Skip to content

Conversation

@terryyanko
Copy link

@terryyanko terryyanko commented Sep 23, 2024

Related to: percona/roadmap#26

For workloads running on GCE, fetch the service account token from the metadata server to allow for access to GCP services without explicit keys.

Tested successfully with local mongo and GCE metadata server emulator

@it-percona-cla
Copy link

it-percona-cla commented Sep 23, 2024

CLA assistant check
All committers have signed the CLA.

@terryyanko terryyanko marked this pull request as ready for review September 23, 2024 17:30
@defbin defbin added this to the next milestone Sep 29, 2024
}
providers = append(providers, &credentials.StaticProvider{Value: credentials.Value{
AccessKeyID: "GCP_OAUTH_TOKEN",
SecretAccessKey: "GCP_OATH_TOKEN",
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

is GCP_OATH_TOKEN a typo?

Copy link
Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Sorry for the delay, no not a typo, the fields are mandatory but they're just set to placeholder values here since they're not used for GCS.

@defbin defbin removed this from the 2.8.0 milestone Nov 14, 2024
Co-authored-by: Ege Güneş <[email protected]>
Timeout: 100 * time.Millisecond,
}

req, err := http.NewRequest("GET", "http://169.254.169.254/computeMetadata/v1/", nil)
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

shouldn't "http://metadata.google.internal" be used instead of the hardcoded IP?

@radoslawszulgo radoslawszulgo changed the title Add support for Workload Identity Authentication PBM-1504 Add support for Workload Identity Authentication Feb 24, 2025
@davidswimbird
Copy link

Any status updates here?

Would be a nice addition to not have to keep long-lived credentials within our GKE cluster.

@boris-ilijic
Copy link
Member

Hi @terryyanko,
Thanks for this contribution. Finally we're ready to move forward with the feature.
Therefore please rebase your PR on top of dev and we'll start to review it, and soon after that we expect to merge it.

@boris-ilijic
Copy link
Member

boris-ilijic commented Dec 9, 2025

Would be a nice addition to not have to keep long-lived credentials within our GKE cluster.

Hey @davidswimbird, it's nice that you are showing interest for this feature and agree, we'll try to add it as part of PBM's next release.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

7 participants