-
Notifications
You must be signed in to change notification settings - Fork 348
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat: support CRI-O #697
feat: support CRI-O #697
Conversation
Codecov Report
@@ Coverage Diff @@
## main #697 +/- ##
==========================================
- Coverage 39.30% 37.69% -1.62%
==========================================
Files 24 25 +1
Lines 8702 8997 +295
==========================================
- Hits 3420 3391 -29
- Misses 4828 5158 +330
+ Partials 454 448 -6
Continue to review full report at Codecov.
|
394d2ea
to
b72e40a
Compare
@nam-jaehyun @nyrahul @daemon1024 Please give this a review. (I'm unable to request reviews 😅 ). |
Github test 06 and 08 passed eventually. Also, in local tests, multiubuntu test 02 and 07 are failing. 07 fails due to the same reason as above but I'm not sure about 02 as audit action works fine when tested manually. Here are logs from karmor when the test conditions are created -
For ref: the default capabilties applied by CRI-O:
|
b72e40a
to
c3fcffa
Compare
@nam-jaehyun @nyrahul as discussed, I've updated the github workflows to test for all the runtimes and skip the tests that have been specifically failing only for crio. |
Hey, I see that tests are still failing! Also can you please squash the commits? |
Oof yes. Taking a look into why the tests with containerd are failing 👀 |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
can you also update contribution/vagrant/Vagrantfile?
cri-o needs to work under the following commands.
KubeArmor/KubeArmor$ make vagrant-up RUNTIME=crio
KubeArmor/KubeArmor$ make vagrant-up RUNTIME=crio NETNEXT=1
if possible, KubeArmor/KubeArmor$ make vagrant-up RUNTIME=crio OS=centos
9372567
to
c10756d
Compare
I and @daemon1024 were thinking about extending the use of cri-api and using it for docker and containerd as well. The current code for handling the two runtimes would be deprecated and the code used here would be used to communicate with the runtimes' socket. Does this sound good? |
Imo, it sounds very good. But my understanding was that we are using some containerd or docker specific apis which are not part of cri-api spec. If this understanding is wrong, what you saying is the best way to handle things i.e. just use cri-api for everything ... This will simplify lot of our program logic. But I am keen on what @nam-jaehyun has to say. |
11f59de
to
7fe6ec8
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Great PR!! Please check my comments inline.
@DelusionalOptimist , can you squash the commits? |
Signed-off-by: Rudraksh Pareek <[email protected]>
72993b5
to
2c56af2
Compare
@nyrahul done 👍 |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM 👍🏼
Signed-off-by: Rudraksh Pareek [email protected]
Fixes #666
Tasks: