Assigned
Status Update
Comments
fl...@gmail.com <fl...@gmail.com> #2
How this might work:
In AWS and Azure the wildcard is not expanded into actual permissions, which means it stays this way. A quick and dirty approach would be to expand any wildcards at creation time, but this is not what I am looking for as it makes it harder to manage/adapt.
wb...@google.com <wb...@google.com> #3
Hi and thanks for reaching out !
Can you provide a little more detailed description of the feature you want ? Like syntax examples etc ? It will make future work easier for a team that will handle this.
wb...@google.com <wb...@google.com> #4
I have created an internal feature request and a proper team will handle it. Please keep in mind that there's no ETA for this but you will be updated as soon anytning changes in this case.
[Deleted User] <[Deleted User]> #5
This is listed as assigned, but there's no progress, and honestly, this is a serious consideration for an organization when they're considering cloud providers, especially those embracing IaC and not wanting to spend hours typing out permission after permission because basic features that have existed for years in other clouds aren't here.
Is this actually planned to get attention anytime soon?
Is this actually planned to get attention anytime soon?
ng...@sycomp.com <ng...@sycomp.com> #6
Agreed...much needed feature.
Need to use this now and can't image having to code variety of resource types and conditions which will have to be maintained as new resources are added to our solution.
In general, I'm finding IAM a bit more cumbersome/overloaded including gcloud/portal compared to other cloud platforms.
Need to use this now and can't image having to code variety of resource types and conditions which will have to be maintained as new resources are added to our solution.
In general, I'm finding IAM a bit more cumbersome/overloaded including gcloud/portal compared to other cloud platforms.
fr...@gmail.com <fr...@gmail.com> #7
Any update?
aa...@ingka.ikea.com <aa...@ingka.ikea.com> #8
Is there an update eon the status of this feature?
Description
What you would like to accomplish:
I want to use wildcard-permissions like
compute.*.get
, andcompute.*.list
in GCP IAM role definitions.How this might work:
Make it work the same way as in Azure or AWS.
If applicable, reasons why alternative solutions are not sufficient:
I just had the case in which I assigned 129 permissions to an GCP IAM role manually (without wildcard). This makes the intent of the role definition exceptionally hard to grasp. And I know I can do wildcard-permission management with Azure and AWS.
Other information (workarounds you have tried, documentation consulted, etc):
NA