Skip to content

Connect to GCP CloudSQL by impersonating a service account #252

@josh-thisisbud

Description

@josh-thisisbud

Hey there,

It appears this provider is expecting to be able to use the environmental GCP credentials to access the project directly, however I need to either:

  • Provide it with the name of a service account to impersonate
  • Provide it with an already resolved oauth token for the service account I wish for it to use

The reason I can't use the existing setup is because TF is given a service account with only the permissions to impersonate other service accounts. The impersonated service accounts are the ones with the permissions to perform tasks in the projects on the DB instances.

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions