-
Notifications
You must be signed in to change notification settings - Fork 168
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Auth config block supports common arguments from env and flags #577
base: main
Are you sure you want to change the base?
Auth config block supports common arguments from env and flags #577
Conversation
…orp#577 Also fixes using AWS IRSA token by mistake if both included in the pod's volume hashicorp#544 This maybe a better fix then the proposed hashicorp#545 pull request as this is likely more future-proof to other third party k8s provider launching their own Service Account Token injection, assuming the third party k8s provider will follow the unsaid convention of injecting the token in the <third.party.url>/serviceaccount/token path
224c1ee
to
804f57a
Compare
…orp#577 Also fixes using AWS IRSA token by mistake if both included in the pod's volume hashicorp#544 This maybe a better fix then the proposed hashicorp#545 pull request as this is likely more future-proof to other third party k8s provider launching their own Service Account Token injection, assuming the third party k8s provider will follow the unsaid convention of injecting the token in the <third.party.url>/serviceaccount/token path
804f57a
to
654386a
Compare
@benashz : Can you please review this PR when you get a chance? I am guessing the automated git checks will run after it gets a vote from the maintainers. |
Tagging @tvoran @VioletHynes to get more visibility into this. |
Hey! Thanks for the heads up. This isn't my area, but I'll try and get somebody's eyes on this. Thanks for the contribution! |
Hello, I confirm we are also impacted by this issue, most notably when also running Istio (when configured for the Istio sidecar being the first container). Istio does not add the
|
@adrien-f : Thank you for confirming you are also facing this issue. I am hoping this fix should solve your issue. |
Hi there @uchanchlani! Thanks for this PR. I've flagged it for our Vault Ecosystem team, and they'll be adding it to their next refinement meeting for further discussion on when this could be merged. Please note that the team is tight on time due to other committed deliverables, so I can't guarantee a timeline on final outcomes. We definitely appreciate your patience. I'll ask the engineer who picks this up to make sure to give a ping at that time to get any conflicts resolved as well. |
Auth config block supports common custom arguments via env variables and CLI flags. Feature #576
Also fixes using AWS IRSA token by mistake if both included in the pod's volume #544 This maybe a better fix then the proposed #545 pull request as this is likely more future-proof
to other third party k8s provider launching their own Service Account Token injection, assuming
the third party k8s provider will follow the unsaid convention of injecting the token in the
<third.party.url>/serviceaccount/token path