Skip to content

Commit 9c80bb1

Browse files
committed
OCPBUGS#3154 BoundServiceAccountToken has 365d validation period even it has expirationSeconds: 3607
1 parent bfe2a14 commit 9c80bb1

File tree

1 file changed

+6
-1
lines changed

1 file changed

+6
-1
lines changed

modules/bound-sa-tokens-configuring.adoc

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -122,8 +122,13 @@ spec:
122122
----
123123
<1> A reference to an existing service account.
124124
<2> The path relative to the mount point of the file to project the token into.
125-
<3> Optionally set the expiration of the service account token, in seconds. The default is 3600 seconds (1 hour) and must be at least 600 seconds (10 minutes). The kubelet will start trying to rotate the token if the token is older than 80 percent of its time to live or if the token is older than 24 hours.
125+
<3> Optionally set the expiration of the service account token, in seconds. The default is 3600 seconds (1 hour) and must be at least 600 seconds (10 minutes). The kubelet will start trying to rotate the token if the token is older than 80 percent of its time to live or if the token is older than 24 hours.
126126
<4> Optionally set the intended audience of the token. The recipient of a token should verify that the recipient identity matches the audience claim of the token, and should otherwise reject the token. The audience defaults to the identifier of the API server.
127+
+
128+
[NOTE]
129+
====
130+
In order to prevent unexpected failure, {product-title} overrides the `expirationSeconds` value to be one year from the initial token generation with the `--service-account-extend-token-expiration` default of `true`. You cannot change this setting.
131+
====
127132

128133
.. Create the pod:
129134
+

0 commit comments

Comments
 (0)