-
Notifications
You must be signed in to change notification settings - Fork 39k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Token request: proactively remove unused secret based SA tokens #77600
Comments
/remove-sig api-machinery |
Since patch #72179 would be contained in v1.15, does that mean we should start clean work after v1.15 released?
|
We can start considering how we'd enable a service account to indicate it didn't want secret tokens in 1.15, but yes, we would not have the controller-manager switch to using that until at least 1.16 |
This comment has been minimized.
This comment has been minimized.
This comment has been minimized.
This comment has been minimized.
/remove-lifecycle rotten |
/lifecycle frozen |
Stopping auto-generating new secret-based tokens and removing existing unused secret-based tokens is being addressed in KEP 2799 (kubernetes/enhancements#2800) /close |
@liggitt: Closing this issue. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
Once it is possible to opt out of secret based SA tokens, any preexisting secrets should be removed.
Action items:
/sig auth
/sig api-machinery
@kubernetes/sig-auth-feature-requests
xref: #70679 #71275 #72179 #77599
/priority important-longterm
The text was updated successfully, but these errors were encountered: