Compare commits
4 Commits
2496b12a7c
...
c01501794d
| Author | SHA1 | Date | |
|---|---|---|---|
|
c01501794d
|
|||
|
19ab3e7da2
|
|||
|
1d03948fec
|
|||
|
257a341145
|
@@ -9,8 +9,7 @@ on:
|
||||
|
||||
jobs:
|
||||
build:
|
||||
uses: dreaded_x/workflows/.gitea/workflows/rust-kubernetes.yaml@66ab50c3ac239dbdd1e42e6276ec2e65b6a79379
|
||||
uses: infra/workflows/.gitea/workflows/docker.yaml@956337b9bd5e72a93d3a57513cd421e7554dd61d
|
||||
secrets: inherit
|
||||
with:
|
||||
generate_crds: true
|
||||
webhook_url: ${{ secrets.WEBHOOK_URL }}
|
||||
|
||||
@@ -15,9 +15,11 @@ RUN cargo chef cook --release --recipe-path recipe.json
|
||||
COPY . .
|
||||
ARG RELEASE_VERSION
|
||||
ENV RELEASE_VERSION=${RELEASE_VERSION}
|
||||
RUN cargo auditable build --release
|
||||
RUN cargo auditable build --release && /app/target/release/crdgen > /crds.yaml
|
||||
|
||||
FROM gcr.io/distroless/cc-debian12:nonroot AS runtime
|
||||
FROM scratch AS manifests
|
||||
COPY --from=builder /crds.yaml /
|
||||
|
||||
FROM gcr.io/distroless/cc-debian13:nonroot AS runtime
|
||||
COPY --from=builder /app/target/release/lldap-controller /lldap-controller
|
||||
COPY --from=builder /app/target/release/crdgen /crdgen
|
||||
CMD ["/lldap-controller"]
|
||||
|
||||
23
docker-bake.hcl
Normal file
23
docker-bake.hcl
Normal file
@@ -0,0 +1,23 @@
|
||||
variable "TAG_BASE" {}
|
||||
variable "RELEASE_VERSION" {}
|
||||
|
||||
group "default" {
|
||||
targets = ["lldap-controller", "manifests"]
|
||||
}
|
||||
|
||||
target "docker-metadata-action" {}
|
||||
|
||||
target "lldap-controller" {
|
||||
inherits = ["docker-metadata-action"]
|
||||
context = "./"
|
||||
dockerfile = "Dockerfile"
|
||||
tags = [for tag in target.docker-metadata-action.tags : "${TAG_BASE}:${tag}"]
|
||||
target = "runtime"
|
||||
}
|
||||
|
||||
target "manifests" {
|
||||
context = "./"
|
||||
dockerfile = "Dockerfile"
|
||||
target = "manifests"
|
||||
output = [{ type = "cacheonly" }, "manifests"]
|
||||
}
|
||||
@@ -18,12 +18,17 @@ spec:
|
||||
kubectl.kubernetes.io/default-container: lldap-controller
|
||||
spec:
|
||||
serviceAccountName: lldap-controller
|
||||
securityContext: {}
|
||||
securityContext:
|
||||
runAsNonRoot: true
|
||||
runAsUser: 1000
|
||||
runAsGroup: 1000
|
||||
fsGroup: 1000
|
||||
seccompProfile:
|
||||
type: RuntimeDefault
|
||||
containers:
|
||||
- name: lldap-controller
|
||||
image: git.huizinga.dev/dreaded_x/lldap-controller@${DIGEST}
|
||||
image: '{{ index .images "lldap-controller" }}'
|
||||
imagePullPolicy: IfNotPresent
|
||||
securityContext: {}
|
||||
resources:
|
||||
limits:
|
||||
cpu: 200m
|
||||
@@ -43,10 +48,16 @@ spec:
|
||||
- name: LLDAP_USERNAME
|
||||
value: admin
|
||||
- name: LLDAP_PASSWORD_FILE
|
||||
value: /secrets/credentials/lldap-ldap-user-pass
|
||||
value: /secrets/credentials/admin-pass
|
||||
- name: LLDAP_BIND_DN
|
||||
value: uid={username},ou=people,dc=huizinga,dc=dev
|
||||
securityContext:
|
||||
allowPrivilegeEscalation: false
|
||||
runAsNonRoot: true
|
||||
capabilities:
|
||||
drop:
|
||||
- ALL
|
||||
volumes:
|
||||
- name: credentials
|
||||
secret:
|
||||
secretName: lldap-credentials
|
||||
secretName: credentials
|
||||
|
||||
Reference in New Issue
Block a user