-
Notifications
You must be signed in to change notification settings - Fork 68
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Automated backport of #3064: Configure SAs to enforce mountable secrets #3143
Automated backport of #3064: Configure SAs to enforce mountable secrets #3143
Conversation
This prevents accessing arbitrary secrets in pods running with these SAs. See https://kubernetes.io/docs/reference/labels-annotations-taints/#enforce-mountable-secrets for details. Signed-off-by: Stephen Kitt <skitt@redhat.com>
🤖 Created branch: z_pr3143/skitt/automated-backport-of-#3064-origin-release-0.17 |
I’m wary of the upgrade impacts of this change (in particular the renamed broker secret) on upgrades from one patch release to the next — we won’t be able to enforce the use of |
We'd have to backport submariner-io/subctl#1150 as well. This is a breaking change unless |
…3064-origin-release-0.17
🤖 Closed branches: [z_pr3143/skitt/automated-backport-of-#3064-origin-release-0.17] |
Backport of #3064 on release-0.17.
#3064: Configure SAs to enforce mountable secrets
For details on the backport process, see the backport requests page.