Compare commits

..

8 Commits

Author SHA1 Message Date
20b058b221 feat: Cache docker builds
All checks were successful
Build and deploy / build (push) Successful in 24m12s
2025-12-23 03:35:44 +01:00
5a2926b76f chore: Remove ./ from kustomization for consistency
All checks were successful
Build and deploy / build (push) Successful in 10m46s
2025-12-23 01:38:49 +01:00
0de7c36592 feat: Create namespace and set it explicitly 2025-12-23 01:38:49 +01:00
0078ae6100 feat: Add security context
All checks were successful
Build and deploy / build (push) Successful in 10m39s
2025-12-22 23:59:39 +01:00
b005873532 fix: Outdated glibc 2025-12-22 23:59:39 +01:00
2a02e168a0 chore: Renamed credentials secret in deployment 2025-12-22 23:59:38 +01:00
0397588c8c feat: Update to new workflow 2025-12-22 23:59:38 +01:00
cfbbac3e0b chore: Update dependencies 2025-12-22 23:59:38 +01:00
9 changed files with 50 additions and 16 deletions

View File

@@ -9,8 +9,7 @@ on:
jobs:
build:
uses: infra/workflows/.gitea/workflows/docker.yaml@d062ec1f98edd46c48b5f3185d2a7c01ebb6bda2
uses: infra/workflows/.gitea/workflows/docker.yaml@956337b9bd5e72a93d3a57513cd421e7554dd61d
secrets: inherit
with:
webhook_url: ${{ secrets.WEBHOOK_URL }}

View File

@@ -1,7 +1,7 @@
FROM rust:1.92 AS base
ENV CARGO_REGISTRIES_CRATES_IO_PROTOCOL=sparse
RUN cargo install cargo-chef --locked --version 0.1.71 && \
cargo install cargo-auditable --locked --version 0.6.6
RUN cargo install cargo-chef --locked --version 0.1.73 && \
cargo install cargo-auditable --locked --version 0.7.2
WORKDIR /app
FROM base AS planner
@@ -20,6 +20,6 @@ RUN cargo auditable build --release && /app/target/release/crdgen > /crds.yaml
FROM scratch AS manifests
COPY --from=builder /crds.yaml /
FROM gcr.io/distroless/cc-debian12:nonroot AS runtime
FROM gcr.io/distroless/cc-debian13:nonroot AS runtime
COPY --from=builder /app/target/release/lldap-controller /lldap-controller
CMD ["/lldap-controller"]

View File

@@ -6,9 +6,23 @@ group "default" {
}
target "docker-metadata-action" {}
target "cache" {
cache-from = [
{
type = "gha",
}
]
cache-to = [
{
type = "gha",
mode = "max"
}
]
}
target "lldap-controller" {
inherits = ["docker-metadata-action"]
inherits = ["docker-metadata-action", "cache"]
context = "./"
dockerfile = "Dockerfile"
tags = [for tag in target.docker-metadata-action.tags : "${TAG_BASE}:${tag}"]
@@ -16,6 +30,7 @@ target "lldap-controller" {
}
target "manifests" {
inherits = ["cache"]
context = "./"
dockerfile = "Dockerfile"
target = "manifests"

View File

@@ -2,9 +2,11 @@ kind: ClusterRoleBinding
apiVersion: rbac.authorization.k8s.io/v1
metadata:
name: lldap-controller
namespace: lldap
subjects:
- kind: ServiceAccount
name: lldap-controller
namespace: lldap
roleRef:
kind: ClusterRole
name: lldap-controller

View File

@@ -2,6 +2,7 @@ kind: ClusterRole
apiVersion: rbac.authorization.k8s.io/v1
metadata:
name: lldap-controller
namespace: lldap
rules:
- apiGroups:
- lldap.huizinga.dev

View File

@@ -2,6 +2,7 @@ apiVersion: apps/v1
kind: Deployment
metadata:
name: lldap-controller
namespace: lldap
labels:
app: lldap-controller
app.kubernetes.io/name: lldap-controller
@@ -18,12 +19,17 @@ spec:
kubectl.kubernetes.io/default-container: lldap-controller
spec:
serviceAccountName: lldap-controller
securityContext: {}
securityContext:
runAsNonRoot: true
runAsUser: 1000
runAsGroup: 1000
fsGroup: 1000
seccompProfile:
type: RuntimeDefault
containers:
- name: lldap-controller
image: "{{ index .images 'lldap-controller' }}"
image: '{{ index .images "lldap-controller" }}'
imagePullPolicy: IfNotPresent
securityContext: {}
resources:
limits:
cpu: 200m
@@ -43,9 +49,15 @@ spec:
- name: LLDAP_USERNAME
value: admin
- name: LLDAP_PASSWORD_FILE
value: /secrets/credentials/lldap-ldap-user-pass
value: /secrets/credentials/admin-pass
- name: LLDAP_BIND_DN
value: uid={username},ou=people,dc=huizinga,dc=dev
securityContext:
allowPrivilegeEscalation: false
runAsNonRoot: true
capabilities:
drop:
- ALL
volumes:
- name: credentials
secret:

View File

@@ -1,9 +1,9 @@
apiVersion: kustomize.config.k8s.io/v1beta1
kind: Kustomization
namespace: lldap
resources:
- ./crds.yaml
- ./service-account.yaml
- ./cluster-role.yaml
- ./cluster-role-binding.yaml
- ./deployment.yaml
- namespace.yaml
- crds.yaml
- service-account.yaml
- cluster-role.yaml
- cluster-role-binding.yaml
- deployment.yaml

4
manifests/namespace.yaml Normal file
View File

@@ -0,0 +1,4 @@
apiVersion: v1
kind: Namespace
metadata:
name: lldap

View File

@@ -2,6 +2,7 @@ apiVersion: v1
kind: ServiceAccount
metadata:
name: lldap-controller
namespace: lldap
labels:
app: lldap-controller
app.kubernetes.io/name: lldap-controller