This repository demonstrates automated Docker image building and publishing to Docker Hub using GitHub Actions.
The project contains multiple containerized services related to Kubernetes authentication and authorization, with automated CI/CD pipelines that build and push Docker images on every push to the main branch.
A GitHub Actions workflow (.github/workflows/docker-image.yml) automatically:
- Triggers on code push to the
mainbranch - Sets up Docker Buildx for multi-platform builds
- Authenticates with Docker Hub using encrypted credentials
- Caches Docker layers to optimize build times
- Builds and pushes 7 Docker images to Docker Hub:
dind- Docker-in-Docker environment with additional commandsauthn-webhook- Kubernetes authentication webhook serviceauthz-webhook- Kubernetes authorization webhook servicedirectpv-discover- DirectPV discovery toolserp-api-python- Python SERP API service imageserp-api-go- Go SERP API service imagemcp-scraper- MCP scraper service image
- authn-webhook: A simple HTTP server implementing Kubernetes token-based authentication webhook for the kube-apiserver
- authz-webhook: A simple HTTP server implementing Kubernetes authorization webhook for the kube-apiserver
- dind: Docker-in-Docker container with extended functionality
- kubectl-directpv: DirectPV discovery service for Kubernetes persistent volumes
- serp-api: Python-based SERP API service
- serp-api/go-serp: Go-based SERP API service
- mcp-scraper: MCP scraper service
When you push to main:
- GitHub Actions automatically triggers the workflow
- Docker images are built using the Dockerfile in each service directory
- Images are tagged with either fixed versions or
latest, depending on the service - All images are pushed to Docker Hub at
victorbecerra/[service-name] - Build layers are cached to speed up subsequent builds
This section is updated weekly by a GitHub Actions workflow that pulls the latest Kubernetes vulnerability results and writes a short report into the README.
Last updated: 2026-04-06 (UTC)
- Official CVE Feed — FEATURE STATE: Kubernetes v1.27 [beta] This is a community maintained list of official CVEs announced by the Kubernetes Security Response Committee.
- [4-1] CVE details on Kubernetes — No information is available for this page.
- Kubernetes Security in 2026: Risks, Rewards & Resilience ... — Vulnerabilities in ingress controllers, storage solutions, or monitoring tools can be exploited to gain unauthorized access or disrupt ...
- Kubernetes CVEs and Security Vulnerabilities - OpenCVE — Explore the latest vulnerabilities and security issues of Kubernetes in the CVE database.
- Kubernetes Security Vulnerabilities: A Comprehensive Guide — Understand common Kubernetes security vulnerabilities, how to identify them, and best practices for mitigation to protect your cluster.
- Top 10 Kubernetes Security Issues — Some notable Kubernetes vulnerabilities that have been discovered in recent years include: CVE-2018-1002105: A critical flaw in the Kubernetes ...
- CVE Kubernetes Vulnerability Database - ARMO — 3 new NGINX ingress controller vulnerabilities. CVE-2023-5043, CVE-2023-5044 and CVE-2022-4886. Oct 27, 2023 - Three security issues were reported by the ...
- The Top 5 Kubernetes CVEs of 2024: Have You Patched ... — First disclosed on March 29, 2024, CVE-2024-3094 was last modified on November 21, 2024 and reported by Red Hat, Inc. The base score for this ...
- K10-vulnerable-components.md — ArgoCD has had a few CVEs over the years including CVE-2022-24348 which allows malicious actors to load a malicious Kubernetes Helm Chart (YAML). ArgoCD runs ..
- Security bulletins | Google Kubernetes Engine (GKE) — The Kubernetes project recently announced a new security vulnerability, CVE-2021-25735, that could allow node updates to bypass a Validating Admission ...
Original components were based on exercises from "Programming with Kubernetes" (educative.io) and demonstrate webhook implementations for Kubernetes API server authentication and authorization flows, extended for additional OSS tools that I worked with/or experimented.