Skip to content

Allow for custom CertGeneratorImage #547

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 2 commits into from
May 9, 2024

Conversation

Fiona-Waters
Copy link
Contributor

@Fiona-Waters Fiona-Waters commented Apr 30, 2024

Issue link

RHOAIENG-6505

What changes have been made

I updated the CFO config to include an image to be used for cert creation in the init containers added by the CFO webhook. This is added so that in the case of a disconnected cluster there is not an extra image required.

Verification steps

  • Install CodeFlare Operator from this branch, and provide a custom image in the codeflare-operator-config configMap adding the image to the kuberay configuration like this:
    kuberay:
      ingressDomain: ""
      mTLSEnabled: true
      rayDashboardOAuthEnabled: true
      certGeneratorImage: "registry.access.redhat.com/ubi9@sha256:770cf07083e1c85ae69c25181a205b7cdef63c11b794c89b3b487d4670b4c328"
  • Restart the CFO pod.
  • Create a raycluster using a demo notebook, and check that the init containers are using the image specified in the configmap and that the raycluster pods are created succesfully.

Checks

  • I've made sure the tests are passing.
  • Testing Strategy
    • Unit tests
    • Manual tests
    • Testing is not required for this change

@Fiona-Waters Fiona-Waters changed the title Allow for custom ray image Allow for custom CertGeneratorImage Apr 30, 2024
Copy link
Collaborator

@KPostOffice KPostOffice left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Looks good, just a couple comments 👍🏻

@ChughShilpa
Copy link
Contributor

@Fiona-Waters
One question, To use custom image, user needs to specify it in cluster config in demo-notebooks and then also need to update the same in codeflare-operator-config config-map ?

@Fiona-Waters
Copy link
Contributor Author

@Fiona-Waters One question, To use custom image, user needs to specify it in cluster config in demo-notebooks and then also need to update the same in codeflare-operator-config config-map ?

The ray image specified in the cluster config in demo-notebooks will be the main ray image used. The one set in the config map will be used just for tls cert creation in the init containers. It can be the same image for both but it doesn't have to be.

@Fiona-Waters Fiona-Waters requested a review from KPostOffice May 7, 2024 15:39
@Fiona-Waters Fiona-Waters force-pushed the ray-image branch 5 times, most recently from 34be621 to d6a6600 Compare May 8, 2024 21:27
@Fiona-Waters Fiona-Waters requested a review from Bobbins228 May 9, 2024 08:24
Copy link
Contributor

@Bobbins228 Bobbins228 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

/lgtm
Working as expected nice work Fiona

Copy link
Collaborator

@KPostOffice KPostOffice left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

One small comment

@@ -7,3 +7,4 @@ data:
kuberay:
rayDashboardOAuthEnabled: false
ingressDomain: "kind"
mtLSEnabled: false
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
mtLSEnabled: false
mTLSEnabled: false

Why is this needed here?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Updated. It is needed as the e2e test is out of date. Creating a follow on jira to cover this.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Copy link
Collaborator

@KPostOffice KPostOffice left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

/lgtm

Copy link

openshift-ci bot commented May 9, 2024

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: KPostOffice

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@openshift-ci openshift-ci bot added the approved label May 9, 2024
@openshift-merge-bot openshift-merge-bot bot merged commit 2c2b0a2 into project-codeflare:main May 9, 2024
8 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants