You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The current workload identity pool, used to authenticate the GitHub Action so that it can access GCP resources, is managed manually on the staging and production projects. We have a newer workload identity pool that is managed via Terraform and monitored by the oncall rotation. We should switch over to this, which will require coordination with oncall to make sure the WLI pool is set up properly to support token exchanges with this repo and that the service account has access to the root-signing GCP resources.
The text was updated successfully, but these errors were encountered:
Leaving this open as a reminder, but this requires no work at this time. Blocked by #929: Once we switch over to TUF-on-CI to manage this repo, we'll also switch to a new KMS key, which will be accessed by a service account tuf-gha where workload identity federation is managed through the managed workload identity pool.
This is done for prod as of #1111. Staging will happen once we switch management of the GCS bucket over to sigstore/root-signing-staging, which is tracked elsewhere.
Description
The current workload identity pool, used to authenticate the GitHub Action so that it can access GCP resources, is managed manually on the staging and production projects. We have a newer workload identity pool that is managed via Terraform and monitored by the oncall rotation. We should switch over to this, which will require coordination with oncall to make sure the WLI pool is set up properly to support token exchanges with this repo and that the service account has access to the root-signing GCP resources.
The text was updated successfully, but these errors were encountered: