Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Bump odh 0.12.rc0 to rhoai main branch #17

Merged
merged 36 commits into from
May 21, 2024

Conversation

Jooho
Copy link

@Jooho Jooho commented May 21, 2024

Motivation

Bump odh 0.12.rc0 to rhoai main branch

ckadner and others added 30 commits October 10, 2023 14:43
#### Motivation

It can be challenging to figure out how to get a development environment
setup especially for folks who have not worked with Maven before.

#### Modifications

Adding some information of development workflow and project setup for
working with an IDE.

#### Result

Hopefully a less frustrating on-boarding experience.

/cc @rafvasq

---------

Signed-off-by: Christian Kadner <ckadner@us.ibm.com>
Signed-off-by: Christian Kadner <ckadner@us.ibm.com>
Signed-off-by: Spolti <fspolti@redhat.com>
- Create /docs directory
- Add new docs on:
  - VModels
  - Configuration/Tuning
  - Scaling
  - Metrics
- Move existing docs into /docs directory:
  - Payload processing
  - Getting started, build, deployment

---

Signed-off-by: Rafael Vasquez <raf.vasquez@ibm.com>
Signed-off-by: Spolti <fspolti@redhat.com>
grpc, protobuf, guava, jackson-databind, thrift, log4j2, junit

---------

Signed-off-by: Nick Hill <nickhill@us.ibm.com>
Configure CodeQL vulnerability scans

---------

Signed-off-by: Christian Kadner <ckadner@us.ibm.com>
- Execute external commands using an array of strings
  rather than a single string
- Make the regular expression pattern a bit more efficient

---------

Signed-off-by: Rafael Vasquez <raf.vasquez@ibm.com>
chore: update ubi8-minimal to latest version, 8.8.
Vulnerabities fixed:
- [RHSA-2023:7165]( https://access.redhat.com/errata/RHSA-2023:7151): cups security and bug fix update (Moderate)
- [RHSA-2023:7151](https://access.redhat.com/errata/RHSA-2023:7151): python3 security update (Moderate)
- [RHSA-2023:7176](https://access.redhat.com/errata/RHSA-2023:7176): python-pip security update (Moderate)
- [RHSA-2023:7176](https://access.redhat.com/errata/RHSA-2023:7176): python-pip security update (Moderate)
- [RHSA-2023:7151](https://access.redhat.com/errata/RHSA-2023:7151): python3 security update (Moderate)
- [RHSA-2023:7190](https://access.redhat.com/errata/RHSA-2023:7190): avahi security update (Moderate)
- [RHSA-2023:7112](https://access.redhat.com/errata/RHSA-2023:7112): shadow-utils security and bug fix update (Low)

Signed-off-by: Spolti <fspolti@redhat.com>
chore: Update bouncy castle depdendency to address the following vulnerability:
- [CVE-2023-33201](https://nvd.nist.gov/vuln/detail/CVE-2023-33201): Bouncy Castle For Java LDAP injection vulnerability

Signed-off-by: Spolti <fspolti@redhat.com>
chore: Update bouncy castle depdendency to address the following
vulnerability:
- [CVE-2023-33201](https://nvd.nist.gov/vuln/detail/CVE-2023-33201):
Bouncy Castle For Java LDAP injection vulnerability

Signed-off-by: Spolti <fspolti@redhat.com>
Functionality added in kserve#90 

---------

Signed-off-by: Nick Hill <nickhill@us.ibm.com>
PR kserve#90 introduced support for per-model prometheus metrics with the
intention to not change the default behavior but require this as a feature
to be enabled explicitly via configuration. However, it was inadvertently
made the default.

This commit restores the original behavior by changing the default configuration
to not include modelId/vModelId prometheus metric labels because model-mesh
was designed primarily for use cases where there is a very large and changing
number of individual models and those scenarios would result in a much greater
number of individual metrics than prometheus can handle.

