@@ -45,13 +45,14 @@ jobs:
45
45
run : ./tests/gh-actions/install_multi_tenancy.sh
46
46
47
47
- name : Install kubeflow-istio-resources
48
- run : kustomize build common/istio-1-24/kubeflow-istio-resources/base | kubectl apply -f -
48
+ run : kustomize build common/istio-cni- 1-24/kubeflow-istio-resources/base | kubectl apply -f -
49
49
50
50
- name : Install seaweedfs
51
51
run : |
52
52
kustomize build experimental/seaweedfs/istio | kubectl apply -f -
53
53
kubectl -n kubeflow wait --for=condition=available --timeout=600s deploy/seaweedfs
54
54
55
+
55
56
- name : Create KF Profile
56
57
run : |
57
58
kustomize build common/user-namespace/base | kubectl apply -f -
92
93
KF_PROFILE=kubeflow-user-example-com
93
94
TOKEN="$(kubectl -n $KF_PROFILE create token default-editor)"
94
95
python3 tests/gh-actions/pipeline_test.py run_pipeline "${TOKEN}" "${KF_PROFILE}"
96
+
97
+ - name : Fail to list pipelines with unauthorized ServiceAccount Token
98
+ run : |
99
+ pip3 install kfp==2.11.0
100
+ KF_PROFILE=kubeflow-user-example-com
101
+ TOKEN="$(kubectl -n default create token default)"
102
+ python3 tests/gh-actions/pipeline_test.py test_unauthorized_access "${TOKEN}" "${KF_PROFILE}"
103
+ echo "Test succeeded. Token from unauthorized ServiceAccount cannot list pipelines in $KF_PROFILE namespace."
104
+
105
+
106
+ - name : Apply Pod Security Standards baseline levels for static namespaces
107
+ run : ./tests/gh-actions/enable_baseline_PSS.sh
108
+
109
+ - name : Unapply applied baseline labels
110
+ run : |
111
+ NAMESPACES=("istio-system" "auth" "cert-manager" "oauth2-proxy" "kubeflow")
112
+ for NAMESPACE in "${NAMESPACES[@]}"; do
113
+ if kubectl get namespace "$NAMESPACE" >/dev/null 2>&1; then
114
+ kubectl label namespace $NAMESPACE pod-security.kubernetes.io/enforce-
115
+ fi
116
+ done
117
+
118
+ - name : Applying Pod Security Standards restricted levels for static namespaces
119
+ run : ./tests/gh-actions/enable_restricted_PSS.sh
0 commit comments