-
Notifications
You must be signed in to change notification settings - Fork 360
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add a CI Workflow to push docker image of multiubuntu on a change #1943
base: main
Are you sure you want to change the base?
Conversation
@Aryan-sharma11 Sorry for not looking up for the issue. Will look into the CI failures and fix them! |
@Aryan-sharma11 I could understand the failure of ginkgo tests but can't get why crio tests are failing. Can you help with this? |
@Manik2708 It looks like syscall test for BPFLSM runner are failing on some other PRs too, I'll look into it. Will update you on the issue soon. |
Thanks for your time @Aryan-sharma11. I think workflows were re-ran and now every test has passed. Please review cc @rksharma95 |
@Manik2708 thanks for the PR, can you check on your fork if path filter is working properly? |
@rksharma95 Please see this report of CI: https://github.com/kubearmor/KubeArmor/actions/runs/12970813140/job/36201280553?pr=1943#step:11:1. It was becoming difficult for me to test the changes in fork, so I introduced a dummy change in multiubuntu, when this PR will be ready to merge, I will revert this change! |
@rksharma95 can you please check the other scenario as well? if no change on path |
@rksharma95 Please run the workflow, now it should test the other scenario |
@rksharma95 Please can you help me with the vulnerability failures? I have no idea why are they failing and how it is connected to this PR? |
@Manik2708 can you upgrade the dependencies to their fixed version as suggested in the test result? |
@rksharma95 https://github.com/kubearmor/KubeArmor/actions/runs/13025109360/job/36333266926?pr=1943#step:4:35 For this I think we need to upgrade the go version. Am I correct? |
After fixing the versions, the security checks are failing. @rksharma95 How can we fix it? |
@rksharma95 I have built locally successfully with these changes (tested the core KubeArmor code) and |
@Manik2708 let's push the changes. |
@rksharma95 Actually the PR is becoming very large, and I am concerned if it could be a breaking change if dependencies are upgraded directly. @Aryan-sharma11 helped me in the PR: kubearmor/kubearmor-client#471 which was giving similar errors even after running |
It's a snyk issue, let's upgrade to 1.23.5 we can ignore snyk failures. |
Then can you please run the workflows, so that we could see if tests are passing on upgrading to 1.23.5? |
@rksharma95 Have made the change, please review! |
@Manik2708 please squash all the commits. |
@rksharma95 Squashed! Please review! |
@Manik2708 please handle these as well. |
@rksharma95 For this I am thinking of moving with this approach:
Now it rises a question: What if in future a contributor adds a new ubuntu-deployment file but then tests might not run against the local image for deployment if these conventions are not followed:
Therefore I am thinking to throw an error if any of these conventions are not followed for any of the ubuntu-deployment file, so that the contributor who is adding a new multiubuntu deployment could follow the conventions. But then there could be an exception where these conventions might need to be bypassed, for that, those exceptions could be added in the CI to ignore the error from a particular file. Am I going in correct direction? |
@Manik2708 I don't think we need to enforce this convention by any validation, we can add a comment in the workflow step |
@rksharma95 Done! Please review! |
@rksharma95 Please can you run the workflows! |
Vulnerability fixed in the commit: 5882551 @rksharma95 Can you please run the workflows? |
@rksharma95 @Aryan-sharma11 Is it good to go? |
Signed-off-by: Manik2708 <[email protected]>
Signed-off-by: Manik2708 <[email protected]>
Signed-off-by: Manik2708 <[email protected]>
@Manik2708 squash commits |
@rksharma95 It's long time I have squashed the commits but still |
Purpose of PR?:
Fixes #1876
Does this PR introduce a breaking change? No
If the changes in this PR are manually verified, list down the scenarios covered:: Will be tested in CI
Additional information for reviewer? :
I have introduced one change in multiubuntu directory to see if CI is working fine, as it is very difficult to test ci in fork. Once this PR is ready to merge, that change will be reverted!
Checklist:
<type>(<scope>): <subject>