-
Notifications
You must be signed in to change notification settings - Fork 327
secrets store csi driver should NOT have serviceaccounts/token create permission when tokenRequests feature is enabled. #1976
Description
What steps did you take and what happened:
When the CSI driver's tokenRequests feature is enabled, you should not grant serviceaccounts/token creation permissions to the secrets-store-csi-driver. This is because the feature delegates token provisioning to the kubelet, which was the primary motivation behind the CSI Service Account Token enhancement.
What did you expect to happen:
No serviceaccounts/token create permission is granted so this binding should be removed and the README file needs to be updated.
Anything else you would like to add:
[Miscellaneous information that will assist in solving the issue.]
Which provider are you using:
[e.g. Azure Key Vault, HashiCorp Vault, etc. Have you checked out the provider's repo for more help?]
This is a bug in secrets store csi driver. Not tied to specific provider.
Environment:
- Secrets Store CSI Driver version: (use the image tag):
- Kubernetes version: (use
kubectl version):
Metadata
Metadata
Assignees
Labels
Type
Projects
Status