Skip to content

Commit b6d21e5

Browse files
committed
Updating rbac and some minor changes around the install script and instructions
1 parent 2791a6f commit b6d21e5

File tree

4 files changed

+22
-13
lines changed

4 files changed

+22
-13
lines changed

deployment/README.md

Lines changed: 15 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -181,22 +181,31 @@ kubectl -n kuadrant-system patch limitador limitador --type merge \
181181
-p '{"spec":{"image":"quay.io/kuadrant/limitador:1a28eac1b42c63658a291056a62b5d940596fd4c","version":""}}'
182182
```
183183

184-
#### Configure AuthPolicy Audience
184+
#### Ensure the correct audience is set for AuthPolicy
185185

186-
First, get the correct audience for OpenShift identities, then apply the auth policy:
186+
Patch `AuthPolicy` with the correct audience for Openshift Identities:
187187

188-
```bash
188+
```shell
189+
PROJECT_DIR=$(git rev-parse --show-toplevel)
189190
AUD="$(kubectl create token default --duration=10m \
190191
| jwt decode --json - \
191192
| jq -r '.payload.aud[0]')"
192-
kubectl patch -f deployment/base/policies/auth-policy.yaml \
193+
194+
echo "Patching AuthPolicy with audience: $AUD"
195+
196+
# Note: Auth policy path may vary depending on your deployment
197+
# For consolidated deployment structure:
198+
199+
# Patch MaaS API AuthPolicy
200+
kubectl patch --local -f ${PROJECT_DIR}/deployment/base/policies/maas-auth-policy.yaml \
193201
--type='json' \
194202
-p "$(jq -nc --arg aud "$AUD" '[{
195203
op:"replace",
196-
path:"/spec/rules/authentication/openshift-identities/kubernetesTokenReview/audiences",
197-
value:[$aud]
204+
path:"/spec/rules/authentication/openshift-identities/kubernetesTokenReview/audiences/0",
205+
value:$aud
198206
}]')" \
199207
-o yaml | kubectl apply -f -
208+
200209
```
201210

202211
### Kubernetes Configuration

deployment/samples/models/simulator/rbac.yaml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,8 +6,8 @@ metadata:
66
namespace: llm
77
rules:
88
- apiGroups: ["serving.kserve.io"]
9-
resources: ["inferenceservices"]
10-
verbs: ["create"]
9+
resources: ["llminferenceservices"]
10+
verbs: ["post"]
1111
---
1212
apiVersion: rbac.authorization.k8s.io/v1
1313
kind: RoleBinding

deployment/scripts/deploy-openshift.sh

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -167,10 +167,10 @@ kubectl rollout status deployment/authorino-operator -n kuadrant-system --timeou
167167
kubectl rollout status deployment/limitador-operator-controller-manager -n kuadrant-system --timeout=120s
168168

169169
# Step 8: Restart KServe controller
170-
echo ""
171-
echo "8️⃣ Restarting KServe controller..."
172-
kubectl rollout restart deployment kserve-controller-manager -n kserve
173-
kubectl rollout status deployment/kserve-controller-manager -n kserve --timeout=120s
170+
# echo ""
171+
# echo "8️⃣ Restarting KServe controller..."
172+
# kubectl rollout restart deployment kserve-controller-manager -n kserve
173+
# kubectl rollout status deployment/kserve-controller-manager -n kserve --timeout=120s
174174

175175
# Verification
176176
echo ""

maas-api/deploy/overlays/dev/models/qwen3/rbac.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ metadata:
66
namespace: llm
77
rules:
88
- apiGroups: ["serving.kserve.io"]
9-
resources: ["inferenceservices"]
9+
resources: ["llminferenceservices"]
1010
verbs: ["post"]
1111
---
1212
apiVersion: rbac.authorization.k8s.io/v1

0 commit comments

Comments
 (0)