mirror of
https://github.com/pomerium/pomerium.git
synced 2025-08-03 16:59:22 +02:00
ci: rename master to main (#3045)
Co-authored-by: alexfornuto <afornuto@pomerium.com>
This commit is contained in:
parent
1238fa86b7
commit
0b0fba06b3
69 changed files with 165 additions and 165 deletions
|
@ -1088,11 +1088,11 @@ By default, the `databroker` service uses an in-memory databroker.
|
|||
|
||||
To create your own data broker, implement the following gRPC interface:
|
||||
|
||||
- [pkg/grpc/databroker/databroker.proto](https://github.com/pomerium/pomerium/blob/master/pkg/grpc/databroker/databroker.proto)
|
||||
- [pkg/grpc/databroker/databroker.proto](https://github.com/pomerium/pomerium/blob/main/pkg/grpc/databroker/databroker.proto)
|
||||
|
||||
For an example implementation, the in-memory database used by the databroker service can be found here:
|
||||
|
||||
- [pkg/databroker/memory](https://github.com/pomerium/pomerium/tree/master/pkg/databroker/memory)
|
||||
- [pkg/databroker/memory](https://github.com/pomerium/pomerium/tree/main/pkg/databroker/memory)
|
||||
|
||||
|
||||
### Data Broker Internal Service URL
|
||||
|
@ -1669,7 +1669,7 @@ See [Client-Side mTLS With Pomerium](/guides/mtls.md) for more information.
|
|||
|
||||
If specified, Pomerium will present this client certificate to upstream services when requested to enforce [mutual authentication](https://en.wikipedia.org/wiki/Mutual_authentication) (mTLS).
|
||||
|
||||
For more details, see our [mTLS example repository](https://github.com/pomerium/pomerium/tree/master/examples/mutual-tls) and the [Upstream mTLS With Pomerium](/guides/upstream-mtls.md) guide.
|
||||
For more details, see our [mTLS example repository](https://github.com/pomerium/pomerium/tree/main/examples/mutual-tls) and the [Upstream mTLS With Pomerium](/guides/upstream-mtls.md) guide.
|
||||
|
||||
|
||||
### Pass Identity Headers
|
||||
|
@ -1802,7 +1802,7 @@ Signing Key is the private key used to sign a user's attestation JWT which can b
|
|||
|
||||
If set, the signing key's public key will can retrieved by hitting Pomerium's `/.well-known/pomerium/jwks.json` endpoint which lives on the authenticate service. Otherwise, the endpoint will return an empty keyset.
|
||||
|
||||
For example, assuming you have [generated an ES256 key](https://github.com/pomerium/pomerium/blob/master/scripts/generate_self_signed_signing_key.sh) as follows.
|
||||
For example, assuming you have [generated an ES256 key](https://github.com/pomerium/pomerium/blob/main/scripts/generate_self_signed_signing_key.sh) as follows.
|
||||
|
||||
```bash
|
||||
# Generates an P-256 (ES256) signing key
|
||||
|
@ -1844,7 +1844,7 @@ If no certificate is specified, one will be generated and the base64'd public ke
|
|||
[letsencrypt]: https://letsencrypt.org/
|
||||
[oidc rfc]: https://openid.net/specs/openid-connect-core-1_0.html#AuthRequest
|
||||
[okta]: /docs/identity-providers/okta.md
|
||||
[script]: https://github.com/pomerium/pomerium/blob/master/scripts/generate_wildcard_cert.sh
|
||||
[script]: https://github.com/pomerium/pomerium/blob/main/scripts/generate_wildcard_cert.sh
|
||||
[signed headers]: /docs/topics/getting-users-identity.md
|
||||
[toml]: https://en.wikipedia.org/wiki/TOML
|
||||
[yaml]: https://en.wikipedia.org/wiki/YAML
|
||||
|
|
|
@ -34,7 +34,7 @@ postamble: |
|
|||
[letsencrypt]: https://letsencrypt.org/
|
||||
[oidc rfc]: https://openid.net/specs/openid-connect-core-1_0.html#AuthRequest
|
||||
[okta]: /docs/identity-providers/okta.md
|
||||
[script]: https://github.com/pomerium/pomerium/blob/master/scripts/generate_wildcard_cert.sh
|
||||
[script]: https://github.com/pomerium/pomerium/blob/main/scripts/generate_wildcard_cert.sh
|
||||
[signed headers]: /docs/topics/getting-users-identity.md
|
||||
[toml]: https://en.wikipedia.org/wiki/TOML
|
||||
[yaml]: https://en.wikipedia.org/wiki/YAML
|
||||
|
@ -1221,11 +1221,11 @@ settings:
|
|||
|
||||
To create your own data broker, implement the following gRPC interface:
|
||||
|
||||
- [pkg/grpc/databroker/databroker.proto](https://github.com/pomerium/pomerium/blob/master/pkg/grpc/databroker/databroker.proto)
|
||||
- [pkg/grpc/databroker/databroker.proto](https://github.com/pomerium/pomerium/blob/main/pkg/grpc/databroker/databroker.proto)
|
||||
|
||||
For an example implementation, the in-memory database used by the databroker service can be found here:
|
||||
|
||||
- [pkg/databroker/memory](https://github.com/pomerium/pomerium/tree/master/pkg/databroker/memory)
|
||||
- [pkg/databroker/memory](https://github.com/pomerium/pomerium/tree/main/pkg/databroker/memory)
|
||||
- name: "Data Broker Internal Service URL"
|
||||
keys: ["databroker_internal_service_url"]
|
||||
attributes: |
|
||||
|
@ -1823,7 +1823,7 @@ settings:
|
|||
doc: |
|
||||
If specified, Pomerium will present this client certificate to upstream services when requested to enforce [mutual authentication](https://en.wikipedia.org/wiki/Mutual_authentication) (mTLS).
|
||||
|
||||
For more details, see our [mTLS example repository](https://github.com/pomerium/pomerium/tree/master/examples/mutual-tls) and the [Upstream mTLS With Pomerium](/guides/upstream-mtls.md) guide.
|
||||
For more details, see our [mTLS example repository](https://github.com/pomerium/pomerium/tree/main/examples/mutual-tls) and the [Upstream mTLS With Pomerium](/guides/upstream-mtls.md) guide.
|
||||
- name: "Pass Identity Headers"
|
||||
keys: ["pass_identity_headers"]
|
||||
attributes: |
|
||||
|
@ -1960,7 +1960,7 @@ settings:
|
|||
|
||||
If set, the signing key's public key will can retrieved by hitting Pomerium's `/.well-known/pomerium/jwks.json` endpoint which lives on the authenticate service. Otherwise, the endpoint will return an empty keyset.
|
||||
|
||||
For example, assuming you have [generated an ES256 key](https://github.com/pomerium/pomerium/blob/master/scripts/generate_self_signed_signing_key.sh) as follows.
|
||||
For example, assuming you have [generated an ES256 key](https://github.com/pomerium/pomerium/blob/main/scripts/generate_self_signed_signing_key.sh) as follows.
|
||||
|
||||
```bash
|
||||
# Generates an P-256 (ES256) signing key
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue