Skip to content

Commit ef4889f

Browse files
committed
remove permissions
1 parent 36c548c commit ef4889f

File tree

1 file changed

+19
-18
lines changed

1 file changed

+19
-18
lines changed

modules/ccs-gcp-provisioned.adoc

Lines changed: 19 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -60,21 +60,22 @@ The following services must be enabled on a GCP CCS cluster:
6060
* `orgpolicy`
6161
* `networksecurity`
6262

63-
[id="gcp-policy-permissions_{context}"]
64-
== Permissions
65-
66-
The following roles must be added to the support service account:
67-
68-
* `compute.admin`
69-
* `dns.admin`
70-
* `orgpolicy.policyViewer`
71-
* `servicemanagement.admin`
72-
* `serviceusage.serviceUsageAdmin`
73-
* `storage.admin`
74-
* `compute.loadBalancerAdmin`
75-
* `viewer`
76-
* `iam.roleAdmin`
77-
* `iam.securityAdmin`
78-
* `iam.serviceAccountKeyAdmin`
79-
* `iam.serviceAccountAdmin`
80-
* `iam.serviceAccountUser`
63+
//Commenting this section out for now. Once Workload Identity feature is implemented, this may need to be conditionalized for that, but does not apply to service account key authorization method.
64+
// [id="gcp-policy-permissions_{context}"]
65+
// == Permissions
66+
67+
// The following roles must be added to the support service account:
68+
69+
// * `compute.admin`
70+
// * `dns.admin`
71+
// * `orgpolicy.policyViewer`
72+
// * `servicemanagement.admin`
73+
// * `serviceusage.serviceUsageAdmin`
74+
// * `storage.admin`
75+
// * `compute.loadBalancerAdmin`
76+
// * `viewer`
77+
// * `iam.roleAdmin`
78+
// * `iam.securityAdmin`
79+
// * `iam.serviceAccountKeyAdmin`
80+
// * `iam.serviceAccountAdmin`
81+
// * `iam.serviceAccountUser`

0 commit comments

Comments
 (0)