Skip to content
Merged
Changes from 1 commit
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Prev Previous commit
Next Next commit
fixing generated code
Signed-off-by: Daniele Martinoli <dmartino@redhat.com>
  • Loading branch information
dmartinol committed Dec 3, 2024
commit 25f1d90853ecb8fc7ac9544ba12d5248cbb6ccbc
22 changes: 12 additions & 10 deletions infra/feast-operator/dist/install.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -62,16 +62,17 @@ spec:
properties:
kubernetes:
description: |-
KubernetesAuth defines the authorization settings using Kubernetes RBAC.
KubernetesAuth provides a way to define the authorization settings using Kubernetes RBAC resources.
https://kubernetes.io/docs/reference/access-authn-authz/rbac/
properties:
roles:
description: |-
The Kubernetes RBAC roles to be deployed in the same namespace of the FeatureStore.
See the Feast permission model https://docs.feast.dev/getting-started/concepts/permission
Please note that the feature store admin is not obligated to manage roles using the Feast operator.
Roles can be managed independently. This configuration is only providing a way to automate this step.
Note that the operator cannot ensure that these roles will match the ones used in the configured Feast permissions.
Roles are managed by the operator and created with an empty list of rules.
See the Feast permission model at https://docs.feast.dev/getting-started/concepts/permission
The feature store admin is not obligated to manage roles using the Feast operator, roles can be managed independently.
This configuration option is only providing a way to automate this procedure.
Important note: the operator cannot ensure that these roles will match the ones used in the configured Feast permissions.
items:
type: string
type: array
Expand Down Expand Up @@ -1230,16 +1231,17 @@ spec:
properties:
kubernetes:
description: |-
KubernetesAuth defines the authorization settings using Kubernetes RBAC.
KubernetesAuth provides a way to define the authorization settings using Kubernetes RBAC resources.
https://kubernetes.io/docs/reference/access-authn-authz/rbac/
properties:
roles:
description: |-
The Kubernetes RBAC roles to be deployed in the same namespace of the FeatureStore.
See the Feast permission model https://docs.feast.dev/getting-started/concepts/permission
Please note that the feature store admin is not obligated to manage roles using the Feast operator.
Roles can be managed independently. This configuration is only providing a way to automate this step.
Note that the operator cannot ensure that these roles will match the ones used in the configured Feast permissions.
Roles are managed by the operator and created with an empty list of rules.
See the Feast permission model at https://docs.feast.dev/getting-started/concepts/permission
The feature store admin is not obligated to manage roles using the Feast operator, roles can be managed independently.
This configuration option is only providing a way to automate this procedure.
Important note: the operator cannot ensure that these roles will match the ones used in the configured Feast permissions.
items:
type: string
type: array
Expand Down