• Home
  • Features
  • Pricing
  • Docs
  • Announcements
  • Sign In

dunglas / mercure / 25072914818
84%
master: 93%

Build:
Build:
LAST BUILD BRANCH: chore/bump-go-deps
DEFAULT BRANCH: master
Ran 28 Apr 2026 07:22PM UTC
Jobs 1
Files 23
Run time 1min
Badge
Embed ▾
README BADGES
x

If you need to use a raster PNG badge, change the '.svg' to '.png' in the link

Markdown

Textile

RDoc

HTML

Rst

28 Apr 2026 07:20PM UTC coverage: 83.829%. Remained the same
25072914818

push

github

dunglas
docs(chart): drop NET_BIND_SERVICE from the rootless example, target an unprivileged port

Binding 80/443 from a securityContext with `allowPrivilegeEscalation: false`
fails regardless of `capabilities.add: [NET_BIND_SERVICE]`: K8s puts the cap
in Permitted and Bounding only, no_new_privs makes the binary's file
capability moot on exec, and there is no field to grant Ambient. The new
effective set after runc execs into caddy is empty, so `bind(:80)` returns
EACCES.

Recommend `service.targetPort: 8080` instead so caddy listens on an
unprivileged port; the Service still exposes :80 to the cluster. Drop
`add: [NET_BIND_SERVICE]` from both the values.yaml example and the
install.md snippet, and rewrite the comments to describe what actually
happens. Regenerate the chart README via helm-docs.

1747 of 2084 relevant lines covered (83.83%)

50.36 hits per line

Jobs
ID Job ID Ran Files Coverage
1 0 - 25072914818.1 28 Apr 2026 07:22PM UTC 23
83.83
GitHub Action Run
Source Files on build 25072914818
  • Tree
  • List 23
  • Changed 0
  • Source Changed 0
  • Coverage Changed 0
Coverage ∆ File Lines Relevant Covered Missed Hits/Line
  • Back to Repo
  • c6832a1f on github
  • Prev Build on main (#25057553530)
  • Next Build on main (#25075943547)
STATUS · Troubleshooting · Open an Issue · Sales · Support · CAREERS · ENTERPRISE · START FREE · SCHEDULE DEMO
ANNOUNCEMENTS · TWITTER · TOS & SLA · Supported CI Services · What's a CI service? · Automated Testing

© 2026 Coveralls, Inc