You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
eoAPI services (especially the raster API) need to access COG files in S3 buckets. Instead of using long-lived credentials, use IRSA (IAM Roles for Service Accounts) for secure, temporary credential access:
All services using GDAL (raster API with titiler-pgstac) automatically use these credentials through their respective cloud SDKs. No environment variables or hardcoded credentials needed.
175
+
140
176
## Ingress Configuration
141
177
142
178
Unified ingress configuration supporting both NGINX and Traefik:
Now we are ready to install eoapi. See the [eoapi installation instructions](./helm-install.md) for more details.
127
+
128
+
# Configure Workload Identity for GCS Bucket Access
129
+
130
+
eoAPI services need to access COG files in GCS buckets. Use Workload Identity for secure, temporary credential access instead of long-lived credentials:
131
+
132
+
1.**Enable Workload Identity on your cluster** (if not already enabled):
133
+
```bash
134
+
gcloud container clusters update sandbox \
135
+
--workload-pool=PROJECT_ID.svc.id.goog \
136
+
--zone=us-central1-a
137
+
```
138
+
139
+
2.**Create a Google Service Account**:
140
+
```bash
141
+
gcloud iam service-accounts create eoapi-gcs-sa \
142
+
--display-name="eoAPI GCS Service Account"
143
+
```
144
+
145
+
3.**Grant GCS permissions** to the service account:
146
+
```bash
147
+
# For specific bucket access
148
+
gsutil iam ch serviceAccount:eoapi-gcs-sa@PROJECT_ID.iam.gserviceaccount.com:objectViewer gs://your-bucket-name
Copy file name to clipboardExpand all lines: docs/stac-auth-proxy.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,7 +12,7 @@ external_links:
12
12
13
13
## Solution Overview
14
14
15
-
We have implemented support for STAC Auth Proxy integration with EOAPI-K8S through service-specific ingress control. This feature allows the STAC service to be accessible only internally while other services remain externally available.
15
+
We have implemented support for STAC Auth Proxy integration with eoAPI-K8S through service-specific ingress control. This feature allows the STAC service to be accessible only internally while other services remain externally available.
0 commit comments