Skip to content

Commit 3e7464c

Browse files
authored
Merge pull request #63921 from cbippley/OCPBUGS-3154
OCPBUGS#3154 BoundServiceAccountToken has 365d validation period even…
2 parents 221c863 + 9c80bb1 commit 3e7464c

File tree

1 file changed

+6
-1
lines changed

1 file changed

+6
-1
lines changed

modules/bound-sa-tokens-configuring.adoc

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -122,8 +122,13 @@ spec:
122122
----
123123
<1> A reference to an existing service account.
124124
<2> The path relative to the mount point of the file to project the token into.
125-
<3> Optionally set the expiration of the service account token, in seconds. The default is 3600 seconds (1 hour) and must be at least 600 seconds (10 minutes). The kubelet will start trying to rotate the token if the token is older than 80 percent of its time to live or if the token is older than 24 hours.
125+
<3> Optionally set the expiration of the service account token, in seconds. The default is 3600 seconds (1 hour) and must be at least 600 seconds (10 minutes). The kubelet will start trying to rotate the token if the token is older than 80 percent of its time to live or if the token is older than 24 hours.
126126
<4> Optionally set the intended audience of the token. The recipient of a token should verify that the recipient identity matches the audience claim of the token, and should otherwise reject the token. The audience defaults to the identifier of the API server.
127+
+
128+
[NOTE]
129+
====
130+
In order to prevent unexpected failure, {product-title} overrides the `expirationSeconds` value to be one year from the initial token generation with the `--service-account-extend-token-expiration` default of `true`. You cannot change this setting.
131+
====
127132

128133
.. Create the pod:
129134
+

0 commit comments

Comments
 (0)