-
Notifications
You must be signed in to change notification settings - Fork 46
Document additive behavior of policies in Restricted API Access #480
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
Conversation
Adds documentation explaining that when multiple policies apply to the same Service Account, permissions are additive (union of all granted permissions). Fixes authzed#360
|
@ivanauth is attempting to deploy a commit to the authzed Team on Vercel. A member of the Team first needs to authorize it. |
vroldanbet
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM, please addres CI build errors
3233055 to
0547981
Compare
|
@vroldanbet done, thank you. |
|
The latest updates on your projects. Learn more about Vercel for GitHub.
|
|
@ivanauth I re-ran the failed jobs, can you address the errors? |
|
@vroldanbet thank you. The Link Checker failure is pre-existing on the The errors are:
All other checks pass (Lint, Spellcheck, Signature, Vercel Deploy). Happy to fix these pre-existing issues in this PR or a separate one if you'd like - just let me know! |
vroldanbet
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks for the context, @ivanauth. Sounds like those errors predate this PR; no reason to block because of them. LGTM!
|
Awesome, thank you @vroldanbet! |
Description
Adds documentation explaining that policies in Restricted API Access are additive. When multiple policies apply to the same Service Account, the resulting permissions are the union of all permissions granted by those policies.
This behavior isn't immediately obvious to users, so having it explicitly documented helps avoid confusion when configuring multiple policies for a single Service Account.
Fixes #360