Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Vault agent injector 1.6.0 ignoring security context user groups #715

Open
alishab02 opened this issue Dec 11, 2024 · 0 comments
Open

Vault agent injector 1.6.0 ignoring security context user groups #715

alishab02 opened this issue Dec 11, 2024 · 0 comments
Labels
bug Something isn't working

Comments

@alishab02
Copy link

alishab02 commented Dec 11, 2024

Good afternoon,
When deploying Vault Agent Injector v1.6.0 (via helm chart 0.29.1), the sidecar does not respect the pods security context when using the vault.hashicorp.com/agent-inject-token: true annotation, preventing the pod from picking up the token.

The previous deployed version of Vault Agent Injector v1.2.1 (via helm chart 0.25.0) presented no such issue and created the token file with the following permissions:
-rw-r----- 1 100 nonroot 95 Dec 11 13:44 /vault/secrets/token

Whereas version v1.6.0 presented the following permissions:
-rw-r----- 1 100 1000 95 Dec 10:53 /vault/secrets/token

To Reproduce

  1. Deploy vault agent injector 1.6.0 via helm chart 0.29.1
  2. Shell into the pod
  3. cat /vault/secrets/token
  4. permission denied / Error: no vault token set on Client (in-pod logs)

Expected behavior
The pod should use the permissions set in the securityContext and be able to view /vault/secrets/token

Environment

  • Kubernetes version: v1.26.5+k3s1
  • vault-k8s version: 1.6.0
@alishab02 alishab02 added the bug Something isn't working label Dec 11, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
bug Something isn't working
Projects
None yet
Development

No branches or pull requests

1 participant