Merge pull request #139 from travisgroth/feature/viper-config

deployment: expose config file interface in docker images
This commit is contained in:
Bobby DeSimone 2019-05-26 20:09:07 -07:00 committed by GitHub
commit 794b7996db
No known key found for this signature in database
GPG key ID: 4AEE18F83AFDEB23
10 changed files with 28 additions and 16 deletions

View file

@ -22,9 +22,9 @@ Remember to set your identity provider settings and to generate new secret keys!
- Great for testing Pomerium
- Routes default to hosted version of httpbin.org
Customize for your identity provider and run `source ./env && ./bin/pomerium`
Customize for your identity provider and run `./bin/pomerium -config config.yaml`
<<< @/env.example
<<< @/config.example.yaml
## Docker

View file

@ -23,11 +23,10 @@ services:
- CERTIFICATE_KEY_FILE=privkey.pem
- AUTHENTICATE_SERVICE_URL=https://authenticate.corp.beyondperimeter.com
- AUTHORIZE_SERVICE_URL=https://authorize.corp.beyondperimeter.com
- POLICY_FILE=./policy.yaml
volumes:
- ./cert.pem:/pomerium/cert.pem:ro
- ./privkey.pem:/pomerium/privkey.pem:ro
- ./policy.example.yaml:/pomerium/policy.yaml:ro
- ./config-policy-only.yaml:/pomerium/config.yaml:ro
ports:
- 443:443

View file

@ -60,7 +60,7 @@ services:
volumes:
- ./cert.pem:/pomerium/cert.pem:ro
- ./privkey.pem:/pomerium/privkey.pem:ro
- ./policy.example.yaml:/pomerium/policy.yaml:ro
- ./config-policy-only.yaml:/pomerium/config.yaml:ro
expose:
- 443
@ -79,7 +79,7 @@ services:
volumes:
- ./cert.pem:/pomerium/cert.pem:ro
- ./privkey.pem:/pomerium/privkey.pem:ro
- ./policy.example.yaml:/pomerium/policy.yaml:ro
- ./config-policy-only.yaml:/pomerium/config.yaml:ro
expose:
- 443

View file

@ -23,9 +23,9 @@ Edit the `docker-compose.yml` to match your specific [identity provider]'s setti
### Policy configuration
Next, create a policy configuration file which will contain the routes you want to proxy, and their desired access-controls. For example, `policy.example.yaml`:
Next, create a configuration file which will contain the routes you want to proxy, and their desired access-controls. For example, `config-policy-only.yaml`:
<<< @/policy.example.yaml
<<< @/config-policy-only.yaml
### Certificates