-
Notifications
You must be signed in to change notification settings - Fork 17
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add document for CI setup with GCP #310
Conversation
doc/ci-gcp-setup.md
Outdated
|
||
* Open the [Service accounts](https://console.developers.google.com/iam-admin/serviceaccounts) page. If prompted, select a project. | ||
* Click `Create service account`. | ||
* In the `Create service account` window, type a name for the service account, and select `Furnish a new private key`. If you want to grant [G Suite domain-wide authority](https://developers.google.com/identity/protocols/OAuth2ServiceAccount#delegatingauthority) to the service account, also select `Enable G Suite Domain-wide Delegation`. Then click `Save`. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
How is this "G Suite domain-wide authority" thing relevant to the setup?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Not sure. Lorenzo did the major part of the initial setup so I am not sure if he used it or not.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I doubt we need it anyway
doc/ci-gcp-setup.md
Outdated
* Click `Create service account`. | ||
* In the `Create service account` window, type a name for the service account, and select `Furnish a new private key`. If you want to grant [G Suite domain-wide authority](https://developers.google.com/identity/protocols/OAuth2ServiceAccount#delegatingauthority) to the service account, also select `Enable G Suite Domain-wide Delegation`. Then click `Save`. | ||
|
||
Your new public/private key pair is generated and downloaded to your machine; it serves as the only copy of this key. `You are responsible for storing it securely`. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I think that instead of using backticks to accent the message about storing the keys securely, you could use double asterisks **this will be bold**
-> this will be bold.
@krnowak it is ready for another review 🎉 |
Hmph, forgot about this PR. LFAD. |
I'd like @indradhanush to have a look at it, just in case. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM with some nitpicks. No problem if they are ignored as well. 👍
doc/ci-gcp-setup.md
Outdated
``` | ||
|
||
### No Auth Provider found for name "gcp" | ||
k8s.io/client-go/plugin/pkg/client/auth/gcp package was added fix the error |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Nitpick: `k8s.io/client-go/plugin/pkg/client/auth/gcp` vs k8s.io/client-go/plugin/pkg/client/auth/gcp
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Nitpick: "was added to fix the error:"
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Could you also add a short section about existing issues and add one about images and clusters not being deleted if a build was cancelled?
Signed-off-by: Kosy Anyanwu <kosy@kinvolk.io>
a729c8f
to
8eb0829
Compare
@krnowak @indradhanush ready for another review 😎 |
No description provided.