mirror of https://github.com/linkerd/linkerd2.git
				
				
				
			
				
					
						
							Subject Disables "automountServiceAccountToken", instead manually mounts it as a projected volume where necessary Problem By default, kubernetes enables "automountServiceAccountToken" for all pods. This poses a security risk, as pods might get kube-api permissions unintentionally. More specifically, this fails security compliance tests: https://learn.microsoft.com/en-us/azure/governance/policy/samples/built-in-policies https://www.azadvertizer.net/azpolicyadvertizer/kubernetes_block-automount-token.html Solution Disable "automountServiceAccountToken", create projected volume for the token, and mount it on relevant containers Validation Linkerd pods are able to access k8s API, work as expected (same as before) Fixes #13108 --------- Signed-off-by: Aran Shavit <Aranshavit@gmail.com>  | 
			||
|---|---|---|
| .. | ||
| linkerd-control-plane | ||
| linkerd-crds | ||
| linkerd2-cni | ||
| partials | ||
| patch | ||
| artifacthub-repo-edge.yml | ||
| artifacthub-repo-stable.yml | ||