google-iam

Google Cloud Run Authentication Service-to-Service

放肆的年华 提交于 2020-05-27 06:14:46
问题 I have two services (APIs) deployed on GCP Cloud Run. Call them service-one.myDomain.com and service-two.myDomain.com . I would like service-one to be authenticated in calling service-two independently of what any user is doing. I've read and implemented the instructions from GCP Cloud Run docs on Authenticating service-to-service (https://cloud.google.com/run/docs/authenticating/service-to-service) but service-one.myDomain.com is unsuccessful in calling service-two.myDomain.com receiving a

how can I get my gcloud user creds into a container securely and use them to impersonate a service account when testing locally?

杀马特。学长 韩版系。学妹 提交于 2020-05-17 06:48:05
问题 Starting with this: users have their own google user accounts that are setup locally via gcloud login the application is using the gcp APIs in the usual way- by default it will look for GOOGLE_APPLICATION_CREDENTIALS, GCE roles, service accounts, or use the local users gcloud configured credentials when users run it locally it will use their own user account, when run in gcp it will use a service account The user's account also has access to impersonate the service account. So when running

Use user account Credential for reaching private Cloud Run/Cloud Functions

坚强是说给别人听的谎言 提交于 2020-05-17 06:12:45
问题 Here my use case. I already have a Cloud Run service deployed in private mode. (same issue with Cloud Function) I'm developing a new service that use this Cloud Run. I use the default credential in the application for the authentication. It worked on Compute Engine and on Cloud Run because the default credential is gotten from the metadata server. But, on my local environment, I need to use a service account key file for achieving this. (for example, when I set the GOOGLE_APPLICATION

invalid image name in cloud build when using domain-scoped project

隐身守侯 提交于 2020-05-11 13:01:35
问题 I'm trying to build a container with GCP's Cloud Build. I'm using the simple template from the quickstart doc. I've done this before successfully. However, this time I am using a project which is under an "organization". So the project ID is mycompany.com:projectX , rather than simply projectX . I am unable to get the build to complete. When I run: gcloud builds submit --tag gcr.io/mycompany.com:project-id/helloworld I get the following error: (gcloud.builds.submit) INVALID_ARGUMENT: invalid

invalid image name in cloud build when using domain-scoped project

折月煮酒 提交于 2020-05-11 12:58:48
问题 I'm trying to build a container with GCP's Cloud Build. I'm using the simple template from the quickstart doc. I've done this before successfully. However, this time I am using a project which is under an "organization". So the project ID is mycompany.com:projectX , rather than simply projectX . I am unable to get the build to complete. When I run: gcloud builds submit --tag gcr.io/mycompany.com:project-id/helloworld I get the following error: (gcloud.builds.submit) INVALID_ARGUMENT: invalid

How to list, find, or search iam policies across services (APIs), resource types, and projects in google cloud platform (GCP)?

六眼飞鱼酱① 提交于 2020-04-05 05:29:27
问题 In Google Cloud Platform (GCP), you can only get the IAM policy for a specific resource by calling getIamPolicy (get-iam-policy in gcloud). Is there a way to list, search, list, search, or find IAM policies across resources, services, or projects? This is needed to answer questions like: What roles does a service account have? Which resources are shared publicly? Do policies contain deleted users? Does a user still appear in any policies after they leave my company? Does a user has a given

How Can I Obtain GCP service account credentials on Google Cloud Run?

ⅰ亾dé卋堺 提交于 2020-03-05 06:07:51
问题 This page explains both: Obtaining and providing service account credentials manually for developing local, deploying on-premises, or deploying to another public cloud. Obtaining credentials on Compute Engine, Kubernetes Engine, App Engine flexible environment, and Cloud Functions But there is no mention of obtaining credentials on Cloud Run. I'd appreciate it if you give instructions for obtaining credentials and setting firebase-admin initializeApp and firebase initializeApp for

How Can I Obtain GCP service account credentials on Google Cloud Run?

柔情痞子 提交于 2020-03-05 06:06:28
问题 This page explains both: Obtaining and providing service account credentials manually for developing local, deploying on-premises, or deploying to another public cloud. Obtaining credentials on Compute Engine, Kubernetes Engine, App Engine flexible environment, and Cloud Functions But there is no mention of obtaining credentials on Cloud Run. I'd appreciate it if you give instructions for obtaining credentials and setting firebase-admin initializeApp and firebase initializeApp for

GCP equivalent of “deny” permissions in aws policy

我与影子孤独终老i 提交于 2020-01-16 08:34:09
问题 Is there a way to deny permissions in GCP custom role? For example, this is a policy in AWS that denies a set of actions on S3: { "Sid": "DenyS3", "Effect": "Deny", "Action": "s3:Get*", "Resource": "*" } Is there a way to define a similar custom role in GCP? 回答1: Is there a way to deny permissions in GCP custom role? No, IAM roles are deny by default and are additive only. How do i get permissions only on a specific image name? The classic use case for IAM roles is to assign them to the

What's the difference between Project Browser role and Project Viewer role in Google Cloud Platform

孤街醉人 提交于 2020-01-05 06:46:41
问题 According to the console popup, the Project Browser role has browse access to the project's resources while the Project Viewer has read access to those resources. Does this mean that with the browser role I can only list the filenames stored in the project's buckets but I need viewer role to download those files? 回答1: Does this mean that with the browser role I can only list the filenames stored in the project's buckets but I need viewer role to download those files? The browser role roles