Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
4 changes: 2 additions & 2 deletions .secrets.baseline
Original file line number Diff line number Diff line change
Expand Up @@ -1156,7 +1156,7 @@
"filename": "infra/feast-operator/internal/controller/services/services.go",
"hashed_secret": "36dc326eb15c7bdd8d91a6b87905bcea20b637d1",
"is_verified": false,
"line_number": 179
"line_number": 182
}
],
"infra/feast-operator/internal/controller/services/tls_test.go": [
Expand Down Expand Up @@ -1539,5 +1539,5 @@
}
]
},
"generated_at": "2026-05-14T10:20:01Z"
"generated_at": "2026-05-18T04:10:17Z"
}
27 changes: 27 additions & 0 deletions docs/how-to-guides/feast-operator/06-batch-and-jobs.md
Original file line number Diff line number Diff line change
Expand Up @@ -63,6 +63,33 @@ spec:
> For engine-specific YAML options (Spark conf, Ray address, etc.) see the
> [Feast SDK — Compute Engine](../reference/compute-engine/) docs.

### KubeRay clusters — auto-generated RBAC

When the batch-engine ConfigMap selects the Ray engine in KubeRay mode:

```yaml
data:
config: |
type: ray.engine
use_kuberay: true
cluster_name: my-ray-cluster
```

the operator creates a namespace-scoped `Role` and `RoleBinding` named
`feast-<crName>-kuberay`, owner-referenced to the `FeatureStore`. The Role
grants the Feast service account:

| API group | Resource | Verbs |
|-----------|----------|-------|
| `ray.io` | `rayclusters` | `get`, `list`, `watch` |
| (core) | `secrets` | `get`, `list`, `watch`, `create`, `update`, `delete` |

This is what the CodeFlare SDK needs to discover the `RayCluster` and read
the mTLS Secrets used for the Ray client connection. When you flip
`use_kuberay` back to `false` (or remove the `batchEngine` field), the
Role and RoleBinding are deleted on the next reconcile. No manual RBAC
setup is required.

---

## Scheduled Materialization (`spec.cronJob`)
Expand Down
10 changes: 9 additions & 1 deletion infra/feast-operator/config/rbac/role.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -9,6 +9,7 @@ rules:
resources:
- configmaps
- persistentvolumeclaims
- secrets
- serviceaccounts
- services
verbs:
Expand All @@ -23,7 +24,6 @@ rules:
resources:
- namespaces
- pods
- secrets
verbs:
- get
- list
Expand Down Expand Up @@ -124,6 +124,14 @@ rules:
- patch
- update
- watch
- apiGroups:
- ray.io
resources:
- rayclusters
verbs:
- get
- list
- watch
- apiGroups:
- rbac.authorization.k8s.io
resources:
Expand Down
10 changes: 9 additions & 1 deletion infra/feast-operator/dist/install.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -20919,6 +20919,7 @@ rules:
resources:
- configmaps
- persistentvolumeclaims
- secrets
- serviceaccounts
- services
verbs:
Expand All @@ -20933,7 +20934,6 @@ rules:
resources:
- namespaces
- pods
- secrets
verbs:
- get
- list
Expand Down Expand Up @@ -21034,6 +21034,14 @@ rules:
- patch
- update
- watch
- apiGroups:
- ray.io
resources:
- rayclusters
verbs:
- get
- list
- watch
- apiGroups:
- rbac.authorization.k8s.io
resources:
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -66,9 +66,11 @@ type FeatureStoreReconciler struct {
// +kubebuilder:rbac:groups=apps,resources=deployments,verbs=get;list;create;update;watch;delete
// +kubebuilder:rbac:groups=core,resources=services;configmaps;persistentvolumeclaims;serviceaccounts,verbs=get;list;create;update;watch;delete
// +kubebuilder:rbac:groups=rbac.authorization.k8s.io,resources=roles;rolebindings;clusterroles;clusterrolebindings;subjectaccessreviews,verbs=get;list;create;update;watch;delete
// +kubebuilder:rbac:groups=core,resources=secrets;pods;namespaces,verbs=get;list;watch
// +kubebuilder:rbac:groups=core,resources=secrets,verbs=get;list;watch;create;update;delete
// +kubebuilder:rbac:groups=core,resources=pods;namespaces,verbs=get;list;watch
// +kubebuilder:rbac:groups=core,resources=pods/exec,verbs=create
// +kubebuilder:rbac:groups=authentication.k8s.io,resources=tokenreviews,verbs=create
// +kubebuilder:rbac:groups=ray.io,resources=rayclusters,verbs=get;list;watch
// +kubebuilder:rbac:groups=route.openshift.io,resources=routes,verbs=get;list;create;update;watch;delete
// +kubebuilder:rbac:groups=batch,resources=cronjobs,verbs=get;list;watch;create;update;patch;delete
// +kubebuilder:rbac:groups=autoscaling,resources=horizontalpodautoscalers,verbs=get;list;watch;create;update;patch;delete
Expand Down
Original file line number Diff line number Diff line change
@@ -0,0 +1,197 @@
/*
Copyright 2024 Feast Community.

Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at

http://www.apache.org/licenses/LICENSE-2.0

Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
*/

package controller

import (
"context"

. "github.com/onsi/ginkgo/v2"
. "github.com/onsi/gomega"
corev1 "k8s.io/api/core/v1"
rbacv1 "k8s.io/api/rbac/v1"
"k8s.io/apimachinery/pkg/api/errors"
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
"k8s.io/apimachinery/pkg/types"
"sigs.k8s.io/controller-runtime/pkg/reconcile"

feastdevv1 "github.com/feast-dev/feast/infra/feast-operator/api/v1"
"github.com/feast-dev/feast/infra/feast-operator/internal/controller/services"
)

var _ = Describe("FeatureStore Controller-KubeRay RBAC", func() {
const (
batchConfigMapName = "ray-batch-engine"
)
var pullPolicy = corev1.PullAlways
ctx := context.Background()

createBatchEngineConfigMap := func(yamlBody string) {
cm := &corev1.ConfigMap{
ObjectMeta: metav1.ObjectMeta{Name: batchConfigMapName, Namespace: "default"},
Data: map[string]string{"config": yamlBody},
}
Expect(k8sClient.Create(ctx, cm)).To(Succeed())
}

deleteBatchEngineConfigMap := func() {
cm := &corev1.ConfigMap{
ObjectMeta: metav1.ObjectMeta{Name: batchConfigMapName, Namespace: "default"},
}
_ = k8sClient.Delete(ctx, cm)
}

reconcileOnce := func(name string) {
controllerReconciler := &FeatureStoreReconciler{
Client: k8sClient,
Scheme: k8sClient.Scheme(),
}
_, err := controllerReconciler.Reconcile(ctx, reconcile.Request{
NamespacedName: types.NamespacedName{Name: name, Namespace: "default"},
})
Expect(err).NotTo(HaveOccurred())
}

rbacKey := func(fsName string) types.NamespacedName {
return types.NamespacedName{
Name: services.GetFeastName(&feastdevv1.FeatureStore{ObjectMeta: metav1.ObjectMeta{Name: fsName}}) + "-kuberay",
Namespace: "default",
}
}

Context("when batchEngine has type: ray.engine and use_kuberay: true", func() {
const resourceName = "kuberay-rbac-enabled"

BeforeEach(func() {
createBatchEngineConfigMap("type: ray.engine\nuse_kuberay: true\ncluster_name: my-cluster\n")
resource := createFeatureStoreResource(resourceName, image, pullPolicy, &[]corev1.EnvVar{}, nil)
resource.Spec.BatchEngine = &feastdevv1.BatchEngineConfig{
ConfigMapRef: &corev1.LocalObjectReference{Name: batchConfigMapName},
}
Expect(k8sClient.Create(ctx, resource)).To(Succeed())
})

AfterEach(func() {
resource := &feastdevv1.FeatureStore{}
if err := k8sClient.Get(ctx, types.NamespacedName{Name: resourceName, Namespace: "default"}, resource); err == nil {
Expect(k8sClient.Delete(ctx, resource)).To(Succeed())
}
deleteBatchEngineConfigMap()
})

It("creates a Role with KubeRay rules and a RoleBinding to the Feast SA", func() {
reconcileOnce(resourceName)

role := &rbacv1.Role{}
Expect(k8sClient.Get(ctx, rbacKey(resourceName), role)).To(Succeed())
Expect(role.Rules).To(ConsistOf(
rbacv1.PolicyRule{
APIGroups: []string{"ray.io"},
Resources: []string{"rayclusters"},
Verbs: []string{"get", "list", "watch"},
},
rbacv1.PolicyRule{
APIGroups: []string{""},
Resources: []string{"secrets"},
Verbs: []string{"get", "list", "watch", "create", "update", "delete"},
},
))

fs := &feastdevv1.FeatureStore{}
Expect(k8sClient.Get(ctx, types.NamespacedName{Name: resourceName, Namespace: "default"}, fs)).To(Succeed())
Expect(role.OwnerReferences).To(HaveLen(1))
Expect(role.OwnerReferences[0].UID).To(Equal(fs.UID))

binding := &rbacv1.RoleBinding{}
Expect(k8sClient.Get(ctx, rbacKey(resourceName), binding)).To(Succeed())
Expect(binding.RoleRef).To(Equal(rbacv1.RoleRef{
APIGroup: rbacv1.GroupName,
Kind: "Role",
Name: rbacKey(resourceName).Name,
}))
Expect(binding.Subjects).To(ConsistOf(rbacv1.Subject{
Kind: rbacv1.ServiceAccountKind,
Name: services.GetFeastName(fs),
Namespace: "default",
}))
Expect(binding.OwnerReferences).To(HaveLen(1))
Expect(binding.OwnerReferences[0].UID).To(Equal(fs.UID))
})
})

Context("when batchEngine ConfigMap changes from use_kuberay: true to false", func() {
const resourceName = "kuberay-rbac-disable"

BeforeEach(func() {
createBatchEngineConfigMap("type: ray.engine\nuse_kuberay: true\n")
resource := createFeatureStoreResource(resourceName, image, pullPolicy, &[]corev1.EnvVar{}, nil)
resource.Spec.BatchEngine = &feastdevv1.BatchEngineConfig{
ConfigMapRef: &corev1.LocalObjectReference{Name: batchConfigMapName},
}
Expect(k8sClient.Create(ctx, resource)).To(Succeed())
})

AfterEach(func() {
resource := &feastdevv1.FeatureStore{}
if err := k8sClient.Get(ctx, types.NamespacedName{Name: resourceName, Namespace: "default"}, resource); err == nil {
Expect(k8sClient.Delete(ctx, resource)).To(Succeed())
}
deleteBatchEngineConfigMap()
})

It("deletes the Role and RoleBinding on the next reconcile", func() {
reconcileOnce(resourceName)
Expect(k8sClient.Get(ctx, rbacKey(resourceName), &rbacv1.Role{})).To(Succeed())

cm := &corev1.ConfigMap{}
Expect(k8sClient.Get(ctx, types.NamespacedName{Name: batchConfigMapName, Namespace: "default"}, cm)).To(Succeed())
cm.Data["config"] = "type: ray.engine\nuse_kuberay: false\n"
Expect(k8sClient.Update(ctx, cm)).To(Succeed())

reconcileOnce(resourceName)

err := k8sClient.Get(ctx, rbacKey(resourceName), &rbacv1.Role{})
Expect(errors.IsNotFound(err)).To(BeTrue(), "expected Role to be deleted, got %v", err)
err = k8sClient.Get(ctx, rbacKey(resourceName), &rbacv1.RoleBinding{})
Expect(errors.IsNotFound(err)).To(BeTrue(), "expected RoleBinding to be deleted, got %v", err)
})
})

Context("when no batchEngine is configured", func() {
const resourceName = "kuberay-rbac-absent"

BeforeEach(func() {
resource := createFeatureStoreResource(resourceName, image, pullPolicy, &[]corev1.EnvVar{}, nil)
Expect(k8sClient.Create(ctx, resource)).To(Succeed())
})

AfterEach(func() {
resource := &feastdevv1.FeatureStore{}
if err := k8sClient.Get(ctx, types.NamespacedName{Name: resourceName, Namespace: "default"}, resource); err == nil {
Expect(k8sClient.Delete(ctx, resource)).To(Succeed())
}
})

It("does not create the KubeRay Role or RoleBinding", func() {
reconcileOnce(resourceName)

err := k8sClient.Get(ctx, rbacKey(resourceName), &rbacv1.Role{})
Expect(errors.IsNotFound(err)).To(BeTrue(), "expected no Role, got %v", err)
err = k8sClient.Get(ctx, rbacKey(resourceName), &rbacv1.RoleBinding{})
Expect(errors.IsNotFound(err)).To(BeTrue(), "expected no RoleBinding, got %v", err)
})
})
})
Loading
Loading