Coder Social home page Coder Social logo

hexa-org / policy-mapper Goto Github PK

View Code? Open in Web Editor NEW
3.0 3.0 2.0 1.04 MB

Policy Mapper defines packages for use in mapping of Identity Policy between Hexa IDQL and other formats.

License: Apache License 2.0

Go 99.21% Shell 0.15% Open Policy Agent 0.64%
aws bind cedar cel gcp hexa idql

policy-mapper's People

Contributors

barinek avatar ggebel avatar independentid avatar saurabh-io avatar

Stargazers

 avatar  avatar  avatar

Watchers

 avatar  avatar

policy-mapper's Issues

Add Support for IDQL Scopes

This adds support for Scopes which are obligations returned to a PEP. For example a SQL Filter, or IDQL Filter, or a set of attributes or columns allowed to be returned.

Use cases:

  • SQL Servers (filters expressed as WHERE clauses)
  • SCIM (use IDQL Filter expressions)
  • LDAP (can convert IDQL filter to LDAP filter)

Fix random test failures in hexa_policy_test.go

Issues with using pass by reference was causing occasional failures.

A for loop in hexa_policy was not resetting the reference but allowed random passes. By forcing direct use of objects, the reference problem is blocked.

Breaking change:
PolicyDif struct -> PolicyExist attribute is no longer passed by reference.

Fix Slice error in Options

When no credential is required (and thus not supplied), the hexa cli will panic building WithHttpOptions

Add Export Integration Function to Hexa CLI

The export function enables an administrator to export an existing integration to a json file that can be used by the web admin of Policy-Orchestrator

In particular Hexa CLI can be used to create itnegration files by doing the following:

hexa add opa http mybundle --cacert=ca-cert.pem --url=https://mybundlerserver:8889/
hexa export mybundle mybundleserver.json

Enhance Cedar mapper to support when true

For some reason, the default policy generated by AVP often includes a when { true }; clause

permit(
  principal,
  action in [hexa_avp::Action::"ReadAccount",hexa_avp::Action::"Transfer",hexa_avp::Action::"Deposit",hexa_avp::Action::"Withdrawl"],
  resource
) when {
  true
};

The above when clause should be converted or just ignored.

Remove ProjectId from OpaProvider

Unlike projectid in AWS providers or GCP provider, projectid is never actually used. Instead the platform project is wrapped up in the bundle url and the access token.

This is important to simplify and avoid confusion.

SDK: Complete Provider Support of WithHttpClient Option

Occasionally for testing purposes and other integration work there is the need to initialize a custom HTTP Client when calling cloud APIs. For example, the custom client can mock the remote server and its responses.

This is currently implemented inside many of Hexa Providers but is not yet exposed through the SDK interface.

Switch to Cedar Parser

Currently Cedar where clause expression parsing is using Google CEL (because they are almost the same). In the dependencies update, the CEL parser is now failing to parse Cedar where clauses (see Hexa cli test suite).

Now that Cedar is published, it is time to switch to the Cedar libraries

OPA Provider - Support for OAuth2 Client Credential flow for access to HTTP Bundle Servers

Currently the OPA HTTP Provider accepts a fixed authorization which can be a token for authorization with the HexaBundleServer.

The Policy-OPA AuthZen Server takes a certificate PEM to validate tokens provided.

This functionality would allow the provider client to authenticate to an OAuth2 server using the client credentials flow to receive a rotating token for access.

Note: #47 will allow this to be done outside the provider because an http.Client could be configured in the provider which handles token use and refreshing automatically. This enhancement means that each integration can have it's own client credential and OAuth2 server making it possible to connect to multiple provisioning domains while at the same time simplifying configuration inside of Policy-Orchestrator and Hexa CLI

OPA Provider HTTP Bundle Has Wrong Structure

The OPA Provider Get Policies function is expecting OPA Bundle server to respond with a file structure of
/bundle/

Instead the current testBundleServer is returning
/default/bundle/

This causes an unexpected file not found error

Migrate DemoConfig to Policy-Mapper

The orchestrator "democonfig" service is an implementation of a bundle server that can be used for testing.

This would be moved over to the "examples" directory of policy-mapper to let evaluators set up and run a bundle server and OPA server.

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.