-
Notifications
You must be signed in to change notification settings - Fork 1.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[STEP3] user's namespace provisioning #20168
Comments
|
In the PR eclipse-che/che-operator#1027 we're implementing this by watching namespace events (or project events on OpenShift). This way, we can pre-deploy the namespace with all necessary objects for different secrets and other settings as soon as the namespace is marked as a workspace namespace for a particular user using a dedicated label. This means that we don't have to do additional checks on workspace startup and let the devworkspace operator do its magic of auto-mounting the secrets and configmaps into the workspace pod as configured (either as files or as env vars). |
@skabashnyuk |
Note that since this is an epic issue, I updated it with a list of subtasks for each of the things that the che server is currently provisioning into the workspace pod. We need to figure out the priority of those and if or how to implement them. Some of the tasks are implementable only on the DWO side, some can be implemented in che-operator, some will probably require changes in both. |
@l0rd could you please review the list of remainings and wrote your option about what is mandatory/option for Step 3. |
Is your task related to a problem? Please describe.
Che server is able to use its configuration to set various settings on the workspace pod and/or user's namespace. We should think about supporting them on the DevWorkspaces, too:
Describe the solution you'd like
Describe alternatives you've considered
All the settings that would be in the
CheUser
instance can also be placed in variously labeled config maps and secrets and the user information can be drawn from OpenShift's User object or, hopefully, from the user info of the OIDC provider of Kubernetes.Additional context
The text was updated successfully, but these errors were encountered: