Skip to content

Commit 45aa0d8

Browse files
committed
Clarify expiration time for service accounts and tokens of pods pending deletion despite finalizers
Refers #47403 Signed-off-by: aleskandro <[email protected]>
1 parent 8575f42 commit 45aa0d8

File tree

2 files changed

+6
-0
lines changed

2 files changed

+6
-0
lines changed

content/en/docs/reference/access-authn-authz/service-accounts-admin.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -75,6 +75,8 @@ stored as extra 'private claims' in the issued JWT.
7575

7676
When a bound token is presented to the kube-apiserver, the service account authenticator
7777
will extract and verify these claims.
78+
If the referenced object or the service account is pending deletion (for example, due to finalizers),
79+
the request will not be authenticated after 1 minute of the `.metadata.deletionTimestamp`.
7880
If the referenced object no longer exists (or its `metadata.uid` does not match),
7981
the request will not be authenticated.
8082

content/en/docs/tasks/configure-pod-container/configure-service-account.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -58,6 +58,10 @@ When a Pod authenticates as a ServiceAccount, its level of access depends on the
5858
[authorization plugin and policy](/docs/reference/access-authn-authz/authorization/#authorization-modules)
5959
in use.
6060

61+
The API credentials are automatically revoked when the Pod is deleted, even if
62+
finalizers are in place. In particular, the API credentials are revoked after 1
63+
minute of the `.metadata.deletionTimestamp`, which includes the grace period.
64+
6165
### Opt out of API credential automounting
6266

6367
If you don't want the {{< glossary_tooltip text="kubelet" term_id="kubelet" >}}

0 commit comments

Comments
 (0)