Compare commits

..

2 Commits

Author SHA1 Message Date
f2d3e58948 chore: Remove ./ from kustomization for consistency
All checks were successful
Build and deploy / build (push) Successful in 11m27s
2025-12-23 00:50:22 +01:00
b75561f589 feat: Create namespace and set it explicitly 2025-12-23 00:49:55 +01:00
3 changed files with 3 additions and 28 deletions

View File

@@ -6,23 +6,9 @@ group "default" {
}
target "docker-metadata-action" {}
target "cache" {
cache-from = [
{
type = "gha",
}
]
cache-to = [
{
type = "gha",
mode = "max"
}
]
}
target "authelia-controller" {
inherits = ["docker-metadata-action", "cache"]
inherits = ["docker-metadata-action"]
context = "./"
dockerfile = "Dockerfile"
tags = [for tag in target.docker-metadata-action.tags : "${TAG_BASE}:${tag}"]
@@ -30,7 +16,6 @@ target "authelia-controller" {
}
target "manifests" {
inherits = ["cache"]
context = "./"
dockerfile = "Dockerfile"
target = "manifests"

View File

@@ -6,7 +6,6 @@ metadata:
subjects:
- kind: ServiceAccount
name: authelia-controller
namespace: authelia
roleRef:
kind: ClusterRole
name: authelia-controller

View File

@@ -45,7 +45,6 @@ pub struct AccessControlRuleSpec {
#[derive(Serialize, Deserialize, Clone, Debug, Hash)]
struct AccessControl {
rules: Vec<AccessControlRuleSpec>,
default_policy: AccessPolicy,
}
#[derive(Serialize, Deserialize, Clone, Debug, Hash)]
@@ -61,22 +60,14 @@ impl AccessControlRule {
debug!("Updating acl");
rules.sort_by_cached_key(|rule| rule.name_any());
let rules: Vec<_> = rules
let rules = rules
.iter()
.inspect(|rule| trace!(name = rule.name_any(), "Rule found"))
.map(|rule| rule.spec.clone())
.collect();
let top = TopLevel {
access_control: AccessControl {
// TODO: Make sure configurable?
default_policy: if rules.is_empty() {
AccessPolicy::OneFactor
} else {
AccessPolicy::Deny
},
rules,
},
access_control: AccessControl { rules },
};
let contents = BTreeMap::from([(