mirror of
https://github.com/external-secrets/external-secrets.git
synced 2024-12-15 17:51:01 +00:00
docs: mention auth-delegator role in vault provider (#2734)
Signed-off-by: Moritz Johner <beller.moritz@googlemail.com>
This commit is contained in:
parent
7b57943c55
commit
d42ccaaf78
2 changed files with 3 additions and 1 deletions
|
@ -306,6 +306,8 @@ options of obtaining credentials for vault:
|
||||||
3. by using transient credentials from the mounted service account token within the
|
3. by using transient credentials from the mounted service account token within the
|
||||||
external-secrets operator
|
external-secrets operator
|
||||||
|
|
||||||
|
Vault validates the service account token by using the TokenReview API. ⚠️ You have to bind the `system:auth-delegator` ClusterRole to the service account that is used for authentication. Please follow the [Vault documentation](https://developer.hashicorp.com/vault/docs/auth/kubernetes#configuring-kubernetes).
|
||||||
|
|
||||||
```yaml
|
```yaml
|
||||||
{% include 'vault-kubernetes-store.yaml' %}
|
{% include 'vault-kubernetes-store.yaml' %}
|
||||||
```
|
```
|
||||||
|
|
|
@ -77,7 +77,7 @@ clean:
|
||||||
# serve runs mkdocs as a local webserver for interactive development.
|
# serve runs mkdocs as a local webserver for interactive development.
|
||||||
# This will serve the live copy of the docs on 127.0.0.1:8000.
|
# This will serve the live copy of the docs on 127.0.0.1:8000.
|
||||||
.PHONY: serve
|
.PHONY: serve
|
||||||
serve:
|
serve: build
|
||||||
$(DOCKER) run \
|
$(DOCKER) run \
|
||||||
-it \
|
-it \
|
||||||
--sig-proxy=true \
|
--sig-proxy=true \
|
||||||
|
|
Loading…
Reference in a new issue