Status Update
Comments
gr...@google.com <gr...@google.com>
sc...@google.com <sc...@google.com>
[Deleted User] <[Deleted User]> #2
Hello,
Thank you for reaching out to us!
I tried to reproduce this issue at my end. However, I am getting the intended behavior.
Please check the
Please let me know if that helped you with your use case and if there is anything else you would need assistance with.
Thank you
am...@broadinstitute.org <am...@broadinstitute.org> #3
> Scheme
> JavaScript origins must use the HTTPS scheme, not plain HTTP. Localhost URIs (including localhost IP address URIs) are exempt from this rule.
Subdomains of localhost (ie. foo.localhost) *are* "Localhost URIs" but are not currently exempt from the rule, contrary to the documentation.
ap...@deloittece.com.c-04dybahf.appstempdomain.goog <ap...@deloittece.com.c-04dybahf.appstempdomain.goog> #4
Hello,
Thank you for reaching out to us with your request.
We have duly noted your feedback and will thoroughly validate it. While we cannot provide an estimated time of implementation or guarantee the fulfillment of the issue, please be assured that your input is highly valued. Your feedback enables us to enhance our products and services.
We appreciate your continued trust and support in improving our Google Cloud Platform products. In case you want to report a new issue, Please do not hesitate to create a new issue on the
Once again, we sincerely appreciate your valuable feedback; Thank you for your understanding and collaboration.
az...@deloittece.com.c-04dybahf.appstempdomain.goog <az...@deloittece.com.c-04dybahf.appstempdomain.goog> #5
sk...@zencore.dev <sk...@zencore.dev> #6
va...@google.com <va...@google.com>
gh...@google.com <gh...@google.com>
ma...@1komma5grad.com <ma...@1komma5grad.com> #7
da...@mobilitydata.org <da...@mobilitydata.org> #8
My use case:
I was looking to add JWT authorization to a cloud-run service without having to handle the token verification in the cloud-run itself. With the help of the API Gateway, I can have multiple serverless services behind it to secure them and have a single point of access. However, without the ability to make the serverless services "private", this solution is not applicable as a potential attacker can call the cloud-run services directly. This means that API Gateway doesn't add much value to my use case.
[Deleted User] <[Deleted User]> #9
gi...@gmail.com <gi...@gmail.com> #10
API Gaateway without access to internal services adds no value. This needs to be addressed immediately
lu...@athena.studio <lu...@athena.studio> #11
iv...@atacadao.com.br <iv...@atacadao.com.br> #12
gu...@atacadao.com.br <gu...@atacadao.com.br> #13
ed...@joy.co <ed...@joy.co> #14
Any update in regards to this feature?
I think it is a serious security implication that API Gateway cannot have direct access to internal services.
pa...@shoper.pl <pa...@shoper.pl> #15
ok...@shoper.pl <ok...@shoper.pl> #16
ma...@dm.de <ma...@dm.de> #17
dp...@gmail.com <dp...@gmail.com> #18
ch...@mckinsey.com <ch...@mckinsey.com> #19
gd...@computas.com <gd...@computas.com> #20
ma...@thesting.com <ma...@thesting.com> #21
This would be a great addition, when setting up a microservice architecture i never expose the service itself but only a gateway
g....@gmail.com <g....@gmail.com> #22
de...@circle.dental <de...@circle.dental> #23
gi...@haulerhero.com <gi...@haulerhero.com> #24
sa...@sliceglobal.com <sa...@sliceglobal.com> #25
ma...@nure.ua <ma...@nure.ua> #26
hi...@srgplus.com <hi...@srgplus.com> #27
al...@wunderventures.com <al...@wunderventures.com> #28
gg...@farsightgen.com <gg...@farsightgen.com> #29
how soon might we expect a fix to this? Our conversion to GCP is gated by this functionality.
jv...@sura.cl <jv...@sura.cl> #30
ca...@gmail.com <ca...@gmail.com> #31
je...@sura.cl <je...@sura.cl> #32
cm...@sura.cl <cm...@sura.cl> #33
da...@umany.global <da...@umany.global> #34
ch...@sensotix.com <ch...@sensotix.com> #35
ee...@yource.cc <ee...@yource.cc> #36
cm...@legria.com <cm...@legria.com> #37
gu...@gmail.com <gu...@gmail.com> #38
an...@consileon.de <an...@consileon.de> #39
ve...@happtiq.com <ve...@happtiq.com> #40
Not addressing this when the ticket was created two years ago and has over a hundred upvotes is embarrassing.
be...@blakbear.com <be...@blakbear.com> #41
ka...@gmail.com <ka...@gmail.com> #42
pe...@gmail.com <pe...@gmail.com> #43
ge...@gmail.com <ge...@gmail.com> #44
ga...@gmail.com <ga...@gmail.com> #45
[Deleted User] <[Deleted User]> #46
ma...@qaecy.com <ma...@qaecy.com> #47
[Deleted User] <[Deleted User]> #48 Restricted+
mo...@dexcom.com <mo...@dexcom.com> #49
ch...@gmail.com <ch...@gmail.com> #50
ag...@gmail.com <ag...@gmail.com> #51
vi...@google.com <vi...@google.com> #52
Hello,
One more Cx is facing this issue related to this case- 51098348 and Cx asking for an ETA for this feature request. I would request to please take a look to implement this feature request as many users are facing this issue.
ed...@elysiumlab.io <ed...@elysiumlab.io> #53
Is there still an internal team working on API Gateway at Google that might have this feature on their roadmap?
Please advise, otherwise there is no sense in monitoring and waiting for this 2 year old request that many customers would like.
gi...@gmail.com <gi...@gmail.com> #54
mi...@sada.com <mi...@sada.com> #55
+1
da...@gmail.com <da...@gmail.com> #56
pa...@unilever.com <pa...@unilever.com> #57
ve...@happtiq.com <ve...@happtiq.com> #58
mo...@unilever.com <mo...@unilever.com> #59
eg...@gmail.com <eg...@gmail.com> #60
fe...@100esignature.com <fe...@100esignature.com> #61
zd...@peoplespheres.com <zd...@peoplespheres.com> #62
I'am asking a lot of questions about GCP product and if it is the best choice for our cloud move
Description
What you would like to accomplish:
That a Cloud Run service with ingress traffic set to Internal could accept requests from API Gateway in order to have a more secure app instead of using the all ingress which is the only option available for this setup.
How this might work:
When using API Gateway with Cloud Run, it should be possible to allow only internal traffic from Cloud Run in order to only allow traffic from within Cloud Run’s VPC Network.
Other information (workarounds you have tried, documentation consulted, etc):
For the time being the only workaround is to allow All traffic for the ingress setting.