You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This seems to only be a problem in the openshift-gitops namespace on the openshift-gitops ACD (presumably due to the operator). I am trying to sort out whether this is intentional. To Reproduce
Steps to reproduce the behavior:
Install from operator.
set mountsatoken and serviceaccount in ACD
Check deployment and see automountServiceAccountToken: false, which will prevent the token from mounting.
See error
Expected behavior
The ability to mount the SA token as takes place with other pods.
Or... allow modifying automountServiceAccountToken in the openshift-gitops ACD (unless this is intentional)
Screenshots
ACD with SA set, 2. Deployment
Additional context
The text was updated successfully, but these errors were encountered:
@iam-veeramalla do you foresee allowing the default SA to be utilized or do you believe a new SA should be utilized ? (I would lean on default based on the testing I've done w Vault/K8s auth)
There is a bug when modifying the serviceaccount in the argocd crd : the operator does not reconcile the deployment. Manually deleting the deployment resolves the issue.
Describe the bug
The repo server does not create a service account, (unlike server, application-controller etc). If a service account is not defined, I believe the deployment is built with automountServiceAccountToken: false (https://github.com/argoproj-labs/argocd-operator/blob/9d60b042f3c7b60661944ef08f05ebc8e17b8403/controllers/argocd/deployment.go#L775), which in turn does not mount the SA token in /var/run/secrets/kubernetes.io/serviceaccount/token .
This seems to only be a problem in the openshift-gitops namespace on the openshift-gitops ACD (presumably due to the operator). I am trying to sort out whether this is intentional.
To Reproduce
Steps to reproduce the behavior:
Expected behavior
The ability to mount the SA token as takes place with other pods.
Or... allow modifying automountServiceAccountToken in the openshift-gitops ACD (unless this is intentional)
Screenshots
Additional context
The text was updated successfully, but these errors were encountered: