-
Notifications
You must be signed in to change notification settings - Fork 11
refactor: new policies #4
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
refactor: new policies #4
Conversation
📝 WalkthroughWalkthroughThis PR introduces 17 new access control policy definitions and modifies 1 existing policy within a policy management system. Two configuration JSON files are updated to register the new policies, expand trusted issuer metadata, and enhance token metadata structures with user tracking and role-based principal mappings. Changes
Estimated code review effort🎯 3 (Moderate) | ⏱️ ~25 minutes Pre-merge checks and finishing touches❌ Failed checks (1 inconclusive)
✅ Passed checks (2 passed)
✨ Finishing touches🧪 Generate unit tests (beta)
Thanks for using CodeRabbit! It's free for OSS, and your support helps us grow. If you like it, consider giving us a shout-out. Comment |
|
Hi @SafinWasi Policies add much needed variety of examples to the demo 👍 Before merging, you'll need to take care of |
|
@ossdhaval unfortunately commits authored under Agama Lab are not GPG signed as that functionality is beyond the capacities of github app installation. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Actionable comments posted: 13
📜 Review details
Configuration used: Organization UI
Review profile: ASSERTIVE
Plan: Pro
📒 Files selected for processing (21)
449805c83e13f332b1b35eac6ffa93187fbd1c648085.json6d9f73b2d44ad4e7aa8f1182cde9f72dcbaa244f4327.jsontarpDemo/13b34711a196f382ade96677cefd513a2a6deff1b949.policytarpDemo/28e83add6e203af0d3814f06228e45a0eeb5c1269b08.policytarpDemo/420184da127304d1b2898761893a974096f6dbade45a.policytarpDemo/4ab79a92feac06a1a005373b741ed50e07d23d98f9a5.policytarpDemo/50c0ea31a9ed25a575b7538dec38cb953431651e7bec.policytarpDemo/689edd369c276afb5a163119dcd92c74196a4e0c7bdb.policytarpDemo/6e46e36071466cc37c0e9bbd65f16c51ea2ab152c6fc.policytarpDemo/76acfe86fb09731682f92c4fbf7d2e066813ce639404.policytarpDemo/870eaec25d9c8e9a642c4ed4d08b1ad480e6bc1348c7.policytarpDemo/91b2611a1ea9859cb7ce780ca16adf3b2a68f892786a.policytarpDemo/9e2f1520bd292765609e8ce57add8d3c134e3a91759d.policytarpDemo/b5111ecf0d218da2cdbece83aeb77cb6b479d3b5d85c.policytarpDemo/c367d06f19af8db1ec69354044334c799ff4cd2021ae.policytarpDemo/c4729e4ab456b4c8e74102593e5b32e04176bc837cc5.policytarpDemo/e459eba6691d141497dd1317e44d3d5b3bdd9fd65150.policytarpDemo/e76eb1853f0c6a199ca383cd9714e0113dfd851e079a.policytarpDemo/f38f10e80c6f429153cf97781a4c6bcf29761a04259f.policytarpDemo/fe83e4b2338614b970559ce4141b6d3e60559d79282c.policytarpDemo/fe84f983188f1639a03ed77c0753fc893fbe0d4cf155.policy
🔇 Additional comments (15)
tarpDemo/c4729e4ab456b4c8e74102593e5b32e04176bc837cc5.policy (1)
1-6: LGTM! Simple and well-structured policy.The policy correctly defines a permit rule allowing users to perform Compare actions on applications. The Cedar syntax is correct and the policy logic is straightforward.
tarpDemo/e459eba6691d141497dd1317e44d3d5b3bdd9fd65150.policy (1)
1-6: Sensitive resource access granted - verify role assignment process.This policy grants read access to SecretDocument for users in the "confidential" role. Ensure that the assignment of users to the "confidential" role is properly controlled and audited, as this grants access to sensitive documents.
tarpDemo/4ab79a92feac06a1a005373b741ed50e07d23d98f9a5.policy (1)
1-6: LGTM! Clean policy definition.The policy correctly defines a permit rule for users to tag applications. The syntax is correct and the logic is clear.
tarpDemo/91b2611a1ea9859cb7ce780ca16adf3b2a68f892786a.policy (1)
1-6: Broad permission granted - verify this aligns with security requirements.This policy allows all users to read applications without any conditions. Ensure this level of access is intended and aligns with the principle of least privilege for your security model.
tarpDemo/c367d06f19af8db1ec69354044334c799ff4cd2021ae.policy (1)
1-9: Good security practice with explicit deny rule.This forbid policy correctly implements fraud-based access denial. The syntax properly checks for the existence of
fraud_indicatorsbefore accessing it. In Cedar, forbid policies take precedence over permit policies, ensuring that fraudulent requests are blocked even if other policies would permit access.Verify that the "high_risk" string value matches the fraud indicator values set by your backend application when populating the request context.
tarpDemo/fe84f983188f1639a03ed77c0753fc893fbe0d4cf155.policy (1)
3-3: Standardize role naming conventions across policies.This policy uses capitalized role name "Editor", but other policies use inconsistent conventions: "confidential", "admin", and "security-admin" (lowercase), while "Teacher" and "Student" are capitalized. Apply a consistent naming convention (all lowercase or all capitalized) across all role definitions to prevent runtime authorization mismatches.
tarpDemo/fe83e4b2338614b970559ce4141b6d3e60559d79282c.policy (1)
6-9: Context attribute population and security validation are outside the scope of this policy file and must be verified at the enforcement point level.This policy's defensive check (
context has network &&) is sound, but the three underlying concerns cannot be verified within this quickstart repository because it contains only policy definitions and schema. The enforcement point implementation—which is responsible for populating context attributes, ensuring network classification security, and validating the "corp" designation—is not included in this repository. These validations need to be confirmed in the Cedarling framework or the consuming application.6d9f73b2d44ad4e7aa8f1182cde9f72dcbaa244f4327.json (1)
15-15: Schema includes all required types and properly supports new policies and actions.Verification confirms all components are correctly defined:
- All new actions (Compare, Share, Tag, Monitor, DELETE, Execute, GET, HEAD, PATCH, POST, PUT, Read, Search, Write) are present with proper
appliesTodefinitions- Resource types Application and SecretDocument are properly defined; Application includes attributes (app_id, name, url)
- Context attributes required for conditional policies are all defined: current_time, device_health, fraud_indicators, geolocation, network, network_type, operating_system, tokens, user_agent
- Role entity type is properly included and referenced
tarpDemo/76acfe86fb09731682f92c4fbf7d2e066813ce639404.policy (1)
5-5: Breaking change: Resource constraint narrowed to SecretDocument.The resource constraint changed from a generic
resourcetoresource is Jans::SecretDocument, which significantly narrows the policy scope. Verify that this is intentional and that Teacher role access to other resource types (if needed) is covered by other policies.tarpDemo/9e2f1520bd292765609e8ce57add8d3c134e3a91759d.policy (1)
1-6: LGTM!The policy correctly grants write access to
SecretDocumentresources only to principals in thesecurity-adminrole. The syntax and logic are sound.tarpDemo/6e46e36071466cc37c0e9bbd65f16c51ea2ab152c6fc.policy (1)
1-6: LGTM!The policy correctly permits any
Jans::Userentity to perform theSearchaction onApplicationresources. The syntax is valid Cedar.tarpDemo/50c0ea31a9ed25a575b7538dec38cb953431651e7bec.policy (1)
1-10: LGTM!The policy demonstrates proper attribute-based access control with Cedar. The
whenclause correctly guards against missing attributes by checkingprincipal has emailbefore accessingprincipal.email.domain.tarpDemo/13b34711a196f382ade96677cefd513a2a6deff1b949.policy (1)
1-6: LGTM!The policy correctly grants write access to
Applicationresources for principals in theadminrole. Syntax and logic are correct.449805c83e13f332b1b35eac6ffa93187fbd1c648085.json (2)
7-102: Policy registry looks consistent with policy files.The policy entries correctly register all new policies with appropriate descriptions. The base64-encoded
policy_contentfields match the corresponding.policyfiles in thetarpDemo/directory.
152-157: Verifytx_tokenconfiguration completeness.The
tx_tokenconfiguration is missing several fields that are present in other token types:required_claims,role_mapping,claim_mapping, andprincipal_mapping. If transaction tokens will be used for authorization decisions, this incomplete configuration may cause runtime issues.Is this intentional, or should
tx_tokenhave the same metadata fields as the other token types?
| "1985d6d8767b87d752035c9f9c0078daf057ad2cd5ea": { | ||
| "name": "Jans", | ||
| "description": "testIdp", | ||
| "description": "", | ||
| "openid_configuration_endpoint": "https://test-jans.gluu.info/.well-known/openid-configuration", |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
🧹 Nitpick | 🔵 Trivial
Consider adding a description for the trusted issuer.
