Compare commits
2 Commits
| Author | SHA1 | Date | |
|---|---|---|---|
| a4dc2f1111 | |||
| de61e7e9d9 |
+41
-40
@@ -1,81 +1,82 @@
|
|||||||
|
# You can override the included template(s) by including variable overrides
|
||||||
|
# SAST customization: https://docs.gitlab.com/ee/user/application_security/sast/#customizing-the-sast-settings
|
||||||
|
# Secret Detection customization: https://docs.gitlab.com/ee/user/application_security/secret_detection/#customizing-settings
|
||||||
|
# Dependency Scanning customization: https://docs.gitlab.com/ee/user/application_security/dependency_scanning/#customizing-the-dependency-scanning-settings
|
||||||
|
# Note that environment variables can be set in several places
|
||||||
|
# See https://docs.gitlab.com/ee/ci/variables/#cicd-variable-precedence
|
||||||
variables:
|
variables:
|
||||||
GOCACHE: "${CI_PROJECT_DIR}/_go/cache"
|
GOCACHE: "${CI_PROJECT_DIR}/_go/cache"
|
||||||
DOCKER_HOST: tcp://docker:2375
|
DOCKER_HOST: tcp://docker:2375
|
||||||
DOCKER_DRIVER: overlay2
|
DOCKER_DRIVER: overlay2
|
||||||
|
|
||||||
before_script:
|
before_script:
|
||||||
- mkdir -p ${CI_PROJECT_DIR}/_go/{pkg,bin,cache}
|
- mkdir -p ${CI_PROJECT_DIR}/_go/{pkg,bin,cache}
|
||||||
- rm -rf /go/pkg
|
- rm -rf /go/pkg
|
||||||
- ln -s ${CI_PROJECT_DIR}/_go/pkg /go/pkg
|
- ln -s ${CI_PROJECT_DIR}/_go/pkg /go/pkg
|
||||||
- ln -s ${CI_PROJECT_DIR}/_go/bin /go/bin
|
- ln -s ${CI_PROJECT_DIR}/_go/bin /go/bin
|
||||||
|
|
||||||
cache:
|
cache:
|
||||||
key: "$CI_COMMIT_REF_NAME"
|
key: "$CI_COMMIT_REF_NAME"
|
||||||
paths:
|
paths:
|
||||||
- _go
|
- _go
|
||||||
untracked: true
|
untracked: true
|
||||||
|
|
||||||
stages:
|
stages:
|
||||||
- deps
|
- deps
|
||||||
- test
|
- test
|
||||||
- build
|
- build
|
||||||
- package
|
- package
|
||||||
- release
|
- release
|
||||||
|
|
||||||
deps:
|
deps:
|
||||||
stage: deps
|
stage: deps
|
||||||
image: golang:1.12
|
image: golang:1.12
|
||||||
script:
|
script:
|
||||||
- go get -mod=readonly
|
- go get -mod=readonly
|
||||||
|
|
||||||
test:
|
test:
|
||||||
stage: test
|
stage: test
|
||||||
dependencies:
|
dependencies:
|
||||||
- deps
|
- deps
|
||||||
image: golang:1.12
|
image: golang:1.12
|
||||||
script:
|
script:
|
||||||
- go fmt $(go list ./...)
|
- go fmt $(go list ./...)
|
||||||
- go vet $(go list ./...)
|
- go vet $(go list ./...)
|
||||||
- CGO_ENABLED=1 go test -mod=readonly -race $(go list ./...) -coverprofile .testCoverage.txt
|
- CGO_ENABLED=1 go test -mod=readonly -race $(go list ./...) -coverprofile .testCoverage.txt
|
||||||
|
|
||||||
build:
|
build:
|
||||||
stage: build
|
stage: build
|
||||||
dependencies:
|
dependencies:
|
||||||
- deps
|
- deps
|
||||||
image: golang:1.12
|
image: golang:1.12
|
||||||
script:
|
script:
|
||||||
- GOOS=linux GOARCH=amd64 CGO_ENABLED=0 go build -mod=readonly -o release/default-request-adder -ldflags '-w -s'
|
- GOOS=linux GOARCH=amd64 CGO_ENABLED=0 go build -mod=readonly -o release/default-request-adder
|
||||||
|
-ldflags '-w -s'
|
||||||
artifacts:
|
artifacts:
|
||||||
paths:
|
paths:
|
||||||
- release/
|
- release/
|
||||||
|
|
||||||
package:
|
package:
|
||||||
stage: package
|
stage: package
|
||||||
dependencies:
|
dependencies:
|
||||||
- build
|
- build
|
||||||
image: docker:stable
|
image: docker:stable
|
||||||
services:
|
services:
|
||||||
- docker:dind
|
- docker:dind
|
||||||
before_script:
|
before_script:
|
||||||
- docker login -u gitlab-ci-token -p $CI_JOB_TOKEN $CI_REGISTRY
|
- docker login -u gitlab-ci-token -p $CI_JOB_TOKEN $CI_REGISTRY
|
||||||
script:
|
script:
|
||||||
- docker build -t $CI_REGISTRY_IMAGE:$CI_COMMIT_SHA .
|
- docker build -t $CI_REGISTRY_IMAGE:$CI_COMMIT_SHA .
|
||||||
- docker tag $CI_REGISTRY_IMAGE:$CI_COMMIT_SHA $CI_REGISTRY_IMAGE:$CI_COMMIT_REF_NAME
|
- docker tag $CI_REGISTRY_IMAGE:$CI_COMMIT_SHA $CI_REGISTRY_IMAGE:$CI_COMMIT_REF_NAME
|
||||||
- docker push $CI_REGISTRY_IMAGE:$CI_COMMIT_SHA
|
- docker push $CI_REGISTRY_IMAGE:$CI_COMMIT_SHA
|
||||||
- docker push $CI_REGISTRY_IMAGE:$CI_COMMIT_REF_NAME
|
- docker push $CI_REGISTRY_IMAGE:$CI_COMMIT_REF_NAME
|
||||||
|
|
||||||
release:
|
release:
|
||||||
stage: release
|
stage: release
|
||||||
dependencies:
|
dependencies:
|
||||||
- package
|
- package
|
||||||
image: docker:stable
|
image: docker:stable
|
||||||
services:
|
services:
|
||||||
- docker:dind
|
- docker:dind
|
||||||
before_script:
|
before_script:
|
||||||
- docker login -u gitlab-ci-token -p $CI_JOB_TOKEN $CI_REGISTRY
|
- docker login -u gitlab-ci-token -p $CI_JOB_TOKEN $CI_REGISTRY
|
||||||
script:
|
script:
|
||||||
- docker pull $CI_REGISTRY_IMAGE:$CI_COMMIT_SHA
|
- docker pull $CI_REGISTRY_IMAGE:$CI_COMMIT_SHA
|
||||||
- docker tag $CI_REGISTRY_IMAGE:$CI_COMMIT_SHA $CI_REGISTRY_IMAGE:latest
|
- docker tag $CI_REGISTRY_IMAGE:$CI_COMMIT_SHA $CI_REGISTRY_IMAGE:latest
|
||||||
- docker push $CI_REGISTRY_IMAGE:latest
|
- docker push $CI_REGISTRY_IMAGE:latest
|
||||||
only:
|
only:
|
||||||
- master
|
- master
|
||||||
|
include:
|
||||||
|
- template: Security/Dependency-Scanning.gitlab-ci.yml
|
||||||
|
|||||||
@@ -1,4 +1,4 @@
|
|||||||
# Default-request-adder
|
# Default-request-adder
|
||||||
A small container which periodically (every 10s) checks for a LimitRange on all non-excluded namespaces named `extreme-request-defaults` and creates it using the configured memory settings if absent.
|
A small container which periodically (every 10s) checks for a LimitRange on all non-excluded namespaces named `extreme-request-defaults` and creates it using the configured memory settings if absent.
|
||||||
|
|
||||||
See the example-dir for an example deployment-file.
|
[Example deployment-file](example/deploy.yaml)
|
||||||
@@ -1,3 +1,40 @@
|
|||||||
|
apiVersion: v1
|
||||||
|
kind: ServiceAccount
|
||||||
|
metadata:
|
||||||
|
name: default-request-adder
|
||||||
|
namespace: kube-system
|
||||||
|
---
|
||||||
|
|
||||||
|
apiVersion: rbac.authorization.k8s.io/v1
|
||||||
|
kind: ClusterRole
|
||||||
|
metadata:
|
||||||
|
name: default-request-adder
|
||||||
|
namespace: kube-system
|
||||||
|
rules:
|
||||||
|
- apiGroups: [""]
|
||||||
|
resources: ["namespaces"]
|
||||||
|
verbs: ["list"]
|
||||||
|
- apiGroups: [""]
|
||||||
|
resources: ["limitranges"]
|
||||||
|
verbs: ["list","create"]
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
|
apiVersion: rbac.authorization.k8s.io/v1beta1
|
||||||
|
kind: ClusterRoleBinding
|
||||||
|
metadata:
|
||||||
|
name: default-request-adder
|
||||||
|
namespace: kube-system
|
||||||
|
roleRef:
|
||||||
|
apiGroup: rbac.authorization.k8s.io
|
||||||
|
kind: ClusterRole
|
||||||
|
name: default-request-adder
|
||||||
|
subjects:
|
||||||
|
- kind: ServiceAccount
|
||||||
|
name: default-request-adder
|
||||||
|
namespace: kube-system
|
||||||
|
---
|
||||||
|
|
||||||
apiVersion: apps/v1
|
apiVersion: apps/v1
|
||||||
kind: Deployment
|
kind: Deployment
|
||||||
metadata:
|
metadata:
|
||||||
@@ -20,6 +57,7 @@ spec:
|
|||||||
labels:
|
labels:
|
||||||
app: default-request-adder
|
app: default-request-adder
|
||||||
spec:
|
spec:
|
||||||
|
serviceAccountName: default-request-adder
|
||||||
containers:
|
containers:
|
||||||
- name: default-request-adder
|
- name: default-request-adder
|
||||||
resources:
|
resources:
|
||||||
|
|||||||
@@ -54,18 +54,22 @@ func main() {
|
|||||||
for {
|
for {
|
||||||
namespaces, err := clientset.CoreV1().Namespaces().List(metav1.ListOptions{})
|
namespaces, err := clientset.CoreV1().Namespaces().List(metav1.ListOptions{})
|
||||||
if err != nil {
|
if err != nil {
|
||||||
panic(err.Error())
|
panic(err)
|
||||||
}
|
}
|
||||||
|
|
||||||
for _, ns := range namespaces.Items {
|
for _, ns := range namespaces.Items {
|
||||||
if !nsExcluded(ns.Name, excludedNS) {
|
if !nsExcluded(ns.Name, excludedNS) {
|
||||||
log.Printf("Checking for LimitRange named extreme-request-defaults in namespace '%v'\n", ns.Name)
|
log.Printf("Checking for LimitRange named extreme-request-defaults in namespace '%v'\n", ns.Name)
|
||||||
if limitRanges, err := clientset.CoreV1().LimitRanges(ns.Name).List(metav1.ListOptions{FieldSelector: "metadata.name=extreme-request-defaults"}); err == nil && len(limitRanges.Items) == 0 {
|
if limitRanges, err := clientset.CoreV1().LimitRanges(ns.Name).List(metav1.ListOptions{FieldSelector: "metadata.name=extreme-request-defaults"}); err != nil {
|
||||||
log.Printf("Trying to create LimitRange\n")
|
panic(err)
|
||||||
if _, err := clientset.CoreV1().LimitRanges(ns.Name).Create(&limitRange); err != nil {
|
} else {
|
||||||
log.Printf("Unable to create LimitRange in namespace '%v': Error: %v\n", ns.Name, err)
|
if len(limitRanges.Items) == 0 {
|
||||||
} else {
|
log.Printf("Trying to create LimitRange\n")
|
||||||
log.Printf("LimitRange extreme-request-defaults created in namespace '%v'\n", ns.Name)
|
if _, err := clientset.CoreV1().LimitRanges(ns.Name).Create(&limitRange); err != nil {
|
||||||
|
log.Printf("Unable to create LimitRange in namespace '%v': Error: %v\n", ns.Name, err)
|
||||||
|
} else {
|
||||||
|
log.Printf("LimitRange extreme-request-defaults created in namespace '%v'\n", ns.Name)
|
||||||
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|||||||
Reference in New Issue
Block a user