Why does adkgo deploy cloudrun need Secret Manager Secret Accessor role? #571
Replies: 3 comments
-
|
The related issue is why doesn't |
Beta Was this translation helpful? Give feedback.
-
|
After perusing the source, and the generated Dockerfile: FROM gcr.io/distroless/static-debian11
COPY main /app/main
EXPOSE 8080
# Command to run the executable when the container starts
CMD ["/app/main", "web", "-port", "8080", "api", "-webui_address", "127.0.0.1:8081", "a2a", "--a2a_agent_url", "http://127.0.0.1:8081", "webui", "--api_server_address", "http://127.0.0.1:8081/api"]I can just forgo using |
Beta Was this translation helpful? Give feedback.
-
|
The confusing part here is that there are really two separate questions hidden in one deploy failure. One is why the generated deployment binds to the default compute service account, and the other is why the deployment path assumes GOOGLE_API_KEY should come from Secret Manager instead of plain env injection. |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
I'm trying to deploy to cloud run, using this bash script:
Getting this error output:
Why is it trying to use the default compute account? And why does it need GOOGLE_API_KEY defined in Secret Manager?
I do regular deployments to Cloud Run all the time and none of my deployments require Secret Manager. ENVs defined in CI/CD and Docker images. It works just fine.
Beta Was this translation helpful? Give feedback.
All reactions