fix(core): Handle K8s service account token rotation#2496
Open
AryanBakliwal wants to merge 1 commit intokubearmor:mainfrom
Open
fix(core): Handle K8s service account token rotation#2496AryanBakliwal wants to merge 1 commit intokubearmor:mainfrom
AryanBakliwal wants to merge 1 commit intokubearmor:mainfrom
Conversation
eb077bc to
28ab06f
Compare
28ab06f to
d83ba36
Compare
rksharma95
previously approved these changes
Mar 13, 2026
achrefbensaad
previously approved these changes
Mar 13, 2026
Signed-off-by: Aryan Bakliwal <aryanbakliwal12345@gmail.com>
c4a6eab
d83ba36 to
c4a6eab
Compare
rksharma95
approved these changes
Mar 19, 2026
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Purpose of PR?:
Use
BearerTokenFilein client config, which is set to the path to a file containingBearerToken. The contents of the file are periodically read and the last successfully read value takes precedence overBearerToken.Fixes #2262
Does this PR introduce a breaking change?
No
If the changes in this PR are manually verified, list down the scenarios covered:
Using a local k3s cluster and setting token expiration time to 1 hour. See timestamp in logs:
Before
After ~1 hour, the token expires and requests to API server return unauthorized
After
KubeArmor pod running for >1.5 hour, working as expected
Additional information for reviewer? :
Mention if this PR is part of any design or a continuation of previous PRs
Checklist:
<type>(<scope>): <subject>