Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Offer an easy and secure way to add additional service accounts for bucket access #909

Open
nkemnitz opened this issue Feb 19, 2025 · 3 comments

Comments

@nkemnitz
Copy link
Collaborator

Sometimes we need to access service accounts and buckets not managed by us. Back in SEAMLeSS days, we would add these as secret to the cluster and mount them in the deployment so that CloudFiles/CloudVolume would pick the correct credentials for each bucket.

Now that this is hardcoded, things are a bit more difficult. Or maybe there is another, even better way?

@supersergiy
Copy link
Member

Now the access is managed through the account used for gcloud auth application-default login. Instead of adding additional service accounts, we should just give the users access to those buckets.

@nkemnitz
Copy link
Collaborator Author

In this particular case, the destination bucket was not one of ours and write access only tolerated using the provided service account.
gcloud auth application-default login --impersonate-service-account SERVICE_ACCT_EMAIL might work, though... at least as long as I don't need to access a third bucket in the same zutils task with yet another service account.

@supersergiy
Copy link
Member

Is this because the client communicated access to us by giving a service account? Could we change the protocol to be such that they have to grant our users permission to the bucket instead?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants