You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Is your feature request related to a problem or challenge? Please describe what you are trying to do.
Hello, I deploy my application to GCP GKE and in order to authorize to GCP Object Storage I am using a workload identity as described by the GCP documentation
The problem I am facing is that default is not the right service account, I would like to use the one defined when attaching the iam service account to the kubernetes one.
I think we should add configuration to specify the name of the service account you want to use. I am not sure the implication but it sounds good to use the service_account_key if present, if not we can use default as we do today.
Describe alternatives you've considered
I can generate a credential file and authenticate with another method but this one looks like the way to go suggested by GCP itself.
Additional context
The text was updated successfully, but these errors were encountered:
I cannot find any documentation about calling the metadata endpoint with anything other than default, when you would do this, or what its behaviour would be. But crucially the docs would indicate that for workload identity you should call the metadata endpoint with default as the current code does.
Is it possible your cluster isn't configured with workload identity enabled?
Is your feature request related to a problem or challenge? Please describe what you are trying to do.
Hello, I deploy my application to GCP GKE and in order to authorize to GCP Object Storage I am using a workload identity as described by the GCP documentation
https://cloud.google.com/kubernetes-engine/docs/how-to/workload-identity#authenticating_to
The problem I am facing is that
default
is not the right service account, I would like to use the one defined when attaching the iam service account to the kubernetes one.https://github.com/apache/arrow-rs/blob/master/object_store/src/gcp/credential.rs#L325-L331
Describe the solution you'd like
I think we should add configuration to specify the name of the service account you want to use. I am not sure the implication but it sounds good to use the
service_account_key
if present, if not we can usedefault
as we do today.Describe alternatives you've considered
I can generate a credential file and authenticate with another method but this one looks like the way to go suggested by GCP itself.
Additional context
The text was updated successfully, but these errors were encountered: