-
Notifications
You must be signed in to change notification settings - Fork 242
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
ci: validate pods and systemd-networkd restart for PRs #1909
Merged
Merged
Changes from all commits
Commits
Show all changes
16 commits
Select commit
Hold shift + click to select a range
1d970d6
update script to check cns in memory and add to pr pipeline
camrynl 1981d8f
adding stage to both overlay and podsubnet cilium stages
camrynl b498742
Merge branch 'master' into prpipeline
camrynl f1c208c
Merge branch 'master' into prpipeline
camrynl 4683017
Merge branch 'master' into prpipeline
camrynl cf20f57
add exit case if priveleged pod is not found
camrynl ecb1a55
check status of priv pod
camrynl 3990be1
call ds status before exit
camrynl 3835203
Merge branch 'master' into prpipeline
camrynl ae4ecfa
Merge branch 'master' into prpipeline
camrynl 5c8a710
install cilium ds with kubectl and not helm for systemd-networkd init…
camrynl d0a72cd
upload cilium ds
camrynl 8e2243b
adding files for cilium-agent and cilium-operator deployment
camrynl f14cb52
update cilium ds
camrynl 5203681
addressing comments
camrynl dfaaf95
Merge branch 'master' into prpipeline
camrynl File filter
Filter by extension
Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
95 changes: 95 additions & 0 deletions
95
test/integration/manifests/cilium/cilium-agent/clusterrole.yaml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,95 @@ | ||
apiVersion: rbac.authorization.k8s.io/v1 | ||
kind: ClusterRole | ||
metadata: | ||
name: cilium | ||
rules: | ||
- apiGroups: | ||
- networking.k8s.io | ||
resources: | ||
- networkpolicies | ||
verbs: | ||
- get | ||
- list | ||
- watch | ||
- apiGroups: | ||
- discovery.k8s.io | ||
resources: | ||
- endpointslices | ||
verbs: | ||
- get | ||
- list | ||
- watch | ||
- apiGroups: | ||
- "" | ||
resources: | ||
- namespaces | ||
- services | ||
- pods | ||
- endpoints | ||
- nodes | ||
verbs: | ||
- get | ||
- list | ||
- watch | ||
- apiGroups: | ||
- apiextensions.k8s.io | ||
resources: | ||
- customresourcedefinitions | ||
verbs: | ||
- list | ||
- watch | ||
# This is used when validating policies in preflight. This will need to stay | ||
# until we figure out how to avoid "get" inside the preflight, and then | ||
# should be removed ideally. | ||
- get | ||
- apiGroups: | ||
- cilium.io | ||
resources: | ||
- ciliumbgploadbalancerippools | ||
- ciliumbgppeeringpolicies | ||
- ciliumclusterwideenvoyconfigs | ||
- ciliumclusterwidenetworkpolicies | ||
- ciliumegressgatewaypolicies | ||
- ciliumegressnatpolicies | ||
- ciliumendpoints | ||
- ciliumendpointslices | ||
- ciliumenvoyconfigs | ||
- ciliumidentities | ||
- ciliumlocalredirectpolicies | ||
- ciliumnetworkpolicies | ||
- ciliumnodes | ||
verbs: | ||
- list | ||
- watch | ||
- apiGroups: | ||
- cilium.io | ||
resources: | ||
- ciliumidentities | ||
- ciliumendpoints | ||
- ciliumnodes | ||
verbs: | ||
- create | ||
- apiGroups: | ||
- cilium.io | ||
resources: | ||
- ciliumendpoints | ||
verbs: | ||
- delete | ||
- get | ||
- apiGroups: | ||
- cilium.io | ||
resources: | ||
- ciliumnodes | ||
- ciliumnodes/status | ||
verbs: | ||
- get | ||
- update | ||
- apiGroups: | ||
- cilium.io | ||
resources: | ||
- ciliumnetworkpolicies/status | ||
- ciliumclusterwidenetworkpolicies/status | ||
- ciliumendpoints/status | ||
- ciliumendpoints | ||
verbs: | ||
- patch |
12 changes: 12 additions & 0 deletions
12
test/integration/manifests/cilium/cilium-agent/clusterrolebinding.yaml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,12 @@ | ||
apiVersion: rbac.authorization.k8s.io/v1 | ||
kind: ClusterRoleBinding | ||
metadata: | ||
name: cilium | ||
roleRef: | ||
apiGroup: rbac.authorization.k8s.io | ||
kind: ClusterRole | ||
name: cilium | ||
subjects: | ||
- kind: ServiceAccount | ||
name: "cilium" | ||
namespace: kube-system |
Oops, something went wrong.
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Did we encounter such case during testing ?
Can we add the status of privileged pod deployment then. (
kubectl describe daemonset privileged-daemonset -n kube-system
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
sure I'll add that, here you can see this run just got stuck in the loop. I had to manually cancel it https://dev.azure.com/msazure/One/_build/results?buildId=71680459&view=logs&j=4ea62961-c456-50ab-e773-f15fbc744993&t=6637b73f-d7ef-5d5e-d4d4-eb0bbec757cb&s=c689f5d8-16f1-5a52-95fe-f6a4e6a9e7fe
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Sorry I meant if we fail to get the privileged pod then it will be good to have the status of daemon set. Basically before exiting we can have that as I see from the pipeline run,
daemonset.apps/privileged-daemonset
created.Ideally we should be waiting for the deployment to be complete before proceeding i think.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Ah makes sense, I made the switch