-
Notifications
You must be signed in to change notification settings - Fork 383
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[DOC] Improve documentation for service account impersonation #2812
Comments
I found a few problems with this issue:
|
I think the principal (user) trying to impersonate the service account should also have the The official docs are here: https://cloud.google.com/docs/authentication/use-service-account-impersonation#required-roles
|
Thanks for looking at this. My account has the Owner role, and that includes all the necessary permissions afaik. I have also tried adding
I still get:
|
It seems like service account impersonation is the recommended way to authenticate for local development.
But it's not very clear how this is done in practice. Do I need to adapt my code for this?
I've run:
gcloud auth application-default login --impersonate-service-account SERVICE_ACCT_EMAIL
and I have a token in:
cat /Users/myuser/.config/gcloud/application_default_credentials.json
I have tried code like this (after having looked at #2800):
But then I got an error:
and this, I assumed this would pick up the ADC credentials file, notice its impersonation, and things would just work:
But then I got this error:
My local user has the Owner role in the GCP project. And has owner permissions on the service account. The service account has the
Service Account Token Creator
role.Im using
firebase-admin
v13.0.1Some working sample code for this would be very helpful.
The text was updated successfully, but these errors were encountered: