-
Notifications
You must be signed in to change notification settings - Fork 27
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
support specifying source for allowed-vm-sizes
#740
Comments
@davidangb We are considering an implementation where the environment variable will be a URL that will replace the current
|
@BMurri great questions!
thanks! |
@davidangb The way this works at present is as a whitelist, with the special exception of the empty set value (which includes a missing blob or malformed content) which turns off the whitelist. If a blob is placed by the user at the current location and we do what you suggest, the result will be the union of the two (the user can add arbitrary vmsizes/vmfamilies to your protected list) but not "trim" the list (blacklist-style), yet (I believe there's an open enhancement issue to enable that scenario). If that's what you intend, then I'll implement it that way |
ah, I must have misunderstood. If we specify a value for |
@davidangb This will be in v5.4.1 (or later) |
Problem:
When TES is configured to use Terra, TES reads the
allowed-vm-sizes
file from the containing Terra workspace storage container. Any user of the workspace who has permission to run workflows also has permission to write to that storage container; users can modify the file. Thus, theallowed-vm-sizes
file cannot be used/trusted to restrict the VMs used by this TES instance.Solution:
Terra would like to be able to specify the allowed VM sizes via an environment variable or other deploy-time config which would not be writable by end users. As discussed in person, this could be:
allowed-vm-sizes
instead of - or in addition to - reading from the workspace storage containerWe are also open to other solutions if you think an alternative is better.
Describe alternatives you've considered
We have explored Terra's ability to seed this file at TES deploy time, coupled with some kind of monitoring/checksum to ensure the file is not modified. While possible, the ROI on this approach was unattractive.
Code dependencies
Will this require code changes in:
Additional context
This feature request is in support of AnVIL Lite.
[Note: Please be sure to set the appropriate label for this issue and tag contributors in the comments to start a discussion]
The text was updated successfully, but these errors were encountered: