fix: use hydra-ldap to fix isolated example

This commit is contained in:
wpetit 2025-02-13 17:02:48 +01:00
parent c97266c272
commit f606af2728
19 changed files with 418 additions and 347 deletions

View File

@ -17,34 +17,32 @@ spec:
app.kubernetes.io/version: "v1.2.2" app.kubernetes.io/version: "v1.2.2"
spec: spec:
containers: containers:
- name: werther - name: werther
image: reg.cadoles.com/cadoles/hydra-werther:2023.12.6-stable.1421.15a4717 image: reg.cadoles.com/cadoles/hydra-werther:2023.12.6-stable.1421.15a4717
imagePullPolicy: IfNotPresent imagePullPolicy: IfNotPresent
envFrom: envFrom:
- configMapRef: - configMapRef:
name: hydra-ldap-env name: hydra-ldap-env
env: env:
- name: WERTHER_WEB_DIR - name: WERTHER_LDAP_BINDDN
value: "/usr/share/werther/login/" valueFrom:
- name: WERTHER_LDAP_BINDDN secretKeyRef:
valueFrom: name: hydra-ldap-sc
secretKeyRef: key: WERTHER_LDAP_BINDDN
name: hydra-ldap-sc - name: WERTHER_LDAP_BINDPW
key: WERTHER_LDAP_BINDDN valueFrom:
- name: WERTHER_LDAP_BINDPW secretKeyRef:
valueFrom: name: hydra-ldap-sc
secretKeyRef: key: WERTHER_LDAP_BINDPW
name: hydra-ldap-sc ports:
key: WERTHER_LDAP_BINDPW - containerPort: 8080
ports: name: http
- containerPort: 8080 securityContext:
name: hydra-ldap-http allowPrivilegeEscalation: false
securityContext: capabilities:
allowPrivilegeEscalation: false drop:
capabilities: - ALL
drop: privileged: false
- ALL readOnlyRootFilesystem: true
privileged: false runAsNonRoot: true
readOnlyRootFilesystem: true runAsUser: 100
runAsNonRoot: true
runAsUser: 100

View File

@ -7,9 +7,9 @@ metadata:
spec: spec:
type: ClusterIP type: ClusterIP
ports: ports:
- name: hydra-ldap - name: http
port: 8080 port: 80
targetPort: hydra-ldap-http targetPort: http
protocol: TCP protocol: TCP
selector: selector:
app.kubernetes.io/name: hydra-ldap app.kubernetes.io/name: hydra-ldap

View File

@ -24,6 +24,8 @@ spec:
name: hydra-saml-env name: hydra-saml-env
ports: ports:
- containerPort: 8080 - containerPort: 8080
command:
- /bin/apache2-foreground
resources: {} resources: {}
restartPolicy: Always restartPolicy: Always
--- ---

View File

@ -23,17 +23,17 @@ spec:
- containerPort: 8080 - containerPort: 8080
resources: {} resources: {}
envFrom: envFrom:
- configMapRef: - configMapRef:
name: oidc-test-env name: oidc-test-env
env: env:
- name: OIDC_CLIENT_ID - name: OIDC_CLIENT_ID
valueFrom: valueFrom:
secretKeyRef: secretKeyRef:
name: oidc-test-oauth2-client name: oidc-test-oauth2-client
key: client_id key: CLIENT_ID
- name: OIDC_CLIENT_SECRET - name: OIDC_CLIENT_SECRET
valueFrom: valueFrom:
secretKeyRef: secretKeyRef:
name: oidc-test-oauth2-client name: oidc-test-oauth2-client
key: client_secret key: CLIENT_SECRET
restartPolicy: Always restartPolicy: Always

View File

@ -0,0 +1,46 @@
debug = true
[ldap]
enabled = true
listen = "0.0.0.0:3893"
tls = false
[ldaps]
enabled = false
[behaviors]
IgnoreCapabilities = true
[backend]
datastore = "config"
baseDN = "dc=glauth,dc=com"
[[users]]
name = "serviceuser"
mail = "serviceuser@example.com"
uidnumber = 5003
primarygroup = 5502
passsha256 = "652c7dc687d98c9889304ed2e408c74b611e86a40caa51c4b43f1dd5913c5cd0" # mysecret
[[users.capabilities]]
action = "search"
object = "*"
[[users]]
name = "jdoe"
uidnumber = 5001
primarygroup = 5501
givenname = "John"
sn = "Doe"
mail = "jdoe@example.com"
passsha256 = "d30a5f57532a603697ccbb51558fa02ccadd74a0c499fcf9d45b33863ee1582f" # jdoe
[[users.customattributes]]
employeetype = ["Intern", "Temp"]
employeenumber = [12345, 54321]
[[groups]]
name = "users"
gidnumber = 5501
[[groups]]
name = "svcaccts"
gidnumber = 5502

View File

@ -0,0 +1,29 @@
hydra:
apps:
- id: ldap
title:
fr: Connexion LDAP
en: Login LDAP
description:
fr: Authentification avec LDAP
en: Authentication with LDAP
login_url: "%env(string:HYDRA_DISPATCHER_LDAP_LOGIN_URL)%"
consent_url: "%env(string:HYDRA_DISPATCHER_LDAP_CONSENT_URL)%"
logout_url: "%env(string:HYDRA_DISPATCHER_LDAP_LOGOUT_URL)%"
attributes_rewrite_configuration:
uid:
rules:
- "property_exists(consent.session.id_token, 'uid') ? consent.session.id_token.uid : null"
email:
rules:
- "property_exists(consent.session.id_token, 'email') ? consent.session.id_token.email : null"
firewall:
rules:
email:
required: false
uid:
required: false
webhook:
enabled: false
webhook_post_login:
enabled: false

View File

@ -2,12 +2,19 @@ apiVersion: kustomize.config.k8s.io/v1beta1
kind: Kustomization kind: Kustomization
resources: resources:
- ../../overlays/full - ../../overlays/base
- ./resources/ingress.yaml - ./resources/ingress.yaml
- ./resources/saml-idp.yaml - ./resources/glauth-ldap.yaml
- ./resources/self-signed-issuer.yaml - ./resources/self-signed-issuer.yaml
- ./resources/port-forwarder.yaml - ./resources/port-forwarder.yaml
components:
- ../../components/hydra-cnpg-database
- ../../components/hydra-ldap
- ../../components/oidc-test
- ../../components/redis
patchesJson6902: patchesJson6902:
- target: - target:
version: v1 version: v1
@ -22,8 +29,13 @@ patchesJson6902:
- target: - target:
version: v1 version: v1
kind: ConfigMap kind: ConfigMap
name: hydra-saml-env name: hydra-ldap-env
path: patches/hydra-saml-env.yaml path: patches/hydra-ldap-env.yaml
- target:
version: v1
kind: Secret
name: hydra-ldap-sc
path: patches/hydra-ldap-sc.yaml
- target: - target:
version: v1 version: v1
kind: Secret kind: Secret
@ -39,3 +51,12 @@ patchesJson6902:
kind: OAuth2Client kind: OAuth2Client
name: oidc-test-oauth2-client name: oidc-test-oauth2-client
path: patches/oidc-test-oauth2-client.yaml path: patches/oidc-test-oauth2-client.yaml
configMapGenerator:
- name: hydra-dispatcher-apps
behavior: replace
files:
- ./files/hydra-dispatcher-apps.yaml
- name: glauth-ldap-conf
files:
- ./files/glauth.conf

View File

@ -1,3 +1,9 @@
- op: replace
path: "/data/APP_ENV"
value: dev
- op: replace
path: "/data/APP_DEBUG"
value: "true"
- op: replace - op: replace
path: "/data/HYDRA_BASE_URL" path: "/data/HYDRA_BASE_URL"
value: http://hydra:4444 value: http://hydra:4444
@ -17,14 +23,13 @@
path: "/data/COOKIE_PATH" path: "/data/COOKIE_PATH"
value: /auth/dispatcher value: /auth/dispatcher
# Hydra SAML configuration # Hydra LDAP configuration
- op: replace - op: replace
path: "/data/HYDRA_DISPATCHER_SAML_LOGIN_URL" path: "/data/HYDRA_DISPATCHER_LDAP_LOGIN_URL"
value: https://ssokustom/auth/saml/login value: https://ssokustom/auth/ldap/auth/login
- op: replace - op: replace
path: "/data/HYDRA_DISPATCHER_SAML_CONSENT_URL" path: "/data/HYDRA_DISPATCHER_LDAP_CONSENT_URL"
value: https://ssokustom/auth/saml/consent value: https://ssokustom/auth/ldap/auth/consent
- op: replace - op: replace
path: "/data/HYDRA_DISPATCHER_SAML_LOGOUT_URL" path: "/data/HYDRA_DISPATCHER_LDAP_LOGOUT_URL"
value: https://ssokustom/auth/saml/logout value: https://ssokustom/auth/ldap/auth/logout

View File

@ -0,0 +1,27 @@
- op: replace
path: "/data/WERTHER_DEV_MODE"
value: "true"
- op: replace
path: "/data/WERTHER_WEB_BASE_PATH"
value: "/auth/ldap/"
- op: replace
path: "/data/WERTHER_IDENTP_HYDRA_URL"
value: "http://hydra-dispatcher"
- op: replace
path: "/data/WERTHER_LDAP_ENDPOINTS"
value: "glauth-ldap:3893"
- op: replace
path: "/data/WERTHER_LDAP_BASEDN"
value: "dc=glauth,dc=com"
- op: replace
path: "/data/WERTHER_LDAP_BINDDN"
value: "cn=serviceuser,ou=svcaccts,ou=users,dc=glauth,dc=com"
- op: replace
path: "/data/WERTHER_LDAP_BINDPW"
value: "mysecret"

View File

@ -0,0 +1,7 @@
- op: replace
path: "/data/WERTHER_LDAP_BINDDN"
value: "Y249c2VydmljZXVzZXIsb3U9c3ZjYWNjdHMsb3U9dXNlcnMsZGM9Z2xhdXRoLGRjPWNvbQ=="
- op: replace
path: "/data/WERTHER_LDAP_BINDPW"
value: "bXlzZWNyZXQ="

View File

@ -1,43 +0,0 @@
- op: replace
path: "/data/HTTP_BASE_URL"
value: https://ssokustom/auth/saml
- op: replace
path: "/data/COOKIE_PATH"
value: /auth/saml
- op: replace
path: "/data/HYDRA_ADMIN_BASE_URL"
value: http://hydra-dispatcher
- op: replace
path: "/data/LOGOUT_REDIRECT_URL_PATTERN"
value: https://ssokustom/auth/saml/Shibboleth.sso/Logout?return=%s
- op: replace
path: "/data/PATH_PREFIX"
value: "/auth/saml"
- op: replace
path: "/data/SP_ENTITY_ID"
value: https://ssokustom/auth/saml
- op: replace
path: "/data/IDP_ENTITY_ID"
value: https://ssokustom/simplesaml/saml2/idp/metadata.php
- op: replace
path: "/data/IDP_METADATA_URL"
value: https://ssokustom/simplesaml/saml2/idp/metadata.php
- op: replace
path: "/data/APACHE_FORCE_HTTPS"
value: "true"
- op: replace
path: "/data/SP_HANDLER_BASE_PATH"
value: "/auth/saml"
- op: replace
path: "/data/SP_LOG_LEVEL"
value: DEBUG
- op: replace
path: "/data/SP_SESSIONS_REDIRECT_LIMIT"
value: none
- op: replace
path: "/data/SP_SESSIONS_REDIRECT_ALLOW"
value: https://ssokustom
- op: replace
path: "/data/SP_SESSIONS_COOKIE_PROPS"
value: https

View File

@ -0,0 +1,50 @@
apiVersion: apps/v1
kind: Deployment
metadata:
labels:
app.kubernetes.io/name: glauth-ldap
name: glauth-ldap
spec:
replicas: 1
selector:
matchLabels:
app.kubernetes.io/name: glauth-ldap
strategy:
type: Recreate
template:
metadata:
labels:
app.kubernetes.io/name: glauth-ldap
spec:
containers:
- image: glauth/glauth:v2.3.2
name: glauth-ldap
ports:
- containerPort: 3893
name: ldap
resources: {}
volumeMounts:
- name: glauth-ldap-conf
mountPath: /app/config/config.cfg
subPath: glauth.conf
restartPolicy: Always
volumes:
- name: glauth-ldap-conf
configMap:
name: glauth-ldap-conf
---
apiVersion: v1
kind: Service
metadata:
labels:
app.kubernetes.io/name: glauth-ldap
name: glauth-ldap
spec:
ports:
- name: ldap
port: 3893
targetPort: ldap
selector:
app.kubernetes.io/name: glauth-ldap
status:
loadBalancer: {}

View File

@ -10,43 +10,45 @@ metadata:
spec: spec:
ingressClassName: nginx ingressClassName: nginx
tls: tls:
- hosts: - hosts:
- ssokustom - ssokustom
secretName: ssokustom-example-tls secretName: ssokustom-example-tls
rules: rules:
- http: - http:
paths: paths:
- path: / - path: /
pathType: Prefix pathType: Prefix
backend: backend:
service: service:
name: oidc-test name: oidc-test
port: port:
name: http name: http
--- ---
apiVersion: networking.k8s.io/v1 apiVersion: networking.k8s.io/v1
kind: Ingress kind: Ingress
metadata: metadata:
name: auth-saml name: auth-ldap
annotations: annotations:
cert-manager.io/issuer: "self-signed" cert-manager.io/issuer: "self-signed"
nginx.ingress.kubernetes.io/force-ssl-redirect: "true" nginx.ingress.kubernetes.io/force-ssl-redirect: "true"
nginx.ingress.kubernetes.io/rewrite-target: /$2
nginx.ingress.kubernetes.io/x-forwarded-prefix: /auth/ldap
spec: spec:
ingressClassName: nginx ingressClassName: nginx
tls: tls:
- hosts: - hosts:
- ssokustom - ssokustom
secretName: ssokustom-example-tls secretName: ssokustom-example-tls
rules: rules:
- http: - http:
paths: paths:
- path: /auth/saml(/|$)(.*) - path: /auth/ldap(/|$)(.*)
pathType: Prefix pathType: Prefix
backend: backend:
service: service:
name: hydra-saml name: hydra-ldap
port: port:
name: http name: http
--- ---
apiVersion: networking.k8s.io/v1 apiVersion: networking.k8s.io/v1
kind: Ingress kind: Ingress
@ -60,19 +62,19 @@ metadata:
spec: spec:
ingressClassName: nginx ingressClassName: nginx
tls: tls:
- hosts: - hosts:
- ssokustom - ssokustom
secretName: ssokustom-example-tls secretName: ssokustom-example-tls
rules: rules:
- http: - http:
paths: paths:
- path: /auth/dispatcher(/|$)(.*) - path: /auth/dispatcher(/|$)(.*)
pathType: Prefix pathType: Prefix
backend: backend:
service: service:
name: hydra-dispatcher name: hydra-dispatcher
port: port:
name: http name: http
--- ---
apiVersion: networking.k8s.io/v1 apiVersion: networking.k8s.io/v1
kind: Ingress kind: Ingress
@ -85,47 +87,16 @@ metadata:
spec: spec:
ingressClassName: nginx ingressClassName: nginx
tls: tls:
- hosts: - hosts:
- ssokustom - ssokustom
secretName: ssokustom-example-tls secretName: ssokustom-example-tls
rules: rules:
- http: - http:
paths: paths:
- path: /auth(/|$)(.*) - path: /auth(/|$)(.*)
pathType: Prefix pathType: Prefix
backend: backend:
service: service:
name: hydra name: hydra
port: port:
name: hydra-public name: hydra-public
---
apiVersion: networking.k8s.io/v1
kind: Ingress
metadata:
name: saml-idp
annotations:
cert-manager.io/issuer: "self-signed"
nginx.ingress.kubernetes.io/force-ssl-redirect: "true"
nginx.ingress.kubernetes.io/rewrite-target: /simplesaml/$2
nginx.ingress.kubernetes.io/backend-protocol: "HTTPS"
spec:
ingressClassName: nginx
tls:
- hosts:
- ssokustom
secretName: ssokustom-example-tls
rules:
- http:
paths:
- path: /simplesaml(/|$)(.*)
pathType: Prefix
backend:
service:
name: saml-idp
port:
name: https

View File

@ -1,51 +0,0 @@
apiVersion: apps/v1
kind: Deployment
metadata:
labels:
app.kubernetes.io/name: saml-idp
name: saml-idp
spec:
replicas: 1
selector:
matchLabels:
app.kubernetes.io/name: saml-idp
strategy:
type: Recreate
template:
metadata:
labels:
app.kubernetes.io/name: saml-idp
spec:
containers:
- image: kristophjunge/test-saml-idp:1.15
name: saml-idp
ports:
- containerPort: 8443
resources: {}
env:
- name: SIMPLESAMLPHP_SP_ENTITY_ID
value: https://ssokustom/auth/saml
- name: SIMPLESAMLPHP_SP_ASSERTION_CONSUMER_SERVICE
value: https://ssokustom/auth/saml/Shibboleth.sso/SAML2/POST
- name: SIMPLESAMLPHP_SP_SINGLE_LOGOUT_SERVICE
value: https://ssokustom/auth/saml/Shibboleth.sso/Logout?return=https://ssokustom
restartPolicy: Always
---
apiVersion: v1
kind: Service
metadata:
labels:
app.kubernetes.io/name: saml-idp
name: saml-idp
spec:
ports:
- name: http
port: 8080
targetPort: 8080
- name: https
port: 8443
targetPort: 8443
selector:
app.kubernetes.io/name: saml-idp
status:
loadBalancer: {}

View File

@ -1,15 +1,20 @@
apiVersion: kustomize.config.k8s.io/v1beta1 apiVersion: kustomize.config.k8s.io/v1beta1
kind: Kustomization kind: Kustomization
resources: resources:
- https://github.com/jetstack/cert-manager/releases/download/v1.13.2/cert-manager.yaml - https://github.com/jetstack/cert-manager/releases/download/v1.13.2/cert-manager.yaml
- https://forge.cadoles.com/CadolesKube/c-kustom//base/cloudnative-pg-operator?ref=develop - https://forge.cadoles.com/CadolesKube/c-kustom//base/cloudnative-pg-operator?ref=develop
- https://forge.cadoles.com/CadolesKube/c-kustom//base/redis?ref=develop - https://forge.cadoles.com/CadolesKube/c-kustom//base/redis?ref=develop
- https://raw.githubusercontent.com/kubernetes/ingress-nginx/main/deploy/static/provider/kind/deploy.yaml - https://raw.githubusercontent.com/kubernetes/ingress-nginx/main/deploy/static/provider/kind/deploy.yaml
patchesJson6902: # 'By executive order', l'inclusion de la CRD OAuth2Client est désormais gérée à la création des clusters Cadoles.
- target: # Dans cet environnement de développement il est cependant nécessaire de l'intégrer manuellement.
version: v1 # Le numéro de version devrait être raccord avec celui de l'image utilisée par la ressource 'hydra-maester'.
# cf. resources/hydra/resources/hydra-maester/resources/hydra-maester-deployment.yaml
- https://raw.githubusercontent.com/ory/hydra-maester/refs/tags/v0.0.25/config/crd/bases/hydra.ory.sh_oauth2clients.yaml
patches:
- path: patches/nginx-controller.yaml
target:
kind: ConfigMap kind: ConfigMap
name: ingress-nginx-controller name: ingress-nginx-controller
namespace: ingress-nginx namespace: ingress-nginx
path: patches/nginx-controller.yaml

View File

@ -1,6 +1,8 @@
- op: replace kind: ConfigMap
path: "/data/allow-snippet-annotations" apiVersion: v1
value: "true" metadata:
- op: replace name: ingress-nginx-controller
path: "/data/use-forwarded-headers" data:
value: "true" allow-snippet-annotations: "true"
use-forwarded-headers: "true"
strict-validate-path-type: "false"

View File

@ -15,3 +15,5 @@ hydra:
firewall: firewall:
additional_properties: "%env(bool:HYDRA_DISPATCHER_FIREWALL_ADDITIONAL_PROPERTIES)%" additional_properties: "%env(bool:HYDRA_DISPATCHER_FIREWALL_ADDITIONAL_PROPERTIES)%"
rules: {} rules: {}
webhook_post_login:
enabled: false

View File

@ -3,6 +3,7 @@ kind: Deployment
metadata: metadata:
labels: labels:
app.kubernetes.io/name: hydra-dispatcher app.kubernetes.io/name: hydra-dispatcher
com.cadoles.forge.sso-kustom/session: redis
name: hydra-dispatcher name: hydra-dispatcher
spec: spec:
replicas: 1 replicas: 1
@ -17,101 +18,101 @@ spec:
app.kubernetes.io/name: hydra-dispatcher app.kubernetes.io/name: hydra-dispatcher
spec: spec:
containers: containers:
- name: hydra-dispatcher-php-fpm - name: hydra-dispatcher-php-fpm
image: reg.cadoles.com/cadoles/hydra-dispatcher-base:2024.9.24-develop.1122.f88a5eb image: reg.cadoles.com/cadoles/hydra-dispatcher-base:2024.9.24-develop.1122.f88a5eb
args: ["/usr/sbin/php-fpm81", "-F", "-e"] args: ["/usr/sbin/php-fpm81", "-F", "-e"]
readinessProbe: readinessProbe:
exec: exec:
command: command:
- sh - sh
- -c - -c
- test -f /etc/php81/php-fpm.d/www.conf - test -f /etc/php81/php-fpm.d/www.conf
livenessProbe: livenessProbe:
exec: exec:
command: command:
- php - php
- bin/console - bin/console
- -V - -V
initialDelaySeconds: 10 initialDelaySeconds: 10
periodSeconds: 30 periodSeconds: 30
env: env:
- name: PHP_FPM_LISTEN - name: PHP_FPM_LISTEN
value: 127.0.0.1:9000 value: 127.0.0.1:9000
- name: PHP_MEMORY_LIMIT - name: PHP_MEMORY_LIMIT
value: 128m value: 128m
- name: PHP_FPM_MEMORY_LIMIT - name: PHP_FPM_MEMORY_LIMIT
value: 128m value: 128m
- name: OPCACHE_VALIDATE_TIMESTAMP - name: OPCACHE_VALIDATE_TIMESTAMP
value: "0" value: "0"
- name: OPCACHE_REVALIDATE_FREQ - name: OPCACHE_REVALIDATE_FREQ
value: "0" value: "0"
envFrom: envFrom:
- configMapRef: - configMapRef:
name: hydra-dispatcher-env name: hydra-dispatcher-env
volumeMounts: volumeMounts:
- mountPath: /app/config/hydra - mountPath: /app/config/hydra
name: hydra-dispatcher-apps name: hydra-dispatcher-apps
- name: hydra-dispatcher-php-ini - name: hydra-dispatcher-php-ini
mountPath: /etc/php81/conf.d/03_base.ini mountPath: /etc/php81/conf.d/03_base.ini
subPath: 03_base.ini subPath: 03_base.ini
resources: {} resources: {}
securityContext: securityContext:
runAsNonRoot: true runAsNonRoot: true
runAsGroup: 1000 runAsGroup: 1000
runAsUser: 1000 runAsUser: 1000
- name: hydra-dispatcher-caddy - name: hydra-dispatcher-caddy
image: reg.cadoles.com/cadoles/hydra-dispatcher-base:2024.9.24-develop.1122.f88a5eb image: reg.cadoles.com/cadoles/hydra-dispatcher-base:2024.9.24-develop.1122.f88a5eb
imagePullPolicy: IfNotPresent imagePullPolicy: IfNotPresent
args: args:
[ [
"/usr/sbin/caddy", "/usr/sbin/caddy",
"run", "run",
"--adapter", "--adapter",
"caddyfile", "caddyfile",
"--config", "--config",
"/etc/caddy/Caddyfile", "/etc/caddy/Caddyfile",
] ]
readinessProbe: readinessProbe:
httpGet: httpGet:
path: /health path: /health
port: 8080 port: 8080
initialDelaySeconds: 5 initialDelaySeconds: 5
timeoutSeconds: 5 timeoutSeconds: 5
periodSeconds: 10 periodSeconds: 10
livenessProbe: livenessProbe:
httpGet: httpGet:
path: /health path: /health
port: 8080 port: 8080
initialDelaySeconds: 15 initialDelaySeconds: 15
timeoutSeconds: 5 timeoutSeconds: 5
periodSeconds: 15 periodSeconds: 15
envFrom: envFrom:
- configMapRef: - configMapRef:
name: hydra-dispatcher-env name: hydra-dispatcher-env
env: env:
- name: CADDY_APP_UPSTREAM_BACKEND_SERVER - name: CADDY_APP_UPSTREAM_BACKEND_SERVER
value: 127.0.0.1:9000 value: 127.0.0.1:9000
- name: CADDY_HTTPS_PORT - name: CADDY_HTTPS_PORT
value: "8443" value: "8443"
- name: CADDY_HTTP_PORT - name: CADDY_HTTP_PORT
value: "8080" value: "8080"
- name: CADDY_DATA_FS - name: CADDY_DATA_FS
value: "/tmp/caddy" value: "/tmp/caddy"
- name: CADDY_APP_ROOT_PUBLIC - name: CADDY_APP_ROOT_PUBLIC
value: "/app/public/" value: "/app/public/"
ports: ports:
- containerPort: 8080 - containerPort: 8080
name: http name: http
resources: {} resources: {}
securityContext: securityContext:
runAsNonRoot: true runAsNonRoot: true
runAsGroup: 1000 runAsGroup: 1000
runAsUser: 1000 runAsUser: 1000
restartPolicy: Always restartPolicy: Always
volumes: volumes:
- name: hydra-dispatcher-apps - name: hydra-dispatcher-apps
configMap: configMap:
name: hydra-dispatcher-apps name: hydra-dispatcher-apps
- name: hydra-dispatcher-php-ini - name: hydra-dispatcher-php-ini
configMap: configMap:
name: hydra-dispatcher-php-ini name: hydra-dispatcher-php-ini