------

Signed-off-by: Nick Hill <nickhill@us.ibm.com>
…ve#127)

This won't change current behaviour since the default is to use netty's
openssl-based TLS implementation anyhow. But it will allow overriding to
use the native jdk TLS impl when needed.

Signed-off-by: Nick Hill <nickhill@us.ibm.com>
protobuf 3.25.0, jackson-databind 2.16.0, junit 5.10.1, etcd-java 0.0.24

Includes important etcd-java update to support authentication when using
etcd server versions >= 3.5

Unfortunately latest netty 4.1.101.Final is incompatible with grpc-java.
We'll need to wait for a grpc patch for that.

Signed-off-by: Nick Hill <nickhill@us.ibm.com>
Vulnerabities fixed:
- [RHSA-2023:7165] cups security and bug fix update (Moderate)
- [RHSA-2023:7151] python3 security update (Moderate)
- [RHSA-2023:7176] python-pip security update (Moderate)
- [RHSA-2023:7151] python3 security update (Moderate)
- [RHSA-2023:7190] avahi security update (Moderate)
- [RHSA-2023:7112] shadow-utils security and bug fix update (Low)

-----

Signed-off-by: Spolti <fspolti@redhat.com>
Signed-off-by: Nick Hill <nickhill@us.ibm.com>
Signed-off-by: Spolti <fspolti@redhat.com>
Prevent incorrectly empty logged payloads:
- Do not attempt to avoid slicing the response bytebuf in the case that a
  PayloadProcessor is configured
- Do not attempt to avoid some additional refcount updates in the case
  status != OK

Resolves kserve#111

-----

Signed-off-by: Nick Hill <nickhill@us.ibm.com>
Add a vModelId field to the Payload class and correspondingly update
built-in PayloadProcessor implementations where applicable.

It may be null if the request was directed at a concrete modelId rather
than a vModelId.

-----

Signed-off-by: Nick Hill <nickhill@us.ibm.com>
Signed-off-by: Selbi Nuryyeva <selbi@redhat.com>
…ilures (kserve#132)

To help debugging unready condition in case of model loading failures.
The logged message helps to pinpoint the root cause of unready condition.

Fixes kserve#100

-----

Signed-off-by: Leon Kiefer <leon.k97@gmx.de>
This is to move away from CVE-2024-23944: information disclosure.

Signed-off-by: Edgar Hernández <23639005+israel-hdez@users.noreply.github.com>
Motivation

Update dependencies to keep them up-to-date. 
In particular want to update netty ito resolve
[CVE](https://www.cve.org/CVERecord?id=CVE-2024-29025) with
`io.netty_netty-codec-http` picked up by twistlock

Modifications

grpc 1.60.2, netty 4.1.108, protobuf 3.25.3, annotations 9.0.87, guava
33.1.0-jre, jackson-databind 2.16.2, thrift 0.20.0, log4j2 2.23.1,
bouncycastle 1.77, junit 5.10.2

Note that grpc-java v1.59.1 [resolved
issue](grpc/grpc-java#10665 (comment))
with supporting netty 4.1.101.Final

---------

Signed-off-by: Anh-Uong <anh.uong@ibm.com>
rpancham and others added 6 commits April 17, 2024 14:53
Signed-off-by: rpancham <rpancham@redhat.com>
Create Workflow for release and tag with Changelog
#### Modifications
Added linux/s390x ( platform ) in the build github workflow 

#### Result

https://github.com/modassarrana89/modelmesh/actions/runs/8688245342/job/23823937204
// Build operation run in local workflow is a success. Attached archieve
log for refernece

[logs_22763759557.zip](https://github.com/kserve/modelmesh/files/14978607/logs_22763759557.zip)

---------

Signed-off-by: Modassar Rana <modassar.rana@ibm.com>
@Jooho Jooho merged commit 1824bf9 into red-hat-data-services:main May 21, 2024
4 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.