This directory contains examples and configurations for using Feast with Role-Based Access Control (RBAC) in an OpenShift environment with TLS authentication.
1-setup-operator-rbac.ipynb: Jupyter notebook for setting up RBAC with TLS in OpenShift2-client-rbac-test-pod.ipynb: Jupyter notebook demonstrating RBAC testing with TLS in OpenShift3-uninstall.ipynb: Jupyter notebook for cleaning up the RBAC setuppermissions_apply.py: Python script for applying RBAC permissions with TLS configurationclient/: Directory containing client configurationsreadonly_user_deployment_tls.yaml: Deployment configuration for readonly users with TLSadmin_user_deployment_tls.yaml: Deployment configuration for admin users with TLSunauthorized_user_deployment_tls.yaml: Deployment configuration for unauthorized users with TLSfeature_repo/: Feature repository configurationsfeature_store.yaml: Feature store configuration with TLS settingstest.py: Contents numerous tests for validation of permissions while accessing feast objects
- TLS certificate configuration for secure communication
- OpenShift service CA certificate integration
- RBAC with service account authentication
- HTTPS endpoints (port 443)
- Separate configurations for admin, readonly, and unauthorized users
-
Set up RBAC with TLS:
- Option 1: Run
1-setup-operator-rbac.ipynbnotebook - Option 2: Run
python permissions_apply.pyscript
- Option 1: Run
-
Apply the appropriate deployment configurations
-
Test RBAC functionality with TLS authentication using
2-client-rbac-test-pod.ipynb -
Clean up resources using
3-uninstall.ipynbwhen done
For more details, refer to the Feast documentation.