refactor(operator): Operator refactor #3786
Workflow file for this run
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
name: ci-test-ginkgo | |
on: | |
push: | |
branches: [main] | |
paths: | |
- "KubeArmor/**" | |
- "tests/**" | |
- "protobuf/**" | |
- ".github/workflows/ci-test-ginkgo.yml" | |
- "pkg/KubeArmorOperator/**" | |
- "deployments/helm/**" | |
pull_request: | |
branches: [main] | |
paths: | |
- "KubeArmor/**" | |
- "tests/**" | |
- "protobuf/**" | |
- ".github/workflows/ci-test-ginkgo.yml" | |
- "pkg/KubeArmorOperator/**" | |
- "deployments/helm/**" | |
# Declare default permissions as read only. | |
permissions: read-all | |
jobs: | |
build: | |
name: Auto-testing Framework / ${{ matrix.os }} / ${{ matrix.runtime }} | |
runs-on: ${{ matrix.os }} | |
env: | |
RUNTIME: ${{ matrix.runtime }} | |
strategy: | |
fail-fast: false | |
matrix: | |
os: [ubuntu-20.04] | |
runtime: ["containerd", "crio"] | |
steps: | |
- uses: actions/checkout@v3 | |
with: | |
submodules: true | |
- uses: actions/setup-go@v5 | |
with: | |
go-version-file: 'KubeArmor/go.mod' | |
- name: Check what paths were updated | |
uses: dorny/paths-filter@v2 | |
id: filter | |
with: | |
filters: | | |
controller: | |
- 'pkg/KubeArmorController/**' | |
- name: Install the latest LLVM toolchain | |
run: ./.github/workflows/install-llvm.sh | |
- name: Compile libbpf | |
run: ./.github/workflows/install-libbpf.sh | |
- name: Setup a Kubernetes environment | |
run: ./.github/workflows/install-k3s.sh | |
- name: Generate KubeArmor artifacts | |
run: | | |
#set the $IS_COVERAGE env var to 'true' to build the kubearmor-test image for coverage calculation | |
export IS_COVERAGE=true | |
GITHUB_SHA=$GITHUB_SHA ./KubeArmor/build/build_kubearmor.sh | |
- name: Build Kubearmor-Operator | |
working-directory: pkg/KubeArmorOperator | |
run: | | |
make docker-build | |
- name: Build KubeArmorController | |
if: steps.filter.outputs.controller == 'true' | |
run: make -C pkg/KubeArmorController/ docker-build TAG=latest | |
- name: deploy pre existing pod | |
run: | | |
kubectl apply -f ./tests/k8s_env/ksp/pre-run-pod.yaml | |
sleep 60 | |
kubectl get pods -A | |
- name: Run KubeArmor | |
run: | | |
if [[ ${{ matrix.runtime }} == "containerd" ]]; then | |
docker save kubearmor/kubearmor-test-init:latest | sudo k3s ctr images import - | |
docker save kubearmor/kubearmor-test:latest | sudo k3s ctr images import - | |
docker save kubearmor/kubearmor-operator:latest | sudo k3s ctr images import - | |
docker save kubearmor/kubearmor-snitch:latest | sudo k3s ctr images import - | |
if [[ ${{ steps.filter.outputs.controller }} == 'true' ]]; then | |
docker save kubearmor/kubearmor-controller:latest | sudo k3s ctr images import - | |
fi | |
else | |
if [ ${{ matrix.runtime }} == "crio" ]; then | |
docker save kubearmor/kubearmor-test-init:latest | sudo podman load | |
sudo podman tag localhost/latest:latest docker.io/kubearmor/kubearmor-test-init:latest | |
docker save kubearmor/kubearmor-test:latest | sudo podman load | |
sudo podman tag localhost/latest:latest docker.io/kubearmor/kubearmor-test:latest | |
docker save kubearmor/kubearmor-operator:latest | sudo podman load | |
sudo podman tag localhost/latest:latest docker.io/kubearmor/kubearmor-operator:latest | |
docker save kubearmor/kubearmor-snitch:latest | sudo podman load | |
sudo podman tag localhost/latest:latest docker.io/kubearmor/kubearmor-snitch:latest | |
if [ ${{ steps.filter.outputs.controller }} == 'true' ]; then | |
docker save kubearmor/kubearmor-controller:latest | sudo podman load | |
sudo podman tag localhost/latest:latest docker.io/kubearmor/kubearmor-controller:latest | |
fi | |
fi | |
fi | |
docker system prune -a -f | |
docker buildx prune -a -f | |
chart_version=$(grep '^version:' ./deployments/helm/KubeArmor/Chart.yaml | awk '{print $2}') | |
echo "installing kubearmor chart version $chart_version" | |
helm upgrade --install kubearmor-operator ./deployments/helm/KubeArmorOperator -n kubearmor --create-namespace --set kubearmorOperator.image.tag=latest \ | |
--set kubearmorOperator.imagePullPolicy=Never --set snitch.imagePullPolicy=Never --set helm.repository=embed --set helm.version=$chart_version --set helm.chart=kubearmor | |
