-
Notifications
You must be signed in to change notification settings - Fork 7.4k
set auto-mount service account token to false in keycloak pods #40605
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
Conversation
Signed-off-by: AvivGuiser <avivguiser@gmail.com>
pretty sure the |
For the Keycloak Multi-Site setup, IMHO we assume that the CA used in OpenShift is imported automatically so we can communicate with Infinispan securely. Looping in @ryanemerson / @pruivo to ensure that the docs are updated for that. |
For mult-site HA, Infinispan requires |
@ahus1 The operator automatically adds the certificate to the truststore: Lines 448 to 449 in 7736ca2
|
@pruivo, thank you, I was looking for that code snippet but didn't find it. So this option would be required in the Keycloak HA setup as described in https://www.keycloak.org/high-availability/deploy-keycloak-kubernetes So if this is merged for the 26.3 release and we decide to update the docs in a follow-up issue, that follow-up issue should be a blocker for the 26.3 release. |
@ahus1 How so? This PR is disabling the service account tokens ( |
@pruivo - OK, then I was just worried without a reason. Then proceed here, and our tests in the cluster will show if it breaks. Sorry for the noise! |
This is the only doc I found: https://kubernetes.io/docs/tasks/configure-pod-container/configure-service-account/#opt-out-of-api-credential-automounting |
Based on #38843 (comment) it would appear that the CA cert is also not mounted when |
the |
+1 |
Signed-off-by: AvivGuiser <avivguiser@gmail.com>
added the |
Hey @vmuzikar would it be possible to get someone to take a look here? Thanks in advance! |
fixes #38843