Skip to content

Commit c4ae9ff

Browse files
authored
Merge pull request #117 from harshad16/fix-ssl-sa-certs
Include patch option for providing ssl_ca_certs
2 parents cdb3db2 + 74587dc commit c4ae9ff

File tree

8 files changed

+64
-2
lines changed

8 files changed

+64
-2
lines changed

jupyter/datascience/ubi8-python-3.8/Dockerfile

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -36,6 +36,9 @@ RUN mkdir /opt/app-root/runtimes && \
3636
sed -i "s/Kubeflow Pipelines/Data Science Pipelines/g" /opt/app-root/lib/python3.8/site-packages/elyra/metadata/schemas/kfp.json && \
3737
sed -i "s/kubeflow-service/data-science-pipeline-service/g" /opt/app-root/lib/python3.8/site-packages/elyra/metadata/schemas/kfp.json && \
3838
sed -i "s/\"default\": \"Argo\",/\"default\": \"Tekton\",/g" /opt/app-root/lib/python3.8/site-packages/elyra/metadata/schemas/kfp.json && \
39+
# Workaround for passing ssl_sa_cert
40+
patch /opt/app-root/lib/python3.8/site-packages/elyra/pipeline/kfp/kfp_authentication.py -i utils/kfp_authentication.patch && \
41+
patch /opt/app-root/lib/python3.8/site-packages/elyra/pipeline/kfp/processor_kfp.py -i utils/processor_kfp.patch && \
3942
# switch to Data Science Pipeline in component catalog \
4043
DIR_COMPONENT="/opt/app-root/lib/python3.8/site-packages/elyra/metadata/schemas/local-directory-catalog.json" && \
4144
FILE_COMPONENT="/opt/app-root/lib/python3.8/site-packages/elyra/metadata/schemas/local-file-catalog.json" && \

jupyter/datascience/ubi8-python-3.8/setup-elyra.sh

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -44,6 +44,6 @@ if [ "$(ls -A /opt/app-root/runtimes/)" ]; then
4444
fi
4545

4646
# Environment vars set for accessing ssl_sa_certs and sa_token
47-
export KF_PIPELINES_SSL_SA_CERTS="/var/run/secrets/kubernetes.io/serviceaccount/ca.crt"
47+
# export PIPELINES_SSL_SA_CERTS="/var/run/secrets/kubernetes.io/serviceaccount/ca.crt"
4848
export KF_PIPELINES_SA_TOKEN_ENV="/var/run/secrets/kubernetes.io/serviceaccount/token"
4949
export KF_PIPELINES_SA_TOKEN_PATH="/var/run/secrets/kubernetes.io/serviceaccount/token"
Lines changed: 18 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,18 @@
1+
--- a/kfp_authentication.py 2023-06-09 10:13:11.412910808 -0400
2+
+++ b/kfp_authentication.py 2023-06-09 10:14:39.879565175 -0400
3+
@@ -230,6 +230,7 @@
4+
"""
5+
6+
kf_url = urlsplit(api_endpoint)._replace(path="").geturl()
7+
+ kf_pipelines_ssl_sa_cert = os.getenv("PIPELINES_SSL_SA_CERTS", None)
8+
9+
# return data structure for successful requests
10+
auth_info = {
11+
@@ -239,6 +240,7 @@
12+
"cookies": None, # passed to KFP SDK client as "cookies" param value
13+
"credentials": None, # passed to KFP SDK client as "credentials" param value
14+
"existing_token": None, # passed to KFP SDK client as "existing_token" param value
15+
+ "ssl_ca_cert": kf_pipelines_ssl_sa_cert, # passed to KFP SDK Client as "ssl_ca_cert" param value
16+
}
17+
18+
try:
Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,10 @@
1+
--- a/processor_kfp.py 2023-06-09 10:17:15.659461927 -0400
2+
+++ b/processor_kfp.py 2023-06-09 10:16:20.062429914 -0400
3+
@@ -213,6 +213,7 @@
4+
credentials=auth_info.get("credentials", None),
5+
existing_token=auth_info.get("existing_token", None),
6+
namespace=user_namespace,
7+
+ ssl_ca_cert=auth_info.get("ssl_ca_cert", None),
8+
)
9+
else:
10+
client = ArgoClient(

jupyter/datascience/ubi9-python-3.9/Dockerfile

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -36,6 +36,9 @@ RUN mkdir /opt/app-root/runtimes && \
3636
sed -i "s/Kubeflow Pipelines/Data Science Pipelines/g" /opt/app-root/lib/python3.9/site-packages/elyra/metadata/schemas/kfp.json && \
3737
sed -i "s/kubeflow-service/data-science-pipeline-service/g" /opt/app-root/lib/python3.9/site-packages/elyra/metadata/schemas/kfp.json && \
3838
sed -i "s/\"default\": \"Argo\",/\"default\": \"Tekton\",/g" /opt/app-root/lib/python3.9/site-packages/elyra/metadata/schemas/kfp.json && \
39+
# Workaround for passing ssl_sa_cert
40+
patch /opt/app-root/lib/python3.9/site-packages/elyra/pipeline/kfp/kfp_authentication.py -i utils/kfp_authentication.patch && \
41+
patch /opt/app-root/lib/python3.9/site-packages/elyra/pipeline/kfp/processor_kfp.py -i utils/processor_kfp.patch && \
3942
# switch to Data Science Pipeline in component catalog \
4043
DIR_COMPONENT="/opt/app-root/lib/python3.9/site-packages/elyra/metadata/schemas/local-directory-catalog.json" && \
4144
FILE_COMPONENT="/opt/app-root/lib/python3.9/site-packages/elyra/metadata/schemas/local-file-catalog.json" && \

jupyter/datascience/ubi9-python-3.9/setup-elyra.sh

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -44,6 +44,6 @@ if [ "$(ls -A /opt/app-root/runtimes/)" ]; then
4444
fi
4545

4646
# Environment vars set for accessing ssl_sa_certs and sa_token
47-
export KF_PIPELINES_SSL_SA_CERTS="/var/run/secrets/kubernetes.io/serviceaccount/ca.crt"
47+
# export PIPELINES_SSL_SA_CERTS="/var/run/secrets/kubernetes.io/serviceaccount/ca.crt"
4848
export KF_PIPELINES_SA_TOKEN_ENV="/var/run/secrets/kubernetes.io/serviceaccount/token"
4949
export KF_PIPELINES_SA_TOKEN_PATH="/var/run/secrets/kubernetes.io/serviceaccount/token"
Lines changed: 18 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,18 @@
1+
--- a/kfp_authentication.py 2023-06-09 10:13:11.412910808 -0400
2+
+++ b/kfp_authentication.py 2023-06-09 10:14:39.879565175 -0400
3+
@@ -230,6 +230,7 @@
4+
"""
5+
6+
kf_url = urlsplit(api_endpoint)._replace(path="").geturl()
7+
+ kf_pipelines_ssl_sa_cert = os.getenv("PIPELINES_SSL_SA_CERTS", None)
8+
9+
# return data structure for successful requests
10+
auth_info = {
11+
@@ -239,6 +240,7 @@
12+
"cookies": None, # passed to KFP SDK client as "cookies" param value
13+
"credentials": None, # passed to KFP SDK client as "credentials" param value
14+
"existing_token": None, # passed to KFP SDK client as "existing_token" param value
15+
+ "ssl_ca_cert": kf_pipelines_ssl_sa_cert, # passed to KFP SDK Client as "ssl_ca_cert" param value
16+
}
17+
18+
try:
Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,10 @@
1+
--- a/processor_kfp.py 2023-06-09 10:17:15.659461927 -0400
2+
+++ b/processor_kfp.py 2023-06-09 10:16:20.062429914 -0400
3+
@@ -213,6 +213,7 @@
4+
credentials=auth_info.get("credentials", None),
5+
existing_token=auth_info.get("existing_token", None),
6+
namespace=user_namespace,
7+
+ ssl_ca_cert=auth_info.get("ssl_ca_cert", None),
8+
)
9+
else:
10+
client = ArgoClient(

0 commit comments

Comments
 (0)