View File

@ -7,7 +7,7 @@ metadata:
labels: labels:
app.kubernetes.io/name: hydra-maester app.kubernetes.io/name: hydra-maester
app.kubernetes.io/instance: hydra-master app.kubernetes.io/instance: hydra-master
app.kubernetes.io/version: "v0.0.23" app.kubernetes.io/version: "v0.0.25"
spec: spec:
replicas: 1 replicas: 1
revisionHistoryLimit: 10 revisionHistoryLimit: 10
@ -38,15 +38,14 @@ spec:
- --hydra-url=$(HYDRA_ADMIN_BASE_URL) - --hydra-url=$(HYDRA_ADMIN_BASE_URL)
- --hydra-port=$(HYDRA_ADMIN_PORT) - --hydra-port=$(HYDRA_ADMIN_PORT)
- --endpoint=/admin/clients - --endpoint=/admin/clients
resources: resources: {}
{}
terminationMessagePath: /dev/termination-log terminationMessagePath: /dev/termination-log
terminationMessagePolicy: File terminationMessagePolicy: File
securityContext: securityContext:
allowPrivilegeEscalation: false allowPrivilegeEscalation: false
capabilities: capabilities:
drop: drop:
- ALL - ALL
privileged: false privileged: false
readOnlyRootFilesystem: true readOnlyRootFilesystem: true
runAsNonRoot: true runAsNonRoot: true