-
Notifications
You must be signed in to change notification settings - Fork 175
Open
Labels
bugSomething isn't workingSomething isn't working
Description
Good afternoon,
When deploying Vault Agent Injector v1.6.0 (via helm chart 0.29.1), the sidecar does not respect the pods security context when using the vault.hashicorp.com/agent-inject-token: true
annotation, preventing the pod from picking up the token.
The previous deployed version of Vault Agent Injector v1.2.1 (via helm chart 0.25.0) presented no such issue and created the token file with the following permissions:
-rw-r----- 1 100 nonroot 95 Dec 11 13:44 /vault/secrets/token
Whereas version v1.6.0 presented the following permissions:
-rw-r----- 1 100 1000 95 Dec 10:53 /vault/secrets/token
To Reproduce
- Deploy vault agent injector 1.6.0 via helm chart 0.29.1
- Shell into the pod
- cat /vault/secrets/token
- permission denied / Error: no vault token set on Client (in-pod logs)
Expected behavior
The pod should use the permissions set in the securityContext and be able to view /vault/secrets/token
Environment
- Kubernetes version: v1.26.5+k3s1
- vault-k8s version: 1.6.0
cmeury
Metadata
Metadata
Assignees
Labels
bugSomething isn't workingSomething isn't working