feat: Create namespace and set it explicitly

This commit is contained in:
2025-12-23 00:49:55 +01:00
parent 948473c171
commit eed5b44916
6 changed files with 23 additions and 3 deletions

View File

@@ -2,9 +2,11 @@ kind: ClusterRoleBinding
apiVersion: rbac.authorization.k8s.io/v1 apiVersion: rbac.authorization.k8s.io/v1
metadata: metadata:
name: authelia-controller name: authelia-controller
namespace: authelia
subjects: subjects:
- kind: ServiceAccount - kind: ServiceAccount
name: authelia-controller name: authelia-controller
namespace: authelia
roleRef: roleRef:
kind: ClusterRole kind: ClusterRole
name: authelia-controller name: authelia-controller

View File

@@ -2,6 +2,7 @@ kind: ClusterRole
apiVersion: rbac.authorization.k8s.io/v1 apiVersion: rbac.authorization.k8s.io/v1
metadata: metadata:
name: authelia-controller name: authelia-controller
namespace: authelia
rules: rules:
- apiGroups: - apiGroups:
- authelia.huizinga.dev - authelia.huizinga.dev

View File

@@ -2,6 +2,7 @@ apiVersion: apps/v1
kind: Deployment kind: Deployment
metadata: metadata:
name: authelia-controller name: authelia-controller
namespace: authelia
labels: labels:
app: authelia-controller app: authelia-controller
app.kubernetes.io/name: authelia-controller app.kubernetes.io/name: authelia-controller
@@ -18,12 +19,17 @@ spec:
kubectl.kubernetes.io/default-container: authelia-controller kubectl.kubernetes.io/default-container: authelia-controller
spec: spec:
serviceAccountName: authelia-controller serviceAccountName: authelia-controller
securityContext: {} securityContext:
runAsNonRoot: true
runAsUser: 1000
runAsGroup: 1000
fsGroup: 1000
seccompProfile:
type: RuntimeDefault
containers: containers:
- name: authelia-controller - name: authelia-controller
image: '{{ index .images "authelia-controller" }}' image: '{{ index .images "authelia-controller" }}'
imagePullPolicy: IfNotPresent imagePullPolicy: IfNotPresent
securityContext: {}
resources: resources:
limits: limits:
cpu: 200m cpu: 200m
@@ -34,3 +40,9 @@ spec:
env: env:
- name: RUST_LOG - name: RUST_LOG
value: info,authelia_controller=debug value: info,authelia_controller=debug
securityContext:
allowPrivilegeEscalation: false
runAsNonRoot: true
capabilities:
drop:
- ALL

View File

@@ -1,7 +1,7 @@
apiVersion: kustomize.config.k8s.io/v1beta1 apiVersion: kustomize.config.k8s.io/v1beta1
kind: Kustomization kind: Kustomization
namespace: authelia
resources: resources:
- ./namespace.yaml
- ./crds.yaml - ./crds.yaml
- ./service-account.yaml - ./service-account.yaml
- ./cluster-role.yaml - ./cluster-role.yaml

4
manifests/namespace.yaml Normal file
View File

@@ -0,0 +1,4 @@
apiVersion: v1
kind: Namespace
metadata:
name: authelia

View File

@@ -2,6 +2,7 @@ apiVersion: v1
kind: ServiceAccount kind: ServiceAccount
metadata: metadata:
name: authelia-controller name: authelia-controller
namespace: authelia
labels: labels:
app: authelia-controller app: authelia-controller
app.kubernetes.io/name: authelia-controller app.kubernetes.io/name: authelia-controller