在服务边界内保护代码库
VPC Service Controls 可帮助您降低未经授权从 Trusted Cloud by S3NS托管服务中复制或转移数据的风险。
借助 VPC Service Controls,您可以为 Trusted Cloud by S3NS管理的服务的资源配置安全边界,并控制跨边界的数据移动。
搭配使用 Artifact Registry 与 VPC Service Controls
如果您在服务边界内的项目中使用 Artifact Registry 和 Google Kubernetes Engine 专用集群,则可以访问服务边界内的容器映像以及 Trusted Cloud by S3NS提供的映像。
如需了解入站和出站规则,请参阅入站和出站规则。
您可以使用默认 Google API 和服务网域的 IP 地址或以下特殊 IP 地址访问 Artifact Registry:
199.36.153.4/30
(restricted.s3nsapis.fr
)
199.36.153.8/30
(private.s3nsapis.fr
)
如需详细了解这些选项,请参阅配置专用 Google 访问通道。如需查看使用 199.36.153.4/30
(restricted.s3nsapis.fr
) 的示例配置,请参阅使用虚拟 IP 进行注册表访问文档。
确保 Trusted Cloud by S3NS 需要访问 Artifact Registry 的服务也在服务边界内,包括 Google Kubernetes Engine 等运行时环境。请参阅
支持的服务列表,详细了解每项服务。
如需了解如何将 Artifact Registry 添加到服务边界,请参阅创建服务边界。
访问 gcr.io
代码库中的图片
如需访问 Artifact Registry gcr.io
仓库中的映像,请在设置入站或出站政策时使用身份类型 ANY_IDENTITY。您无法对 gcr.io
网域中的图片使用身份类型 ANY_SERVICE_ACCOUNT 或 ANY_USER_ACCOUNT。
如未另行说明,那么本页面中的内容已根据知识共享署名 4.0 许可获得了许可,并且代码示例已根据 Apache 2.0 许可获得了许可。有关详情,请参阅 Google 开发者网站政策。Java 是 Oracle 和/或其关联公司的注册商标。
最后更新时间 (UTC):2025-08-18。
[[["易于理解","easyToUnderstand","thumb-up"],["解决了我的问题","solvedMyProblem","thumb-up"],["其他","otherUp","thumb-up"]],[["没有我需要的信息","missingTheInformationINeed","thumb-down"],["太复杂/步骤太多","tooComplicatedTooManySteps","thumb-down"],["内容需要更新","outOfDate","thumb-down"],["翻译问题","translationIssue","thumb-down"],["示例/代码问题","samplesCodeIssue","thumb-down"],["其他","otherDown","thumb-down"]],["最后更新时间 (UTC):2025-08-18。"],[[["VPC Service Controls enhances security by allowing you to configure perimeters around Google Cloud-managed services and manage data movement across these boundaries."],["When using Artifact Registry within a service perimeter, you can access container images inside the perimeter as well as Google Cloud-provided images, but cached Docker Hub images on `mirror.gcr.io` require an added egress rule."],["To enable `mirror.gcr.io` access within a service perimeter, you need to add a specific egress rule that allows the `artifactregistry.googleapis.com/DockerRead` method to access the specified project."],["Artifact Registry can be accessed using default Google APIs and services domains' IP addresses, or special IPs like `199.36.153.4/30` (`restricted.googleapis.com`) and `199.36.153.8/30` (`private.googleapis.com`)."],["Ensure that other Google Cloud services requiring access to Artifact Registry, such as Binary Authorization and Google Kubernetes Engine, are also within the service perimeter."]]],[]]