cert-manager/test
Maël Valais 76eef68730 serviceAccountRef: the vault issuer can now use bound SA tokens
Previously, the Vault issuer was only able to use a Secret in order to
use the "Kubernetes authentication" method. The downside to this service
account Secret token is that it has the default JWT iss
"kubernetes/serviceaccount" (along with the fact that the token is not
bound to a particular pod and has no expiry).

With the new serviceAccountRef, cert-manager now requests the token on
behalf of the pod in order to authenticate with Vault.

Signed-off-by: Maël Valais <mael@vls.dev>
2023-02-06 18:28:49 +01:00
..
acme/dns Code review feedback: fix imports 2023-01-19 12:05:56 +00:00
e2e serviceAccountRef: the vault issuer can now use bound SA tokens 2023-02-06 18:28:49 +01:00
fixtures update container names in ytt overlays 2022-08-28 21:40:35 +02:00
integration move utility functions to reduce fragmentation and rename functions for consistency 2023-01-23 13:19:39 +01:00
internal use variables for binaries 2022-08-26 07:43:17 +00:00
unit serviceAccountRef: the vault issuer can now use bound SA tokens 2023-02-06 18:28:49 +01:00
OWNERS