Skip to content

Commit 1ad209a

Browse files
authored
Merge pull request #100149 from bscott-rh/OSDOCS-16429
OSDOCS-16429 Reducing GCP permissions
2 parents 0cdf8bf + b7455e9 commit 1ad209a

File tree

2 files changed

+4
-3
lines changed

2 files changed

+4
-3
lines changed

modules/minimum-required-permissions-ipi-gcp-xpn.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ Ensure that the host project applies one of the following configurations to the
3939
* `roles/compute.networkUser`
4040
====
4141
42-
If you do not supply a service account for control plane nodes in the `install-config.yaml` file, please grant the below permissions to the service account in the host project. If you do not supply a service account for compute nodes in the `install-config.yaml` file, please grant the below permissions to the service account in the host project for cluster destruction.
42+
If you do not supply a service account for control plane nodes in the `install-config.yaml` file, please grant the following permissions to the service account in the host project. If you do not supply a service account for compute nodes in the `install-config.yaml` file, please grant the following permissions to the service account in the host project for cluster destruction. If you do supply service accounts for control plane and compute nodes, you do not need to grant the following permissions.
4343

4444
[%collapsible]
4545
====

modules/minimum-required-permissions-ipi-gcp.adoc

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@
88

99
When you attach the `Owner` role to the service account that you create, you grant that service account all permissions, including those that are required to install {product-title}.
1010

11-
If your organizations security policies require a more restrictive set of permissions, you can create link:https://cloud.google.com/iam/docs/creating-custom-roles[custom roles] with the necessary permissions. The following permissions are required for the installer-provisioned infrastructure for creating and deleting the {product-title} cluster.
11+
If your organization's security policies require a more restrictive set of permissions, you can create link:https://cloud.google.com/iam/docs/creating-custom-roles[custom roles] with the necessary permissions. The following permissions are required for the installer-provisioned infrastructure for creating and deleting the {product-title} cluster.
1212

1313
.Required permissions for creating network resources
1414
[%collapsible]
@@ -96,13 +96,15 @@ If your organization’s security policies require a more restrictive set of per
9696
* `iam.serviceAccountKeys.get`
9797
* `iam.serviceAccountKeys.list`
9898
* `iam.serviceAccounts.actAs`
99+
** This permission can be limited to act as the control plane and compute service accounts. Alternatively, you may grant the service account that the installation program uses the `iam.serviceAccountUser` role on the control plane and compute service accounts.
99100
* `iam.serviceAccounts.create`
100101
* `iam.serviceAccounts.delete`
101102
* `iam.serviceAccounts.get`
102103
* `iam.serviceAccounts.list`
103104
* `resourcemanager.projects.get`
104105
* `resourcemanager.projects.getIamPolicy`
105106
* `resourcemanager.projects.setIamPolicy`
107+
** This permission is not required if you use `credentialsMode: Manual` and supply your own service accounts for compute and control plane nodes.
106108
====
107109
108110
.Required permissions for creating compute resources
@@ -268,7 +270,6 @@ If your organization’s security policies require a more restrictive set of per
268270
* `iam.serviceAccounts.get`
269271
* `iam.serviceAccounts.list`
270272
* `resourcemanager.projects.getIamPolicy`
271-
* `resourcemanager.projects.setIamPolicy`
272273
====
273274
274275
.Required permissions for deleting compute resources

0 commit comments

Comments
 (0)