-
Notifications
You must be signed in to change notification settings - Fork 309
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Warn when using user credentials from the Cloud SDK #266
Conversation
google/auth/_default.py
Outdated
information, please see | ||
_HELP_MESSAGE = """\ | ||
Could not automatically determine credentials. Please set {env} or \ | ||
explicitly create credential and re-run the application. For more \ |
This comment was marked as spam.
This comment was marked as spam.
Sorry, something went wrong.
Hi @theacodes & @crwilcox, Each time we run a BigQuery request we now get this warning. Does this warn every time a user makes a request with their credentials? If so, is that balancing information and noise well? My understanding is that there are lots of legitimate uses of user accounts. I'm also a committer of https://github.com/pydata/pandas-gbq under @tswast, where we intentionally fully support user credentials - potentially conflicting with this warning. Thanks |
One reason I made googleapis/python-bigquery-pandas#161 is to make it easier to explicitly use user credentials when those are desired. In pandas-gbq you can disable default credentials by setting the |
This warning shows up every time you call |
Yeah, it's also on my list to cache the credentials in pandas-gbq. :-) |
Can you help me understand why this warns? We use this code path for all our research. (then when we deploy to GKE it resolves to the service account) I can understand that running servers on user auth is bad, but presumably lots of non-server applications are going to hit this code path? |
I summarized over at #271 (comment)
Also requiring users to install a 300mb SDK that they may not need just to auth for a script is massive overkill. @maxim-lian are you using pandas-gbq? If so, it's already equipped to do the right thing™ here and obtain authorization itself. |
That comment makes sense on the intention. Forgive me if these questions seem pedestrian (and @tswast has already spent lots of time hand-holding me through some auth questions): what would you recommend for us? We run a set of processes that interact with google services extensively - e.g. read & write to BQ, GCS. We run these on local containers when we're doing research, and then on GKE in production. User accounts are extremely convenient (much more so than having everyone create a service account, and then managing permissions for those in parallel to user permissions). Is this a ClientID issue? Should we be using a different one? Feel free to point me towards documentation if it's out there. Thanks |
With local containers, my recommendation would be to let pandas-gbq do the user auth flow. Revoke the default credentials with
to make |
Thanks Tim Would this generalize to using GCS, for example? |
No, it doesn't generalize to GCS, unless we create a The |
No description provided.