kubectl wait --for=condition=ready --timeout=5m -n kubearmor pod -l kubearmor-app=kubearmor-operator | |
kubectl get pods -A | |
sleep 3 # need this sleep because webhook server initialization may take some time | |
kubectl wait --for=condition=established --timeout=5m crd/kubearmorconfigs.operator.kubearmor.com | |
kubectl wait --for=condition=complete --timeout=5m -n kubearmor job -l kubearmor-app=kubearmor-snitch | |
if [[ ${{ steps.filter.outputs.controller }} == 'true' ]]; then | |
kubectl apply -f pkg/KubeArmorOperator/config/samples/kubearmor-coverage.yaml --dry-run=client -o json | \ | |
jq '.spec.kubearmorControllerImage.imagePullPolicy = "Never"' | \ | |
kubectl apply -f - | |
else | |
kubectl apply -f pkg/KubeArmorOperator/config/samples/kubearmor-coverage.yaml | |
fi | |
kubectl wait --for=condition=ReleaseDeployed --timeout=5m kubearmorconfig.operator.kubearmor.com/kubearmorconfig-test -n kubearmor | |
kubectl wait --timeout=7m --for=condition=ready pod -l kubearmor-app,kubearmor-app!=kubearmor-snitch -n kubearmor | |
kubectl get pods -A | |
sleep 10 | |
DAEMONSET_NAME=$(kubectl get daemonset -n kubearmor -o jsonpath='{.items[0].metadata.name}') | |
echo "DaemonSet: $DAEMONSET_NAME" | |
kubectl patch daemonset $DAEMONSET_NAME -n kubearmor --type='json' -p='[ | |
{ | |
"op": "add", | |
"path": "/spec/template/spec/volumes/-", | |
"value": { | |
"name": "coverage-storage", | |
"hostPath": { | |
"path": "/coverage", | |
"type": "DirectoryOrCreate" | |
} | |
} | |
}, | |
{ | |
"op": "add", | |
"path": "/spec/template/spec/containers/0/volumeMounts/-", | |
"value": { | |
"mountPath": "/coverage", | |
"name": "coverage-storage" | |
} | |
}, | |
{ | |
"op": "add", | |
"path": "/spec/template/spec/containers/0/args/-", | |
"value": "-test.coverprofile=/coverage/coverage_k8s_${{ matrix.os }}_${{ matrix.runtime }}.out" | |
} | |
]' | |
sleep 15 | |
- name: Get KubeArmor POD info | |
run: | | |
DAEMONSET_NAME=$(kubectl get daemonset -n kubearmor -o jsonpath='{.items[0].metadata.name}') | |
LABEL_SELECTOR=$(kubectl get daemonset $DAEMONSET_NAME -n kubearmor -o jsonpath='{.spec.selector.matchLabels}' | jq -r 'to_entries[] | "\(.key)=\(.value)"' | paste -sd, -) | |
POD_NAME=$(kubectl get pods -n kubearmor -l "$LABEL_SELECTOR" -o jsonpath='{.items[*].metadata.name}') | |
echo "Pod: $POD_NAME" | |
echo "POD_NAME=$POD_NAME" >> $GITHUB_ENV | |
- name: Test KubeArmor using Ginkgo | |
run: | | |
go install -mod=mod github.com/onsi/ginkgo/v2/ginkgo | |
make | |
working-directory: ./tests/k8s_env | |
timeout-minutes: 30 | |
- name: Kill KubeArmor prcoess in the pod | |
run: | | |
KUBEARMOR_PID=$(kubectl exec ${{ env.POD_NAME }} -n kubearmor -c kubearmor -- sh -c "ps aux | grep '[K]ubeArmor/kubearmor-test' | awk '{print \$1}'") | |
kubectl exec ${{ env.POD_NAME }} -n kubearmor -c kubearmor -- sh -c "kill -s SIGINT $KUBEARMOR_PID" | |
sleep 10 | |
env: | |
POD_NAME: ${{ env.POD_NAME }} | |
- name: Extract coverage file | |
run: | | |
for i in {1..24}; do | |
if [ -f /coverage/coverage_k8s_${{ matrix.os }}_${{ matrix.runtime }}.out ]; then | |
cp /coverage/coverage_k8s_${{ matrix.os }}_${{ matrix.runtime }}.out coverage_k8s_${{ matrix.os }}_${{ matrix.runtime }}.out | |
break | |
fi | |
sleep 5 | |
done | |
ls -l | |
working-directory: KubeArmor | |
- name: Get karmor sysdump | |
if: ${{ failure() }} | |
run: | | |
kubectl describe pod -n kubearmor -l kubearmor-app=kubearmor | |
curl -sfL http://get.kubearmor.io/ | sudo sh -s -- -b /usr/local/bin | |
mkdir -p /tmp/kubearmor/ && cd /tmp/kubearmor && karmor sysdump | |
- name: Archive log artifacts | |
if: ${{ failure() }} | |
uses: actions/upload-artifact@v3 | |
with: | |
name: kubearmor.logs | |
path: | | |
/tmp/kubearmor/ | |
/tmp/kubearmor.* | |
- name: Measure code coverage | |
if: ${{ always() }} | |
run: | | |
ls -l | |
go tool cover -func coverage_k8s_${{ matrix.os }}_${{ matrix.runtime }}.out | |
working-directory: KubeArmor | |
env: | |
GOPATH: /home/runner/go | |
- name: Upload coverage file | |
if: ${{ always() }} | |
uses: actions/upload-artifact@v4 | |
with: | |
name: coverage-k8s-${{ matrix.os }}-${{ matrix.runtime }} | |
path: KubeArmor/coverage_k8s_${{ matrix.os }}_${{ matrix.runtime }}.out |