-
Notifications
You must be signed in to change notification settings - Fork 196
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Use ServiceAccount for Workload Identity clientID and tenantId #1316
Comments
@aramase Can we bump the priority for this, or should we go through Azure Support to escalate? |
#1443 I just opened this PR trying to adjust it similarly to your request. |
We would greatly benefit from this as well: the separate clientID has already caused issues in our workload. |
This functionality would have prevented an outtage experienced with the dual clientID requirement, big thumbs up from me |
This would be great, we would like to avoid specifying the client id in the SecretProviderClass as we are autogenerating SeviceAccount manifests for worload identity, but SecretProviderClass is created by development teams and the need to set the same client ID second time in SecretProviderClass leads to mistakes. |
@halabap if your team is using helm, then a viable and temporary work around is to use helms 'lookup' function. It allows you to query any applied metadata in the Kubernetes resources. It's not better than just referencing a service account, and it does add some fragility to the secret provider, but it works! |
Thanks for hint. Yeah, I know about helm and we are using helm for platform services, but for the business services we stopped using helm and went to plain manifests as helm was adding complexity for developers who had to support the services and the evaluation was stuck sometimes, etc. If there is a chance that this feature will be merged then we will wait for some time as we have custom solution for secrets, which we want to replace by CSI store driver in the future 😉 ThanksSent from my iPhoneOn 29. 11. 2024, at 20:18, Moses Martin ***@***.***> wrote:
@halabap if your team is using helm, then a viable and temporary work around is to use helms 'lookup' function. It allows you to query any applied metadata in the Kubernetes resources.
It's not better than just referencing a service account, and it does add some fragility to the secret provider, but it works!
—Reply to this email directly, view it on GitHub, or unsubscribe.You are receiving this because you were mentioned.Message ID: ***@***.***>
|
Feature Request
Currently for Workload Identity the
SecretProviderClass
requiresclientID
andtenantId
.However this detail is already available from the application's
ServiceAccount
Proposal
Instead can the
SecretProviderClass
just use theServiceAccount
forclientID
andtenantId
?for example
The text was updated successfully, but these errors were encountered: