Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

the repo server does not create a SA, therefore automountServiceAccountToken: false #203

Open
pbmoses opened this issue Aug 30, 2021 · 5 comments
Labels
fix-in-upstream good first issue Good for newcomers kind/bug Something isn't working

Comments

@pbmoses
Copy link

pbmoses commented Aug 30, 2021

Describe the bug
The repo server does not create a service account, (unlike server, application-controller etc). If a service account is not defined, I believe the deployment is built with automountServiceAccountToken: false (https://github.com/argoproj-labs/argocd-operator/blob/9d60b042f3c7b60661944ef08f05ebc8e17b8403/controllers/argocd/deployment.go#L775), which in turn does not mount the SA token in /var/run/secrets/kubernetes.io/serviceaccount/token .

This seems to only be a problem in the openshift-gitops namespace on the openshift-gitops ACD (presumably due to the operator). I am trying to sort out whether this is intentional.
To Reproduce
Steps to reproduce the behavior:

  1. Install from operator.
  2. set mountsatoken and serviceaccount in ACD
  3. Check deployment and see automountServiceAccountToken: false, which will prevent the token from mounting.
  4. See error

Expected behavior
The ability to mount the SA token as takes place with other pods.
Or... allow modifying automountServiceAccountToken in the openshift-gitops ACD (unless this is intentional)

Screenshots

  1. ACD with SA set, 2. Deployment

Screen Shot 2021-08-29 at 6 31 13 PM

Screen Shot 2021-08-29 at 6 31 40 PM

Additional context

@iam-veeramalla
Copy link
Collaborator

iam-veeramalla commented Aug 30, 2021

I can reproduce the bug. Thanks for reporting @pbmoses.

@iam-veeramalla
Copy link
Collaborator

Should be fixed in the upstream
https://github.com/argoproj-labs/argocd-operator/blob/755639898c156155085e1fcbe2c3c5e74fec332d/controllers/argocd/deployment.go#L782

@iam-veeramalla iam-veeramalla added fix-in-upstream kind/bug Something isn't working good first issue Good for newcomers labels Aug 30, 2021
@pbmoses
Copy link
Author

pbmoses commented Aug 30, 2021

@iam-veeramalla do you foresee allowing the default SA to be utilized or do you believe a new SA should be utilized ? (I would lean on default based on the testing I've done w Vault/K8s auth)

@hamelg
Copy link

hamelg commented Oct 11, 2022

This issue is still present in v1.6.1.

@hamelg
Copy link

hamelg commented Oct 18, 2022

There is a bug when modifying the serviceaccount in the argocd crd : the operator does not reconcile the deployment. Manually deleting the deployment resolves the issue.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
fix-in-upstream good first issue Good for newcomers kind/bug Something isn't working
Projects
None yet
Development

No branches or pull requests

3 participants