Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Draft: feat(gcp-kms): impersonate service account #1150

Draft
wants to merge 3 commits into
base: main
Choose a base branch
from

Conversation

eraac
Copy link

@eraac eraac commented Dec 4, 2022

Implementation of the possibility of impersonate service account to call the GCP KMS api.

I'm not 100% familiar with the project yet, I'm not sure I've done the work correctly, feel free to point my errors if any

For the unit tests, I guess I can probably add test for the sops metadata to ensure the gcp_impersonate_service_account is correctly set, but I need to be guide a bit here. Otherwise concerning the feature itself, I've no idea how to test it (except manually)

I still have to update the README, I'll do this tomorrow done

Thanks for the review ❤️

@eraac eraac changed the title draft: feat(gcp-kms): impersonate service account Draft: feat(gcp-kms): impersonate service account Dec 4, 2022
@eraac
Copy link
Author

eraac commented Dec 4, 2022

I got the same kind of issue from aws-profile #634

I want to use default application credential for encrypt (developpers credentials), and another one via impersonate for decrypt (CI). The current workaround is to edit encrypted file metadata, but isn't very conveniant ...

But unfortunately, this change seems to be more complicated and I guess isn't related to this PR

@eraac eraac marked this pull request as draft December 4, 2022 13:03
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant