Documentation ¶
Overview ¶
serviceaccount enforces all pods having an associated serviceaccount, and all containers mounting the API token for that serviceaccount at a known location
Index ¶
Constants ¶
const DefaultAPITokenMountPath = "/var/run/secrets/kubernetes.io/serviceaccount"
DefaultAPITokenMountPath is the path that ServiceAccountToken secrets are automounted to. The token file would then be accessible at /var/run/secrets/kubernetes.io/serviceaccount
const DefaultServiceAccountName = "default"
DefaultServiceAccountName is the name of the default service account to set on pods which do not specify a service account
const EnforceMountableSecretsAnnotation = "kubernetes.io/enforce-mountable-secrets"
EnforceMountableSecretsAnnotation is a default annotation that indicates that a service account should enforce mountable secrets. The value must be true to have this annotation take effect
const PluginName = "ServiceAccount"
PluginName is the name of this admission plugin
Variables ¶
This section is empty.
Functions ¶
func NewServiceAccount ¶
NewServiceAccount returns an admission.Interface implementation which limits admission of Pod CREATE requests based on the pod's ServiceAccount: 1. If the pod does not specify a ServiceAccount, it sets the pod's ServiceAccount to "default" 2. It ensures the ServiceAccount referenced by the pod exists 3. If LimitSecretReferences is true, it rejects the pod if the pod references Secret objects which the pod's ServiceAccount does not reference 4. If the pod does not contain any ImagePullSecrets, the ImagePullSecrets of the service account are added. 5. If MountServiceAccountToken is true, it adds a VolumeMount with the pod's ServiceAccount's api token secret to containers
Types ¶
This section is empty.