Skip to content

Commit 926db12

Browse files
committed
Add deprecation warnings for enforce-mountable-secrets annotation
1 parent 7e26a80 commit 926db12

File tree

5 files changed

+18
-0
lines changed

5 files changed

+18
-0
lines changed

content/en/docs/concepts/configuration/secret.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -674,6 +674,8 @@ For more information, you can refer to the [documentation about this annotation]
674674
{{< warning >}}
675675
Any containers that run with `privileged: true` on a node can access all
676676
Secrets used on that node.
677+
678+
`kubernetes.io/enforce-mountable-secrets` is deprecated in v1.32+. Use separate namespaces to isolate access to mounted secrets.
677679
{{< /warning >}}
678680

679681
## {{% heading "whatsnext" %}}

content/en/docs/concepts/security/secrets-good-practices.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -68,6 +68,10 @@ You can also use the `kubernetes.io/enforce-mountable-secrets` annotation on
6868
a ServiceAccount to enforce specific rules on how Secrets are used in a Pod.
6969
For more details, see the [documentation on this annotation](/docs/reference/labels-annotations-taints/#enforce-mountable-secrets).
7070

71+
{{< warning >}}
72+
`kubernetes.io/enforce-mountable-secrets` is deprecated in v1.32+. Use separate namespaces to isolate access to mounted secrets.
73+
{{< /warning >}}
74+
7175
### Improve etcd management policies
7276

7377
Consider wiping or shredding the durable storage used by `etcd` once it is

content/en/docs/concepts/security/service-accounts.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -199,6 +199,10 @@ You can also use TokenRequest to obtain short-lived tokens for your external app
199199

200200
### Restricting access to Secrets {#enforce-mountable-secrets}
201201

202+
{{< warning >}}
203+
`kubernetes.io/enforce-mountable-secrets` is deprecated in v1.32+. Use separate namespaces to isolate access to mounted secrets.
204+
{{< /warning >}}
205+
202206
Kubernetes provides an annotation called `kubernetes.io/enforce-mountable-secrets`
203207
that you can add to your ServiceAccounts. When this annotation is applied,
204208
the ServiceAccount's secrets can only be mounted on specified types of resources,

content/en/docs/reference/access-authn-authz/admission-controllers.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -789,6 +789,10 @@ Regarding the annotation `kubernetes.io/enforce-mountable-secrets`: While the an
789789
its enforcement also extends to other ways Secrets are used in the context of a Pod.
790790
Therefore, it is crucial to ensure that all the referenced secrets are correctly specified in the ServiceAccount.
791791

792+
{{< warning >}}
793+
`kubernetes.io/enforce-mountable-secrets` is deprecated in v1.32+. Use separate namespaces to isolate access to mounted secrets.
794+
{{< /warning >}}
795+
792796
### StorageObjectInUseProtection
793797

794798
**Type**: Mutating.

content/en/docs/reference/labels-annotations-taints/_index.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -806,6 +806,10 @@ This annotation is used for describing specific behaviour of given object.
806806

807807
### kubernetes.io/enforce-mountable-secrets {#enforce-mountable-secrets}
808808

809+
{{< warning >}}
810+
`kubernetes.io/enforce-mountable-secrets` is deprecated in v1.32+. Use separate namespaces to isolate access to mounted secrets.
811+
{{< /warning >}}
812+
809813
Type: Annotation
810814

811815
Example: `kubernetes.io/enforce-mountable-secrets: "true"`

0 commit comments

Comments
 (0)