaDRKZFFmTE9lZU1kNTNLbmdhMVdkUVhyNUZjZXBrK2RMVktkVkt4WENHcQpoMW9qdWh1VzExR0lvT3pTOUdvU0tsTlZTUkZXVkVXRHZ3PT0KLS0tLS1FTkQgRUMgUFJJVkFURSBLRVktLS0tLQo=
|
||||
SIGNING_KEY_ALGORITHM: ES256
|
||||
image: pomerium/pomerium:${POMERIUM_TAG:-master}
|
||||
image: pomerium/pomerium:${POMERIUM_TAG:-main}
|
||||
networks:
|
||||
main:
|
||||
aliases:
|
||||
|
@ -353,7 +353,7 @@ services:
|
|||
SHARED_SECRET: UYgnt8bxxK5G2sFaNzyqi5Z+OgF8m2akNc0xdQx718w=
|
||||
SIGNING_KEY: LS0tLS1CRUdJTiBFQyBQUklWQVRFIEtFWS0tLS0tCk1IY0NBUUVFSVBSR1d3TGg3NW5OWG5razM3ekRmTjhvbkx3ZkNpYUxQVEQrbmM4THg1aGNvQW9HQ0NxR1NNNDkKQXdFSG9VUURRZ0FFa3BCa08wVEttaDRKZFFmTE9lZU1kNTNLbmdhMVdkUVhyNUZjZXBrK2RMVktkVkt4WENHcQpoMW9qdWh1VzExR0lvT3pTOUdvU0tsTlZTUkZXVkVXRHZ3PT0KLS0tLS1FTkQgRUMgUFJJVkFURSBLRVktLS0tLQo=
|
||||
SIGNING_KEY_ALGORITHM: ES256
|
||||
image: pomerium/pomerium:${POMERIUM_TAG:-master}
|
||||
image: pomerium/pomerium:${POMERIUM_TAG:-main}
|
||||
networks:
|
||||
main:
|
||||
aliases:
|
||||
|
|
|
@ -397,7 +397,7 @@ services:
|
|||
SHARED_SECRET: UYgnt8bxxK5G2sFaNzyqi5Z+OgF8m2akNc0xdQx718w=
|
||||
SIGNING_KEY: LS0tLS1CRUdJTiBFQyBQUklWQVRFIEtFWS0tLS0tCk1IY0NBUUVFSVBSR1d3TGg3NW5OWG5razM3ekRmTjhvbkx3ZkNpYUxQVEQrbmM4THg1aGNvQW9HQ0NxR1NNNDkKQXdFSG9VUURRZ0FFa3BCa08wVEttaDRKZFFmTE9lZU1kNTNLbmdhMVdkUVhyNUZjZXBrK2RMVktkVkt4WENHcQpoMW9qdWh1VzExR0lvT3pTOUdvU0tsTlZTUkZXVkVXRHZ3PT0KLS0tLS1FTkQgRUMgUFJJVkFURSBLRVktLS0tLQo=
|
||||
SIGNING_KEY_ALGORITHM: ES256
|
||||
image: pomerium/pomerium:${POMERIUM_TAG:-master}
|
||||
image: pomerium/pomerium:${POMERIUM_TAG:-main}
|
||||
networks:
|
||||
main:
|
||||
aliases:
|
||||
|
|
|
@ -172,7 +172,7 @@ services:
|
|||
SHARED_SECRET: UYgnt8bxxK5G2sFaNzyqi5Z+OgF8m2akNc0xdQx718w=
|
||||
SIGNING_KEY: LS0tLS1CRUdJTiBFQyBQUklWQVRFIEtFWS0tLS0tCk1IY0NBUUVFSVBSR1d3TGg3NW5OWG5razM3ekRmTjhvbkx3ZkNpYUxQVEQrbmM4THg1aGNvQW9HQ0NxR1NNNDkKQXdFSG9VUURRZ0FFa3BCa08wVEttaDRKZFFmTE9lZU1kNTNLbmdhMVdkUVhyNUZjZXBrK2RMVktkVkt4WENHcQpoMW9qdWh1VzExR0lvT3pTOUdvU0tsTlZTUkZXVkVXRHZ3PT0KLS0tLS1FTkQgRUMgUFJJVkFURSBLRVktLS0tLQo=
|
||||
SIGNING_KEY_ALGORITHM: ES256
|
||||
image: pomerium/pomerium:${POMERIUM_TAG:-master}
|
||||
image: pomerium/pomerium:${POMERIUM_TAG:-main}
|
||||
networks:
|
||||
main:
|
||||
aliases:
|
||||
|
|
|
@ -173,7 +173,7 @@ services:
|
|||
SHARED_SECRET: UYgnt8bxxK5G2sFaNzyqi5Z+OgF8m2akNc0xdQx718w=
|
||||
SIGNING_KEY: LS0tLS1CRUdJTiBFQyBQUklWQVRFIEtFWS0tLS0tCk1IY0NBUUVFSVBSR1d3TGg3NW5OWG5razM3ekRmTjhvbkx3ZkNpYUxQVEQrbmM4THg1aGNvQW9HQ0NxR1NNNDkKQXdFSG9VUURRZ0FFa3BCa08wVEttaDRKZFFmTE9lZU1kNTNLbmdhMVdkUVhyNUZjZXBrK2RMVktkVkt4WENHcQpoMW9qdWh1VzExR0lvT3pTOUdvU0tsTlZTUkZXVkVXRHZ3PT0KLS0tLS1FTkQgRUMgUFJJVkFURSBLRVktLS0tLQo=
|
||||
SIGNING_KEY_ALGORITHM: ES256
|
||||
image: pomerium/pomerium:${POMERIUM_TAG:-master}
|
||||
image: pomerium/pomerium:${POMERIUM_TAG:-main}
|
||||
networks:
|
||||
main:
|
||||
aliases:
|
||||
|
|
Loading…
Add table
Reference in a new issue