From 0377b016ff8677dd9e350856275e7b3d08136fd2 Mon Sep 17 00:00:00 2001 From: Angel Misevski Date: Tue, 18 Oct 2022 20:57:22 -0600 Subject: [PATCH] Fix logging as dw serviceaccount when using make debug As of Kubernetes 1.24, serviceaccounttoken secrets are no longer created by default, and so this method cannot be used to login as the workspace serviceaccount when running locally. Instead, it's possible to use kubectl create token -n to get the token used for the serviceaccount. Signed-off-by: Angel Misevski --- build/make/deploy.mk | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/build/make/deploy.mk b/build/make/deploy.mk index f94e07eef..ebd5bce38 100644 --- a/build/make/deploy.mk +++ b/build/make/deploy.mk @@ -131,7 +131,7 @@ _check_cert_manager: endif _login_with_devworkspace_sa: - $(eval SA_TOKEN := $(shell $(K8S_CLI) get secrets -o=json -n $(NAMESPACE) | jq -r '[.items[] | select (.type == "kubernetes.io/service-account-token" and .metadata.annotations."kubernetes.io/service-account.name" == "$(DEVWORKSPACE_CTRL_SA)")][0].data.token' | base64 --decode )) + $(eval SA_TOKEN := $(shell $(K8S_CLI) create token -n "$(NAMESPACE)" "$(DEVWORKSPACE_CTRL_SA)")) echo "Logging as controller's SA in $(NAMESPACE)" oc login --token=$(SA_TOKEN) --kubeconfig=$(BUMPED_KUBECONFIG)