Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

rename knoxautopolicy to auto-policy-discovery #426

Merged
merged 2 commits into from
Mar 17, 2022
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
14 changes: 7 additions & 7 deletions .github/workflows/latest-release.yml
Original file line number Diff line number Diff line change
Expand Up @@ -9,16 +9,16 @@ on:
branches:
- 'v*'

name: Create Knoxautopolicy release after testing the image
name: Create auto-policy-discovery release after testing the image

jobs:
build:
name: Create Knoxautopolicy Release
name: Create auto-policy-discovery Release
if: github.repository == 'accuknox/auto-policy-discovery'
runs-on: ubuntu-18.04
timeout-minutes: 20
steps:
- name: Checkout Knoxautopolicy code
- name: Checkout auto-policy-discovery code
uses: actions/checkout@v2

- name: Setup Enviroment
Expand All @@ -34,17 +34,17 @@ jobs:
./k3s/install_k3s.sh


- name: Generate Knoxautopolicy artifacts
- name: Generate auto-policy-discovery artifacts
run: |
GITHUB_SHA=$GITHUB_SHA ./src/build/build_knoxautopolicy.sh ${{ steps.vars.outputs.tag }}

- name: Run Knoxautopolicy
- name: Run auto-policy-discovery
run: |
kubectl apply -f deployments/k8s/ && kubectl wait --for=condition=ready --timeout=5m -n default pod -l container=knoxautopolicy
kubectl get pods -A

#TODO: add the following tests after they are fixed
# - name: Test Knoxautopolicy
# - name: Test auto-policy-discovery
# run: |
# ./tests/test-scenarios-local.sh ${{ steps.vars.outputs.tag }}

Expand All @@ -54,6 +54,6 @@ jobs:
username: ${{ secrets.DOCKER_USERNAME }}
password: ${{ secrets.DOCKER_AUTHTOK }}

- name: Push Knoxautopolicy images to Docker
- name: Push auto-policy-discovery images to Docker
run: |
./src/build/push_knoxautopolicy.sh ${{ steps.vars.outputs.tag }}
8 changes: 4 additions & 4 deletions .github/workflows/stable-release.yml
Original file line number Diff line number Diff line change
Expand Up @@ -7,16 +7,16 @@ on:
paths:
- 'STABLE-RELEASE'

name: Knoxautopolicy stable release
name: auto-policy-discovery stable release

jobs:
build:
name: Create Knoxautopolicy Release - 18.04
name: Create auto-policy-discovery Release - 18.04
if: github.repository == 'accuknox/auto-policy-discovery'
runs-on: ubuntu-18.04
timeout-minutes: 20
steps:
- name: Checkout Knoxautopolicy code
- name: Checkout auto-policy-discovery code
uses: actions/checkout@v2

- name: Pull Docker Hub image
Expand All @@ -31,5 +31,5 @@ jobs:
username: ${{ secrets.DOCKER_USERNAME }}
password: ${{ secrets.DOCKER_AUTHTOK }}

- name: Push Knoxautopolicy images to Docker
- name: Push auto-policy-discovery images to Docker
run: ./src/build/push_knoxautopolicy.sh stable
8 changes: 4 additions & 4 deletions .github/workflows/stable-version-release.yml
Original file line number Diff line number Diff line change
Expand Up @@ -4,16 +4,16 @@ on:
branches:
- 'v*'

name: Knoxautopolicy stable release update
name: auto-policy-discovery stable release update

jobs:
build:
name: Create Knoxautopolicy Release - 18.04
name: Create auto-policy-discovery Release - 18.04
if: github.repository == 'accuknox/auto-policy-discovery'
runs-on: ubuntu-18.04
timeout-minutes: 20
steps:
- name: Checkout Knoxautopolicy code
- name: Checkout auto-policy-discovery code
uses: actions/checkout@v2
with:
ref: dev
Expand All @@ -37,7 +37,7 @@ jobs:
username: ${{ secrets.DOCKER_USERNAME }}
password: ${{ secrets.DOCKER_AUTHTOK }}

- name: Push Knoxautopolicy images to Docker
- name: Push auto-policy-discovery images to Docker
if: steps.match.outputs.tag == 'true'
run: ./src/build/push_knoxautopolicy.sh stable