-
Notifications
You must be signed in to change notification settings - Fork 383
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Mismatched signature when signing with impersonated credentials #1239
Comments
Are you sure they are using the expected service account for impersonation (the one they use in workload identity federation)? (the same one that has the necessary permission on the resource) |
Sounds like we need to write a system test with some AWS credentials. |
We already have an AWS integration test and a test for signBlob with workload identity federation. This issue is unlikely to be specific to AWS. We need to confirm the above before we can investigate it. |
I can confirm I am using the expected service account, yes 👍 |
Any update on this yet? |
Not yet. Will keep you posted. |
@bojeil-google do you have an estimated timeline for this work? |
FYI @lsirac |
…credentials Currently, creating signed storage URLs does not work for external account credentials because the storage library expects client_email to be returned from GoogleAuth.getCredentials(). Changing the logic so the same client email that is used to the sign the blob (extracted from the Service Account Impersonation URL) is returned from the getCredentials() call. Fixes googleapis#1239
…credentials (#1397) * fix: Fixing Implementation of GoogleAuth.sign() for external account credentials Currently, creating signed storage URLs does not work for external account credentials because the storage library expects client_email to be returned from GoogleAuth.getCredentials(). Changing the logic so the same client email that is used to the sign the blob (extracted from the Service Account Impersonation URL) is returned from the getCredentials() call. Fixes #1239 * addressing code review comments * addressing code review comments
A user of the cloud storage node library has reported an issue when trying to sign URLs using Workload Identity Federation. The sign url feature of the library ultimately uses GoogleAuth.sign(), so in this case I think it should be resolving to the recently implemented case for signing with impersonated credentials. Evidently, it does sign, it just produces a different signature than when the credentials and private key are used directly. Possibly some issue where the wrong email ends up getting used?
The text was updated successfully, but these errors were encountered: