-
Notifications
You must be signed in to change notification settings - Fork 228
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
AutomountServiceAccountToken property implemented #258
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Did a quick review, thanks for the change!
@zroubalik Do you want to have these changes in our generated YAML files?
Signed-off-by: Christian Kuhn <phello@gmx.de>
Hey, |
@JorTurFer Hi. Our UseCase is as follow: In general Kubernetes automounts service account credentials which allows any compromised pod to run API commands against the cluster. We are restricted to stop this behaviour by specifying automountServiceAccountToken: false in ServiceAccount. This is a global rule so we cannot whitelist the helm chart. As Keda and metrics deployments/pods need API access we need to opt in for these two with automountServiceAccountToken: true in both deployment.yamls When you set both ServiceAccount and Deployments automountServiceAccountToken: true it's the same like not specifying at all so I am not sure if it makes sense to specify it in the installation.yaml. We need it in Helm Chart as said to disable default ServiceAccount behaviour and ensure functionality. Also see:
|
I got the reasons (I don't understand the document in German but I guess that it's an official regulation). |
@JorTurFer Do you need more informations from my side or do we wait for more opinions by other maintainers? In general you can disable it in ServiceAccount and enable it in Deployments hardcoded. But then everybody who would use the Keda ServiceAccount perhaps for other deployments could not longer access API. This was the reason why I decided to implement a switch in values.yaml for ServiceAccount. |
I think it is okay to have an optional switch, ie. default to the existing behavior. |
So we can merge this PR because it keeps the current behaviour as default behaviour, can't? |
@JorTurFer Yes absolutely it keeps current behaviour. Would be great if anybody could merge it for next release. Thank you. |
Would love to have a sign-off of @zroubalik or @JorTurFer as well though |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
F**k, I missed this PR between the notifications :(
If the behavior doesn't change, I don't have any problem to merge it
Thank you @ph311o and sorry for being slow on our end! |
Added new property "automountServiceAccountToken" in ServiceAccounts and Deployments necessary for restricted environments.
Checklist
Fixes #