Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

test: pipeline to check vulnerabilities for KFP images #5066

Closed
wants to merge 5 commits into from

Conversation

Bobgy
Copy link
Contributor

@Bobgy Bobgy commented Feb 1, 2021

Description of your changes:
Part of #3857

Checklist:

@k8s-ci-robot
Copy link
Contributor

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: Bobgy

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

1 similar comment
@google-oss-robot
Copy link

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: Bobgy

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

# Mirror Image


def mirror_image(
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Maybe this component is easier to define in YAML form, since it just calls a command-line program.

source_registry: str,
destination_registry: str,
tag: str = '',
):
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The component should probably output the destination_image, so that it can be chained.


kritis_check = kfp.components.load_component_from_text(
'''
name: Kritis Check
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

In the future we can put this component YAML in /components/. Maybe in /components/container-operations/Scan_for_vulnerabilities/using_Kritis/

registry_url: str = 'gcr.io/gongyuan-pipeline-test/dev'
):
kfp_images_task = kfp_images(registry_url=registry_url, version=version)
with kfp.dsl.ParallelFor(kfp_images_task.output) as image:
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Have you tried:

images = json.dumps([...])
with kfp.dsl.ParallelFor(images) as image:

- -ec
- |
program_path=$(mktemp)
echo -n "$0" > "$program_path"
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Can you please use the latest SDK version for the compilation? The latest one uses printf "%s" "$0" instead of echo -n "$0"

@Ark-kun
Copy link
Contributor

Ark-kun commented Feb 9, 2021

Great idea, Yuan. I like that you're using KFP to test KFP.

/lgtm

You can unhold when you want
/hold

@stale
Copy link

stale bot commented Jun 2, 2021

This issue has been automatically marked as stale because it has not had recent activity. It will be closed if no further activity occurs. Thank you for your contributions.

@stale stale bot added the lifecycle/stale The issue / pull request is stale, any activities remove this label. label Jun 2, 2021
@Bobgy
Copy link
Contributor Author

Bobgy commented Jun 4, 2021

/lifecycle frozen

@google-oss-robot
Copy link

@Bobgy: The lifecycle/frozen label cannot be applied to Pull Requests.

In response to this:

/lifecycle frozen

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@stale stale bot removed lifecycle/stale The issue / pull request is stale, any activities remove this label. labels Jun 4, 2021
@Ark-kun
Copy link
Contributor

Ark-kun commented Jul 11, 2021

@Bobgy You can unhold this PR at any time.
As I said, I only put it on hold to prevent auto-submission.

@stale
Copy link

stale bot commented Mar 2, 2022

This issue has been automatically marked as stale because it has not had recent activity. It will be closed if no further activity occurs. Thank you for your contributions.

@stale stale bot added the lifecycle/stale The issue / pull request is stale, any activities remove this label. label Mar 2, 2022
@Ark-kun Ark-kun removed their assignment Jul 25, 2023
@stale stale bot removed the lifecycle/stale The issue / pull request is stale, any activities remove this label. label Jul 25, 2023
@rimolive
Copy link
Member

/close

This work is in progress within Security WG.

@google-oss-prow google-oss-prow bot closed this Jun 17, 2024
Copy link

@rimolive: Closed this PR.

In response to this:

/close

This work is in progress within Security WG.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

5 participants