Skip to content

"Inherited" permissions not included in policy response #1326

@david-crespo

Description

@david-crespo

When a user has read access on an org (for example) they get read access on projects under that org. But when you pull the policy on a project, they will not show up in there because their role is on the org, not on the project. That means the Access & IAM page in the console for that project can be empty, even while the current user can clearly see the project because they're looking at it.

Not sure what the right solution is here, but it's a big problem on the frontend. The client could pull the org and silo permissions and merge them somehow, but that really feels like API logic. Since a given resources has a pretty short chain of parent resources, pulling the policy on each resource in the chain (e.g., project, org, and silo) might not be too bad and could be done in a single query. Maybe more interesting is figuring out how to represent that in the response in a reasonable way.

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions