Assigned
Status Update
Comments
ro...@google.com <ro...@google.com> #2
I have forwarded this request to the engineering team. We will update this issue with any progress updates and a resolution.
Best Regards,
Josh Moyer
Google Cloud Platform Support
Best Regards,
Josh Moyer
Google Cloud Platform Support
js...@google.com <js...@google.com> #3
This is not only useful for IP addresses, but also for many other resources. I understand that names are currently used as identifiers, so this request is probably not trivial to implement. Maybe distinguishing between a (numeric, automatically generated) identifier and a (textual) label is the way to go?
an...@qyberion.com <an...@qyberion.com> #4
Is it any hope? We have migrated our IP address to the server with different role, and now the name of this IP address resource doesn't match its role at all. It seems to be trivial enough to momentary reserve static IP address of the old named resource, drop resource, and immediately recreate it with the new name and the old IP address.
ro...@ml6.eu <ro...@ml6.eu> #5
This would also improve life when using the Google Deployment Manager (since it otherwise error's out if you've changed a name of an IP)
Description
Problem you have encountered:
(1) We want to require an API key for most of our methods. This as AND requirement along either a Google ID token or a Firebase token. So for almost all our methods we use the following security:
(2) For security reasons, we have been asked to avoid the
key
parameter showing up in logs. So we also want to allow the API key as headerx-api-key
like this:(3) However, we have learned that Endpoints dev portal’s “Try this API” works only with “query”, not with “headers”. If we configured “headers”, we see this error in the “Try this API” box:
Furthermore, API key definition limitations states that “one of the following schemes” is required. It sounds like we can use only either "header" or "query" on any method at any given time.
What you expected to happen:
I expected, that defining "header" schema would work with Endpoints dev portal's "Try this API" feature. It does not.
However, only "query" works with the feature. But surprisingly, if we define "query", the portal feature works, and clients can still send the
x-api-key
header instead of the query.Although the current behavior is desirable for us, as it meets all our requirements, I feel unsettled because it seems to be in contradiction to the documentation. Maybe the documentation is outdated or could be improved.
I just don’t want us to get problems if this is not supposed to actually work, and a patch on Google’s side could break our deployed APIs.
Can you please confirm, that we can safely rely on this behavior and that it isn't a bug that will be patched away?
Steps to reproduce:
(1) Define this as security definition for API keys:
(2) Try this API in Cloud Endpoints dev portal will work.
(3) And you still can send a request with the API key in the header
x-api-key
. It seems to work, but in contradiction to my understanding of the documentation.Other information (workarounds you have tried, documentation consulted, etc):