You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
I'm running vault in kubernetes using the official helm chart, therefore ca.crt and k8s token are available in the vault pod in /var/run/secrets/kubernetes.io/serviceaccount/.
The helm chart also set up the vault serviceaccount with cluster role system:auth-delegator for token validation. So the pod token can be used a the jwt_reviewer_token.
Would it be acceptable for the plugin to check if ca.crt and token exists in /var/run/secrets/kubernetes.io/serviceaccount/ and use them when enabling the plugin without specifying any ca cert or token.
This would greatly simplify my provisioning of vault when running in k8s.
I'm willing to work on a patch if it sounds good to you
The text was updated successfully, but these errors were encountered:
I'm running vault in kubernetes using the official helm chart, therefore ca.crt and k8s token are available in the vault pod in
/var/run/secrets/kubernetes.io/serviceaccount/
.The helm chart also set up the vault serviceaccount with cluster role
system:auth-delegator
for token validation. So the pod token can be used a thejwt_reviewer_token
.Would it be acceptable for the plugin to check if
ca.crt
andtoken
exists in/var/run/secrets/kubernetes.io/serviceaccount/
and use them when enabling the plugin without specifying any ca cert or token.This would greatly simplify my provisioning of vault when running in k8s.
I'm willing to work on a patch if it sounds good to you
The text was updated successfully, but these errors were encountered: