-
Notifications
You must be signed in to change notification settings - Fork 917
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Update kubeflow/model-registry manifests from 5d8ed91 #2973
Conversation
Signed-off-by: tarilabs <matteo.mortari@gmail.com>
/assign @juliusvonkohout as discussed in today's meeting, thank you again |
Signed-off-by: tarilabs <matteo.mortari@gmail.com>
see details in kubeflow/model-registry#267 (comment) Signed-off-by: tarilabs <matteo.mortari@gmail.com>
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Hello, you are missing a security context for most of your deployments. Please add
manifests/common/dex/base/deployment.yaml
Lines 25 to 32 in 550e0b3
securityContext: | |
allowPrivilegeEscalation: false | |
seccompProfile: | |
type: RuntimeDefault | |
runAsNonRoot: true | |
capabilities: | |
drop: | |
- ALL |
to all of your deployments.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Hello, where is the Kubeflow userid header checked ?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Hi @juliusvonkohout I'm assuming you are asking something similar as what pipelines has implemented here, we weren't told when we asked for feedback it was an option, if we need it, I'm happy to add it right away.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Do we need to update https://github.com/kubeflow/manifests/blob/master/common/networkpolicies/base/model-registry.yaml as well ?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
do we have tests for the UI ?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Hi @juliusvonkohout, yes, we have a stack of tests run before merging both for unit testing and integration, everything runs in an action before every PR, not sure if there's extra test for kubeflow integration.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Also, @juliusvonkohout, as this is still not integrated with Central Dashboard by default, we have not added the integration tests on Kubeflow Central Dashboard yet. (but as @lucferbux said, we test it on the model registry repo)
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
But do we have some basic tests in kubeflow/manifests for the UI before we enable it? See https://github.com/kubeflow/manifests/blob/a21afee95a7129d5374eebe84ef9b0983ec3adb5/.github/workflows/model_registry_test.yaml. We need some integration tests.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Can we add the tests in a follow up PR? I can raise a new bug to cover it and add it right away.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@lucferbux then just please create a tracking issue for the next release and link it here.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I'm sorry @juliusvonkohout I didn't follow up on this, here's #2984 and I currently have a local draft PR that I'm testing, probably I'll push it later today, first thing monday.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Hello, you are missing a security context for most of your deployments. Please add
manifests/common/dex/base/deployment.yaml
Lines 25 to 32 in 550e0b3
securityContext: | |
allowPrivilegeEscalation: false | |
seccompProfile: | |
type: RuntimeDefault | |
runAsNonRoot: true | |
capabilities: | |
drop: | |
- ALL |
to all of your deployments.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
https://github.com/kubeflow/manifests/blob/master/apps/model-registry/upstream/base/model-registry-deployment.yaml is also missing the securitycontext
hi @juliusvonkohout @tarekabouzeid wrt to : this was not raised as a blocker since: I'd prefer to defer this new requirement on the roadmap for the next release(s). for this release, what we received in Release team meeting, was to implement K8s matrix check, which we did promptly and as requested with |
Can you then create and link here a tracking issue for the security context in the next model-registry release? |
The link has been created and for the next roadmap (ie KF) release(s) accordingly. |
I assume that kubeflow/model-registry#760 is the issue. For KFP and manifests we already have the securitycontext upstream :-) I think we should have one for the integration tests as well, see #2973 (comment) and then i just add the two issues here as well #2763 and merge this PR. |
Ok, so for the Integration tests, already created #2984 so we are good there, I'll raise the PR asap. |
Yes please the securitycontext and the integration tests in BOTH (also kubeflow/manifests) repositories for the next release. They don't need to be exhaustive, but at least basic API and UI functionality must be tested and then we can review PRs to kubeflow/manifests way faster. /lgtm |
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: juliusvonkohout The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
ack, thank you for raising it |
Pull Request Template for Kubeflow manifests Issues
✏️ A brief description of the changes
Updated KF manifests for MR following most recent release update
📦 List any dependencies that are required for this change
none
🐛 If this PR is related to an issue, please put the link to the issue here.
for KF 1.10 RC builds
✅ Contributor checklist
DCO
check)