linkerd2/charts
Aran Shavit 351cc68b10
Manually mount serviceAccount token (#13186)
Subject
Disables "automountServiceAccountToken", instead manually mounts it as a projected volume where necessary

Problem
By default, kubernetes enables "automountServiceAccountToken" for all pods.
This poses a security risk, as pods might get kube-api permissions unintentionally.
More specifically, this fails security compliance tests:
https://learn.microsoft.com/en-us/azure/governance/policy/samples/built-in-policies
https://www.azadvertizer.net/azpolicyadvertizer/kubernetes_block-automount-token.html

Solution
Disable  "automountServiceAccountToken", create projected volume for the token, and mount it on relevant containers

Validation
Linkerd pods are able to access k8s API, work as expected (same as before)

Fixes #13108 
---------

Signed-off-by: Aran Shavit <Aranshavit@gmail.com>
2024-10-22 13:55:01 -05:00
..
linkerd-control-plane Manually mount serviceAccount token (#13186) 2024-10-22 13:55:01 -05:00
linkerd-crds Add `EgressNetwork` and routes statuses (#13181) 2024-10-19 18:40:32 +03:00
linkerd2-cni Bump linkerd-cni to v1.5.2 (#13198) 2024-10-17 18:18:20 -07:00
partials Manually mount serviceAccount token (#13186) 2024-10-22 13:55:01 -05:00
patch Add native sidecar support (#11465) 2023-11-22 12:23:24 -05:00
artifacthub-repo-edge.yml artifacthub.io Verified Publisher (#6257) 2021-06-15 10:36:21 -05:00
artifacthub-repo-stable.yml Change notes for stable-2.12.0-rc2 (#9202) 2022-08-18 19:50:09 -05:00