-
Notifications
You must be signed in to change notification settings - Fork 302
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Propagation of NodePublishVolumeRequest.VolumeContext to providers #475
Comments
The volume attributes are user defined apart from the default ones added by kubelet. csi.storage.k8s.io/ephemeral:true
csi.storage.k8s.io/pod.name:nginx-78cfc8db98-5s5rr
csi.storage.k8s.io/pod.namespace:default
csi.storage.k8s.io/pod.uid:9f88edc9-4b36-4405-9802-7aa621df338c
csi.storage.k8s.io/serviceAccount.name:default
secretProviderClass:testspc The change should be minimal in secrets-store-csi-driver/pkg/rotation/reconciler.go Lines 220 to 224 in 7f21cd3
If we explore the option of doing rotation based on the |
Based on some of the discussion on #585 we likely don't want plugins to rely on having this information (since some may be missing during rotation requests) but that a good start is to pass all attributes on any real request. IMO we should do this and close it once we pass all attributes, and work on #585 toward providing more attributes in a backwards-compatible way for the rotation feature. /assign @aramase |
The Kubernetes project currently lacks enough contributors to adequately respond to all issues and PRs. This bot triages issues and PRs according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle stale |
/remove-lifecycle stale |
Describe the solution you'd like
I was wondering if it is intentional to filter out VolumeContext (Pod
.spec.volumes[].csi.volumeAttributes
) parameters passed on to providers by limiting the key to:csi.storage.k8s.io/pod.name
csi.storage.k8s.io/pod.namespace
csi.storage.k8s.io/pod.uid
csi.storage.k8s.io/serviceAccount.name
.Spec.Parameters
Is the pod creator considered untrusted? It might be convenient for providers to have access to
volumeAttributes
for per-volume metadata.The text was updated successfully, but these errors were encountered: