@@ -38,14 +38,14 @@ jobs:
38
38
- name : Create kubeflow namespace
39
39
run : kustomize build common/kubeflow-namespace/base | kubectl apply -f -
40
40
41
- - name : Install KF Pipelines
42
- run : ./tests/gh-actions/install_pipelines.sh
43
-
44
41
- name : Install KF Multi Tenancy
45
42
run : ./tests/gh-actions/install_multi_tenancy.sh
46
43
44
+ - name : Install KF Pipelines
45
+ run : ./tests/gh-actions/install_pipelines_swfs.sh
46
+
47
47
- name : Install kubeflow-istio-resources
48
- run : kustomize build common/istio-1-24/kubeflow-istio-resources/base | kubectl apply -f -
48
+ run : kustomize build common/istio-cni- 1-24/kubeflow-istio-resources/base | kubectl apply -f -
49
49
50
50
- name : Create KF Profile
51
51
run : |
75
75
fi
76
76
kubectl get secret mlpipeline-minio-artifact -n "$KF_PROFILE" -o json | jq -r '.data | keys[] as $k | "\($k): \(. | .[$k] | @base64d)"' | tr '\n' ' '
77
77
78
- - name : Install seaweedfs
79
- run : |
80
- kustomize build experimental/seaweedfs/istio | kubectl apply -f -
81
- kubectl -n kubeflow wait --for=condition=available --timeout=600s deploy/seaweedfs
82
- kubectl -n kubeflow exec deploy/seaweedfs -c seaweedfs -- sh -c "echo \"s3.configure -user minio -access_key minio -secret_key minio123 -actions Read,Write,List -apply\" | /usr/bin/weed shell"
83
-
84
78
- name : port forward
85
79
run : |
86
80
ingress_gateway_service=$(kubectl get svc --namespace istio-system --selector="app=istio-ingressgateway" --output jsonpath='{.items[0].metadata.name}')
93
87
KF_PROFILE=kubeflow-user-example-com
94
88
TOKEN="$(kubectl -n $KF_PROFILE create token default-editor)"
95
89
python3 tests/gh-actions/pipeline_test.py run_pipeline "${TOKEN}" "${KF_PROFILE}"
90
+
91
+ - name : Fail to list pipelines with unauthorized ServiceAccount Token
92
+ run : |
93
+ pip3 install kfp==2.11.0
94
+ KF_PROFILE=kubeflow-user-example-com
95
+ TOKEN="$(kubectl -n default create token default)"
96
+ python3 tests/gh-actions/pipeline_test.py test_unauthorized_access "${TOKEN}" "${KF_PROFILE}"
97
+ echo "Test succeeded. Token from unauthorized ServiceAccount cannot list pipelines in $KF_PROFILE namespace."
98
+
99
+
100
+ - name : Apply Pod Security Standards baseline levels for static namespaces
101
+ run : ./tests/gh-actions/enable_baseline_PSS.sh
102
+
103
+ - name : Unapply applied baseline labels
104
+ run : |
105
+ NAMESPACES=("istio-system" "auth" "cert-manager" "oauth2-proxy" "kubeflow")
106
+ for NAMESPACE in "${NAMESPACES[@]}"; do
107
+ if kubectl get namespace "$NAMESPACE" >/dev/null 2>&1; then
108
+ kubectl label namespace $NAMESPACE pod-security.kubernetes.io/enforce-
109
+ fi
110
+ done
111
+
112
+ - name : Applying Pod Security Standards restricted levels for static namespaces
113
+ run : ./tests/gh-actions/enable_restricted_PSS.sh
0 commit comments