Skip to content

Commit

Permalink
Explicitly create service account token for eso-vault-auth-token
Browse files Browse the repository at this point in the history
With newer versions of kubernetes/openshift, it is necessary to explicitly
request a long-lived token for service accounts [1].

[1]: https://kubernetes.io/docs/tasks/configure-pod-container/configure-service-account/#manually-create-a-long-lived-api-token-for-a-serviceaccount
  • Loading branch information
larsks committed Dec 3, 2024
1 parent db9c029 commit 6f666fa
Show file tree
Hide file tree
Showing 3 changed files with 13 additions and 0 deletions.
Original file line number Diff line number Diff line change
@@ -0,0 +1,5 @@
apiVersion: kustomize.config.k8s.io/v1beta1
kind: Kustomization
namespace: external-secrets-operator
resources:
- secret.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,7 @@
apiVersion: v1
kind: Secret
metadata:
name: eso-vault-auth-token
annotations:
kubernetes.io/service-account.name: eso-vault-auth
type: kubernetes.io/service-account-token
1 change: 1 addition & 0 deletions cluster-scope/bundles/external-secrets/kustomization.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -9,3 +9,4 @@ resources:
- ../../base/operators.coreos.com/subscriptions/external-secrets-operator
- ../../base/rbac.authorization.k8s.io/clusterrolebindings/eso-tokenreview
- ../../base/operators.coreos.com/operatorgroups/external-secrets
- ../../base/core/secrets/eso-vault-auth-token/

0 comments on commit 6f666fa

Please sign in to comment.