Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Allow ingestion of automountServiceAccountToken: false via Values for all deployments in Helm chart #15105

Open
stefankeidel opened this issue Dec 3, 2024 · 2 comments
Assignees
Labels
enhancement New feature or request

Comments

@stefankeidel
Copy link

Context

Our Kubernetes cluster is managed company wide and employs Gatekeeper Policies to enforce best practices and security settings cluster-wide. One of those settings demands that automountServiceAccountToken: false be set for all individual pods and deployments, so malicious pods cannot get access to the k8s control plane.

Feature description

We would love to be able to ingest that setting into all the deployments done by the Budibase helm chart, via Values.yaml like so:

apiVersion: apps/v1
kind: Deployment
metadata:
  name: my-deployment
spec:
  template:
    spec:
      automountServiceAccountToken: false

I took a look and my guess is that implementation-wise it could be pretty close to how the affinity and tolerations settings work currently. They seem to get passed on to all the deployments as-is (or at least the few I checked).

@stefankeidel stefankeidel added the enhancement New feature or request label Dec 3, 2024
@shogunpurple shogunpurple self-assigned this Dec 11, 2024
@stefankeidel
Copy link
Author

As a quick update @shogunpurple -- while this would be useful I think for most peeps running shared clusters with some sort of governance in larger organisations, we managed to work around it using kustomize as a sort of post-renderer running after the helm chart for now.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request
Projects
None yet
Development

No branches or pull requests

2 participants