Bitbucket无法读取我的带有Google cloud service key的base64编码的json文件。我已经成功地对Bitbucket尝试解码的同一文件进行了编码和解码。但是由于base64: invalid input错误,Bitbucket无法做到这一点。以下是完整的错误消息:
Status: Downloaded newer image for bitbucketpipelines/google-app-engine-deploy:0.6.1
INFO: Setting up environment.
echo "${KEY_FILE}" | base64 -d >> /tmp/key-file.json
base64: invalid input
gcloud auth activate-service-account --key-file /tmp/key-file.json --quiet --verbosity=warning
ERROR: (gcloud.auth.activate-service-account) Could not read json file /tmp/key-file.json: Unterminated string starting at: line 3 column 17 (char 49)
gcloud config set project wowzers --quiet --verbosity=warning
Updated property [core/project].
INFO: Starting deployment to GCP app engine...
gcloud app --quiet deploy app.yaml --version=14 --promote --stop-previous-version --verbosity=debug --quiet --verbosity=warning
ERROR: (gcloud.app.deploy) You do not currently have an active account selected.据我所知,它在"project_id": "上失败了。解码后的文件如下所示:
{
"type": "service_account",
"project_id": "project-318",
"private_key_id": "...",
...
}我尝试先通过环境变量,然后通过文件提供我的base64编码的密钥文件。但也有同样的错误。当无法提取JSON时,bitbucket会写入以下错误:ERROR: (gcloud.auth.activate-service-account) Could not read json file /tmp/key-file.json: No JSON object could be decoded
发布于 2020-03-25 06:58:54
原来来自google cloud的密钥文件包含换行符:\n。所以结果base64编码的文件看起来也是这样的:
HhsUUrAkupWJ6vdesSRHwNhnPpgxByYT7z7HVBEPsrUpjLWdX6TQm4pHNJydsC34F
RvVYyBAedgLhWPPGPvU6UBJww3aNxQnJS95ZvKDBuNr5CNTtAgh6EgsattRrZtawH
fjphVs82UWZZFq3JUeGwGdTs88XWu6ejaPYZknnD94W7pU6Ds8vJHGhAnBw9FtkrA
gjp4UFZN2Yg9KJFSrTfFA6dUsp2dPVN6VzVfpqJzGrxbFBjWQAp4zK5TXhJaN4zDr
.....但为了将其传递给Bitbucket,您需要在一行中完成所有操作:
HhsUUrAkupWJ6vdesSRHwNhnPpgxByYT7z7HVBEPsrUpjLWdX6TQm4pHNJydsC34FRvVYyBAedgLhWPPGPvU6UBJww3aNxQnJS95ZvKDBuNr5CNTtAgh6EgsattRrZtawHfjphVs82UWZZFq3JUeGwGdTs88XWu6ejaPYZknnD94W7pU6Ds8vJHGhAnBw9FtkrAgjp4UFZN2Yg9KJFSrTfFA6dUsp2dPVN6VzVfpqJzGrxbFBjWQAp4zK5TXhJaN4zDr....在我手动删除新的线条符号后,它给出了成功消息:Activated service account credentials for: [project]
发布于 2020-03-25 11:17:48
我可以建议使用GCP的KMS (密钥管理服务)。解密base64非常容易,在KMS下,您需要具有相应的用户角色才能解密它。使用KMS的步骤是以下代码片段:
KEYRING=kubernetes-secrets
KEY=generic-type-encryption-key
gcloud kms keyrings create $KEYRING --location asia-east2
gcloud kms keys create $KEY --location asia-east2 \
--keyring $KEYRING \
--purpose encryption
gcloud kms encrypt --location asia-east2 \
--keyring $KEYRING \
--key $KEY \
--plaintext-file example.txt \
--ciphertext-file encrypted.example.txthttps://stackoverflow.com/questions/60838878
复制相似问题