Tetap teratur dengan koleksi
Simpan dan kategorikan konten berdasarkan preferensi Anda.
Halaman ini merangkum persyaratan umum untuk men-deploy artefak ke
lingkungan runtimeGoogle Cloud .
Ada dua bentuk kontrol akses yang perlu dipertimbangkan:
Izin IAM
Izin Identity and Access Management menentukan pengguna, akun layanan, dan
identitas lainnya yang dapat mengakses
resource. Anda memberikan
izin Artifact Registry
kepada identitas yang dapat mengakses repositori.
Access scopes
Cakupan akses menentukan cakupan OAuth default untuk permintaan yang dibuat melalui gcloud CLI dan library klien pada instance VM. Akibatnya, cakupan akses dapat lebih membatasi akses ke metode API saat mengautentikasi dengan kredensial default aplikasi.
Lingkungan runtimeGoogle Cloud dikonfigurasi sebelumnya dengan akses ke repositori dalam project yang sama. Anda harus mengonfigurasi atau mengubah izin
sendiri jika:
Anda menggunakan akun layanan di satu project untuk mengakses Artifact Registry di project lain
Anda menggunakan akun layanan dengan akses hanya baca ke penyimpanan, tetapi
ingin akun layanan mengupload dan mendownload artefak
Anda menggunakan akun layanan kustom untuk berinteraksi dengan Artifact Registry.
Untuk persyaratan khusus layanan, lihat informasi berikut:
[[["Mudah dipahami","easyToUnderstand","thumb-up"],["Memecahkan masalah saya","solvedMyProblem","thumb-up"],["Lainnya","otherUp","thumb-up"]],[["Sulit dipahami","hardToUnderstand","thumb-down"],["Informasi atau kode contoh salah","incorrectInformationOrSampleCode","thumb-down"],["Informasi/contoh yang saya butuhkan tidak ada","missingTheInformationSamplesINeed","thumb-down"],["Masalah terjemahan","translationIssue","thumb-down"],["Lainnya","otherDown","thumb-down"]],["Terakhir diperbarui pada 2025-08-18 UTC."],[[["\u003cp\u003eThis page outlines the general requirements for deploying artifacts to Google Cloud runtime environments.\u003c/p\u003e\n"],["\u003cp\u003eAccess to resources is controlled through IAM permissions, determining which identities can access repositories.\u003c/p\u003e\n"],["\u003cp\u003eAccess scopes further limit API method access when authenticating with application default credentials.\u003c/p\u003e\n"],["\u003cp\u003eGoogle Cloud environments have default access to repositories in the same project, requiring manual configuration for cross-project access or service accounts with modified permissions.\u003c/p\u003e\n"],["\u003cp\u003eService-specific deployment requirements can be found for App Engine, Cloud Run, Compute Engine, and Google Kubernetes Engine.\u003c/p\u003e\n"]]],[],null,["# Deploy to Google Cloud\n\nThis page summarizes general requirements for deploying artifacts to\nGoogle Cloud runtime environments.\n\nThere are two forms of access control to consider:\n\nIAM permissions\n: Identity and Access Management permissions determine the users, service accounts and other\n [identities](/iam/docs/overview#concepts_related_identity) that can access\n resources. You grant\n [Artifact Registry permissions](/artifact-registry/docs/access-control#permissions)\n to identities that can access repositories.\n\nAccess scopes\n: [Access scopes](/compute/docs/access/service-accounts#accesscopesiam) determine the\n default OAuth scopes for requests made through the gcloud CLI and client\n libraries on a VM instance. As a result, access scopes can further limit\n access to API methods when authenticating with\n [application default credentials](/docs/authentication/production).\n\nGoogle Cloud runtime environments are preconfigured with access to\nrepositories in the same project. You must configure or modify permissions\nyourself if:\n\n- You are using a service account in one project to access Artifact Registry in a different project\n- You are using a service account with read-only access to storage, but you want the service account to both upload and download artifacts\n- You are using a custom service account to interact with Artifact Registry.\n\nFor service-specific requirements, refer to the following information:\n\n- [App Engine flexible environment](/artifact-registry/docs/integrate-app-engine)\n- [Cloud Run](/artifact-registry/docs/integrate-cloud-run)\n- [Compute Engine](/artifact-registry/docs/integrate-compute)\n- [Google Kubernetes Engine](/artifact-registry/docs/integrate-gke)"]]