Skip to content

Conversation

nazarewk
Copy link

For some unknown time GCP WIF can be used directly to access any kind of GCP resources without impersonating Service Account, this PR implements this flow.

fixes #87

@nazarewk
Copy link
Author

Could probably use some additional tests, I have tested it empirically by using on a live cluster.

@ordovicia ordovicia self-requested a review January 16, 2025 06:07

# optional: Defaults to value inside `service-account-email`
#
cloud.google.com/project: "12345"
Copy link
Contributor

@sl1pm4t sl1pm4t Jul 14, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

It's not obvious whether this needs to be the project ID or the project Number.

If it's normally parsed out of the SA then it seems it should be the Project ID, but the example here has a number?!

Unless "SA" means Kubernetes SA, and the project number is parsed out of workload identity provider annotation?

Either way, it would be clearer if the annotation name was explicit (e.g. projectID or projectNumber)

Copy link
Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I am not sure whether it matters. I'm not working with GCP for a while already so I can't test, but I remember most of the tools calling the field project and accepting both numerical IDs and project names.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

Manage credentials without GCP Service Account as a middleman

3 participants