-
Notifications
You must be signed in to change notification settings - Fork 2.4k
Missing RBAC for cert-manager default serviceaccount #7212
Description
Describe the bug:
Looking at the documentation for using the cert-managers default Serviceaccount for Route53 configuration (https://cert-manager.io/docs/configuration/acme/dns01/route53/#using-the-cert-manager-serviceaccount) it should not be necessary to manually create the RBAC for creating service account tokens, only when using a separately defined Serviceaccount (https://cert-manager.io/docs/configuration/acme/dns01/route53/#rbac).
However, when using the default Serviceaccount issues with RBAC still occur until the Role and Rolebinding are manually created:
"re-queuing item due to error processing" err="error getting service account token: failed to request token for cert-manager/cert-manager: serviceaccounts \"cert-manager\" is forbidden: Use
r \"system:serviceaccount:cert-manager:cert-manager\" cannot create resource \"serviceaccounts/token\" in API group \"\" in the namespace \"cert-manager\"" logger="cert-manager.controller" key="foo/foo-1-423214965-
2925438771"
Expected behaviour:
RBAC definitions for creating service account tokens should be included in the helm chart for the default cert-manager Serviceaccount
Steps to reproduce the bug:
Follow the documentation for Route53 with IRSA authentication while using the default cert-manager Serviceaccount
Anything else we need to know?:
Environment details::
- Kubernetes version: v1.29.6-eks-db838b0
- Cloud-provider/provisioner: AWS
- cert-manager version: v1.15.2
- Install method: helm
/kind bug