-
Notifications
You must be signed in to change notification settings - Fork 209
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Improvement: support for the friendly names of the builtin roles #3642
Comments
Good suggestion. (Leaving |
We're still interested in doing this. We would be open to contributions. I would be curious how BICEP/ARM templates or something like the CLI does this. Is it just a magical list of well-known names hardcoded, or is there some API to call? |
There's a REST API to call - {
"id": "/providers/Microsoft.Authorization/roleDefinitions/b24988ac-6180-42a0-ab88-20f7382dd24c",
"name": "b24988ac-6180-42a0-ab88-20f7382dd24c",
"properties": {
"assignableScopes": [
"/"
],
"createdBy": null,
"createdOn": "2015-02-02T21:55:09.8806423Z",
"description": "Grants full access to manage all resources, but does not allow you to assign roles in Azure RBAC, manage assignments in Azure Blueprints, or share image galleries.",
"permissions": [
{
"actions": [
"*"
],
"dataActions": [],
"notActions": [
"Microsoft.Authorization/*/Delete",
"Microsoft.Authorization/*/Write",
"Microsoft.Authorization/elevateAccess/Action",
"Microsoft.Blueprint/blueprintAssignments/write",
"Microsoft.Blueprint/blueprintAssignments/delete",
"Microsoft.Compute/galleries/share/action",
"Microsoft.Purview/consents/write",
"Microsoft.Purview/consents/delete",
"Microsoft.Resources/deploymentStacks/manageDenySetting/action"
],
"notDataActions": []
}
],
"roleName": "Contributor",
"type": "BuiltInRole",
"updatedBy": null,
"updatedOn": "2024-05-15T21:41:09.7999413Z"
},
"type": "Microsoft.Authorization/roleDefinitions"
}, Note how it's flagged as I'm wondering if we could use the new apiVersion: authorization.azure.com/v1api20200801preview
kind: RoleAssignment
metadata:
name: aso-sample-contributor
namespace: default
spec:
...
operatorSpec:
builtInRole: Contributor |
Describe the current behavior
Currently, RoleAssignment resource requires full
armId
value for the role which is big and unfriendly and requiressubscriptionId
to be present.Describe the improvement
Please add in addition support for a friendly name of the builtin role so that instead of this
user could use name of the role like this
The text was updated successfully, but these errors were encountered: