-
Notifications
You must be signed in to change notification settings - Fork 336
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support scoped serviceAccount #12567
Comments
Correction: the bound service account feature was introduced in Kubernetes 1.22. They allow the switch Fortunately, from my study of Kuma code base, only Kuma-CNI is being impacted by this issue. In other components, we are either not interacting with the API server directly or not copying the token to somewhere else before we use it. The
|
I think #11399 solved this for kuma-dp |
We are using the token to authenticate DPs and this is not fixed in older versions. So our DPs, including the ingress and egress are also impacted |
Backporting done: |
Description
After upgrading to 1.30.6 , It is no longer supported to change “service-account-extend-token-expiration” setting back to “True” for 1.30 OIDC enabled cluster thus this is the reason Kong Mesh CNI and egress pod were not able to renew the token and broke down with Unathorized.
We should support bounded serviceAccount as it seems to be an important security new feature in 1.30.
Docs:
https://kubernetes.io/docs/tasks/configure-pod-container/configure-service-account/#manually-create-a-long-lived-api-token-for-a-serviceaccount
https://github.com/kubernetes/enhancements/blob/master/keps/sig-auth/1205-bound-service-account-tokens/README.md
Is this only for CNI or more generally for other components?
The text was updated successfully, but these errors were encountered: