Skip to content

the repo server does not create a SA, therefore automountServiceAccountToken: false #203

Open
@pbmoses

Description

@pbmoses

Describe the bug
The repo server does not create a service account, (unlike server, application-controller etc). If a service account is not defined, I believe the deployment is built with automountServiceAccountToken: false (https://github.com/argoproj-labs/argocd-operator/blob/9d60b042f3c7b60661944ef08f05ebc8e17b8403/controllers/argocd/deployment.go#L775), which in turn does not mount the SA token in /var/run/secrets/kubernetes.io/serviceaccount/token .

This seems to only be a problem in the openshift-gitops namespace on the openshift-gitops ACD (presumably due to the operator). I am trying to sort out whether this is intentional.
To Reproduce
Steps to reproduce the behavior:

  1. Install from operator.
  2. set mountsatoken and serviceaccount in ACD
  3. Check deployment and see automountServiceAccountToken: false, which will prevent the token from mounting.
  4. See error

Expected behavior
The ability to mount the SA token as takes place with other pods.
Or... allow modifying automountServiceAccountToken in the openshift-gitops ACD (unless this is intentional)

Screenshots

  1. ACD with SA set, 2. Deployment

Screen Shot 2021-08-29 at 6 31 13 PM

Screen Shot 2021-08-29 at 6 31 40 PM

Additional context

Metadata

Metadata

Assignees

No one assigned

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions