Skip to content

Commit 4fdb3a2

Browse files
ci: apply automated fixes (attempt 2/3)
1 parent d6750d8 commit 4fdb3a2

File tree

20 files changed

+279
-146
lines changed

20 files changed

+279
-146
lines changed

pages/docs/integrations/azure-ad-b2c/sso-saml/+Page.mdx

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -128,8 +128,7 @@ For this step, we assume you have an app running locally (i.e. on localhost:3000
128128
1. Access your ngrok tunnel via your copied URL
129129
1. You should be prompted to log in or sign up
130130

131-
![img/5-3.png](../img/5-3.png)
132-
4. After login, you should be able to see the application
131+
![img/5-3.png](../img/5-3.png) 4. After login, you should be able to see the application
133132

134133
## Bonus: Update your Azure AD B2C custom policies to support the password reset flow {#bonus}
135134

pages/docs/k8s/guides/endpoint-types/+Page.mdx

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -92,7 +92,8 @@ policy:
9292
on_http_request: - actions: - type: forward-internal
9393
config:
9494
url: https://example-service.internal:8443
95-
```
95+
96+
````
9697
</TabItem>
9798

9899
</Tabs>
@@ -138,7 +139,8 @@ on_http_request: - actions: - type: forward-internal
138139
config:
139140
url: tcp://example-service.internal:8000
140141
bindings: - public
141-
```
142+
````
143+
142144
</TabItem>
143145
144146
</Tabs>

pages/docs/k8s/guides/how-to/basic-auth/+Page.mdx

Lines changed: 8 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -105,7 +105,8 @@ config:
105105
realm: sample-realm
106106
credentials: - user:password1 - admin:password2
107107
enforce: true
108-
```
108+
109+
````
109110
110111
### 2. Use the `NgrokTrafficPolicy` on an `Ingress`
111112

@@ -129,7 +130,8 @@ service:
129130
name: example-service
130131
port:
131132
number: 80
132-
```
133+
````
134+
133135
</TabItem>
134136
<TabItem value="gateway-api" label="Gateway API">
135137
💡 Gateway API resources do not natively support Basic Authentication, but they can be extended using a traffic policy.
@@ -150,7 +152,8 @@ config:
150152
realm: sample-realm
151153
credentials: - user:password1 - admin:password2
152154
enforce: true
153-
```
155+
156+
````
154157
155158
### 2. Use the `NgrokTrafficPolicy` on a `Gateway`
156159

@@ -172,7 +175,8 @@ listeners: - name: example-hostname
172175
hostname: "example-hostname.ngrok.io"
173176
port: 443
174177
protocol: HTTPS
175-
```
178+
````
179+
176180
</TabItem>
177181
178182
</Tabs>

pages/docs/k8s/guides/how-to/circuit-breaking/+Page.mdx

Lines changed: 8 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -101,7 +101,8 @@ volume_threshold: 1
101101
window_duration: 60s
102102
tripped_duration: 2m
103103
enforce: true
104-
```
104+
105+
````
105106
106107
### 2. Use the `NgrokTrafficPolicy` on an `Ingress`
107108

@@ -125,7 +126,8 @@ service:
125126
name: example-service
126127
port:
127128
number: 80
128-
```
129+
````
130+
129131
</TabItem>
130132
<TabItem value="gateway-api" label="Gateway API">
131133
💡 Gateway API resources do not natively support circuit breaking, but they can be extended using a traffic policy.
@@ -148,7 +150,8 @@ volume_threshold: 1
148150
window_duration: 60s
149151
tripped_duration: 2m
150152
enforce: true
151-
```
153+
154+
````
152155
153156
### 2. Use the `NgrokTrafficPolicy` on a `Gateway`
154157

