[feature] Support other gcp project's gcr images to be pulled by service account with workload identity
See original GitHub issueFeature Area
/area backend
What feature would you like to see?
Current workload identity supports multiple project for calling normal APIs, but we cannot pull images on other project’s container registry even if the google service account has enough storage permissions (ErrImagePull occurs).
I don’t know who can handle better (GCP’s backend or Kubeflow Pipelines), but I confirmed that we can pull images after calling gcloud configure-docker
.
What is the use case or pain point?
With this supported, we can easily call other GCP project’s API on Kubeflow Pipelines easily.
Is there a workaround currently?
We can use normal kubernetes secret for imagePullSecret.
Love this idea? Give it a 👍. We prioritize fulfilling features with the most 👍.
Issue Analytics
- State:
- Created 2 years ago
- Comments:6 (6 by maintainers)
Top Results From Across the Web
Use Workload Identity | Google Kubernetes Engine (GKE)
Workload Identity allows workloads in your GKE clusters to impersonate Identity and Access Management (IAM) service accounts to access Google Cloud services ...
Read more >Mapping Kubernetes Service Accounts to GCP IAMs using ...
The first thing we need to do is enable Workload Identity on the GKE cluster. The Identity Namespace, which is statically defined in...
Read more >Workload Identity Federation is not working with GCP KMS ...
I say cosign as is the packages used in the linked PR. The google/cloud-sdk:slim image used SDK version 364.0.0 (extracted from Dockerfile )....
Read more >Authorize Google Cloud SDK - CircleCI
If you are having issues pushing container images to GCR you may need more granular permissions than the default service account provides. You...
Read more >Add a Google Cloud Platform (GCP) Connector - Harness Docs
Open a Harness Project. In Project Setup, click Connectors. Click New Connector, and click GCP. The GCP Connector settings appear. In ...
Read more >Top Related Medium Post
No results found
Top Related StackOverflow Question
No results found
Troubleshoot Live Code
Lightrun enables developers to add logs, metrics and snapshots to live code - no restarts or redeploys required.
Start FreeTop Related Reddit Thread
No results found
Top Related Hackernoon Post
No results found
Top Related Tweet
No results found
Top Related Dev.to Post
No results found
Top Related Hashnode Post
No results found
Top GitHub Comments
In my organization we grant permission to nodepoolSA. I suppose docker pull secrets might work as well. However default-editor/pipeline-runner does not pull images and hence granting permission to it will not work.
A GKE nodepool has a VM service account. This is used to pull images. You need to grant storage permission to this SA.