-
Notifications
You must be signed in to change notification settings - Fork 827
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Try to simplify storage permissions #2007
Comments
#2010 should allow us to perform 1 (should research more before flipping that switch though) Also ensures org admins can list, get, update any bucket within the org. Specifically does nothing about whether they can access multipartUploads or objects. |
Based on review of #2094, here are some example buckets that appear to have per-object ACLs enabled:
|
The Kubernetes project currently lacks enough contributors to adequately respond to all issues and PRs. This bot triages issues and PRs according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle stale |
/area infra |
/area access |
/priority backlog |
/remove-priority backlog |
The Kubernetes project currently lacks enough contributors to adequately respond to all issues and PRs. This bot triages issues and PRs according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle stale |
The Kubernetes project currently lacks enough active contributors to adequately respond to all issues and PRs. This bot triages issues and PRs according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle rotten |
/remove-lifecycle rotten |
Followup based on #2005
For whatever reason, I am still confused by exactly which permissions are available to whom on which GCS buckets. I've started consulting a spreadsheet I put together to help figure out what makes sense from a policy perspective. I've been trying keep GCS IAM best practices in mind, as well as the guidance that basic roles aren't a great idea for production environments.
Three things currently bug me:
roles/viewer
are grantedstorage.objects.get
(ref: https://cloud.google.com/storage/docs/access-control/iam-roles#basic-roles-modifiable)storage.buckets.list
on a per-bucket basis exceptroles/storage.admin
What I think we can do to address:
constraints/storage.uniformBucketLevelAccess
at the org level (ref: https://cloud.google.com/resource-manager/docs/organization-policy/org-policy-constraints). This wouldn't suddenly wipe out existing per-object ACLs. The only per-object ACLs I am currently aware of are related to billing data in kubernetes-public, and I'm optimistic they can be removed in favor of the bucket's IAM policy.storage.bucketLister
role and trying to apply it on a per-bucket basis (we do this today withsecretmanager.secretLister
)projectOwner:roles/legacyBucketOwner
, and replace with directroles/storage.admin
or a custom storage admin role that removestorage.buckets.delete
References:
The text was updated successfully, but these errors were encountered: