cert-manager/test/e2e
Maël Valais 76eef68730 serviceAccountRef: the vault issuer can now use bound SA tokens
Previously, the Vault issuer was only able to use a Secret in order to
use the "Kubernetes authentication" method. The downside to this service
account Secret token is that it has the default JWT iss
"kubernetes/serviceaccount" (along with the fact that the token is not
bound to a particular pod and has no expiry).

With the new serviceAccountRef, cert-manager now requests the token on
behalf of the pod in order to authenticate with Vault.

Signed-off-by: Maël Valais <mael@vls.dev>
2023-02-06 18:28:49 +01:00
..
bin/cloudflare-clean Update Cloudflare ListDNSRecords 2023-01-13 09:55:41 -08:00
framework serviceAccountRef: the vault issuer can now use bound SA tokens 2023-02-06 18:28:49 +01:00
suite serviceAccountRef: the vault issuer can now use bound SA tokens 2023-02-06 18:28:49 +01:00
util Corrects test Gateway resources 2022-12-05 15:05:45 +00:00
e2e_test.go upgrade ginkgo to v2 2022-08-04 10:16:29 +00:00
e2e.go upgrade ginkgo to v2 2022-08-04 10:16:29 +00:00