Pomerium is an identity and context-aware access proxy.
Find a file
Cuong Manh Le 633c25feb7
authorize: store policy evaluator on success only (#1206)
Currently, when option changes, whether the option is good or bad, we
always store new policy evaluator.

When options is bad, policy evaluator will be nil. That can lead to panic
at runtime if a Check request were called after Authorize.OnConfigChange
ran with bad option.

We already have an error message if new policy evaluator fails, so we
must only update it on success only.
2020-08-05 21:39:10 +07:00
.github deployment: fix brew creation for pomerium-cli (#1192) 2020-08-03 10:15:38 -04:00
authenticate fix redirect loop, remove user/session services, remove duplicate deleted_at fields (#1162) 2020-07-30 09:41:57 -06:00
authorize authorize: store policy evaluator on success only (#1206) 2020-08-05 21:39:10 +07:00
cache pkg/storage/redis: add redis TLS support (#1163) 2020-07-31 19:37:23 +07:00
cmd cmd/pomerium-cli: do not require terminal with cached creds (#1196) 2020-08-04 08:36:14 -04:00
config proxy: add support for spdy upgrades (#1203) 2020-08-04 13:26:14 -04:00
docs proxy: add support for spdy upgrades (#1203) 2020-08-04 13:26:14 -04:00
examples docs: rename docs/reference to docs/topics (#1182) 2020-08-01 10:00:14 -07:00
integration integration: add dummy value for idp_service_account (#1009) 2020-06-26 12:32:51 -04:00
internal proxy: add support for spdy upgrades (#1203) 2020-08-04 13:26:14 -04:00
pkg pkg/storage/redis: metrics updates (#1195) 2020-08-05 07:16:53 -04:00
proxy proxy: refactor handler setup code (#1205) 2020-08-05 12:48:44 +07:00
scripts depedency: bump envoy to 1.15.0 (#1119) 2020-07-21 08:25:37 -07:00
.codecov.yml development: change codecov precision 2019-07-18 16:49:37 -07:00
.dockerignore Update build and release process for envoy embedding (#699) 2020-05-18 17:10:10 -04:00
.gitignore grpc: rename internal/grpc to pkg/grpc (#1010) 2020-06-26 09:17:02 -06:00
.golangci.yml identity: abstract identity providers by type (#560) 2020-04-23 10:36:24 -07:00
.pre-commit-config.yaml grpc: rename internal/grpc to pkg/grpc (#1010) 2020-06-26 09:17:02 -06:00
3RD-PARTY all: refactor handler logic 2019-09-16 18:01:14 -07:00
Dockerfile Update build and release process for envoy embedding (#699) 2020-05-18 17:10:10 -04:00
go.mod chore(deps): update module google.golang.org/grpc to v1.31.0 2020-08-03 15:40:56 +00:00
go.sum authorize: add test for denied response (#1197) 2020-08-04 21:20:30 +07:00
LICENSE initial release 2019-01-02 12:13:36 -08:00
Makefile Allow specify go executable in Makefile (#1008) 2020-06-26 23:53:47 +07:00
package.json chore(deps): update vuepress monorepo to v1.5.2 2020-06-15 08:29:40 +00:00
README.md docs: add visual studio code server 2019-08-08 10:04:56 -07:00
renovate.json Merge remote-tracking branch 'origin/master' into feature/envoy 2020-05-18 17:10:10 -04:00
VERSION deployment: prepare 0.9.0 (#798) 2020-05-30 18:07:57 -07:00

pomerium logo

pomerium chat Travis CI Go Report Card GoDoc LICENSE codecov Docker Pulls

Pomerium is an identity-aware proxy that enables secure access to internal applications. Pomerium provides a standardized interface to add access control to applications regardless of whether the application itself has authorization or authentication baked-in. Pomerium gateways both internal and external requests, and can be used in situations where you'd typically reach for a VPN.

Pomerium can be used to:

  • provide a single-sign-on gateway to internal applications.
  • enforce dynamic access policy based on context, identity, and device state.
  • aggregate access logs and telemetry data.
  • a VPN alternative.

Docs

For comprehensive docs, and tutorials see our documentation.