Skip to content
Snippets Groups Projects
  1. Oct 21, 2020
    • Dale Hamel's avatar
      Refactor docker image publishing · d4aecc65
      Dale Hamel authored
      This adds support to push docker images to quay.io, like other projects in
      the iovisor org.
      
      It separates docker image builds into a separate github workflow, and
      refactors the package building process slightly, to be generic, in order to
      create builds for both ubuntu 16.04 and ubuntu 18.04.
      
      This provides a means to distribute intermediate apt packages between releases,
      and also enables uploading these as CI artifacts.
      
      As recent releases have not annotated their tags, it drops the requirement for
      tags to be annotated in selecting the version to use.
      d4aecc65
  2. Jan 29, 2020
    • Dale Hamel's avatar
      Run BCC test suite with github actions · a47c44fa
      Dale Hamel authored
      With this commit, pushes to branches can trigger tests directly on
      Github Actions.
      
      Here it will be able to test against kernel 4.14 and 5.0.0, which correspond
      to the latest Ubuntu LTS kernel releases.
      
      Tests are run for both Debug and Release modes.
      
      Tests run inside docker, in an ubuntu 19.04 container base.
      
      For the github workflow:
      
      - The test_libbcc suite is run first, to potentially fail fast on these faster
      unit tests.
      - The Python test suite is run
      
      Some of these tests are allowed to fail, but the failure is still reported:
      
      - In catch2 tests, using the [!mayfail] tag, where this will be displayed in
      the test summary
      - In Python unittests, using the `@mayFail("Reason")` decorator, which is
      introduce for consistency with catch2. These will report the reason for the
      failure, and log this to an artifact of the test.
      a47c44fa
  3. Dec 21, 2019
    • Alban Crequy's avatar
      tools: cgroup filtering in execsnoop/opensnoop · b2aa29fa
      Alban Crequy authored
      Add a new option --cgroupmap in execsnoop and opensnoop to only display
      results from processes that belong to one of the cgroups whose id,
      returned by bpf_get_current_cgroup_id(), is in a pinned BPF hash map.
      
      Examples of commands:
          # opensnoop --cgroupmap /sys/fs/bpf/test01
          # execsnoop --cgroupmap /sys/fs/bpf/test01
      
      Cgroup ids can be discovered in userspace by the system call
      name_to_handle_at(); an example of C program doing that is available in
      examples/cgroupid/cgroupid.c.
      
      More complete documentation is added in docs/filtering_by_cgroups.md
      
      The documentation is independent from Kubernetes. However, my goal is to
      use this feature in Kubernetes: I am preparing to use this in Inspektor
      Gadget to select specific Kubernetes pods, depending on a Kubernetes
      label selector. Kubernetes pods matching the label selector can come and
      go during the execution of the bcc tools; Inspektor Gadget is updating
      the BPF hash map used by the bcc tools accordingly.
      b2aa29fa
  4. Jan 07, 2019
  5. Feb 09, 2017
  6. Feb 21, 2016
  7. May 03, 2015
  8. May 02, 2015
Loading