Replies: 3 comments
-
Beta Was this translation helpful? Give feedback.
-
Thank you for the feedback! Regarding the features:
Regarding the concerns:
|
Beta Was this translation helpful? Give feedback.
-
The main feature here that is supported across both the metadata server and IAM is the ability to add the MDS also supports a few other flags (format and licenses); I can imagine somebody might find these useful, but they're not something I have a use case for. Since they're only available in certain scenarios (compute instance, no impersonation), it seems like it'd be harder to have in a library (it's surprising if the flags fail in some contexts). So I wouldn't expect these to be included. |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
I understand from some of the discussion in #364 that ID tokens are possibly in scope for this library?
If so, I just wanted to provide some feedback on what I would like in that area, and some concerns about what is currently there:
Features I think are needed:
Using the IAM API for some aspects of this potentially cause a circular dependency, maybe makes ID token handling better suited as a separate library to access token auth?
Concerns:
I'm not personally convinced that this should be represented by the current Credentials type. I should be able to use the current credentials, as I would want to create access tokens and ID tokens for the same identity, without having to configure the library twice.
Some aspects of the Credentials trait are not well suited to ID tokens:
.get_id_token(cloud_run_audience)
, without having to hold 10 different credential structures. For example, consider a reverse proxy to many different CR instances. Ideally, the caching (if it exists) works by audience.x-serverless-authorization
, and sometimesauthorization
. And as ID tokens support JWK validation, it's possible to use them in completely user-invented protocols.I would also say that I would never want to replace a Google access token source with an ID token source - the target audiences are completely disjoint; one is validated by Google, the other can be validated using standard OAuth approaches. So forcing them to use the same trait doesn't offer much to benefit the user.
I recognize that some of this is different from what exists in other Google APIs, e.g. Java (in https://github.com/googleapis/google-auth-library-java/tree/main/oauth2_http/java/com/google/auth/oauth2) models
IdToken
as a subtype ofAccessToken
. I consider this a mistake (there is not an is a relationship here, ID tokens do not have scopes, etc.).All the above is just my personal opinion; happy if any of it is of help.
Beta Was this translation helpful? Give feedback.
All reactions