You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@airflow.apache.org by GitBox <gi...@apache.org> on 2020/06/25 17:12:53 UTC

[GitHub] [airflow] amithmathew edited a comment on issue #8803: Impersonate service accounts while running GCP Operators without key material (if airflow is running on GCP)

amithmathew edited a comment on issue #8803:
URL: https://github.com/apache/airflow/issues/8803#issuecomment-649709601


   Thanks Kamil. I don't think this statement is accurate in the context I was proposing - "The implementation of this feature in the current Airflow architecture meant that DAG or the operator could access the access key or service account file that allows you to log in to any other account. This is unacceptable."
   
   The account used by the airflow worker can impersonate another service account only if granted the appropriate permissions through IAM, so I don't think you can log into *any* account. Secondly, even when using a secrets backend, your DAGs still have permissions to access any secret in there (unless I'm missing something).
   
   [This](https://cloud.google.com/iam/docs/understanding-service-accounts#directly_impersonating_a_service_account) is the relevant documentation.
   
   Not having to deal with key material allows for -
    1: Do not have to deal with key rotations.
    2: When airflow operations is centralized in an organization, eliminate any coordination required for key management and transfer for setup - everything is controlled through IAM.
    3: Controlling IAM access through terraform becomes easier, no key generation, transfer or load required.
   
   I may be missing something, of course!


----------------------------------------------------------------
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

For queries about this service, please contact Infrastructure at:
users@infra.apache.org