Skip to content

Do not reuse the default ServiceAccount #3440

@sathieu

Description

@sathieu

/kind feature

Describe the solution you'd like

Currently the provider uses the default k8s ServiceAccount.

Please create a specific one, and:

  • use it in the Deployment
  • use it in the capv-leader-election-rolebinding RoleBinding`
  • use it in the capv-manager-rolebinding ClusterRoleBinding

This will allow the provider to work when automountServiceAccountToken is set to false in the default ServiceAccount and in the created pods.

Anything else you would like to add:

Some references :

Environment:

  • Cluster-api-provider-vsphere version:
  • Kubernetes version: (use kubectl version):
  • OS (e.g. from /etc/os-release):

Metadata

Metadata

Assignees

No one assigned

    Labels

    help wantedDenotes an issue that needs help from a contributor. Must meet "help wanted" guidelines.kind/featureCategorizes issue or PR as related to a new feature.

    Type

    No type

    Projects

    No projects

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions