-
Notifications
You must be signed in to change notification settings - Fork 508
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat: Add impersonated service account to gcloud default credentials #728
base: master
Are you sure you want to change the base?
Conversation
@@ -147,13 +149,14 @@ digraph d_front_back { | |||
1. Use self-signed JWT flow to create an access token locally. | |||
1. If certificate is presented, embed the certificate into the JWT. | |||
1. Use the regular [self-signed JWT flow][4] for an access token. _[END]_ | |||
1. Use user identity flow to exchange for an access token. _[END]_ | |||
1. Use the gcloud default credential to exchange for an access token. _[END]_ |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Can you link this flow to 4113? Something like:
Use the gcloud default credential to exchange for an access token. [END]
target principal to impersonate. All other service accounts are delegates. For | ||
more information about the ‘--impersonate-service-account’ flag, please read | ||
the help text of [gcloud][0]. For more information about service account | ||
impersonation, please read the **TODO(silvano@ will submit his PR)**. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Lets remove the TODO here and add this sentence with the impersonation PR.
applications **should** call [IAM APIs][5] to request a short-lived access | ||
token of the impersonated service account. The access token of the impersonated | ||
service account **should** be used to authenticate the request to GCP APIs. | ||
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Can you add a change log section here?
@@ -27,8 +33,8 @@ credentials. | |||
|
|||
### Credentials Generation | |||
|
|||
gcloud default credentials can be generated via command ‘[gcloud auth | |||
application-default login][2]’. | |||
gcloud default credentials can be generated via command [gcloud auth |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
We can have two sections here:
Gcloud User Credential
...
Impersonated Service Account
...
No description provided.