Skip to content

Missing RBAC for cert-manager default serviceaccount #7212

@Jasper-Ben

Description

@Jasper-Ben

Describe the bug:

Looking at the documentation for using the cert-managers default Serviceaccount for Route53 configuration (https://cert-manager.io/docs/configuration/acme/dns01/route53/#using-the-cert-manager-serviceaccount) it should not be necessary to manually create the RBAC for creating service account tokens, only when using a separately defined Serviceaccount (https://cert-manager.io/docs/configuration/acme/dns01/route53/#rbac).

However, when using the default Serviceaccount issues with RBAC still occur until the Role and Rolebinding are manually created:

"re-queuing item due to error processing" err="error getting service account token: failed to request token for cert-manager/cert-manager: serviceaccounts \"cert-manager\" is forbidden: Use
r \"system:serviceaccount:cert-manager:cert-manager\" cannot create resource \"serviceaccounts/token\" in API group \"\" in the namespace \"cert-manager\"" logger="cert-manager.controller" key="foo/foo-1-423214965-
2925438771"

Expected behaviour:

RBAC definitions for creating service account tokens should be included in the helm chart for the default cert-manager Serviceaccount

Steps to reproduce the bug:

Follow the documentation for Route53 with IRSA authentication while using the default cert-manager Serviceaccount

Anything else we need to know?:

Environment details::

  • Kubernetes version: v1.29.6-eks-db838b0
  • Cloud-provider/provisioner: AWS
  • cert-manager version: v1.15.2
  • Install method: helm

/kind bug

Metadata

Metadata

Assignees

No one assigned

    Labels

    kind/bugCategorizes issue or PR as related to a bug.

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions