feat: add support for passing access tokens, or access token credential files to the keyring as environment variables #44
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Sometimes, there are scenarios where keyring needs to be invoked from a docker container, and you would probably not want to install 'gcloud' in your docker container to keep it light weight. in these cases, its easier for the developer to create the access config file using gcloud outside the docker build, and then passing them as a docker secret.
a specific scenario: while using google cloud build along with docker buildkit, the google auth keyring does not work, because the docker builder needs to be building on --network=cloudbuild, but --network=cloudbuild is an unsupported network on docker buildkit builder