Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[release-0.12.1] Cherry picks - Fixes for ODH #345

Commits on May 6, 2024

  1. set disableIngressCreation to true in odh overlay

    Signed-off-by: Vedant Mahabaleshwarkar <[email protected]>
    VedantMahabaleshwarkar authored and israel-hdez committed May 6, 2024
    Configuration menu
    Copy the full SHA
    bf2b3ea View commit details
    Browse the repository at this point in the history
  2. add .tekton to gitignore to avoid conflict due to Konflux

    Signed-off-by: jooho <[email protected]>
    Jooho authored and israel-hdez committed May 6, 2024
    Configuration menu
    Copy the full SHA
    9644345 View commit details
    Browse the repository at this point in the history
  3. [RHOAIENG-3551] - fastapi - Regular Expression Denial of Service (ReDoS)

    Fixes CVE-2024-24762 - Regular Expression Denial of Service (ReDoS)
    Remove the fastapi when this is addressed:  https://issues.redhat.com/browse/RHOAIENG-3894
    or ray releses a new version that removes the fastapi version pinning and it gets updated on KServe
    
    Signed-off-by: Spolti <[email protected]>
    spolti authored and israel-hdez committed May 6, 2024
    Configuration menu
    Copy the full SHA
    fb28bc8 View commit details
    Browse the repository at this point in the history
  4. fix syntax error in inferenceservice-config patch

    Signed-off-by: Vedant Mahabaleshwarkar <[email protected]>
    VedantMahabaleshwarkar authored and israel-hdez committed May 6, 2024
    Configuration menu
    Copy the full SHA
    7e4651a View commit details
    Browse the repository at this point in the history
  5. Increase memory limit of kserve-controller pod

    The increased memory limit is for the controller pod to work normally in clusters having 9k+ secrets.
    
    Related https://issues.redhat.com/browse/RHOAIENG-3996
    
    Signed-off-by: Edgar Hernández <[email protected]>
    israel-hdez committed May 6, 2024
    Configuration menu
    Copy the full SHA
    d2f76fa View commit details
    Browse the repository at this point in the history
  6. Upgrade orjson to version 3.9.15 (kserve#3488)

    * Upgrade orjson to version 3.9.15
    
    chore: Fixes [CVE-2024-27454](https://nvd.nist.gov/vuln/detail/CVE-2024-27454): orjson.loads in orjson before 3.9.15 does not limit recursion for deeply nested JSON documents.
    
    Signed-off-by: Spolti <[email protected]>
    
    * Update python/kserve/pyproject.toml
    
    Co-authored-by: Sivanantham <[email protected]>
    Signed-off-by: Filippe Spolti <[email protected]>
    
    * re-run poetry lock
    
    Signed-off-by: Spolti <[email protected]>
    
    ---------
    
    Signed-off-by: Spolti <[email protected]>
    Signed-off-by: Filippe Spolti <[email protected]>
    Co-authored-by: Sivanantham <[email protected]>
    2 people authored and israel-hdez committed May 6, 2024
    Configuration menu
    Copy the full SHA
    1833f14 View commit details
    Browse the repository at this point in the history
  7. Remove conversion webhook from manifests (kserve#3476)

    Signed-off-by: jooho <[email protected]>
    Jooho authored and israel-hdez committed May 6, 2024
    Configuration menu
    Copy the full SHA
    02f50ff View commit details
    Browse the repository at this point in the history
  8. Remove cluster level list/watch for configmaps, serviceaccounts, secr…

    …ets (kserve#3469)
    
    * Remove cluster level list/watch for configmaps, serviceaccounts, secrets
    
    Signed-off-by: Sivanantham Chinnaiyan <[email protected]>
    
    * Resolve comments
    
    Signed-off-by: Sivanantham Chinnaiyan <[email protected]>
    
    ---------
    
    Signed-off-by: Sivanantham Chinnaiyan <[email protected]>
    sivanantha321 authored and israel-hdez committed May 6, 2024
    Configuration menu
    Copy the full SHA
    e77c199 View commit details
    Browse the repository at this point in the history
  9. CVE-2024-28110 security upgrade (kserve#3509)

    Signed-off-by: Andrews Arokiam <[email protected]>
    andyi2it authored and israel-hdez committed May 6, 2024
    Configuration menu
    Copy the full SHA
    f24a641 View commit details
    Browse the repository at this point in the history
  10. Add capability to run RawDeployment E2Es in OpenShift-ci

    Since ODH would support KServe's RawDeployment mode, this modifies the scripts around OpenShift-ci setup to be possible to run RawDeployment-related E2Es.
    
    The run-e2e-tests.sh script is modified to exclude installation of Service Mesh and Serverless, when RawDeployments E2Es are requested to run. A supporting file inferenceservice-openshift-ci-raw.yaml was added to patch KServe's configuration to use RawDeployment mode by default and to use OpenShift Ingress when exposing Inference Services.
    
    Since the E2Es use some annotations in the InferenceService, changes done to the v1beta1_inference_service.py file in commit ecff079 were reverted. As an alternative, the `enablePassthrough` annotation was moved to the ServingRuntime resources. This is not only cleaner, but also reduces the diverging code with the upstream repository. Furthermore, this seems to be an auto-generated file that should not be touched.
    
    Signed-off-by: Edgar Hernández <[email protected]>
    israel-hdez committed May 6, 2024
    Configuration menu
    Copy the full SHA
    9e17f0e View commit details
    Browse the repository at this point in the history
  11. GH Alert: Potential file inclusion via variable (kserve#3520)

    chore:	fixes the GH [Alert](https://github.com/kserve/kserve/security/code-scanning/12080).
    	filepath.Clean sanitizes the directory path and remove any unnecessary components (such as . and ..)
    
    Signed-off-by: Spolti <[email protected]>
    spolti authored and israel-hdez committed May 6, 2024
    Configuration menu
    Copy the full SHA
    f257009 View commit details
    Browse the repository at this point in the history
  12. Configuration menu
    Copy the full SHA
    4e3b91c View commit details
    Browse the repository at this point in the history
  13. [RHOAIENG-5073] - Routing and Headless Service Support in KServe Raw …

    …Mode Deployment
    
    Signed-off-by: Spolti <[email protected]>
    spolti authored and israel-hdez committed May 6, 2024
    Configuration menu
    Copy the full SHA
    e5e0ebd View commit details
    Browse the repository at this point in the history
  14. comment ce logs for headless services

    Signed-off-by: Spolti <[email protected]>
    spolti authored and israel-hdez committed May 6, 2024
    Configuration menu
    Copy the full SHA
    db8b183 View commit details
    Browse the repository at this point in the history
  15. Configuration menu
    Copy the full SHA
    25eb7b1 View commit details
    Browse the repository at this point in the history
  16. [RHOAIENG-4617] - follow up - remove hardcoded fastapi from Dockerfile (

    opendatahub-io#292)
    
    * [RHOAIENG-4617] - follow up - remove hardcoded fastapi from Dockerfile
    
    As the Ray Serve latest release removed the hard dependency of old fastapi version
    we can now remove the workaround from the Storage Initializer Container Image.
    
    Signed-off-by: Spolti <[email protected]>
    spolti authored and israel-hdez committed May 6, 2024
    Configuration menu
    Copy the full SHA
    98cc37a View commit details
    Browse the repository at this point in the history
  17. Fix storage-initializer-docker-publisher workflow

    There is an error in the storage-initializer-docker-publisher workflow where a string is being used, but should be a variable. On PR merges, this is causing an error when trying to push the docker image of the storage initializer.
    
    This is fixing the issue by properly using the variable.
    
    Signed-off-by: Edgar Hernández <[email protected]>
    israel-hdez committed May 6, 2024
    Configuration menu
    Copy the full SHA
    4e537e7 View commit details
    Browse the repository at this point in the history