-
Notifications
You must be signed in to change notification settings - Fork 74
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat(helm): Allow to configure automountServiceAccountToken #513
base: main
Are you sure you want to change the base?
Conversation
[APPROVALNOTIFIER] This PR is NOT APPROVED This pull-request has been approved by: The full list of commands accepted by this bot can be found here.
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
Hi @germanattanasio. Thanks for your PR. I'm waiting for a cert-manager member to verify that this patch is reasonable to test. If it is, they should reply with Once the patch is verified, the new status will be reflected by the I understand the commands that are listed here. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
* Reuse an existing service account if needed * Configure `automountServiceAccountToken` for the pod and service account * Allow volumes to be defined and mounted in the main container Signed-off-by: German Attanasio <[email protected]>
423b0ac
to
a05af37
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
/ok-to-test
Hey, thanks for raising this and sorry it took a while to get eyes on it. I've enabled testing and dropped a question too!
# Automount API credentials for a Service Account. | ||
# +docs:property | ||
automountServiceAccountToken: true |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
question: do we need to expose this? I might be missing something, but could we leave this out and just override it at the level of the trust-manager pods? That seems simpler.
If we do need to add this, should it default to false instead?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I wanted it to be backward compatible but It's up to you
Motivation
The deployment of trust-manager in an AKS cluster raised a high-severity security finding from Azure Defender, recommending the disabling of automounted service account tokens to prevent potential misuse by compromised pods.
This PR addresses the issue by allowing users to disable
automountServiceAccountToken
while enabling them to use volumes to access the token. This approach is based on the requirement thattrust-manager
needs the token to interact with the Kubernetes API.With the proposed changes, you can deploy the chart using the following configuration:
Related to: cert-manager/cert-manager#5254
Changes
automountServiceAccountToken
for both the pod and the service account.Signed-off-by: German Attanasio [email protected]