kops/pkg/model/gcemodel
justinsb 93a6871e9b gce: don't set per-IG permissions when using shared account
If we're using a cluster-level service-account, we shouldn't try to
set bucket permissions on a per-IG level.

For compatibility with the existing behavior, we simply don't set any
permissions in this case.
2021-12-28 10:10:16 -05:00
..
BUILD.bazel gce: Use ServiceAccount task when building model 2021-12-15 11:08:51 -05:00
OWNERS Fix area/provider/gcp GitHub label assignment 2021-12-01 22:43:43 -06:00
api_loadbalancer.go Initial IPv6 support for GCE 2021-08-21 20:09:31 -04:00
autoscalinggroup.go gce: use per instancegroup serviceaccounts 2021-12-17 12:57:14 -05:00
context.go Need to truncate gce serviceaccounts to max 30 characters 2021-12-17 12:57:14 -05:00
convenience.go simplify code and remove unused code 2019-12-17 00:28:35 +08:00
external_access.go Initial IPv6 support for GCE 2021-08-21 20:09:31 -04:00
firewall.go Run hack/update-gofmt.sh 2021-12-01 22:39:50 +02:00
network.go GCE: support egress specification 2021-10-26 21:37:03 -04:00
service_accounts.go gce: use per instancegroup serviceaccounts 2021-12-17 12:57:14 -05:00
storageacl.go gce: don't set per-IG permissions when using shared account 2021-12-28 10:10:16 -05:00