The description field is empty. Adding a brief description would improve documentation and help maintainers understand the purpose of this issuer configuration.
🤖 Prompt for AI Agents
In 449805c83e13f332b1b35eac6ffa93187fbd1c648085.json around lines 105–108 the
trusted issuer entry with id "1985d6d8767b87d752035c9f9c0078daf057ad2cd5ea" has
an empty "description" field; add a concise, one-sentence description that
explains the issuer's purpose (e.g., environment, owner, or service it
represents) so maintainers understand why this issuer exists and any special
context.
| } | ||
| }, | ||
| "schema": "{"Jans":{"commonTypes":{"Context":{"type":"Record","attributes":{"current_time":{"type":"EntityOrCommon","required":false,"name":"Long"},"device_health":{"type":"Set","required":false,"element":{"type":"EntityOrCommon","name":"String"}},"fraud_indicators":{"type":"Set","required":false,"element":{"type":"EntityOrCommon","name":"String"}},"geolocation":{"type":"Set","required":false,"element":{"type":"EntityOrCommon","name":"String"}},"network":{"type":"EntityOrCommon","required":false,"name":"String"},"network_type":{"type":"EntityOrCommon","required":false,"name":"String"},"operating_system":{"type":"EntityOrCommon","required":false,"name":"String"},"user_agent":{"type":"EntityOrCommon","required":false,"name":"String"}}},"email_address":{"type":"Record","attributes":{"domain":{"type":"EntityOrCommon","name":"String"},"uid":{"type":"EntityOrCommon","name":"String"}}},"Url":{"type":"Record","attributes":{"host":{"type":"EntityOrCommon","name":"String"},"path":{"type":"EntityOrCommon","name":"String"},"protocol":{"type":"EntityOrCommon","name":"String"}}}},"entityTypes":{"Access_token":{"shape":{"type":"Record","attributes":{"aud":{"type":"EntityOrCommon","name":"String"},"exp":{"type":"EntityOrCommon","name":"Long"},"iat":{"type":"EntityOrCommon","name":"Long"},"iss":{"type":"EntityOrCommon","name":"TrustedIssuer"},"jti":{"type":"EntityOrCommon","required":false,"name":"String"},"nbf":{"type":"EntityOrCommon","required":false,"name":"Long"},"scope":{"type":"Set","required":false,"element":{"type":"EntityOrCommon","name":"String"}}}}},"Application":{"shape":{"type":"Record","attributes":{"app_id":{"type":"EntityOrCommon","name":"String"},"name":{"type":"EntityOrCommon","name":"String"},"url":{"type":"EntityOrCommon","name":"Url"}}}},"HTTP_Request":{"shape":{"type":"Record","attributes":{"header":{"type":"Record","attributes":{"Accept":{"type":"EntityOrCommon","required":false,"name":"String"}}},"url":{"type":"EntityOrCommon","name":"Url"}}}},"id_token":{"shape":{"type":"Record","attributes":{"acr":{"type":"EntityOrCommon","required":false,"name":"String"},"amr":{"type":"Set","required":false,"element":{"type":"EntityOrCommon","name":"String"}},"aud":{"type":"Set","element":{"type":"EntityOrCommon","name":"String"}},"azp":{"type":"EntityOrCommon","required":false,"name":"String"},"birthdate":{"type":"EntityOrCommon","required":false,"name":"String"},"email":{"type":"EntityOrCommon","required":false,"name":"email_address"},"exp":{"type":"EntityOrCommon","name":"Long"},"iat":{"type":"EntityOrCommon","name":"Long"},"iss":{"type":"EntityOrCommon","name":"TrustedIssuer"},"jti":{"type":"EntityOrCommon","required":false,"name":"String"},"name":{"type":"EntityOrCommon","required":false,"name":"String"},"phone_number":{"type":"EntityOrCommon","required":false,"name":"String"},"role":{"type":"Set","required":false,"element":{"type":"EntityOrCommon","name":"String"}},"sub":{"type":"EntityOrCommon","name":"String"}}}},"Role":{"shape":{"type":"Record","attributes":{}}},"SecretDocument":{"shape":{"type":"Record","attributes":{}}},"TrustedIssuer":{"shape":{"type":"Record","attributes":{"issuer_entity_id":{"type":"EntityOrCommon","name":"Url"}}}},"User":{"shape":{"type":"Record","attributes":{"email":{"type":"EntityOrCommon","required":false,"name":"email_address"},"id_token":{"type":"EntityOrCommon","required":false,"name":"id_token"},"phone_number":{"type":"EntityOrCommon","required":false,"name":"String"},"role":{"type":"Set","element":{"type":"EntityOrCommon","name":"String"}},"sub":{"type":"EntityOrCommon","name":"String"},"userinfo_token":{"type":"EntityOrCommon","required":false,"name":"Userinfo_token"},"username":{"type":"EntityOrCommon","required":false,"name":"String"}}},"memberOfTypes":["Role"]},"Userinfo_token":{"shape":{"type":"Record","attributes":{"aud":{"type":"EntityOrCommon","name":"String"},"birthdate":{"type":"EntityOrCommon","required":false,"name":"String"},"email":{"type":"EntityOrCommon","required":false,"name":"email_address"},"exp":{"type":"EntityOrCommon","required":false,"name":"Long"},"iat":{"type":"EntityOrCommon","required":false,"name":"Long"},"iss":{"type":"EntityOrCommon","name":"TrustedIssuer"},"jti":{"type":"EntityOrCommon","required":false,"name":"String"},"name":{"type":"EntityOrCommon","required":false,"name":"String"},"phone_number":{"type":"EntityOrCommon","required":false,"name":"String"},"role":{"type":"Set","required":false,"element":{"type":"EntityOrCommon","name":"String"}},"sub":{"type":"EntityOrCommon","name":"String"}}}},"Workload":{"shape":{"type":"Record","attributes":{"access_token":{"type":"EntityOrCommon","required":false,"name":"Access_token"},"client_id":{"type":"EntityOrCommon","name":"String"},"iss":{"type":"EntityOrCommon","name":"TrustedIssuer"},"name":{"type":"EntityOrCommon","required":false,"name":"String"},"rp_id":{"type":"EntityOrCommon","required":false,"name":"String"},"spiffe_id":{"type":"EntityOrCommon","required":false,"name":"String"}}}}},"actions":{"Compare":{"appliesTo":{"principalTypes":["User","Workload"],"resourceTypes":["Application"],"context":{"type":"Context"}}},"DELETE":{"appliesTo":{"principalTypes":["Workload"],"resourceTypes":["HTTP_Request"],"context":{"type":"Context"}}},"Execute":{"appliesTo":{"principalTypes":["User","Workload"],"resourceTypes":["Application"],"context":{"type":"Context"}}},"GET":{"appliesTo":{"principalTypes":["Workload"],"resourceTypes":["HTTP_Request"],"context":{"type":"Context"}}},"HEAD":{"appliesTo":{"principalTypes":["Workload"],"resourceTypes":["HTTP_Request"],"context":{"type":"Context"}}},"Monitor":{"appliesTo":{"principalTypes":["User","Workload"],"resourceTypes":["Application"],"context":{"type":"Context"}}},"PATCH":{"appliesTo":{"principalTypes":["Workload"],"resourceTypes":["HTTP_Request"],"context":{"type":"Context"}}},"POST":{"appliesTo":{"principalTypes":["Workload"],"resourceTypes":["HTTP_Request"],"context":{"type":"Context"}}},"PUT":{"appliesTo":{"principalTypes":["Workload"],"resourceTypes":["HTTP_Request"],"context":{"type":"Context"}}},"Read":{"appliesTo":{"principalTypes":["User","Workload"],"resourceTypes":["Application","SecretDocument"],"context":{"type":"Context"}}},"Search":{"appliesTo":{"principalTypes":["User","Workload"],"resourceTypes":["Application"],"context":{"type":"Context"}}},"Share":{"appliesTo":{"principalTypes":["User","Workload"],"resourceTypes":["Application"],"context":{"type":"Context"}}},"Tag":{"appliesTo":{"principalTypes":["User","Workload"],"resourceTypes":["Application"],"context":{"type":"Context"}}},"Write":{"appliesTo":{"principalTypes":["User","Workload"],"resourceTypes":["Application","SecretDocument"],"context":{"type":"Context"}}}}}}" | ||
| "schema": "{"Jans":{"commonTypes":{"Context":{"type":"Record","attributes":{"current_time":{"type":"EntityOrCommon","required":false,"name":"Long"},"device_health":{"type":"Set","required":false,"element":{"type":"EntityOrCommon","name":"String"}},"fraud_indicators":{"type":"Set","required":false,"element":{"type":"EntityOrCommon","name":"String"}},"geolocation":{"type":"Set","required":false,"element":{"type":"EntityOrCommon","name":"String"}},"network":{"type":"EntityOrCommon","required":false,"name":"String"},"network_type":{"type":"EntityOrCommon","required":false,"name":"String"},"operating_system":{"type":"EntityOrCommon","required":false,"name":"String"},"tokens":{"type":"EntityOrCommon","required":false,"name":"TokensContext"},"user_agent":{"type":"EntityOrCommon","required":false,"name":"String"}}},"email_address":{"type":"Record","attributes":{"domain":{"type":"EntityOrCommon","name":"String"},"uid":{"type":"EntityOrCommon","name":"String"}}},"TokensContext":{"type":"Record","attributes":{"total_token_count":{"type":"EntityOrCommon","name":"Long"}}},"Url":{"type":"Record","attributes":{"host":{"type":"EntityOrCommon","name":"String"},"path":{"type":"EntityOrCommon","name":"String"},"protocol":{"type":"EntityOrCommon","name":"String"}}}},"entityTypes":{"Access_token":{"shape":{"type":"Record","attributes":{"aud":{"type":"EntityOrCommon","required":false,"name":"String"},"exp":{"type":"EntityOrCommon","required":false,"name":"Long"},"iat":{"type":"EntityOrCommon","required":false,"name":"Long"},"iss":{"type":"EntityOrCommon","required":false,"name":"TrustedIssuer"},"jti":{"type":"EntityOrCommon","required":false,"name":"String"},"nbf":{"type":"EntityOrCommon","required":false,"name":"Long"},"scope":{"type":"Set","required":false,"element":{"type":"EntityOrCommon","name":"String"}},"token_type":{"type":"EntityOrCommon","required":false,"name":"String"},"validated_at":{"type":"EntityOrCommon","required":false,"name":"Long"}}},"tags":{"type":"Set","element":{"type":"EntityOrCommon","name":"String"}}},"Application":{"shape":{"type":"Record","attributes":{"app_id":{"type":"EntityOrCommon","name":"String"},"name":{"type":"EntityOrCommon","name":"String"},"url":{"type":"EntityOrCommon","name":"Url"}}}},"HTTP_Request":{"shape":{"type":"Record","attributes":{"header":{"type":"Record","attributes":{"Accept":{"type":"EntityOrCommon","required":false,"name":"String"}}},"url":{"type":"EntityOrCommon","name":"Url"}}}},"id_token":{"shape":{"type":"Record","attributes":{"acr":{"type":"EntityOrCommon","required":false,"name":"String"},"amr":{"type":"Set","required":false,"element":{"type":"EntityOrCommon","name":"String"}},"aud":{"type":"Set","required":false,"element":{"type":"EntityOrCommon","name":"String"}},"azp":{"type":"EntityOrCommon","required":false,"name":"String"},"birthdate":{"type":"EntityOrCommon","required":false,"name":"String"},"email":{"type":"EntityOrCommon","required":false,"name":"email_address"},"exp":{"type":"EntityOrCommon","required":false,"name":"Long"},"iat":{"type":"EntityOrCommon","required":false,"name":"Long"},"iss":{"type":"EntityOrCommon","required":false,"name":"TrustedIssuer"},"jti":{"type":"EntityOrCommon","required":false,"name":"String"},"name":{"type":"EntityOrCommon","required":false,"name":"String"},"phone_number":{"type":"EntityOrCommon","required":false,"name":"String"},"role":{"type":"Set","required":false,"element":{"type":"EntityOrCommon","name":"String"}},"sub":{"type":"EntityOrCommon","required":false,"name":"String"},"token_type":{"type":"EntityOrCommon","required":false,"name":"String"},"validated_at":{"type":"EntityOrCommon","required":false,"name":"Long"}}},"tags":{"type":"Set","element":{"type":"EntityOrCommon","name":"String"}}},"Role":{"shape":{"type":"Record","attributes":{}}},"SecretDocument":{"shape":{"type":"Record","attributes":{}}},"TrustedIssuer":{"shape":{"type":"Record","attributes":{"issuer_entity_id":{"type":"EntityOrCommon","name":"Url"}}}},"User":{"shape":{"type":"Record","attributes":{"email":{"type":"EntityOrCommon","required":false,"name":"email_address"},"id_token":{"type":"EntityOrCommon","required":false,"name":"id_token"},"phone_number":{"type":"EntityOrCommon","required":false,"name":"String"},"role":{"type":"Set","element":{"type":"EntityOrCommon","name":"String"}},"sub":{"type":"EntityOrCommon","name":"String"},"userinfo_token":{"type":"EntityOrCommon","required":false,"name":"Userinfo_token"},"username":{"type":"EntityOrCommon","required":false,"name":"String"}}},"memberOfTypes":["Role"]},"Userinfo_token":{"shape":{"type":"Record","attributes":{"aud":{"type":"EntityOrCommon","required":false,"name":"String"},"birthdate":{"type":"EntityOrCommon","required":false,"name":"String"},"email":{"type":"EntityOrCommon","required":false,"name":"email_address"},"exp":{"type":"EntityOrCommon","required":false,"name":"Long"},"iat":{"type":"EntityOrCommon","required":false,"name":"Long"},"iss":{"type":"EntityOrCommon","required":false,"name":"TrustedIssuer"},"jti":{"type":"EntityOrCommon","required":false,"name":"String"},"name":{"type":"EntityOrCommon","required":false,"name":"String"},"phone_number":{"type":"EntityOrCommon","required":false,"name":"String"},"role":{"type":"Set","required":false,"element":{"type":"EntityOrCommon","name":"String"}},"sub":{"type":"EntityOrCommon","required":false,"name":"String"},"token_type":{"type":"EntityOrCommon","required":false,"name":"String"},"validated_at":{"type":"EntityOrCommon","required":false,"name":"Long"}}},"tags":{"type":"Set","element":{"type":"EntityOrCommon","name":"String"}}},"Workload":{"shape":{"type":"Record","attributes":{"access_token":{"type":"EntityOrCommon","required":false,"name":"Access_token"},"client_id":{"type":"EntityOrCommon","name":"String"},"iss":{"type":"EntityOrCommon","required":false,"name":"TrustedIssuer"},"name":{"type":"EntityOrCommon","required":false,"name":"String"},"rp_id":{"type":"EntityOrCommon","required":false,"name":"String"},"spiffe_id":{"type":"EntityOrCommon","required":false,"name":"String"}}}}},"actions":{"Compare":{"appliesTo":{"principalTypes":["User","Workload"],"resourceTypes":["Application"],"context":{"type":"Context"}}},"DELETE":{"appliesTo":{"principalTypes":["Workload"],"resourceTypes":["HTTP_Request"],"context":{"type":"Context"}}},"Execute":{"appliesTo":{"principalTypes":["User","Workload"],"resourceTypes":["Application"],"context":{"type":"Context"}}},"GET":{"appliesTo":{"principalTypes":["Workload"],"resourceTypes":["HTTP_Request"],"context":{"type":"Context"}}},"HEAD":{"appliesTo":{"principalTypes":["Workload"],"resourceTypes":["HTTP_Request"],"context":{"type":"Context"}}},"Monitor":{"appliesTo":{"principalTypes":["User","Workload"],"resourceTypes":["Application"],"context":{"type":"Context"}}},"PATCH":{"appliesTo":{"principalTypes":["Workload"],"resourceTypes":["HTTP_Request"],"context":{"type":"Context"}}},"POST":{"appliesTo":{"principalTypes":["Workload"],"resourceTypes":["HTTP_Request"],"context":{"type":"Context"}}},"PUT":{"appliesTo":{"principalTypes":["Workload"],"resourceTypes":["HTTP_Request"],"context":{"type":"Context"}}},"Read":{"appliesTo":{"principalTypes":["User","Workload"],"resourceTypes":["Application","SecretDocument"],"context":{"type":"Context"}}},"Search":{"appliesTo":{"principalTypes":["User","Workload"],"resourceTypes":["Application"],"context":{"type":"Context"}}},"Share":{"appliesTo":{"principalTypes":["User","Workload"],"resourceTypes":["Application"],"context":{"type":"Context"}}},"Tag":{"appliesTo":{"principalTypes":["User","Workload"],"resourceTypes":["Application"],"context":{"type":"Context"}}},"Write":{"appliesTo":{"principalTypes":["User","Workload"],"resourceTypes":["Application","SecretDocument"],"context":{"type":"Context"}}}}}}" |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
🧹 Nitpick | 🔵 Trivial
Schema is base64-encoded; consider storing human-readable version.
The Cedar schema is stored as a base64-encoded blob, making it difficult to review changes and maintain. Consider storing a human-readable .cedarschema file alongside the JSON configuration for easier review and version control of schema changes.
🤖 Prompt for AI Agents
In 449805c83e13f332b1b35eac6ffa93187fbd1c648085.json around line 161 the
"schema" value is a base64-encoded Cedar schema which hinders reviews; decode
the base64 into a human-readable .cedarschema file committed alongside this
JSON, replace the long base64 blob in the JSON with either a short filename
reference (or the plain JSON-schema text) and update any load/serialization
logic or CI/build scripts to re-encode the file where necessary (add an
encode/decode step in CI or a small helper script) so repository stores a
readable schema while runtime still receives the original encoded form.
| @id("user_cannot_write_from_restricted_country") | ||
| forbid ( | ||
| principal is Jans::User, | ||
| action == Jans::Action::"Write", | ||
| resource is Jans::SecretDocument | ||
| ) when { | ||
| context has geolocation && | ||
| context.geolocation.contains("restricted") | ||
| }; No newline at end of file |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Add newline at end of file.
🤖 Prompt for AI Agents
In tarpDemo/28e83add6e203af0d3814f06228e45a0eeb5c1269b08.policy around lines 1
to 9, the file is missing a trailing newline; update the file to end with a
single newline character (ensure the last line breaks with \n) and save so the
file conforms to POSIX newline conventions.
| context has geolocation && | ||
| context.geolocation.contains("restricted") |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Security issue: Substring matching with .contains() will incorrectly block users from allowed countries.
The condition context.geolocation.contains("restricted") uses substring matching, which will incorrectly trigger for:
- ✅ "restricted" (intended)
- ❌ "unrestricted" (will incorrectly block users from allowed countries)
- ❌ "not_restricted" (will incorrectly block)
- ❌ "restricted_access_allowed" (may incorrectly block)
This could deny legitimate access to users operating from permitted locations.
🔎 Recommended fix using exact equality check
) when {
context has geolocation &&
- context.geolocation.contains("restricted")
+ context.geolocation == "restricted"
};If geolocation contains country codes or a list of restricted locations, use:
) when {
context has geolocation &&
- context.geolocation.contains("restricted")
+ ["CN", "IR", "KP", "SY"].contains(context.geolocation)
};📝 Committable suggestion
‼️ IMPORTANT
Carefully review the code before committing. Ensure that it accurately replaces the highlighted code, contains no missing lines, and has no issues with indentation. Thoroughly test & benchmark the code to ensure it meets the requirements.
| context has geolocation && | |
| context.geolocation.contains("restricted") | |
| context has geolocation && | |
| context.geolocation == "restricted" |
| context has geolocation && | |
| context.geolocation.contains("restricted") | |
| context has geolocation && | |
| ["CN", "IR", "KP", "SY"].contains(context.geolocation) |
🤖 Prompt for AI Agents
In tarpDemo/28e83add6e203af0d3814f06228e45a0eeb5c1269b08.policy around lines
7-8, the rule uses substring matching with
context.geolocation.contains("restricted") which will falsely match values like
"unrestricted" or "restricted_access_allowed"; replace the substring check with
an exact membership test: if geolocation is a single value compare for equality
to the exact restricted token, or if it can be a list/CSV parse it into an array
and test membership (e.g., split/trim then check includes) or use a
full-word/anchored match; ensure the comparison is case-normalized if needed and
update the policy to only block when a precise restricted entry is present.
| @id("user_cannot_execute_on_public_network") | ||
| forbid ( | ||
| principal is Jans::User, | ||
| action == Jans::Action::"Execute", | ||
| resource is Jans::Application | ||
| ) when { | ||
| context has network_type && | ||
| context.network_type == "public" | ||
| }; |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Policy logic is correct.
The condition properly uses exact equality (context.network_type == "public") to restrict execution on public networks. This is the correct approach for string matching in security contexts.
Add newline at EOF
The file should end with a newline character for POSIX compliance.
🤖 Prompt for AI Agents
In tarpDemo/420184da127304d1b2898761893a974096f6dbade45a.policy around lines 1
to 9, the file is missing a trailing newline at EOF; add a single newline
character at the end of the file so it ends with a newline (POSIX-compliant) and
save the file.
| @id("user_cannot_write_to_secretdocument") | ||
| forbid ( | ||
| principal is Jans::User, | ||
| action == Jans::Action::"Write", | ||
| resource is Jans::SecretDocument | ||
| ); No newline at end of file |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Policy logic is correct.
The unconditional forbid rule clearly restricts Jans::User principals from writing to SecretDocument resources. However, ensure a newline is added at the end of the file.
🔎 Add newline at EOF
The file should end with a newline character for POSIX compliance.
🤖 Prompt for AI Agents
In tarpDemo/870eaec25d9c8e9a642c4ed4d08b1ad480e6bc1348c7.policy around lines 1
to 6, the policy is correct but the file is missing a trailing newline; add a
single newline character at the end of the file (ensure the file ends with '\n')
so it conforms to POSIX/EOF conventions.
| @id("user_can_monitor") | ||
| permit ( | ||
| principal is Jans::User, | ||
| action == Jans::Action::"Monitor", | ||
| resource is Jans::Application | ||
| ); No newline at end of file |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Policy logic is correct.
The unconditional permit rule appropriately grants Jans::User principals the ability to monitor Jans::Application resources.
Add newline at EOF
The file should end with a newline character for POSIX compliance.
🤖 Prompt for AI Agents
In tarpDemo/b5111ecf0d218da2cdbece83aeb77cb6b479d3b5d85c.policy around lines 1
to 6, the policy is correct but the file is missing a trailing newline; to fix,
open the file and add a single newline character at the end of the file (ensure
the file ends with '\n') then save so it complies with POSIX EOF conventions.
| @id("user_can_execute") | ||
| permit ( | ||
| principal is Jans::User, | ||
| action == Jans::Action::"Execute", | ||
| resource is Jans::Application | ||
| ); No newline at end of file |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Policy logic is correct.
The unconditional permit rule appropriately grants Jans::User principals the ability to execute Jans::Application resources.
Add newline at EOF
The file should end with a newline character.
🤖 Prompt for AI Agents
In tarpDemo/e76eb1853f0c6a199ca383cd9714e0113dfd851e079a.policy around lines
1-6, the file is missing a trailing newline at EOF; simply add a single newline
character at the end of the file so it ends with a newline (ensure there is
exactly one newline and no extra whitespace after it).
| @id("cannot_write_if_not_admin") | ||
| forbid ( | ||
| principal is Jans::User, | ||
| action == Jans::Action::"Write", | ||
| resource is Jans::Application | ||
| ) when { | ||
| principal has role && | ||
| !principal.role.contains("admin") | ||
| }; No newline at end of file |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Add newline at end of file.
Cedar policy files should end with a newline character for POSIX compliance and better version control diffs.
🤖 Prompt for AI Agents
In tarpDemo/f38f10e80c6f429153cf97781a4c6bcf29761a04259f.policy around lines
1-9, the file is missing a trailing newline; update the file to ensure it ends
with a single newline character (POSIX EOF newline) so the file terminates with
'\n' and save/commit the change.
| principal has role && | ||
| !principal.role.contains("admin") |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Security issue: Substring matching with .contains() is unsafe for role validation.
The condition !principal.role.contains("admin") will match any string containing "admin" as a substring, including:
- ✅ "admin" (intended)
⚠️ "administrator" (likely unintended)⚠️ "not_admin" (unintended - would be blocked despite not being admin)⚠️ "domain_admin_user" (unintended)
This creates a security risk where users with roles like "not_admin" would be incorrectly denied access, and users with "administrator" might be incorrectly granted access (depending on intent).
🔎 Recommended fix using exact equality check
) when {
principal has role &&
- !principal.role.contains("admin")
+ principal.role != "admin"
};If role is a set/list of roles, use:
) when {
principal has role &&
- !principal.role.contains("admin")
+ !(principal.role.contains("admin"))
};But ensure the role value is exactly "admin", not a partial match. Consider using a dedicated admin role attribute or exact string equality.
🤖 Prompt for AI Agents
In tarpDemo/f38f10e80c6f429153cf97781a4c6bcf29761a04259f.policy around lines 7-8
the condition uses substring matching (!principal.role.contains("admin")) which
produces false positives/negatives; change it to an exact role check: if role is
a single string use equality (principal.role == "admin"), if role is a
collection check membership (!("admin" in principal.role) or
principal.role.containsExact("admin") depending on policy language), and also
normalize/trim the value (case/whitespace) if needed to avoid accidental
mismatches.
Must be merged after JanssenProject/jans#12833
Summary by CodeRabbit
New Features
Updates
✏️ Tip: You can customize this high-level summary in your review settings.