Open crenshaw-dev opened 2 years ago
Throwing in some notes I kept while implementing the CLI fix: https://docs.google.com/document/d/1MmYIfM8tbEp2irCaLtgrv9jJL-coYG3u-wa3xTVkEOU/edit#heading=h.r5wcd4iwxat8
Kubernetes has a TokenManager concept that creates, refreshes, caches, and rotates tokens from the TokenRequest API. The challenge right now is that some of clusterauth package's funcs are called directly by the argocd CLI, which doesn't allow Argo CD to persist token management. It might make sense to inject this token manager into the cluster server to add support for the TokenRequest API to avoid using these long lived tokens.
Hi @crenshaw-dev , I am working on this issue. Would be raising a PR soon
Hi @crenshaw-dev, With reference to the document shared by @danielhelfand, while implementing the token request api in argocd-server, the decision whether to go for existing token generation old way or the using the new api in the code should come from ENV of the argocd-server or this can also be overriden with flags ? What do you recommend here
Hi @crenshaw-dev While working on the enhancement, I came across few scenarios for which answers from your end would help. I have the following questions:
Apologies @mabhi I completely missed your messages. Making a note to follow up on your questions.
Thank you for the response. Would wait for your comments.
Hi Folks - any update on this issue?
Any updates?
I would also be interested, thx
Any updates?
Any updates ?
My application-controller pod is emitting below log continuously and I think that it is because of this. 25k the past 24 hours to be exact.
Use tokens from the TokenRequest API or manually created secret-based tokens instead of auto-generated secret-based tokens.
Another followup on this. Is there any updates? My application-controller pod is generating about 7.5gb of logs a day and they're mostly:
Use tokens from the TokenRequest API or manually created secret-based tokens instead of auto-generated secret-based tokens.
4.5 million logs entries in a 24 hour window
Any updates ?
Any updates?
Hello, any updates ?
Would be great to have a smart solution for external managed clusters instead of rolling over the service account bearer token every year, thank you.
dead
Summary
2.4 creates a non-expiring ServiceAccount token Secret on
argocd cluster add
for 1.24 clusters.Instead, Argo CD should use the TokenRequest API.
Motivation
Kubernetes recommends using the TokenRequest API rather than relying on tokens that don't expire.