You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
We should add a restriction to automount volumes when the controller.devfile.io/restricted-access annotation is used with a DevWorkspace. To do this, we would likely need to extend restricted-access functionality to configmaps and secrets:
If an automount configmap/secret has controller.devfile.io/restricted-access annotation,
Label it a creator ID like we do for workspaces
Disallow any modifications except for by the creator (and optionally DevWorkspace SA if needed)
If a DevWorkspace has the controller.devfile.io/restricted-access annotation, only auto-mount configmaps/secrets/pvcs that have the controller.devfile.io/restricted-access annotation as well
For workspaces that do not use controller.devfile.io/restricted-access, nothing changes and automount resources work as they currently do (all automount resources in the namespace are mounted).
Additional context
This would be useful as an added safeguard to ensure restricted-access workspaces don't import any data that isn't controlled entirely by the creator.
The text was updated successfully, but these errors were encountered:
Description
We should add a restriction to automount volumes when the
controller.devfile.io/restricted-access
annotation is used with a DevWorkspace. To do this, we would likely need to extend restricted-access functionality to configmaps and secrets:controller.devfile.io/restricted-access
annotation,controller.devfile.io/restricted-access
annotation, only auto-mount configmaps/secrets/pvcs that have thecontroller.devfile.io/restricted-access
annotation as wellFor workspaces that do not use
controller.devfile.io/restricted-access
, nothing changes and automount resources work as they currently do (all automount resources in the namespace are mounted).Additional context
This would be useful as an added safeguard to ensure restricted-access workspaces don't import any data that isn't controlled entirely by the creator.
The text was updated successfully, but these errors were encountered: