1#![deny(
19 missing_docs,
20 rustdoc::broken_intra_doc_links,
21 rustdoc::private_intra_doc_links,
22 rustdoc::invalid_codeblock_attributes,
23 rustdoc::invalid_html_tags,
24 rustdoc::invalid_rust_codeblocks,
25 rustdoc::bare_urls,
26 clippy::doc_markdown
27)]
28#![cfg_attr(feature = "wasm", allow(non_snake_case))]
29
30use cedar_policy_core::ast::{Policy, PolicySet, Template};
31use serde::Serialize;
32use std::collections::HashSet;
33mod level_validate;
34
35mod coreschema;
36#[cfg(feature = "entity-manifest")]
37pub mod entity_manifest;
38pub use coreschema::*;
39mod diagnostics;
40pub use diagnostics::*;
41mod expr_iterator;
42mod extension_schema;
43mod extensions;
44mod rbac;
45mod schema;
46pub use schema::err::*;
47pub use schema::*;
48pub mod json_schema;
49mod str_checks;
50pub use str_checks::confusable_string_checks;
51pub mod cedar_schema;
52pub mod typecheck;
53use typecheck::Typechecker;
54mod partition_nonempty;
55pub mod types;
56
57#[derive(Default, Eq, PartialEq, Copy, Clone, Debug, Serialize)]
59pub enum ValidationMode {
60 #[default]
62 Strict,
63 Permissive,
65 #[cfg(feature = "partial-validate")]
68 Partial,
69}
70
71impl ValidationMode {
72 fn is_partial(self) -> bool {
75 match self {
76 ValidationMode::Strict | ValidationMode::Permissive => false,
77 #[cfg(feature = "partial-validate")]
78 ValidationMode::Partial => true,
79 }
80 }
81
82 fn is_strict(self) -> bool {
84 match self {
85 ValidationMode::Strict => true,
86 ValidationMode::Permissive => false,
87 #[cfg(feature = "partial-validate")]
88 ValidationMode::Partial => false,
89 }
90 }
91}
92
93#[derive(Debug, Clone)]
96pub struct Validator {
97 schema: ValidatorSchema,
98}
99
100impl Validator {
101 pub fn new(schema: ValidatorSchema) -> Validator {
103 Self { schema }
104 }
105
106 pub fn schema(&self) -> &ValidatorSchema {
108 &self.schema
109 }
110
111 pub fn validate(&self, policies: &PolicySet, mode: ValidationMode) -> ValidationResult {
114 let validate_policy_results: (Vec<_>, Vec<_>) = policies
115 .all_templates()
116 .map(|p| self.validate_policy(p, mode))
117 .unzip();
118 let template_and_static_policy_errs = validate_policy_results.0.into_iter().flatten();
119 let template_and_static_policy_warnings = validate_policy_results.1.into_iter().flatten();
120 let link_errs = policies
121 .policies()
122 .filter_map(|p| self.validate_slots(p, mode))
123 .flatten();
124 ValidationResult::new(
125 template_and_static_policy_errs.chain(link_errs),
126 template_and_static_policy_warnings
127 .chain(confusable_string_checks(policies.all_templates())),
128 )
129 }
130
131 pub fn validate_with_level(
136 &self,
137 policies: &PolicySet,
138 mode: ValidationMode,
139 max_deref_level: u32,
140 ) -> ValidationResult {
141 let validate_policy_results: (Vec<_>, Vec<_>) = policies
142 .all_templates()
143 .map(|p| self.validate_policy_with_level(p, mode, max_deref_level))
144 .unzip();
145 let template_and_static_policy_errs = validate_policy_results.0.into_iter().flatten();
146 let template_and_static_policy_warnings = validate_policy_results.1.into_iter().flatten();
147 let link_errs = policies
148 .policies()
149 .filter_map(|p| self.validate_slots(p, mode))
150 .flatten();
151 ValidationResult::new(
152 template_and_static_policy_errs.chain(link_errs),
153 template_and_static_policy_warnings
154 .chain(confusable_string_checks(policies.all_templates())),
155 )
156 }
157
158 fn validate_policy<'a>(
162 &'a self,
163 p: &'a Template,
164 mode: ValidationMode,
165 ) -> (
166 impl Iterator<Item = ValidationError> + 'a,
167 impl Iterator<Item = ValidationWarning> + 'a,
168 ) {
169 let validation_errors = if mode.is_partial() {
170 None
175 } else {
176 Some(
177 self.validate_entity_types(p)
178 .chain(self.validate_enum_entity(p))
179 .chain(self.validate_action_ids(p))
180 .chain(self.validate_template_action_application(p)),
185 )
186 }
187 .into_iter()
188 .flatten();
189 let (errors, warnings) = self.typecheck_policy(p, mode);
190 (validation_errors.chain(errors), warnings)
191 }
192
193 fn validate_slots<'a>(
196 &'a self,
197 p: &'a Policy,
198 mode: ValidationMode,
199 ) -> Option<impl Iterator<Item = ValidationError> + 'a> {
200 if p.is_static() {
202 return None;
203 }
204 if mode.is_partial() {
208 return None;
209 }
210 Some(
214 self.validate_entity_types_in_slots(p.id(), p.env())
215 .chain(self.validate_linked_action_application(p)),
216 )
217 }
218
219 fn typecheck_policy<'a>(
225 &'a self,
226 t: &'a Template,
227 mode: ValidationMode,
228 ) -> (
229 impl Iterator<Item = ValidationError> + 'a,
230 impl Iterator<Item = ValidationWarning> + 'a,
231 ) {
232 let typecheck = Typechecker::new(&self.schema, mode);
233 let mut errors = HashSet::new();
234 let mut warnings = HashSet::new();
235 typecheck.typecheck_policy(t, &mut errors, &mut warnings);
236 (errors.into_iter(), warnings.into_iter())
237 }
238}
239
240#[cfg(test)]
241mod test {
242 use itertools::Itertools;
243 use std::{collections::HashMap, sync::Arc};
244
245 use crate::types::Type;
246 use crate::validation_errors::UnrecognizedActionIdHelp;
247 use crate::Result;
248
249 use super::*;
250 use cedar_policy_core::{
251 ast::{self, PolicyID},
252 est::Annotations,
253 parser::{self, Loc},
254 };
255
256 #[test]
257 fn top_level_validate() -> Result<()> {
258 let mut set = PolicySet::new();
259 let foo_type = "foo_type";
260 let bar_type = "bar_type";
261 let action_name = "action";
262 let schema_file = json_schema::NamespaceDefinition::new(
263 [
264 (
265 foo_type.parse().unwrap(),
266 json_schema::StandardEntityType {
267 member_of_types: vec![],
268 shape: json_schema::AttributesOrContext::default(),
269 tags: None,
270 }
271 .into(),
272 ),
273 (
274 bar_type.parse().unwrap(),
275 json_schema::StandardEntityType {
276 member_of_types: vec![],
277 shape: json_schema::AttributesOrContext::default(),
278 tags: None,
279 }
280 .into(),
281 ),
282 ],
283 [(
284 action_name.into(),
285 json_schema::ActionType {
286 applies_to: Some(json_schema::ApplySpec {
287 principal_types: vec!["foo_type".parse().unwrap()],
288 resource_types: vec!["bar_type".parse().unwrap()],
289 context: json_schema::AttributesOrContext::default(),
290 }),
291 member_of: None,
292 attributes: None,
293 annotations: Annotations::new(),
294 loc: None,
295 #[cfg(feature = "extended-schema")]
296 defn_loc: None,
297 },
298 )],
299 );
300 let schema = schema_file.try_into().unwrap();
301 let validator = Validator::new(schema);
302
303 let policy_a_src = r#"permit(principal in foo_type::"a", action == Action::"actin", resource == bar_type::"b");"#;
304 let policy_a = parser::parse_policy(Some(PolicyID::from_string("pola")), policy_a_src)
305 .expect("Test Policy Should Parse");
306 set.add_static(policy_a)
307 .expect("Policy already present in PolicySet");
308
309 let policy_b_src = r#"permit(principal in foo_tye::"a", action == Action::"action", resource == br_type::"b");"#;
310 let policy_b = parser::parse_policy(Some(PolicyID::from_string("polb")), policy_b_src)
311 .expect("Test Policy Should Parse");
312 set.add_static(policy_b)
313 .expect("Policy already present in PolicySet");
314
315 let result = validator.validate(&set, ValidationMode::default());
316 let principal_err = ValidationError::unrecognized_entity_type(
317 Some(Loc::new(20..27, Arc::from(policy_b_src))),
318 PolicyID::from_string("polb"),
319 "foo_tye".to_string(),
320 Some("foo_type".to_string()),
321 );
322 let resource_err = ValidationError::unrecognized_entity_type(
323 Some(Loc::new(74..81, Arc::from(policy_b_src))),
324 PolicyID::from_string("polb"),
325 "br_type".to_string(),
326 Some("bar_type".to_string()),
327 );
328 let action_err = ValidationError::unrecognized_action_id(
329 Some(Loc::new(45..60, Arc::from(policy_a_src))),
330 PolicyID::from_string("pola"),
331 "Action::\"actin\"".to_string(),
332 Some(UnrecognizedActionIdHelp::SuggestAlternative(
333 "Action::\"action\"".to_string(),
334 )),
335 );
336
337 assert!(!result.validation_passed());
338 assert!(
339 result.validation_errors().contains(&principal_err),
340 "{result:?}"
341 );
342 assert!(
343 result.validation_errors().contains(&resource_err),
344 "{result:?}"
345 );
346 assert!(
347 result.validation_errors().contains(&action_err),
348 "{result:?}"
349 );
350 Ok(())
351 }
352
353 #[test]
354 fn top_level_validate_with_links() -> Result<()> {
355 let mut set = PolicySet::new();
356 let schema: ValidatorSchema = json_schema::Fragment::from_json_str(
357 r#"
358 {
359 "some_namespace": {
360 "entityTypes": {
361 "User": {
362 "shape": {
363 "type": "Record",
364 "attributes": {
365 "department": {
366 "type": "String"
367 },
368 "jobLevel": {
369 "type": "Long"
370 }
371 }
372 },
373 "memberOfTypes": [
374 "UserGroup"
375 ]
376 },
377 "UserGroup": {},
378 "Photo" : {}
379 },
380 "actions": {
381 "view": {
382 "appliesTo": {
383 "resourceTypes": [
384 "Photo"
385 ],
386 "principalTypes": [
387 "User"
388 ]
389 }
390 }
391 }
392 }
393 }
394 "#,
395 )
396 .expect("Schema parse error.")
397 .try_into()
398 .expect("Expected valid schema.");
399 let validator = Validator::new(schema);
400
401 let t = parser::parse_policy_or_template(
402 Some(PolicyID::from_string("template")),
403 r#"permit(principal == some_namespace::User::"Alice", action, resource in ?resource);"#,
404 )
405 .expect("Parse Error");
406 let loc = t.loc().cloned();
407 set.add_template(t)
408 .expect("Template already present in PolicySet");
409
410 let result = validator.validate(&set, ValidationMode::default());
412 assert_eq!(
413 result.validation_errors().collect::<Vec<_>>(),
414 Vec::<&ValidationError>::new()
415 );
416
417 let mut values = HashMap::new();
419 values.insert(
420 ast::SlotId::resource(),
421 ast::EntityUID::from_components(
422 "some_namespace::Photo".parse().unwrap(),
423 ast::Eid::new("foo"),
424 None,
425 ),
426 );
427 set.link(
428 ast::PolicyID::from_string("template"),
429 ast::PolicyID::from_string("link1"),
430 values,
431 )
432 .expect("Linking failed!");
433 let result = validator.validate(&set, ValidationMode::default());
434 assert!(result.validation_passed());
435
436 let mut values = HashMap::new();
438 values.insert(
439 ast::SlotId::resource(),
440 ast::EntityUID::from_components(
441 "some_namespace::Undefined".parse().unwrap(),
442 ast::Eid::new("foo"),
443 None,
444 ),
445 );
446 set.link(
447 ast::PolicyID::from_string("template"),
448 ast::PolicyID::from_string("link2"),
449 values,
450 )
451 .expect("Linking failed!");
452 let result = validator.validate(&set, ValidationMode::default());
453 assert!(!result.validation_passed());
454 assert_eq!(result.validation_errors().count(), 2);
455 let undefined_err = ValidationError::unrecognized_entity_type(
456 None,
457 PolicyID::from_string("link2"),
458 "some_namespace::Undefined".to_string(),
459 Some("some_namespace::User".to_string()),
460 );
461 let invalid_action_err = ValidationError::invalid_action_application(
462 loc.clone(),
463 PolicyID::from_string("link2"),
464 false,
465 false,
466 );
467 assert!(result.validation_errors().any(|x| x == &undefined_err));
468 assert!(result.validation_errors().any(|x| x == &invalid_action_err));
469
470 let mut values = HashMap::new();
472 values.insert(
473 ast::SlotId::resource(),
474 ast::EntityUID::from_components(
475 "some_namespace::User".parse().unwrap(),
476 ast::Eid::new("foo"),
477 None,
478 ),
479 );
480 set.link(
481 ast::PolicyID::from_string("template"),
482 ast::PolicyID::from_string("link3"),
483 values,
484 )
485 .expect("Linking failed!");
486 let result = validator.validate(&set, ValidationMode::default());
487 assert!(!result.validation_passed());
488 assert_eq!(result.validation_errors().count(), 3);
490 let invalid_action_err = ValidationError::invalid_action_application(
491 loc,
492 PolicyID::from_string("link3"),
493 false,
494 false,
495 );
496 assert!(result.validation_errors().contains(&invalid_action_err));
497
498 Ok(())
499 }
500
501 #[test]
502 fn validate_finds_warning_and_error() {
503 let schema: ValidatorSchema = json_schema::Fragment::from_json_str(
504 r#"
505 {
506 "": {
507 "entityTypes": {
508 "User": { }
509 },
510 "actions": {
511 "view": {
512 "appliesTo": {
513 "resourceTypes": [ "User" ],
514 "principalTypes": [ "User" ]
515 }
516 }
517 }
518 }
519 }
520 "#,
521 )
522 .expect("Schema parse error.")
523 .try_into()
524 .expect("Expected valid schema.");
525 let validator = Validator::new(schema);
526
527 let mut set = PolicySet::new();
528 let src = r#"permit(principal == User::"าปenry", action, resource) when {1 > true};"#;
529 let p = parser::parse_policy(None, src).unwrap();
530 set.add_static(p).unwrap();
531
532 let result = validator.validate(&set, ValidationMode::default());
533 assert_eq!(
534 result.validation_errors().collect::<Vec<_>>(),
535 vec![&ValidationError::expected_type(
536 typecheck::test::test_utils::get_loc(src, "true"),
537 PolicyID::from_string("policy0"),
538 Type::primitive_long(),
539 Type::singleton_boolean(true),
540 None,
541 )]
542 );
543 assert_eq!(
544 result.validation_warnings().collect::<Vec<_>>(),
545 vec![&ValidationWarning::mixed_script_identifier(
546 None,
547 PolicyID::from_string("policy0"),
548 "าปenry"
549 )]
550 );
551 }
552}
553
554#[cfg(test)]
555mod enumerated_entity_types {
556 use cedar_policy_core::{
557 ast::{Eid, EntityUID, ExprBuilder, PolicyID},
558 expr_builder::ExprBuilder as _,
559 extensions::Extensions,
560 parser::parse_policy_or_template,
561 };
562 use cool_asserts::assert_matches;
563 use itertools::Itertools;
564
565 use crate::{
566 typecheck::test::test_utils::get_loc,
567 types::{EntityLUB, Type},
568 validation_errors::AttributeAccess,
569 ValidationError, ValidationWarning, Validator, ValidatorSchema,
570 };
571
572 #[track_caller]
573 fn schema() -> ValidatorSchema {
574 ValidatorSchema::from_json_value(
575 serde_json::json!(
576 {
577 "": { "entityTypes": {
578 "Foo": {
579 "enum": [ "foo" ],
580 },
581 "Bar": {
582 "memberOfTypes": ["Foo"],
583 }
584 },
585 "actions": {
586 "a": {
587 "appliesTo": {
588 "principalTypes": ["Foo"],
589 "resourceTypes": ["Bar"],
590 }
591 }
592 }
593 }
594 }
595 ),
596 Extensions::none(),
597 )
598 .unwrap()
599 }
600
601 #[test]
602 fn basic() {
603 let schema = schema();
604 let template = parse_policy_or_template(None, r#"permit(principal, action == Action::"a", resource) when { principal == Foo::"foo" };"#).unwrap();
605 let validator = Validator::new(schema);
606 let (errors, warnings) =
607 validator.validate_policy(&template, crate::ValidationMode::Strict);
608 assert!(warnings.collect_vec().is_empty());
609 assert!(errors.collect_vec().is_empty());
610 }
611
612 #[test]
613 #[allow(clippy::cognitive_complexity)]
614 fn basic_invalid() {
615 let schema = schema();
616 let template = parse_policy_or_template(None, r#"permit(principal, action == Action::"a", resource) when { principal == Foo::"fo" };"#).unwrap();
617 let validator = Validator::new(schema.clone());
618 let (errors, warnings) =
619 validator.validate_policy(&template, crate::ValidationMode::Strict);
620 assert!(warnings.collect_vec().is_empty());
621 assert_matches!(&errors.collect_vec(), [ValidationError::InvalidEnumEntity(err)] => {
622 assert_eq!(err.err.choices, vec![Eid::new("foo")]);
623 assert_eq!(err.err.uid, EntityUID::with_eid_and_type("Foo", "fo").unwrap());
624 });
625
626 let template = parse_policy_or_template(
627 None,
628 r#"permit(principal == Foo::"๐", action == Action::"a", resource);"#,
629 )
630 .unwrap();
631 let validator = Validator::new(schema.clone());
632 let (errors, warnings) =
633 validator.validate_policy(&template, crate::ValidationMode::Strict);
634 assert!(warnings.collect_vec().is_empty());
635 assert_matches!(&errors.collect_vec(), [ValidationError::InvalidEnumEntity(err)] => {
636 assert_eq!(err.err.choices, vec![Eid::new("foo")]);
637 assert_eq!(err.err.uid, EntityUID::with_eid_and_type("Foo", "๐").unwrap());
638 });
639
640 let template = parse_policy_or_template(
641 None,
642 r#"permit(principal in Foo::"๐", action == Action::"a", resource);"#,
643 )
644 .unwrap();
645 let validator = Validator::new(schema.clone());
646 let (errors, warnings) =
647 validator.validate_policy(&template, crate::ValidationMode::Strict);
648 assert!(warnings.collect_vec().is_empty());
649 assert_matches!(&errors.collect_vec(), [ValidationError::InvalidEnumEntity(err)] => {
650 assert_eq!(err.err.choices, vec![Eid::new("foo")]);
651 assert_eq!(err.err.uid, EntityUID::with_eid_and_type("Foo", "๐").unwrap());
652 });
653
654 let template = parse_policy_or_template(
655 None,
656 r#"permit(principal, action == Action::"a", resource)
657 when { {"๐": Foo::"๐"} has "๐" };
658 "#,
659 )
660 .unwrap();
661 let validator = Validator::new(schema.clone());
662 let (errors, warnings) =
663 validator.validate_policy(&template, crate::ValidationMode::Strict);
664 assert!(warnings.collect_vec().is_empty());
665 assert_matches!(&errors.collect_vec(), [ValidationError::InvalidEnumEntity(err)] => {
666 assert_eq!(err.err.choices, vec![Eid::new("foo")]);
667 assert_eq!(err.err.uid, EntityUID::with_eid_and_type("Foo", "๐").unwrap());
668 });
669
670 let template = parse_policy_or_template(
671 None,
672 r#"permit(principal, action == Action::"a", resource)
673 when { [Foo::"๐"].isEmpty() };
674 "#,
675 )
676 .unwrap();
677 let validator = Validator::new(schema.clone());
678 let (errors, warnings) =
679 validator.validate_policy(&template, crate::ValidationMode::Strict);
680 assert!(warnings.collect_vec().is_empty());
681 assert_matches!(&errors.collect_vec(), [ValidationError::InvalidEnumEntity(err)] => {
682 assert_eq!(err.err.choices, vec![Eid::new("foo")]);
683 assert_eq!(err.err.uid, EntityUID::with_eid_and_type("Foo", "๐").unwrap());
684 });
685
686 let template = parse_policy_or_template(
687 None,
688 r#"permit(principal, action == Action::"a", resource)
689 when { [{"๐": Foo::"๐"}].isEmpty() };
690 "#,
691 )
692 .unwrap();
693 let validator = Validator::new(schema);
694 let (errors, warnings) =
695 validator.validate_policy(&template, crate::ValidationMode::Strict);
696 assert!(warnings.collect_vec().is_empty());
697 assert_matches!(&errors.collect_vec(), [ValidationError::InvalidEnumEntity(err)] => {
698 assert_eq!(err.err.choices, vec![Eid::new("foo")]);
699 assert_eq!(err.err.uid, EntityUID::with_eid_and_type("Foo", "๐").unwrap());
700 });
701 }
702
703 #[test]
704 fn no_attrs_allowed() {
705 let schema = schema();
706 let src = r#"permit(principal, action == Action::"a", resource) when { principal.foo == "foo" };"#;
707 let template = parse_policy_or_template(None, src).unwrap();
708 let validator = Validator::new(schema);
709 let (errors, warnings) =
710 validator.validate_policy(&template, crate::ValidationMode::Strict);
711 assert!(warnings.collect_vec().is_empty());
712 assert_eq!(
713 errors.collect_vec(),
714 [ValidationError::unsafe_attribute_access(
715 get_loc(src, "principal.foo"),
716 PolicyID::from_string("policy0"),
717 AttributeAccess::EntityLUB(
718 EntityLUB::single_entity("Foo".parse().unwrap()),
719 vec!["foo".into()],
720 ),
721 None,
722 false,
723 )]
724 );
725 }
726
727 #[test]
728 fn no_ancestors() {
729 let schema = schema();
730 let src = r#"permit(principal, action == Action::"a", resource) when { principal in Bar::"bar" };"#;
731 let template = parse_policy_or_template(None, src).unwrap();
732 let validator = Validator::new(schema);
733 let (errors, warnings) =
734 validator.validate_policy(&template, crate::ValidationMode::Strict);
735 assert_eq!(
736 warnings.collect_vec(),
737 [ValidationWarning::impossible_policy(
738 get_loc(src, src),
739 PolicyID::from_string("policy0")
740 )]
741 );
742 assert!(errors.collect_vec().is_empty());
743 }
744
745 #[test]
746 fn no_tags_allowed() {
747 let schema = schema();
748 let src = r#"permit(principal, action == Action::"a", resource) when { principal.getTag("foo") == "foo" };"#;
749 let template = parse_policy_or_template(None, src).unwrap();
750 let validator = Validator::new(schema);
751 let (errors, warnings) =
752 validator.validate_policy(&template, crate::ValidationMode::Strict);
753 assert!(warnings.collect_vec().is_empty());
754 assert_eq!(
755 errors.collect_vec(),
756 [ValidationError::unsafe_tag_access(
757 get_loc(src, r#"principal.getTag("foo")"#),
758 PolicyID::from_string("policy0"),
759 Some(EntityLUB::single_entity("Foo".parse().unwrap()),),
760 {
761 let builder = ExprBuilder::new();
762 let mut expr = builder.val("foo");
763 expr.set_data(Some(Type::primitive_string()));
764 expr
765 },
766 )]
767 );
768 }
769}