Load Application Default CredentialsSource:
Loads credentials from a file identified via a search strategy known as
Application Default Credentials (ADC). The hope is to make auth "just work"
for someone working on Google-provided infrastructure or who has used Google
tooling to get started, such as the
gcloud command line tool.
A sequence of paths is consulted, which we describe here, with some abuse of
notation. ALL_CAPS represents the value of an environment variable and
is used in the spirit of a null coalescing operator.
GOOGLE_APPLICATION_CREDENTIALS/application_default_credentials.json CLOUDSDK_CONFIG# on Windows: %||% SystemDrive %||% C:)\gcloud\application_default_credentials.json (APPDATA # on not-Windows: ~/.config/gcloud/application_default_credentials.json
If the above search successfully identifies a JSON file, it is parsed and
ingested as a service account, an external account ("workload identity
federation"), or a user account. Literally, if the JSON describes a service
account, we call
credentials_service_account() and if it describes an
external account, we call
A character vector of scopes to request. Pick from those listed at https://developers.google.com/identity/protocols/oauth2/scopes.
For certain token flows, the
"https://www.googleapis.com/auth/userinfo.email"scope is unconditionally included. This grants permission to retrieve the email address associated with a token; gargle uses this to index cached OAuth tokens. This grants no permission to view or send email and is generally considered a low-value scope.
Additional arguments passed to all credential functions.
An optional subject claim. Specify this if you wish to use the service account represented by
pathto impersonate the
subject, who is a normal user. Before this can work, an administrator must grant the service account domain-wide authority. Identify the user to impersonate via their email, e.g.
subject = "email@example.com". Note that gargle automatically adds the non-sensitive
"https://www.googleapis.com/auth/userinfo.email"scope, so this scope must be enabled for the service account, along with any other