Skip to content

Comments

use Podman secrets for gcloud ADC credentials#4

Open
ktdreyer wants to merge 1 commit intobbrowning:mainfrom
ktdreyer:podman-secrets-gcp-adc
Open

use Podman secrets for gcloud ADC credentials#4
ktdreyer wants to merge 1 commit intobbrowning:mainfrom
ktdreyer:podman-secrets-gcp-adc

Conversation

@ktdreyer
Copy link

@ktdreyer ktdreyer commented Feb 13, 2026

The gcloud bind mount fails silently when SELinux is in enforcing mode.

Even without SELinux, the container cannot read the file with rootless UID mapping.

Use Podman secrets to inject the credentials with tmpfs. This is a best-practice for secrets handling, and it bypasses the SELinux problem.

Fixes: #2

The gcloud bind mount fails silently when SELinux is in enforcing mode.

Even without SELinux, the container cannot read the file with rootless
UID mapping.

Use Podman secrets to inject the credentials with tmpfs. This is a
best-practice for secrets handling, and bypasses the SELinux problem.

Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
@ktdreyer ktdreyer force-pushed the podman-secrets-gcp-adc branch from 01d9a17 to 10ba468 Compare February 16, 2026 20:34
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

missing application_default_credentials.json inside paude container

1 participant