-
Notifications
You must be signed in to change notification settings - Fork 154
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support for impersonated_service_account
type keys
#783
Comments
Thank you for your report. Could I ask for a traceback of this issue? I think the relevant code will end up being in the google-auth library and the traceback will verify that. Feel free to redact anything in the traceback that is specific to your code, and feel free to alternatively email the traceback to [email protected] if you prefer. |
The traceback
Dependencies:
|
Thank you! Based on this traceback, it does look like the issue is in google-auth. I'm afraid I have to close this bug on the Storage side, but hopefully the Auth library folks will be able to help. |
Looks like newer google-auth versions are able to handle this. Support was added in googleapis/google-auth-library-python#762 Can you see if you use the latest google-auth version @andrewsg |
@laszlocph The setup.py for this package does not require an updated version of google-auth but it does not preclude it either. Typically pip will install the most recent compatible version, and if it didn't in your case there must be a specific reason. Can you tell me what version of google-auth is installed on your system in particular? |
Is your feature request related to a problem? Please describe.
I'm trying to provide a scalable way for our developers to run their apps locally and be able to access buckets through a service account.
So far they used a shared service account key locally. The app loaded it and they were able to access the buckets.
I would prefer though to have personal keys instead, but would not want to distribute keys for each user.
Instead, I would like to use the already existing credentials of the
gcloud
tool.There is a feature that allows users to impersonate a service account, but there identity would be logged during this impersonation:
Using this feature though, this lib throws an error
I would want this library to support this relatively new way of authenticating to Google APIs.
Describe the solution you'd like
The feature is implemented in Golang and JAVA libraries, as described in this blog post:
https://medium.com/google-cloud/run-your-app-locally-as-if-you-were-on-google-cloud-2722e33e5656
The Golang solution: golang/oauth2#516
Describe alternatives you've considered
Both are subpar in terms of security and involved workload compared to the proposed solution.
Additional context
none
The text was updated successfully, but these errors were encountered: