Compare commits
11 Commits
2bef46ea1b
...
develop
Author | SHA1 | Date | |
---|---|---|---|
5165759558
|
|||
10f73b96ec
|
|||
5097e551e2
|
|||
820d2d8c51
|
|||
eb5c12ca91
|
|||
2d1c9f7418
|
|||
3c2e0cdcb8
|
|||
66c2c3b6a2
|
|||
b92f6688c7
|
|||
85d00a53f6
|
|||
529abe67b1
|
7
.dockerignore
Normal file
7
.dockerignore
Normal file
@ -0,0 +1,7 @@
|
|||||||
|
**/.git
|
||||||
|
**/.gitignore
|
||||||
|
/.devcontainer
|
||||||
|
/.gitea
|
||||||
|
/.github
|
||||||
|
/.vscode
|
||||||
|
/charts
|
23
.gitea/workflows/lint.yaml
Normal file
23
.gitea/workflows/lint.yaml
Normal file
@ -0,0 +1,23 @@
|
|||||||
|
---
|
||||||
|
name: Ruby Lint
|
||||||
|
on:
|
||||||
|
push:
|
||||||
|
branches:
|
||||||
|
- "**"
|
||||||
|
pull_request:
|
||||||
|
jobs:
|
||||||
|
lint:
|
||||||
|
runs-on: ubuntu-latest
|
||||||
|
steps:
|
||||||
|
- name: Checkout
|
||||||
|
uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
|
||||||
|
|
||||||
|
- name: Ruby Setup
|
||||||
|
uses: ruby/setup-ruby@dffc446db9ba5a0c4446edb5bca1c5c473a806c5 # v1.235.0
|
||||||
|
with:
|
||||||
|
ruby-version: '3.4'
|
||||||
|
bundler-cache: true
|
||||||
|
|
||||||
|
- name: Standard Ruby
|
||||||
|
run: bundle exec standardrb
|
||||||
|
|
@ -1,65 +1,16 @@
|
|||||||
---
|
---
|
||||||
name: Gitea Actions Demo
|
name: Release
|
||||||
run-name: ${{ gitea.actor }} is testing out Gitea Actions 🚀
|
|
||||||
|
|
||||||
on:
|
on:
|
||||||
schedule:
|
schedule:
|
||||||
- cron: "0 10 * * *"
|
- cron: "0 0 * * *"
|
||||||
push:
|
push:
|
||||||
branches:
|
branches:
|
||||||
- "**"
|
- main
|
||||||
tags:
|
tags:
|
||||||
- "v*.*.*"
|
- "v*.*.*"
|
||||||
pull_request:
|
|
||||||
|
|
||||||
jobs:
|
jobs:
|
||||||
lint:
|
|
||||||
runs-on: ubuntu-latest
|
|
||||||
permissions:
|
|
||||||
checks: write
|
|
||||||
contents: write
|
|
||||||
steps:
|
|
||||||
- name: Login to Docker
|
|
||||||
uses: docker/login-action@74a5d142397b4f367a81961eba4e8cd7edddf772 # v3.4.0
|
|
||||||
with:
|
|
||||||
username: ${{ vars.DOCKERHUB_USERNAME }}
|
|
||||||
password: ${{ secrets.DOCKERHUB_TOKEN }}
|
|
||||||
|
|
||||||
- name: Checkout
|
|
||||||
uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
|
|
||||||
|
|
||||||
- name: Ruby Setup
|
|
||||||
uses: ruby/setup-ruby@dffc446db9ba5a0c4446edb5bca1c5c473a806c5 # v1.235.0
|
|
||||||
with:
|
|
||||||
ruby-version: '3.4'
|
|
||||||
bundler-cache: true
|
|
||||||
|
|
||||||
- run: bundle install
|
|
||||||
|
|
||||||
- name: Standard Ruby
|
|
||||||
run: bundle exec standardrb
|
|
||||||
|
|
||||||
|
|
||||||
test:
|
|
||||||
needs: lint
|
|
||||||
runs-on: ubuntu-latest
|
|
||||||
steps:
|
|
||||||
- name: Checkout
|
|
||||||
uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
|
|
||||||
|
|
||||||
- name: Test
|
|
||||||
uses: ruby/setup-ruby@dffc446db9ba5a0c4446edb5bca1c5c473a806c5 # v1.235.0
|
|
||||||
with:
|
|
||||||
ruby-version: '3.4'
|
|
||||||
bundler-cache: true
|
|
||||||
|
|
||||||
- run: bundle exec rake
|
|
||||||
|
|
||||||
docker:
|
docker:
|
||||||
needs: test
|
|
||||||
runs-on: ubuntu-latest
|
runs-on: ubuntu-latest
|
||||||
container:
|
|
||||||
image: catthehacker/ubuntu:act-latest
|
|
||||||
env:
|
env:
|
||||||
DOCKER_ORG: ryanc
|
DOCKER_ORG: ryanc
|
||||||
DOCKER_LATEST: latest
|
DOCKER_LATEST: latest
|
||||||
@ -108,7 +59,8 @@ jobs:
|
|||||||
latest=auto
|
latest=auto
|
||||||
bake-target: docker-metadata-action
|
bake-target: docker-metadata-action
|
||||||
tags: |
|
tags: |
|
||||||
type=schedule
|
type=schedule,pattern=nightly
|
||||||
|
type=edge
|
||||||
type=ref,event=branch
|
type=ref,event=branch
|
||||||
type=ref,event=pr
|
type=ref,event=pr
|
||||||
type=semver,pattern={{version}}
|
type=semver,pattern={{version}}
|
||||||
@ -127,7 +79,8 @@ jobs:
|
|||||||
latest=auto
|
latest=auto
|
||||||
suffix=-alpine,onlatest=true
|
suffix=-alpine,onlatest=true
|
||||||
tags: |
|
tags: |
|
||||||
type=schedule
|
type=schedule,pattern=nightly
|
||||||
|
type=edge
|
||||||
type=ref,event=branch
|
type=ref,event=branch
|
||||||
type=ref,event=pr
|
type=ref,event=pr
|
||||||
type=semver,pattern={{version}}
|
type=semver,pattern={{version}}
|
22
.gitea/workflows/test.yaml
Normal file
22
.gitea/workflows/test.yaml
Normal file
@ -0,0 +1,22 @@
|
|||||||
|
---
|
||||||
|
name: Ruby Test
|
||||||
|
on:
|
||||||
|
push:
|
||||||
|
branches:
|
||||||
|
- "**"
|
||||||
|
pull_request:
|
||||||
|
jobs:
|
||||||
|
test:
|
||||||
|
runs-on: ubuntu-latest
|
||||||
|
steps:
|
||||||
|
- name: Checkout
|
||||||
|
uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
|
||||||
|
|
||||||
|
- name: Test
|
||||||
|
uses: ruby/setup-ruby@dffc446db9ba5a0c4446edb5bca1c5c473a806c5 # v1.235.0
|
||||||
|
with:
|
||||||
|
ruby-version: '3.4'
|
||||||
|
bundler-cache: true
|
||||||
|
|
||||||
|
- run: bundle exec rake
|
||||||
|
|
12
app.rb
12
app.rb
@ -24,8 +24,6 @@ require "config"
|
|||||||
VERSION = "0.2.1"
|
VERSION = "0.2.1"
|
||||||
|
|
||||||
CHUNK_SIZE = 1024**2
|
CHUNK_SIZE = 1024**2
|
||||||
SESSION_SECRET_HEX_LENGTH = 64
|
|
||||||
JWT_SECRET_HEX_LENGTH = 64
|
|
||||||
DEFAULT_FLAKEY = 50
|
DEFAULT_FLAKEY = 50
|
||||||
|
|
||||||
NAME = "kubernaut".freeze
|
NAME = "kubernaut".freeze
|
||||||
@ -380,19 +378,21 @@ get "/pid", provides: "json" do
|
|||||||
jsonify({ppid: ppid, pid: Process.pid}, pretty:)
|
jsonify({ppid: ppid, pid: Process.pid}, pretty:)
|
||||||
end
|
end
|
||||||
|
|
||||||
get "/token" do
|
get "/token", provides: "json" do
|
||||||
|
pretty = params.key? :pretty
|
||||||
|
|
||||||
exp = Time.now.to_i + SECONDS_PER_MINUTE * 2
|
exp = Time.now.to_i + SECONDS_PER_MINUTE * 2
|
||||||
payload = {name: "anonymous", exp: exp, jti: Random.uuid}
|
payload = {name: "anonymous", exp: exp, jti: Random.uuid}
|
||||||
expires_at = Time.at(exp).to_datetime
|
expires_at = Time.at(exp).to_datetime
|
||||||
token = JWT.encode payload, JWT_SECRET, "HS256"
|
token = JWT.encode payload, config.jwt_secret.unwrap, "HS256"
|
||||||
x = {token: token, expires_at: expires_at}
|
x = {token: token, expires_at: expires_at}
|
||||||
|
|
||||||
jsonify x
|
jsonify x, pretty:
|
||||||
end
|
end
|
||||||
|
|
||||||
get "/token/validate" do
|
get "/token/validate" do
|
||||||
token = req_headers["authorization"].split[1]
|
token = req_headers["authorization"].split[1]
|
||||||
payload = JWT.decode token, JWT_SECRET, true, algorithm: "HS256"
|
payload = JWT.decode token, config.jwt_secret.unwrap, true, algorithm: "HS256"
|
||||||
|
|
||||||
jsonify payload
|
jsonify payload
|
||||||
end
|
end
|
||||||
|
@ -40,10 +40,9 @@ FROM base
|
|||||||
|
|
||||||
ENV PORT=4567
|
ENV PORT=4567
|
||||||
|
|
||||||
RUN <<EOT
|
RUN \
|
||||||
addgroup --system --gid 666 kubernaut
|
addgroup --system --gid 666 kubernaut; \
|
||||||
adduser --system --uid 666 --ingroup kubernaut --shell /bin/bash --disabled-password kubernaut
|
adduser --system --uid 666 --ingroup kubernaut --shell /bin/bash --disabled-password kubernaut
|
||||||
EOT
|
|
||||||
|
|
||||||
COPY --from=build "${BUNDLE_PATH}" "${BUNDLE_PATH}"
|
COPY --from=build "${BUNDLE_PATH}" "${BUNDLE_PATH}"
|
||||||
COPY --from=build /kubernaut /kubernaut
|
COPY --from=build /kubernaut /kubernaut
|
||||||
|
@ -48,10 +48,9 @@ FROM base
|
|||||||
|
|
||||||
ENV PORT=4567
|
ENV PORT=4567
|
||||||
|
|
||||||
RUN <<EOT
|
RUN \
|
||||||
groupadd --system --gid 666 kubernaut
|
groupadd --system --gid 666 kubernaut; \
|
||||||
useradd --system --uid 666 --gid kubernaut --create-home --shell /bin/bash kubernaut
|
useradd --system --uid 666 --gid kubernaut --create-home --shell /bin/bash kubernaut
|
||||||
EOT
|
|
||||||
|
|
||||||
COPY --from=build "${BUNDLE_PATH}" "${BUNDLE_PATH}"
|
COPY --from=build "${BUNDLE_PATH}" "${BUNDLE_PATH}"
|
||||||
COPY --from=build /kubernaut /kubernaut
|
COPY --from=build /kubernaut /kubernaut
|
||||||
|
@ -22,12 +22,18 @@ spec:
|
|||||||
- name: sinatra-web
|
- name: sinatra-web
|
||||||
containerPort: 4567
|
containerPort: 4567
|
||||||
env:
|
env:
|
||||||
- name: SESSION_SECRET
|
- name: KUBERNAUT_SESSION_SECRET
|
||||||
valueFrom:
|
valueFrom:
|
||||||
secretKeyRef:
|
secretKeyRef:
|
||||||
name: kubernaut-session-secret
|
name: kubernaut
|
||||||
key: session_secret
|
key: session_secret
|
||||||
optional: true
|
optional: true
|
||||||
|
- name: KUBERNAUT_JWT_SECRET
|
||||||
|
valueFrom:
|
||||||
|
secretKeyRef:
|
||||||
|
name: kubernaut
|
||||||
|
key: jwt_secret
|
||||||
|
optional: true
|
||||||
envFrom:
|
envFrom:
|
||||||
- configMapRef:
|
- configMapRef:
|
||||||
name: kubernaut-configmap
|
name: kubernaut-configmap
|
||||||
|
@ -3,7 +3,6 @@ apiVersion: kustomize.config.k8s.io/v1beta1
|
|||||||
kind: Kustomization
|
kind: Kustomization
|
||||||
namespace: kubernaut
|
namespace: kubernaut
|
||||||
resources:
|
resources:
|
||||||
- secret.yaml
|
|
||||||
- configmap.yaml
|
- configmap.yaml
|
||||||
- deployment.yaml
|
- deployment.yaml
|
||||||
- hpa.yaml
|
- hpa.yaml
|
||||||
|
@ -1,15 +0,0 @@
|
|||||||
---
|
|
||||||
apiVersion: bitnami.com/v1alpha1
|
|
||||||
kind: SealedSecret
|
|
||||||
metadata:
|
|
||||||
creationTimestamp: null
|
|
||||||
name: kubernaut-session-secret
|
|
||||||
namespace: kubernaut
|
|
||||||
spec:
|
|
||||||
encryptedData:
|
|
||||||
session_secret: AgCY08t0AU418znEZt5d252J+lH+fwYki2g6jdJpfdRfVQjnA+b52P0KWrs/x5pB0PKab6Z3JY/Tz0SQCaoIsCR4IzUO3a095aulRqb6Qr1Lz8udBVta4JJMZLmo26tuUfVHlpD1d6J8rkBSm8vzckFLkOA1Wfl/9rS3K4qwiDogA5pI0ULghFkeEx1yKdRwPq0k8PuvOvLUJ6oNq3e5n+B/BrVWdQ+7XQxUq/AMANJrDbe+RD33f99LArHYA7bFMbY8YRazXSTAkeunpTlxTjuGZKYvJKupo29LHz2OVbZVX/hI0nZkdVpcgqvbxF6Vw9CuCeAmtKYl7A3qsAWqDLUdP3hRLsk2P9RDNhEzYWh4ml8APzziWzihdJbGEjwLy7HsHgKslM0XbBnRQDlxp/JtvcWdjQp33A+QOON32zOKHi+qJjDYyGebS1+xkPbnyb1MPSJVAtFpj7dlLbFekLFDZEbXuJYUl1wKdFOIjJHmNK/MTEV2kOhtiVj/aeKgSXwor9hR7Uxzs5ZSawp9uWw+hpr58EX6I+RtfO4yjFC6FjnagiU6SlI1Q2F7/nv82g1UWTYMpNN5bduS1YFWmsnXvK+W7YQHpSForr5ndtCSHmclbXb5Fc33sywC5u6Bi2Gu5/MW6d73BOog5BC3QtOuEQ044Q+cuU3RIlKADBqKLzZmHlmukyyGuZfXJnGjlWGKp3J1KecucTo6XC9QHpUkjXEKdlE63mOI1VuOGyBIHl60v4bnWiBg+aDZVHipz4JLKsVB0HOgBBK7+tOX6tr1GDG/F7Nz/i9ebzUV6i8Ec1jHf+2ZcTtBkNXBIkHc84+4Qd33/gOuP+lizLfIhfQ3DFWbwyfYumpVbeapyYhB0CE=
|
|
||||||
template:
|
|
||||||
metadata:
|
|
||||||
creationTimestamp: null
|
|
||||||
name: kubernaut-session-secret
|
|
||||||
namespace: kubernaut
|
|
@ -1,5 +1,8 @@
|
|||||||
require "sensitive"
|
require "sensitive"
|
||||||
|
|
||||||
|
SESSION_SECRET_HEX_LENGTH = 64
|
||||||
|
JWT_SECRET_HEX_LENGTH = 64
|
||||||
|
|
||||||
class Config
|
class Config
|
||||||
attr_accessor :cat
|
attr_accessor :cat
|
||||||
|
|
||||||
@ -9,7 +12,7 @@ class Config
|
|||||||
@prefix = prefix
|
@prefix = prefix
|
||||||
@cat = cat
|
@cat = cat
|
||||||
|
|
||||||
session_secret ||= ENV.fetch "SESSION_SECRET" do
|
session_secret ||= fetch_env "SESSION_SECRET" do
|
||||||
SecureRandom.hex SESSION_SECRET_HEX_LENGTH
|
SecureRandom.hex SESSION_SECRET_HEX_LENGTH
|
||||||
end
|
end
|
||||||
|
|
||||||
|
Reference in New Issue
Block a user