We implemented other approaches for authentication against the gcp api in the core already. Now, in this PR, this feature is being used by the dataplane to enhance the usage of google storage data-plane. Therefore, users can dynamically change their service account key file in run time by adding it into the vault and or adding it into the data address.
Further notes
Another approach for authentication is to create a Service Account key file and use it to retrieve the GoogleCredentials. Similar to Azure storage Data Plane, the key could be uploaded into the vault and be pointed in the keyname in the DataAddress.
What this PR changes/adds
We implemented other approaches for authentication against the gcp api in the core already. Now, in this PR, this feature is being used by the dataplane to enhance the usage of google storage data-plane. Therefore, users can dynamically change their service account key file in run time by adding it into the vault and or adding it into the data address.
Further notes
Another approach for authentication is to create a Service Account key file and use it to retrieve the GoogleCredentials. Similar to Azure storage Data Plane, the key could be uploaded into the vault and be pointed in the keyname in the DataAddress.
Linked Issue(s)
Closes #59