-
Notifications
You must be signed in to change notification settings - Fork 378
New issue
Have a question about this project? # for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “#”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? # to your account
[DOC] Improve documentation for service account impersonation #2812
Comments
I found a few problems with this issue:
|
I think the principal (user) trying to impersonate the service account should also have the The official docs are here: https://cloud.google.com/docs/authentication/use-service-account-impersonation#required-roles
|
Thanks for looking at this. My account has the Owner role, and that includes all the necessary permissions afaik. I have also tried adding
I still get:
|
It seems like service account impersonation is the recommended way to authenticate for local development.
But it's not very clear how this is done in practice. Do I need to adapt my code for this?
I've run:
gcloud auth application-default login --impersonate-service-account SERVICE_ACCT_EMAIL
and I have a token in:
cat /Users/myuser/.config/gcloud/application_default_credentials.json
I have tried code like this (after having looked at #2800):
But then I got an error:
and this, I assumed this would pick up the ADC credentials file, notice its impersonation, and things would just work:
But then I got this error:
My local user has the Owner role in the GCP project. And has owner permissions on the service account. The service account has the
Service Account Token Creator
role.Im using
firebase-admin
v13.0.1Some working sample code for this would be very helpful.
The text was updated successfully, but these errors were encountered: