Skip to content

secrets store csi driver should NOT have serviceaccounts/token create permission when tokenRequests feature is enabled. #1976

@zshihang

Description

@zshihang

What steps did you take and what happened:

When the CSI driver's tokenRequests feature is enabled, you should not grant serviceaccounts/token creation permissions to the secrets-store-csi-driver. This is because the feature delegates token provisioning to the kubelet, which was the primary motivation behind the CSI Service Account Token enhancement.

What did you expect to happen:

No serviceaccounts/token create permission is granted so this binding should be removed and the README file needs to be updated.

Anything else you would like to add:
[Miscellaneous information that will assist in solving the issue.]

Which provider are you using:
[e.g. Azure Key Vault, HashiCorp Vault, etc. Have you checked out the provider's repo for more help?]

This is a bug in secrets store csi driver. Not tied to specific provider.

Environment:

  • Secrets Store CSI Driver version: (use the image tag):
  • Kubernetes version: (use kubectl version):

Metadata

Metadata

Assignees

No one assigned

    Labels

    kind/bugCategorizes issue or PR as related to a bug.needs-triageIndicates an issue or PR lacks a `triage/foo` label and requires one.

    Type

    No type

    Projects

    Status

    Subprojects - Needs Triage

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions