-
Notifications
You must be signed in to change notification settings - Fork 893
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add e2e github actions #2417
Add e2e github actions #2417
Conversation
Secrets are created in the Manifest AWS account and the credential has been successfully tested locally to run through all the steps The next step is to add the necessary credential to the repo / secrets. |
Thanks for the heads up! @zijianjoy small ping here that I'll reach out so that we can configure these in the kubeflow/manifests repo |
@annajung in the interim can you also update this PR so that it triggers the E2E test (have a dummy file somewhere) so that we can verify the test picks up the credentials once we set them up? |
Sounds good to me for this github actions, feel free to let me know if approval from me is required. |
[APPROVALNOTIFIER] This PR is NOT APPROVED This pull-request has been approved by: annajung The full list of commands accepted by this bot can be found here.
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
Updated the trigger to run the tests for any changes to the |
Signed-off-by: Anna Jung (VMware) <antheaj@vmware.com>
Signed-off-by: Anna Jung (VMware) <antheaj@vmware.com>
Signed-off-by: Anna Jung (VMware) <antheaj@vmware.com>
Signed-off-by: Anna Jung (VMware) <antheaj@vmware.com>
Signed-off-by: Anna Jung (VMware) <antheaj@vmware.com>
Signed-off-by: Anna Jung (VMware) <antheaj@vmware.com>
Signed-off-by: Anna Jung (VMware) <antheaj@vmware.com>
The problem with the github action failing to authenticate is due to security best practices enforced by GitHub. By default, GitHub secrets are not shared across forks to prevent any misuse (ref https://securitylab.github.com/research/github-actions-preventing-pwn-requests/)
There are two triggers that enable sharing secrets, the
Another approach or step that can be combined with the two triggers above is manual workflow approval using tools like https://github.com/marketplace/actions/manual-workflow-approval, which requires specific approval from a reviewer to trigger a workflow. Using this with Currently, I think the best way to move forward is to use the |
Signed-off-by: Anna Jung (VMware) <antheaj@vmware.com>
Signed-off-by: Anna Jung (VMware) <antheaj@vmware.com>
/ok-to-test |
Since we do need to gatekeep when the e2e test with github secrets are run, the following changes have been made
If I understand correctly, ok-to-test is a valid command. It might be that it's valid for certain users with higher permissions. If so, we can use that as a way to trigger e2e, but who has permissions also must be reviewed. If someone can help add |
Signed-off-by: Anna Jung (VMware) <antheaj@vmware.com>
Looks like there is a problem with using
I think one way we can test this out before merging into the main branch is to create a dev branch in kubeflow/manifests and add a branch filter to the workflow to test before making a PR from dev to main. |
@annajung does our kind cluster have PSA by default? https://kubernetes.io/docs/concepts/security/pod-security-admission/. It seems to be possible https://medium.com/@LachlanEvenson/hands-on-with-kubernetes-pod-security-admission-b6cac495cd11 but we really need it by default to test security staff for Kubeflow 1.9 |
@juliusvonkohout since PSA feature became GA in K8s v1.25, it's enabled by default if we use kinD version > 1.25 |
set -eux | ||
juju scp -- -r $(pwd)/ ubuntu/0:~/ | ||
|
||
- name: Install Docker |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Why docker is required?
# Download kubectl | ||
sudo curl -L "https://storage.googleapis.com/kubernetes-release/release/`curl -s https://storage.googleapis.com/kubernetes-release/release/stable.txt`/bin/linux/amd64/kubectl" -o /usr/local/bin/kubectl | ||
sudo chmod +x /usr/local/bin/kubectl | ||
kubectl version --short --client |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I have the following output
(base) [dlovison@redhat ~]$ sudo curl -L "https://storage.googleapis.com/kubernetes-release/release/`curl -s https://storage.googleapis.com/kubernetes-release/release/stable.txt`/bin/linux/amd64/kubectl" -o /usr/local/bin/kubectl
[sudo] password for dlovison:
% Total % Received % Xferd Average Speed Time Time Time Current
Dload Upload Total Spent Left Speed
100 47.5M 100 47.5M 0 0 18.6M 0 0:00:02 0:00:02 --:--:-- 18.6M
(base) [dlovison@redhat ~]$ sudo chmod +x /usr/local/bin/kubectl
(base) [dlovison@redhat ~]$ kubectl version --short --client
error: unknown flag: --short
See 'kubectl version --help' for usage.
/close because anna will not continue with this and its superseded by #2544 |
@juliusvonkohout: Closed this PR. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
Description of your changes:
Based on E2E design proposal shared with the community, add AWS e2e workflow triggered by GitHub actions
TL;DR of steps
/hold
cc @kimwnasptd @DomFleischmann