@@ -162,7 +162,7 @@ const (
162162
163163 DefaultTokenAudience = "api://AzureADTokenExchange" //nolint:gosec // G101 ignore this!
164164
165- defaultAzureFederatedTokenDir = "/var/lib/kubelet/" + DefaultDriverName
165+ defaultAzureFederatedTokenDir = "/var/lib/kubelet/plugins/ " + DefaultDriverName
166166)
167167
168168var (
@@ -590,15 +590,15 @@ func (d *Driver) GetAuthEnv(ctx context.Context, volumeID, protocol string, attr
590590 }
591591 azureFederatedTokenFile := filepath .Join (defaultAzureFederatedTokenDir , clientID )
592592 klog .V (2 ).Infof ("write workload identity token to %s" , azureFederatedTokenFile )
593- if err := os .WriteFile (azureFederatedTokenFile , []byte (workloadIdentityToken ), 0644 ); err != nil {
593+ if err := os .WriteFile (azureFederatedTokenFile , []byte (workloadIdentityToken ), 0600 ); err != nil {
594594 return rgName , accountName , accountKey , containerName , authEnv , fmt .Errorf ("failed to write azure federated token file %s: %v" , azureFederatedTokenFile , err )
595595 }
596596
597597 authEnv = append (authEnv , "AZURE_STORAGE_SPN_CLIENT_ID=" + clientID )
598598 if tenantID != "" {
599599 authEnv = append (authEnv , "AZURE_STORAGE_SPN_TENANT_ID=" + tenantID )
600600 }
601- authEnv = append (authEnv , "AZURE_FEDERATED_TOKEN_FILE =" + azureFederatedTokenFile )
601+ authEnv = append (authEnv , "AZURE_OAUTH_TOKEN_FILE =" + azureFederatedTokenFile )
602602
603603 return rgName , accountName , accountKey , containerName , authEnv , err
604604 }
0 commit comments