- Flatten if/else logic by handling errors and returning early
- Use different logger for server logs. Also handle skipped errors.
- Remove unecessary for loop
- --zap-log-level can already be used (and it works)
- Remove non-existent enki flag
- Run tests with KVM enabled on self-hosted runners
and also don't add grub.cfg since it's already there in the base image
- Remove non-used earthly target
Signed-off-by: Dimitris Karakasilis <dimitris@karakasilis.me>
* Bump ghw and fix label
old label was the new FilesystemLabel. Now the label refers to the
partition label which is different
Signed-off-by: Itxaka <itxaka.garcia@spectrocloud.com>
* bump deps
Signed-off-by: Itxaka <itxaka.garcia@spectrocloud.com>
* Rework ginkgo
Signed-off-by: Itxaka <itxaka.garcia@spectrocloud.com>
* docker login
Signed-off-by: Itxaka <itxaka.garcia@spectrocloud.com>
* [Will drop]Allow building kcrypt from branches
Otherwise any changes that need both wont pass tests.
Signed-off-by: Itxaka <itxaka.garcia@spectrocloud.com>
* Dont build the iso 5 times
Signed-off-by: Itxaka <itxaka.garcia@spectrocloud.com>
* This confirms Im dumb and dont know how to program
Signed-off-by: Itxaka <itxaka.garcia@spectrocloud.com>
* debug logs
Signed-off-by: Itxaka <itxaka.garcia@spectrocloud.com>
* debug
Signed-off-by: Itxaka <itxaka.garcia@spectrocloud.com>
* 🤖 run in github CI
Signed-off-by: Itxaka <itxaka.garcia@spectrocloud.com>
* Debug
Signed-off-by: Itxaka <itxaka.garcia@spectrocloud.com>
* debug
Signed-off-by: Itxaka <itxaka.garcia@spectrocloud.com>
* Add /tmp/oem to scan dirs for config
Signed-off-by: Itxaka <itxaka.garcia@spectrocloud.com>
---------
Signed-off-by: Itxaka <itxaka.garcia@spectrocloud.com>
Error:
```
[FAILED] Error from server (NotFound): namespaces "actions-runner-system" not found
```
coming from: /runner/_work/kcrypt-challenger/kcrypt-challenger/tests/encryption_test.go:157
is suspicious. That namespace shouldn't exist in the test k3d cluster,
no idea why it was looked up. I suspect the env for the following
command somehow pointed to the "outer" cluster:
```
cmd := exec.Command("kubectl", "get", "secrets", ...)
```
Signed-off-by: Dimitris Karakasilis <dimitris@karakasilis.me>
getting closer to running them with KVM enabled. This will require self
hosted runners with KVM enabled but we will get there eventually.
Signed-off-by: Dimitris Karakasilis <dimitris@karakasilis.me>
No automated test for this case because it's complicated to get a
properly signed certificate in tests:
- the domain we use is sslip.io (not sure if letsencrypt would sign it)
- we need to use the letsencrypt production and that has quotas not
suitable for CI
Signed-off-by: Dimitris Karakasilis <dimitris@karakasilis.me>