-
Notifications
You must be signed in to change notification settings - Fork 984
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Allow setting automountServiceAccountToken on replication controller #56
Comments
@calind @radeksimko I have a fix for this in my fork, and will send over a PR. |
Hi @calind The service account does expose @sl1pm4t I'm fairly confident you can't make RC/Pod/ServiceAccount creation idempotent with Let me know if the explanation makes sense and whether we can close this. |
Hi @radeksimko - I disagree that we can't make the creation idempotent. As discussed in PR #57 if we ignore |
Hi @sl1pm4t Basically the fix you're proposing only deals with situation where there's no So we'd have to ignore all of I have opened kubernetes/kubernetes#51328 to track the upstream feature request as discussed earlier. Are you happy for me to close this issue & related PR #57 and move the discussion over to kubernetes/kubernetes#51328 ? Just to clarify - I really want to give users the chance to specify this field and use this handy functionality, but I'd like to do so with minimal (ideally no) disruption for anyone, that's why I believe upstream changes should take place first. Let me know if that makes sense. |
Ok I see your point @radeksimko - thanks for taking the time to explain. |
@radeksimko do you have a clear path forward after the discussion on kubernetes/kubernetes#51328 ? I just spent the better part of an hour figuring out why the service account secret wasn't getting populated in my container :-) |
@ccope The plan is to add validation to prevent people from using |
How should I put 'secrets' to my POD the right way? I suggest to put an example to the documentation with simple explanation how this should be done. May be I'm missing something but after reading all these discussions I still do not understand how I should do this. |
A short term remedy for this issue would be to have a data source read the secret name of the service account, which you could then use to mount the token into your pod. It's cumbersome and I'd prefer a better solution, but for now this is what we're doing using a combination of |
When will this be released? |
According to the Changelog this was released in July 😃 |
This should be resolved -> #56 (comment). Please reopen if that's not the case. |
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. If you feel this issue should be reopened, we encourage creating a new issue linking back to this one for added context. If you feel I made an error 🤖 🙉 , please reach out to my human friends 👉 [email protected]. Thanks! |
Currently the the
kubernetes_replication_controller
creates the spec withautomountServiceAccountToken
set tofalse
. This means that the service account credentials selected byservice_account_name
are not available in the container.https://kubernetes.io/docs/tasks/configure-pod-container/configure-service-account/#use-the-default-service-account-to-access-the-api-server
The text was updated successfully, but these errors were encountered: