Skip to content

Commit

Permalink
Doc: Image Repository: GCP: Direct resource access with WIF
Browse files Browse the repository at this point in the history
GCP now favors direct resource access with WorkloadIdentity Federation, as opposed to service account impersonation.

Signed-off-by: jordanp <[email protected]>
  • Loading branch information
JordanP committed Oct 28, 2024
1 parent a71ffb3 commit c06745e
Showing 1 changed file with 7 additions and 3 deletions.
10 changes: 7 additions & 3 deletions docs/spec/v1beta2/imagerepositories.md
Original file line number Diff line number Diff line change
Expand Up @@ -500,7 +500,7 @@ access to them.

##### Workload Identity

When using Workload Identity to enable access to GCR or Artifact Registry, add
When using Workload Identity to enable access to GCR or Artifact Registry with service account impersonation, add
the following patch to your bootstrap repository, in the
`flux-system/kustomization.yaml` file:

Expand All @@ -527,8 +527,12 @@ The Artifact Registry service uses the permission `artifactregistry.repositories
that is located under the Artifact Registry Reader role. If you are using
Google Container Registry service, the needed permission is instead `storage.objects.list`
which can be bound as part of the Container Registry Service Agent role.
Take a look at [this guide](https://cloud.google.com/kubernetes-engine/docs/how-to/workload-identity)
for more information about setting up GKE Workload Identity.

Take a look at [this guide](https://cloud.google.com/kubernetes-engine/docs/how-to/workload-identity) and
[this guide](https://cloud.google.com/iam/docs/workload-identity-federation-with-kubernetes#authenticate)
for more information about setting up GKE Workload Identity. Note that GCP now recommends using
[direct resource access](https://cloud.google.com/iam/docs/workload-identity-federation#direct-resource-access) as opposed
to service account impersonation when using Workload Identity.

#### Authentication on other platforms

Expand Down

0 comments on commit c06745e

Please sign in to comment.