mirror of
https://github.com/pomerium/pomerium.git
synced 2025-04-29 18:36:30 +02:00
Merge pull request #236 from desimone/feature/deployment-add-spellcheck
deployment: add docs spellcheck to pipeline
This commit is contained in:
commit
50fbfd9aff
3 changed files with 66 additions and 63 deletions
8
Makefile
8
Makefile
|
@ -30,7 +30,7 @@ GOOSARCHES = linux/amd64 darwin/amd64 windows/amd64
|
||||||
|
|
||||||
|
|
||||||
.PHONY: all
|
.PHONY: all
|
||||||
all: clean build lint test ## Runs a clean, build, fmt, lint, test, and vet.
|
all: clean build lint spellcheck test ## Runs a clean, build, fmt, lint, test, and vet.
|
||||||
|
|
||||||
.PHONY: tag
|
.PHONY: tag
|
||||||
tag: ## Create a new git tag to prepare to build a release
|
tag: ## Create a new git tag to prepare to build a release
|
||||||
|
@ -54,6 +54,12 @@ test: ## Runs the go tests.
|
||||||
@echo "==> $@"
|
@echo "==> $@"
|
||||||
@go test -tags "$(BUILDTAGS)" $(shell go list ./... | grep -v vendor)
|
@go test -tags "$(BUILDTAGS)" $(shell go list ./... | grep -v vendor)
|
||||||
|
|
||||||
|
.PHONY: spellcheck
|
||||||
|
spellcheck: # Spellcheck docs
|
||||||
|
@echo "==> Spell checking docs..."
|
||||||
|
@GO111MODULE=off go get -u github.com/client9/misspell/cmd/misspell
|
||||||
|
@misspell -error -source=text docs/
|
||||||
|
|
||||||
|
|
||||||
.PHONY: cover
|
.PHONY: cover
|
||||||
cover: ## Runs go test with coverage
|
cover: ## Runs go test with coverage
|
||||||
|
|
|
@ -105,7 +105,7 @@ https://login.microsoftonline.com/0303f438-3c5c-4190-9854-08d3eb31bd9f/v2.0
|
||||||
|
|
||||||
### Configure Pomerium
|
### Configure Pomerium
|
||||||
|
|
||||||
Finally, configure Pomerium with the identity provider settings retrieved in the pervious steps. Your [environmental variables] should look something like:
|
Finally, configure Pomerium with the identity provider settings retrieved in the previous steps. Your [environmental variables] should look something like:
|
||||||
|
|
||||||
```bash
|
```bash
|
||||||
# Azure
|
# Azure
|
||||||
|
@ -129,11 +129,11 @@ Navigate to **User Settings** then **Applications** using the left-hand menu.
|
||||||
|
|
||||||
On the **Applications** page, add a new application by setting the following parameters:
|
On the **Applications** page, add a new application by setting the following parameters:
|
||||||
|
|
||||||
| Field | Description |
|
Field | Description
|
||||||
| ------------ | -------------------------------------------------------------------------- |
|
------------ | --------------------------------------------------------------------------
|
||||||
| Name | The name of your web app |
|
Name | The name of your web app
|
||||||
| Redirect URI | Redirect URL (e.g.`https://authenticate.corp.example.com/oauth2/callback`) |
|
Redirect URI | Redirect URL (e.g.`https://authenticate.corp.example.com/oauth2/callback`)
|
||||||
| Scopes | **Must** select **read_user** and **openid** |
|
Scopes | **Must** select **read_user** and **openid**
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
|
@ -170,10 +170,10 @@ On the **Credentials** page, click **Create credentials** and choose **OAuth [Cl
|
||||||
|
|
||||||
On the **Create [Client ID]** page, select **Web application**. In the new fields that display, set the following parameters:
|
On the **Create [Client ID]** page, select **Web application**. In the new fields that display, set the following parameters:
|
||||||
|
|
||||||
| Field | Description |
|
Field | Description
|
||||||
| ------------------------ | -------------------------------------------------------------------------- |
|
------------------------ | --------------------------------------------------------------------------
|
||||||
| Name | The name of your web app |
|
Name | The name of your web app
|
||||||
| Authorized redirect URIs | Redirect URL (e.g.`https://authenticate.corp.example.com/oauth2/callback`) |
|
Authorized redirect URIs | Redirect URL (e.g.`https://authenticate.corp.example.com/oauth2/callback`)
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
|
@ -198,8 +198,6 @@ Then, you'll need to manually open an editor and add an `impersonate_user` field
|
||||||
|
|
||||||
:::
|
:::
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
```json
|
```json
|
||||||
{
|
{
|
||||||
"type": "service_account",
|
"type": "service_account",
|
||||||
|
@ -246,13 +244,13 @@ On the **Create New Application** page, select the **Web** for your application.
|
||||||
|
|
||||||
Next, provide the following information for your application settings:
|
Next, provide the following information for your application settings:
|
||||||
|
|
||||||
| Field | Description |
|
Field | Description
|
||||||
| ---------------------------- | --------------------------------------------------------------------------- |
|
---------------------------- | ---------------------------------------------------------------------------
|
||||||
| Name | The name of your application. |
|
Name | The name of your application.
|
||||||
| Base URIs (optional) | The domain(s) of your application. |
|
Base URIs (optional) | The domain(s) of your application.
|
||||||
| Login redirect URIs | Redirect URL (e.g.`https://authenticate.corp.example.com/oauth2/callback`). |
|
Login redirect URIs | Redirect URL (e.g.`https://authenticate.corp.example.com/oauth2/callback`).
|
||||||
| Group assignments (optional) | The user groups that can sign in to this application. |
|
Group assignments (optional) | The user groups that can sign in to this application.
|
||||||
| Grant type allowed | **You must enable Refresh Token.** |
|
Grant type allowed | **You must enable Refresh Token.**
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
|
@ -270,27 +268,27 @@ Select your desired authorization server and navigate to the **claims tab**. Cli
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
| Field | Value |
|
Field | Value
|
||||||
| --------------------- | --------------------- |
|
--------------------- | ---------------------
|
||||||
| Name | groups |
|
Name | groups
|
||||||
| Include in token type | **ID Token**, Always. |
|
Include in token type | **ID Token**, Always.
|
||||||
| Value Type | Groups |
|
Value Type | Groups
|
||||||
| Filter | Matches regex `.*` |
|
Filter | Matches regex `.*`
|
||||||
| Include in | Any scope |
|
Include in | Any scope
|
||||||
|
|
||||||
Add an another, almost identical, claim but this time for **Access Token**.
|
Add an another, almost identical, claim but this time for **Access Token**.
|
||||||
|
|
||||||
| Field | Value |
|
Field | Value
|
||||||
| --------------------- | ------------------------- |
|
--------------------- | -------------------------
|
||||||
| Name | groups |
|
Name | groups
|
||||||
| Include in token type | **Access Token**, Always. |
|
Include in token type | **Access Token**, Always.
|
||||||
| Value Type | Groups |
|
Value Type | Groups
|
||||||
| Filter | Matches regex `.*` |
|
Filter | Matches regex `.*`
|
||||||
| Include in | Any scope |
|
Include in | Any scope
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
Finally, configure Pomerium with the identity provider settings retrieved in the pervious steps. Your [environmental variables] should look something like this.
|
Finally, configure Pomerium with the identity provider settings retrieved in the previous steps. Your [environmental variables] should look something like this.
|
||||||
|
|
||||||
```bash
|
```bash
|
||||||
IDP_PROVIDER="okta"
|
IDP_PROVIDER="okta"
|
||||||
|
@ -325,7 +323,6 @@ Set the application type to **Web** and the token endpoint to be **POST**.
|
||||||
|
|
||||||
Under **Token Timeout settings** set **Refresh Token** to 60 minutes (or whatever value makes sense for your organization). Note, however, if you don't enable refresh tokens the user will be prompted to authenticate whenever the access token expires which can result in a poor user experience.
|
Under **Token Timeout settings** set **Refresh Token** to 60 minutes (or whatever value makes sense for your organization). Note, however, if you don't enable refresh tokens the user will be prompted to authenticate whenever the access token expires which can result in a poor user experience.
|
||||||
|
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
[OneLogin's OIDC implementation](https://developers.onelogin.com/openid-connect/scopes) supports the `groups` which can return either the user's group or role which can be used within pomerium to enforced group-based ACL policy.
|
[OneLogin's OIDC implementation](https://developers.onelogin.com/openid-connect/scopes) supports the `groups` which can return either the user's group or role which can be used within pomerium to enforced group-based ACL policy.
|
||||||
|
@ -338,7 +335,7 @@ To return the user's Active Directory field, configure the group to return `memb
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
Finally, configure Pomerium with the identity provider settings retrieved in the pervious steps. Your [environmental variables] should look something like this.
|
Finally, configure Pomerium with the identity provider settings retrieved in the previous steps. Your [environmental variables] should look something like this.
|
||||||
|
|
||||||
```bash
|
```bash
|
||||||
IDP_PROVIDER="onelogin"
|
IDP_PROVIDER="onelogin"
|
||||||
|
|
|
@ -165,7 +165,7 @@ Expose a prometheus format HTTP endpoint on the specified port. Disabled by defa
|
||||||
#### Metrics tracked
|
#### Metrics tracked
|
||||||
|
|
||||||
Name | Type | Description
|
Name | Type | Description
|
||||||
:------------------------------ | :-------- | :--------------------------------------------
|
:-------------------------------------------- | :-------- | :----------------------------------------------------------------------
|
||||||
grpc_client_request_duration_ms | Histogram | GRPC client request duration by service
|
grpc_client_request_duration_ms | Histogram | GRPC client request duration by service
|
||||||
grpc_client_request_size_bytes | Histogram | GRPC client request size by service
|
grpc_client_request_size_bytes | Histogram | GRPC client request size by service
|
||||||
grpc_client_requests_total | Counter | Total GRPC client requests made by service
|
grpc_client_requests_total | Counter | Total GRPC client requests made by service
|
||||||
|
@ -184,7 +184,7 @@ http_server_requests_total | Counter | Total HTTP server requests handled
|
||||||
http_server_response_size_bytes | Histogram | HTTP server response size by service
|
http_server_response_size_bytes | Histogram | HTTP server response size by service
|
||||||
pomerium_config_checksum_int64 | Gauge | Currently loaded configuration checksum by service
|
pomerium_config_checksum_int64 | Gauge | Currently loaded configuration checksum by service
|
||||||
pomerium_config_last_reload_success | Gauge | Whether the last configuration reload succeeded by service
|
pomerium_config_last_reload_success | Gauge | Whether the last configuration reload succeeded by service
|
||||||
pomerium_config_last_reload_success_timestamp | Guage | The timestamp of the last successful configuration reload by service
|
pomerium_config_last_reload_success_timestamp | Gauge | The timestamp of the last successful configuration reload by service
|
||||||
pomerium_build_info | Gauge | Pomerium build metadata by git revision, service, version and goversion
|
pomerium_build_info | Gauge | Pomerium build metadata by git revision, service, version and goversion
|
||||||
|
|
||||||
### Policy
|
### Policy
|
||||||
|
|
Loading…
Add table
Reference in a new issue