-
Notifications
You must be signed in to change notification settings - Fork 3
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
add required permissions for uploading image to a given bucket #1
base: vm-runners
Are you sure you want to change the base?
Conversation
Hey @msaligane, thanks for the PR. I tried reproducing your issue with permissions but I was unable to. After creating a GCP bucket using This is because after creating the bucket, it automatically gets the Storage Legacy Bucket Owner role assigned to the editors and owners of the project (which is the underlying assumption of README). Therefore, no changes need to be made to the permissions of the bucket Again, we're making the assertion that you have either editor or owner permissions in the project (which you will end up having if you're the one creating the project and that is the flow that is described in README). Regarding the It is important to note that any inability to perform operations on the storage bucket would result from your personal account having insufficient permissions (and not the default Compute Engine account), because that's what the |
Hi @AdamOlech Thanks for the review. My understanding on the usage of service accounts (SA), we should be using the SA associated to the VM instance. In other words, Google does not recommended using the personal account when working in VM instances. Does this make sense? Thanks! |
If you're trying to setup the runner from a Compute Engine instance then yes, it makes sense. The way we usually do this over at Antmicro (and such assumption is reflected in README), is we interact with the Compute Engine using personal developer machines. Because of that, we use our personal accounts to authenticate with
Yes, I think this sounds better than assigning permissions to the default instance account. To reiterate, doing so would result in all instances using the default service account (and any new instance that is created uses it unless specified otherwise) being able to perform read/write bucket operations within the project. |
When uploading the built runner image for GCP (command shown below)
The user encounters an error that is relevant to missing bucket permissions.
This PR translates manual settings in the GCloud console to portable commands in Linux
The following demonstrates the missing steps to generate the appropriate permissions for the service account that is uploading the image
sed
utility to insert required permissions associated with the bucketFYI @erictaur