From dc938d6ed2feaaab8b74a3f5145d536997848302 Mon Sep 17 00:00:00 2001 From: Russ Savage Date: Mon, 16 Oct 2023 14:42:01 -0700 Subject: [PATCH] fix: update docs links for new docs site Signed-off-by: Russ Savage --- api/v1alpha1/ngrok_common.go | 2 +- docs/deployment-guide/ngrok-regions.md | 2 +- docs/developer-guide/internal-crds.md | 14 +++++++------- docs/user-guide/crds.md | 8 ++++---- .../user-guide/ingress-to-edge-relationship.md | 2 +- docs/user-guide/ip-restrictions.md | 2 +- docs/user-guide/route-modules.md | 18 +++++++++--------- docs/user-guide/tcp-tls-edges.md | 6 +++--- .../crds/ingress.k8s.ngrok.com_httpsedges.yaml | 2 +- .../ingress.k8s.ngrok.com_ngrokmodulesets.yaml | 2 +- manifest-bundle.yaml | 2 +- 11 files changed, 30 insertions(+), 30 deletions(-) diff --git a/api/v1alpha1/ngrok_common.go b/api/v1alpha1/ngrok_common.go index 7034412b..738c5f70 100644 --- a/api/v1alpha1/ngrok_common.go +++ b/api/v1alpha1/ngrok_common.go @@ -87,7 +87,7 @@ type SecretKeyRef struct { type EndpointWebhookVerification struct { // a string indicating which webhook provider will be sending webhooks to this // endpoint. Value must be one of the supported providers defined at - // https://ngrok.com/docs/cloud-edge#webhook-verification + // https://ngrok.com/docs/http/webhook-verification/#supported-providers Provider string `json:"provider,omitempty"` // SecretRef is a reference to a secret containing the secret used to validate // requests from the given provider. All providers except AWS SNS require a secret diff --git a/docs/deployment-guide/ngrok-regions.md b/docs/deployment-guide/ngrok-regions.md index 549e6965..a53d4a1e 100644 --- a/docs/deployment-guide/ngrok-regions.md +++ b/docs/deployment-guide/ngrok-regions.md @@ -1,7 +1,7 @@ # ngrok Region ngrok runs globally distributed tunnel servers around the world to enable fast, low latency traffic to your applications. -See https://ngrok.com/docs/platform/pops/ for more information on ngrok's regions. +See https://ngrok.com/docs/network-edge/#points-of-presence for more information on ngrok's regions. Similar to the agent, if you do not explicitly pick a region via helm when installing the controller, the controller will attempt to pick the region with the least latency, which is usually the one geographically closest to your machine. diff --git a/docs/developer-guide/internal-crds.md b/docs/developer-guide/internal-crds.md index d3acaf8d..5e6fd42f 100644 --- a/docs/developer-guide/internal-crds.md +++ b/docs/developer-guide/internal-crds.md @@ -24,7 +24,7 @@ This may stabilize to a first class CRD in the future, but for now, it's not rec | ngrokAPICommon | [ngrokAPICommon](#ngrokapicommon) | No | Common fields shared by all ngrok resources. | | hostports | []string | Yes | A list of hostports served by this edge. | | routes | []HTTPSEdgeRouteSpec | No | A list of routes served by this edge. | -| tlsTermination | [EndpointTLSTerminationAtEdge](https://ngrok.com/docs/api#type-EndpointTLSTerminationAtEdge) | No | The TLS termination configuration for this edge. | +| tlsTermination | [EndpointTLSTerminationAtEdge](https://ngrok.com/docs/api/resources/edges-https/#endpointtlsterminationatedge-parameters) | No | The TLS termination configuration for this edge. | ### HTTPSEdgeRouteSpec | Field | Type | Required | Description | @@ -32,11 +32,11 @@ This may stabilize to a first class CRD in the future, but for now, it's not rec | ngrokAPICommon | [ngrokAPICommon](#ngrokapicommon) | No | Common fields shared by all ngrok resources. | | matchType | string | Yes | The type of match to use for this route. Valid values are: `exact_path` and `path_prefix`. | | match | string | Yes | The value to match against the request path. | -| backend | [TunnelGroupBackend](https://ngrok.com/docs/api#type-TunnelGroupBackend) | Yes | The definition for the tunnel group backend that serves traffic for this edge. | -| compression | [EndpointCompression](https://ngrok.com/docs/api#type-EndpointCompression) | No | Whether or not to enable compression for this route. | -| ipRestriction | [EndpointIPPolicy](https://ngrok.com/docs/api#type-EndpointIPPolicy) | No | An IPRestriction to apply to this route. | -| headers | [EndpointHeaders](https://ngrok.com/docs/api#type-EndpointHeaders) | No | Request/response headers to apply to this route. | -| webhookVerification | [EndpointWebhookVerification](https://ngrok.com/docs/api#type-EndpointWebhookVerification) | No | Webhook verification configuration to apply to this route. | +| backend | [TunnelGroupBackend](https://ngrok.com/docs/api/resources/tunnel-group-backends/) | Yes | The definition for the tunnel group backend that serves traffic for this edge. | +| compression | [EndpointCompression](https://ngrok.com/docs/api/resources/edges-https-routes/#endpointcompression-parameters) | No | Whether or not to enable compression for this route. | +| ipRestriction | [EndpointIPPolicy](https://ngrok.com/docs/api/resources/edges-https-routes/#endpointippolicymutate-parameters) | No | An IPRestriction to apply to this route. | +| headers | [EndpointHeaders](https://ngrok.com/docs/api/resources/edges-https-routes/#endpointrequestheaders-parameters) | No | Request/response headers to apply to this route. | +| webhookVerification | [EndpointWebhookVerification](https://ngrok.com/docs/api/resources/edges-https-routes/#endpointwebhookvalidation-parameters) | No | Webhook verification configuration to apply to this route. | ### HTTPSEdgeRouteStatus | Field | Type | Required | Description | @@ -45,7 +45,7 @@ This may stabilize to a first class CRD in the future, but for now, it's not rec | uri | string | No | The URI for this route. | | match | string | No | The value to match against the request path. | | matchType | string | No | The type of match to use for this route. Valid values are: `exact_path` and `path_prefix`. | -| backend | [TunnelGroupBackendStatus](https://ngrok.com/docs/api#type-TunnelGroupBackendStatus) | No | Stores the status of the tunnel group backend, mainly the ID of the backend. | +| backend | [TunnelGroupBackendStatus](https://ngrok.com/docs/api/resources/tunnel-group-backends/) | No | Stores the status of the tunnel group backend, mainly the ID of the backend. | ### HTTPSEdgeStatus | Field | Type | Required | Description | diff --git a/docs/user-guide/crds.md b/docs/user-guide/crds.md index 199b29b6..9086fb7b 100644 --- a/docs/user-guide/crds.md +++ b/docs/user-guide/crds.md @@ -125,7 +125,7 @@ The Kubernetes ingress spec does not directly support TCP traffic. The ngrok Kub | --- | --- | --- | --- | | ngrokAPICommon | [ngrokAPICommon](#ngrokapicommon) | No | Common fields shared by all ngrok resources. | | backend | [TunnelGroupBackend](#tunnelgroupbackend) | Yes | The definition for the tunnel group backend that serves traffic for this edge. | -| ipRestriction | [EndpointIPPolicy](https://ngrok.com/docs/api#type-EndpointIPPolicy) | No | An IPRestriction to apply to this route. | +| ipRestriction | [EndpointIPPolicy](https://ngrok.com/docs/api/resources/tcp-edge-ip-restriction-module/) | No | An IPRestriction to apply to this route. | ### TunnelGroupBackend | Field | Type | Required | Description | @@ -164,9 +164,9 @@ ngrok's TLS Edges function similarly to TCP Edges in that they may contain arbit | ngrokAPICommon | [ngrokAPICommon](#ngrokapicommon) | No | Common fields shared by all ngrok resources. | | backend | [TunnelGroupBackend](#tunnelgroupbackend) | Yes | The definition for the tunnel group backend that serves traffic for this edge. | | hostports | []string | Yes | A list of hostports served by this edge. | -| ipRestriction | [EndpointIPPolicy](https://ngrok.com/docs/api#type-EndpointIPPolicy) | No | An IPRestriction to apply to this edge. | -| tlsTermination | [TLSTermination](https://ngrok.com/docs/api/resources/tls-edge-tls-termination-module/) | No | TLS Termination behaviour for this edge. | -| mutualTls | [MutualTLS](https://ngrok.com/docs/api/resources/tls-edge-mutual-tls-module/) | No | Mutual TLS validation for this edge. | +| ipRestriction | [EndpointIPPolicy](https://ngrok.com/docs/api/resources/tls-edge-ip-restriction-module/) | No | An IPRestriction to apply to this edge. | +| tlsTermination | [TLSTermination](https://ngrok.com/docs/api/resources/edges-tls/#endpointtlstermination-parameters) | No | TLS Termination behaviour for this edge. | +| mutualTls | [MutualTLS](https://ngrok.com/docs/api/resources/edges-tls/#endpointmutualtlsmutate-parameters) | No | Mutual TLS validation for this edge. | ### TLSEdgeStatus | Field | Type | Required | Description | diff --git a/docs/user-guide/ingress-to-edge-relationship.md b/docs/user-guide/ingress-to-edge-relationship.md index fddcaa51..ff69a594 100644 --- a/docs/user-guide/ingress-to-edge-relationship.md +++ b/docs/user-guide/ingress-to-edge-relationship.md @@ -1,6 +1,6 @@ # Ingress to Edge Relationship -This ingress controller aims to take the [ingress spec](https://kubernetes.io/docs/concepts/services-networking/ingress/#the-ingress-resource) and implement each specified concept into ngrok edges. The concept of an ngrok Edge is documented more [here](https://ngrok.com/docs/cloud-edge/). This document aims to explain how multiple ingress objects with rules and hosts that overlap combine to form edges in the ngrok API. +This ingress controller aims to take the [ingress spec](https://kubernetes.io/docs/concepts/services-networking/ingress/#the-ingress-resource) and implement each specified concept into ngrok edges. The concept of an ngrok Edge is documented more [here](https://ngrok.com/docs/network-edge/). This document aims to explain how multiple ingress objects with rules and hosts that overlap combine to form edges in the ngrok API. In Short: - a host correlates directly to an edge diff --git a/docs/user-guide/ip-restrictions.md b/docs/user-guide/ip-restrictions.md index ec3aa851..a65c97be 100644 --- a/docs/user-guide/ip-restrictions.md +++ b/docs/user-guide/ip-restrictions.md @@ -1,6 +1,6 @@ # IP Restrictions -ngrok offers the ability to restrict access to your edges by IP address via [IP Restrictions](https://ngrok.com/docs/cloud-edge/modules/ip-restrictions/). +ngrok offers the ability to restrict access to your edges by IP address via [IP Restrictions](https://ngrok.com/docs/http/ip-restrictions/). These are configurable via the [IPPolicy](./crds.md#ip-policies) CRD and can be attached to Ingress objects via [NgrokModuleSet](./route-modules.md). Under Construction \ No newline at end of file diff --git a/docs/user-guide/route-modules.md b/docs/user-guide/route-modules.md index 6456d954..98c4e8bb 100644 --- a/docs/user-guide/route-modules.md +++ b/docs/user-guide/route-modules.md @@ -1,7 +1,7 @@ # Modules -ngrok's Cloud Edge [Modules](https://ngrok.com/docs/cloud-edge/modules/) allow you to configure features like compression, IP Restrictions, OAuth, adding/removing headers, and more. +ngrok's Cloud Edge [Modules](https://ngrok.com/docs/http/#modules) allow you to configure features like compression, IP Restrictions, OAuth, adding/removing headers, and more. @@ -125,7 +125,7 @@ using pre-made configurations. ### Circuit Breaker -[Circuit breakers](https://ngrok.com/docs/cloud-edge/modules/circuit-breaker/) are used to protect upstream servers by rejecting traffic to them when they become overwhelmed. +[Circuit breakers](https://ngrok.com/docs/http/circuit-breaker/) are used to protect upstream servers by rejecting traffic to them when they become overwhelmed. ```yaml kind: NgrokModuleSet @@ -174,7 +174,7 @@ modules: #### Request -The [Request Headers](https://ngrok.com/docs/cloud-edge/modules/request-headers/) module allows you to add and remove headers from HTTP requests before they are sent to your upstream server. +The [Request Headers](https://ngrok.com/docs/http/request-headers/) module allows you to add and remove headers from HTTP requests before they are sent to your upstream server. ```yaml kind: NgrokModuleSet @@ -193,7 +193,7 @@ modules: #### Response -The [Response Headers module](https://ngrok.com/docs/cloud-edge/modules/response-headers/) allows you to add and remove headers from HTTP responses before they are returned to the client. +The [Response Headers module](https://ngrok.com/docs/http/response-headers/) allows you to add and remove headers from HTTP responses before they are returned to the client. ```yaml kind: NgrokModuleSet @@ -212,7 +212,7 @@ modules: ### IP Restrictions -[IP Restrictions](https://ngrok.com/docs/cloud-edge/modules/ip-restrictions/) allow you to attach one or more IP policies to the route. +[IP Restrictions](https://ngrok.com/docs/http/ip-restrictions/) allow you to attach one or more IP policies to the route. Policies may be specified by either their `ID` in the ngrok API or by the name of an `ippolicy.ingress.k8s.ngrok.com` Custom Resource if managed by the ingress controller. @@ -245,7 +245,7 @@ modules: ### OAuth -The [OAuth module](https://ngrok.com/docs/cloud-edge/modules/oauth/) enforces an OAuth authentication flow in front of any route it is enabled on. +The [OAuth module](https://ngrok.com/docs/http/oauth/) enforces an OAuth authentication flow in front of any route it is enabled on. #### Ngrok Managed OAuth Application @@ -304,7 +304,7 @@ modules: ### OpenID Connect (OIDC) -The [OIDC module](https://ngrok.com/docs/cloud-edge/modules/openid-connect/) restricts endpoint access to only users authorized by a OpenID Identity Provider. +The [OIDC module](https://ngrok.com/docs/http/openid-connect/) restricts endpoint access to only users authorized by a OpenID Identity Provider. ```yaml --- @@ -337,7 +337,7 @@ modules: ### SAML -The [SAML module](https://ngrok.com/docs/cloud-edge/modules/saml/) restricts endpoint access to only users authorized by a SAML IdP. +The [SAML module](https://ngrok.com/docs/http/saml/) restricts endpoint access to only users authorized by a SAML IdP. ### TLS Termination @@ -355,7 +355,7 @@ modules: ### Webhook Verification -The webhook verification module allows ngrok to assert requests to your endpoint originate from a supported webhook provider like Slack or Github. +The [webhook verification module](https://ngrok.com/docs/http/webhook-verification/) allows ngrok to assert requests to your endpoint originate from a supported webhook provider like Slack or Github. ```yaml --- diff --git a/docs/user-guide/tcp-tls-edges.md b/docs/user-guide/tcp-tls-edges.md index 2ffcb8de..2eac7854 100644 --- a/docs/user-guide/tcp-tls-edges.md +++ b/docs/user-guide/tcp-tls-edges.md @@ -1,7 +1,7 @@ # TCP and TLS Edges -ngrok offers [TCP](https://ngrok.com/docs/cloud-edge/edges/tcp/) and -[TLS](https://ngrok.com/docs/cloud-edge/edges/tcp/) Edges which can be used to +ngrok offers [TCP](https://ngrok.com/docs/tcp/) and +[TLS](https://ngrok.com/docs/tls/) Edges which can be used to provide ingress to TCP or TLS based services. Both are implemented as CRDs and function similarly in broad strokes, albeit with slightly different configuration options offered. [Their CRD reference](./crds.md#tcp-edges) is a @@ -30,7 +30,7 @@ Create the edge CRD. These resources are fairly similar, and both require you to specify a [TunnelGroupBackend](./crds.md#tunnelgroupbackend). This consists of a list of labels that determine which specific [Tunnel](./crds.md#tunnels) should receive traffic from the edge. Both may also specify [IP -Policies](https://ngrok.com/docs/api/resources/ip-policies/) for limiting access +Policies](https://ngrok.com/docs/tls/ip-restrictions/) for limiting access to the edge. At the time of writing, these policies must be provided as a reference in the form `ipp_`. diff --git a/helm/ingress-controller/templates/crds/ingress.k8s.ngrok.com_httpsedges.yaml b/helm/ingress-controller/templates/crds/ingress.k8s.ngrok.com_httpsedges.yaml index 49149eb6..06b8f21d 100644 --- a/helm/ingress-controller/templates/crds/ingress.k8s.ngrok.com_httpsedges.yaml +++ b/helm/ingress-controller/templates/crds/ingress.k8s.ngrok.com_httpsedges.yaml @@ -972,7 +972,7 @@ spec: provider: description: a string indicating which webhook provider will be sending webhooks to this endpoint. Value must - be one of the supported providers defined at https://ngrok.com/docs/cloud-edge#webhook-verification + be one of the supported providers defined at https://ngrok.com/docs/http/webhook-verification/#supported-providers type: string secret: description: SecretRef is a reference to a secret containing diff --git a/helm/ingress-controller/templates/crds/ingress.k8s.ngrok.com_ngrokmodulesets.yaml b/helm/ingress-controller/templates/crds/ingress.k8s.ngrok.com_ngrokmodulesets.yaml index 8521464f..2e0c0327 100644 --- a/helm/ingress-controller/templates/crds/ingress.k8s.ngrok.com_ngrokmodulesets.yaml +++ b/helm/ingress-controller/templates/crds/ingress.k8s.ngrok.com_ngrokmodulesets.yaml @@ -860,7 +860,7 @@ spec: provider: description: a string indicating which webhook provider will be sending webhooks to this endpoint. Value must be one of the - supported providers defined at https://ngrok.com/docs/cloud-edge#webhook-verification + supported providers defined at https://ngrok.com/docs/http/webhook-verification/#supported-providers type: string secret: description: SecretRef is a reference to a secret containing the diff --git a/manifest-bundle.yaml b/manifest-bundle.yaml index 5836c45d..93cd8c4a 100644 --- a/manifest-bundle.yaml +++ b/manifest-bundle.yaml @@ -309,7 +309,7 @@ spec: provider: description: a string indicating which webhook provider will be sending webhooks to this endpoint. Value must - be one of the supported providers defined at https://ngrok.com/docs/cloud-edge#webhook-verification + be one of the supported providers defined at https://ngrok.com/docs/http/webhook-verification/#supported-providers type: string secret: description: SecretRef is a reference to a secret containing