@@ -170,7 +173,8 @@ listeners: - name: example-hostname
170173
hostname: "example-hostname.ngrok.io"
171174
port: 443
172175
protocol: HTTPS
173-
```
176+
````
177+
174178
</TabItem>
175179
176180
</Tabs>

pages/docs/k8s/guides/how-to/compress-response/+Page.mdx

Lines changed: 8 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -108,7 +108,8 @@ on_http_response: - expressions: - req.url.path.startsWith('/api/')
108108
actions: - type: compress-response
109109
config:
110110
algorithms: - gzip - br - deflate - compress
111-
```
111+
112+
````
112113
113114
### 2. Use the `NgrokTrafficPolicy` on an `Ingress`
114115

@@ -132,7 +133,8 @@ service:
132133
name: example-service
133134
port:
134135
number: 80
135-
```
136+
````
137+
136138
</TabItem>
137139
<TabItem value="gateway-api" label="Gateway API">
138140
💡 Gateway API resources do not natively support response compression, but they can be extended using a traffic policy.
@@ -152,7 +154,8 @@ on_http_response: - expressions: - req.url.path.startsWith('/api/')
152154
actions: - type: compress-response
153155
config:
154156
algorithms: - gzip - br - deflate - compress
155-
```
157+
158+
````
156159
157160
### 2. Use the `NgrokTrafficPolicy` on a `Gateway`
158161

@@ -174,7 +177,8 @@ listeners: - name: example-hostname
174177
hostname: "example-hostname.ngrok.io"
175178
port: 443
176179
protocol: HTTPS
177-
```
180+
````
181+
178182
</TabItem>
179183
180184
</Tabs>

pages/docs/k8s/guides/how-to/deny-requests/+Page.mdx

Lines changed: 8 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -95,7 +95,8 @@ on_http_request: - expressions: - conn.client_ip.geo.location.is_eu == false
9595
actions: - type: deny
9696
config:
9797
status_code: 403
98-
```
98+
99+
````
99100
100101
### 2. Use the `NgrokTrafficPolicy` on an `Ingress`
101102

@@ -119,7 +120,8 @@ service:
119120
name: example-service
120121
port:
121122
number: 80
122-
```
123+
````
124+
123125
</TabItem>
124126
<TabItem value="gateway-api" label="Gateway API">
125127
💡 Gateway API resources do not natively support request denial configuration, but they can be extended using a traffic policy.
@@ -139,7 +141,8 @@ on_http_request: - expressions: - conn.client_ip.geo.location.is_eu == false
139141
actions: - type: deny
140142
config:
141143
status_code: 403
142-
```
144+
145+
````
143146
144147
### 2. Use the `NgrokTrafficPolicy` on a `Gateway`
145148

@@ -161,7 +164,8 @@ listeners: - name: example-hostname
161164
hostname: "example-hostname.ngrok.io"
162165
port: 443
163166
protocol: HTTPS
164-
```
167+
````
168+
165169
</TabItem>
166170
167171
</Tabs>

pages/docs/k8s/guides/how-to/jwt-validation/+Page.mdx

Lines changed: 8 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -153,7 +153,8 @@ allowed_algorithms: - RS256 - ES256
153153
keys:
154154
sources:
155155
additional_jkus: - https://example.com/issuer/jku
156-
```
156+
157+
````
157158
158159
### 2. Use the `NgrokTrafficPolicy` on an `Ingress`
159160

@@ -177,7 +178,8 @@ service:
177178
name: example-service
178179
port:
179180
number: 80
180-
```
181+
````
182+
181183
</TabItem>
182184
<TabItem value="gateway-api" label="Gateway API">
183185
💡 Gateway API resources do not natively support JWT validation, but they can be extended using a traffic policy.
@@ -211,7 +213,8 @@ allowed_algorithms: - RS256 - ES256
211213
keys:
212214
sources:
213215
additional_jkus: - https://example.com/issuer/jku
214-
```
216+
217+
````
215218
216219
### 2. Use the `NgrokTrafficPolicy` on a `Gateway`
217220

@@ -233,7 +236,8 @@ listeners: - name: example-hostname
233236
hostname: "example-hostname.ngrok.io"
234237
port: 443
235238
protocol: HTTPS
236-
```
239+
````
240+
237241
</TabItem>
238242
239243
</Tabs>

0 commit comments

Comments
 (0)