Compare commits

..

5 Commits

Author SHA1 Message Date
c01501794d feat: Add security context
Some checks failed
Build and deploy / build (push) Failing after 5m7s
2025-12-22 23:38:20 +01:00
19ab3e7da2 fix: Outdated glibc 2025-12-22 23:38:19 +01:00
1d03948fec chore: Renamed credentials secret in deployment 2025-12-22 23:38:19 +01:00
257a341145 feat: Update to new workflow 2025-12-22 23:38:19 +01:00
72bb27aae0 chore: Update dependencies 2025-12-21 06:19:04 +01:00
8 changed files with 9 additions and 33 deletions

View File

@@ -1,7 +1,7 @@
FROM rust:1.92 AS base FROM rust:1.92 AS base
ENV CARGO_REGISTRIES_CRATES_IO_PROTOCOL=sparse ENV CARGO_REGISTRIES_CRATES_IO_PROTOCOL=sparse
RUN cargo install cargo-chef --locked --version 0.1.73 && \ RUN cargo install cargo-chef --locked --version 0.1.71 && \
cargo install cargo-auditable --locked --version 0.7.2 cargo install cargo-auditable --locked --version 0.6.6
WORKDIR /app WORKDIR /app
FROM base AS planner FROM base AS planner

View File

@@ -6,23 +6,9 @@ group "default" {
} }
target "docker-metadata-action" {} target "docker-metadata-action" {}
target "cache" {
cache-from = [
{
type = "gha",
}
]
cache-to = [
{
type = "gha",
mode = "max"
}
]
}
target "lldap-controller" { target "lldap-controller" {
inherits = ["docker-metadata-action", "cache"] inherits = ["docker-metadata-action"]
context = "./" context = "./"
dockerfile = "Dockerfile" dockerfile = "Dockerfile"
tags = [for tag in target.docker-metadata-action.tags : "${TAG_BASE}:${tag}"] tags = [for tag in target.docker-metadata-action.tags : "${TAG_BASE}:${tag}"]
@@ -30,7 +16,6 @@ target "lldap-controller" {
} }
target "manifests" { target "manifests" {
inherits = ["cache"]
context = "./" context = "./"
dockerfile = "Dockerfile" dockerfile = "Dockerfile"
target = "manifests" target = "manifests"

View File

@@ -2,11 +2,9 @@ kind: ClusterRoleBinding
apiVersion: rbac.authorization.k8s.io/v1 apiVersion: rbac.authorization.k8s.io/v1
metadata: metadata:
name: lldap-controller name: lldap-controller
namespace: lldap
subjects: subjects:
- kind: ServiceAccount - kind: ServiceAccount
name: lldap-controller name: lldap-controller
namespace: lldap
roleRef: roleRef:
kind: ClusterRole kind: ClusterRole
name: lldap-controller name: lldap-controller

View File

@@ -2,7 +2,6 @@ kind: ClusterRole
apiVersion: rbac.authorization.k8s.io/v1 apiVersion: rbac.authorization.k8s.io/v1
metadata: metadata:
name: lldap-controller name: lldap-controller
namespace: lldap
rules: rules:
- apiGroups: - apiGroups:
- lldap.huizinga.dev - lldap.huizinga.dev

View File

@@ -2,7 +2,6 @@ apiVersion: apps/v1
kind: Deployment kind: Deployment
metadata: metadata:
name: lldap-controller name: lldap-controller
namespace: lldap
labels: labels:
app: lldap-controller app: lldap-controller
app.kubernetes.io/name: lldap-controller app.kubernetes.io/name: lldap-controller

View File

@@ -1,9 +1,9 @@
apiVersion: kustomize.config.k8s.io/v1beta1 apiVersion: kustomize.config.k8s.io/v1beta1
kind: Kustomization kind: Kustomization
namespace: lldap
resources: resources:
- namespace.yaml - ./crds.yaml
- crds.yaml - ./service-account.yaml
- service-account.yaml - ./cluster-role.yaml
- cluster-role.yaml - ./cluster-role-binding.yaml
- cluster-role-binding.yaml - ./deployment.yaml
- deployment.yaml

View File

@@ -1,4 +0,0 @@
apiVersion: v1
kind: Namespace
metadata:
name: lldap

View File

@@ -2,7 +2,6 @@ apiVersion: v1
kind: ServiceAccount kind: ServiceAccount
metadata: metadata:
name: lldap-controller name: lldap-controller
namespace: lldap
labels: labels:
app: lldap-controller app: lldap-controller
app.kubernetes.io/name: lldap-controller app.kubernetes.io/name: lldap-controller