-
Notifications
You must be signed in to change notification settings - Fork 821
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Automation service accounts for k8s-artifacts-
buckets
#5957
Comments
+1 as a Release Manager |
1 similar comment
+1 as a Release Manager |
We could also reuse existing service accounts and grant them permissions to push to those buckets. |
Would it be better security wise to have a dedicated service account per bucket? |
it depends on the entities that use these service accounts. As long we are inside the GCP perimeter, IMHO, reuse existing service accounts is fine. |
How would that work, for example when using GitHub actions? |
The only service account I can see is |
I prefer that we create a new service account, especially because this SA might be used outside Prow (e.g. with GitHub Actions) |
I remember @upodroid mentioned this article. https://cloud.google.com/blog/products/identity-security/enabling-keyless-authentication-from-github-actions which in resume means the Github Actions will assume an existing SA. We can start with a new and single SA to cover all the buckets handled by RelEng. |
From the convo on Slack, we can start with one single GCP Service Account to handle artifacts publication. @xmudrii @saschagrunert Feel free to open PR against the repo and I'll actuate it. |
Ref #5997 |
The Kubernetes project currently lacks enough contributors to adequately respond to all issues. This bot triages un-triaged issues according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle stale |
/remove-lifecycle stale |
The Kubernetes project currently lacks enough contributors to adequately respond to all issues. This bot triages un-triaged issues according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle stale |
/remove-lifecycle stale |
The Kubernetes project currently lacks enough contributors to adequately respond to all issues. This bot triages un-triaged issues according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle stale |
The Kubernetes project currently lacks enough active contributors to adequately respond to all issues. This bot triages un-triaged issues according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle rotten |
SIG Release (aka @kubernetes/release-managers) maintains various buckets in the
k8s-artifacts-prod
project:It would be good to have a dedicated service account to automatically publish binaries for each tag and repository to avoid manually invocations of
kpromo gh
.The tokens could be stored in our 1Password vault.
The text was updated successfully, but these errors were encountered: