Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Switch to managed workload identity pool #957

Closed
haydentherapper opened this issue Sep 12, 2023 · 3 comments
Closed

Switch to managed workload identity pool #957

haydentherapper opened this issue Sep 12, 2023 · 3 comments
Assignees
Labels
enhancement New feature or request

Comments

@haydentherapper
Copy link
Contributor

Description

The current workload identity pool, used to authenticate the GitHub Action so that it can access GCP resources, is managed manually on the staging and production projects. We have a newer workload identity pool that is managed via Terraform and monitored by the oncall rotation. We should switch over to this, which will require coordination with oncall to make sure the WLI pool is set up properly to support token exchanges with this repo and that the service account has access to the root-signing GCP resources.

@haydentherapper
Copy link
Contributor Author

Leaving this open as a reminder, but this requires no work at this time. Blocked by #929: Once we switch over to TUF-on-CI to manage this repo, we'll also switch to a new KMS key, which will be accessed by a service account tuf-gha where workload identity federation is managed through the managed workload identity pool.

@haydentherapper
Copy link
Contributor Author

Note there are a bunch of WLI pools in use in this repo currently.

  • A managed WLI pool to grant impersonation for managed service accounts. This will be used going forward to grant access to SAs that manage KMS and GCS
  • A WLI pool in the TUF KMS key project. This project will get cleaned up after proposal: Use TUF-on-CI to maintain root-signing #929
  • A WLI pool in the production project for GCS access, which will be removed once we switch over to the new tuf-gha SA

@haydentherapper
Copy link
Contributor Author

This is done for prod as of #1111. Staging will happen once we switch management of the GCS bucket over to sigstore/root-signing-staging, which is tracked elsewhere.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request
Projects
None yet
Development

No branches or pull requests

1 participant