mirror of
https://github.com/pomerium/pomerium.git
synced 2025-05-30 01:17:21 +02:00
Merge pull request #139 from travisgroth/feature/viper-config
deployment: expose config file interface in docker images
This commit is contained in:
commit
794b7996db
10 changed files with 28 additions and 16 deletions
|
@ -22,9 +22,9 @@ Remember to set your identity provider settings and to generate new secret keys!
|
|||
- Great for testing Pomerium
|
||||
- Routes default to hosted version of httpbin.org
|
||||
|
||||
Customize for your identity provider and run `source ./env && ./bin/pomerium`
|
||||
Customize for your identity provider and run `./bin/pomerium -config config.yaml`
|
||||
|
||||
<<< @/env.example
|
||||
<<< @/config.example.yaml
|
||||
|
||||
## Docker
|
||||
|
||||
|
|
|
@ -23,11 +23,10 @@ services:
|
|||
- CERTIFICATE_KEY_FILE=privkey.pem
|
||||
- AUTHENTICATE_SERVICE_URL=https://authenticate.corp.beyondperimeter.com
|
||||
- AUTHORIZE_SERVICE_URL=https://authorize.corp.beyondperimeter.com
|
||||
- POLICY_FILE=./policy.yaml
|
||||
volumes:
|
||||
- ./cert.pem:/pomerium/cert.pem:ro
|
||||
- ./privkey.pem:/pomerium/privkey.pem:ro
|
||||
- ./policy.example.yaml:/pomerium/policy.yaml:ro
|
||||
- ./config-policy-only.yaml:/pomerium/config.yaml:ro
|
||||
ports:
|
||||
- 443:443
|
||||
|
||||
|
|
|
@ -60,7 +60,7 @@ services:
|
|||
volumes:
|
||||
- ./cert.pem:/pomerium/cert.pem:ro
|
||||
- ./privkey.pem:/pomerium/privkey.pem:ro
|
||||
- ./policy.example.yaml:/pomerium/policy.yaml:ro
|
||||
- ./config-policy-only.yaml:/pomerium/config.yaml:ro
|
||||
expose:
|
||||
- 443
|
||||
|
||||
|
@ -79,7 +79,7 @@ services:
|
|||
volumes:
|
||||
- ./cert.pem:/pomerium/cert.pem:ro
|
||||
- ./privkey.pem:/pomerium/privkey.pem:ro
|
||||
- ./policy.example.yaml:/pomerium/policy.yaml:ro
|
||||
- ./config-policy-only.yaml:/pomerium/config.yaml:ro
|
||||
expose:
|
||||
- 443
|
||||
|
||||
|
|
|
@ -23,9 +23,9 @@ Edit the `docker-compose.yml` to match your specific [identity provider]'s setti
|
|||
|
||||
### Policy configuration
|
||||
|
||||
Next, create a policy configuration file which will contain the routes you want to proxy, and their desired access-controls. For example, `policy.example.yaml`:
|
||||
Next, create a configuration file which will contain the routes you want to proxy, and their desired access-controls. For example, `config-policy-only.yaml`:
|
||||
|
||||
<<< @/policy.example.yaml
|
||||
<<< @/config-policy-only.yaml
|
||||
|
||||
### Certificates
|
||||
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue