File tree Expand file tree Collapse file tree 1 file changed +7
-3
lines changed Expand file tree Collapse file tree 1 file changed +7
-3
lines changed Original file line number Diff line number Diff line change @@ -500,7 +500,7 @@ access to them.
500500
501501# #### Workload Identity
502502
503- When using Workload Identity to enable access to GCR or Artifact Registry, add
503+ When using Workload Identity to enable access to GCR or Artifact Registry with service account impersonation , add
504504the following patch to your bootstrap repository, in the
505505`flux-system/kustomization.yaml` file :
506506
@@ -527,8 +527,12 @@ The Artifact Registry service uses the permission `artifactregistry.repositories
527527that is located under the Artifact Registry Reader role. If you are using
528528Google Container Registry service, the needed permission is instead `storage.objects.list`
529529which can be bound as part of the Container Registry Service Agent role.
530- Take a look at [this guide](https://cloud.google.com/kubernetes-engine/docs/how-to/workload-identity)
531- for more information about setting up GKE Workload Identity.
530+
531+ Take a look at [this guide](https://cloud.google.com/kubernetes-engine/docs/how-to/workload-identity) and
532+ [this guide](https://cloud.google.com/iam/docs/workload-identity-federation-with-kubernetes#authenticate)
533+ for more information about setting up GKE Workload Identity. Note that GCP now recommends using
534+ [direct resource access](https://cloud.google.com/iam/docs/workload-identity-federation#direct-resource-access) as opposed
535+ to service account impersonation when using Workload Identity.
532536
533537# ### Authentication on other platforms
534538
You can’t perform that action at this time.
0 commit comments