Movatterモバイル変換


[0]ホーム

URL:


Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
Appearance settings

OPA/Policy: ensure scope and allow-list checks #19852

Assignees
ThomasK33
@ThomasK33

Description

@ThomasK33

Description

  • Confirm and, if necessary, adjustcoderd/rbac/policy.rego to require both role allow and scope allow. Ensure allow-list membership is enforced for reads/updates/deletes, but not for creates (no ID at creation time), matching the RFC.

Progress

Remaining work

  • Explicitly verify and add tests that create operations bypass allow-list ID checks while read/update/delete enforce membership.
  • Add deny-by-default tests when scope is missing; cover list endpoints where applicable.
  • Ensure all subject construction paths now provide typed allow-lists; update docs/README for policy changes.

Key files/areas

  • coderd/rbac/policy.rego and unit tests.

Acceptance criteria

  • Policy tests prove deny-by-default when scope is missing and allow-list excludes the resource.
  • Create operations bypass allow-list ID checks; other verbs require matching IDs.

Metadata

Metadata

Assignees

Labels

No labels
No labels

Type

Projects

No projects

Milestone

No milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions


    [8]ページ先頭

    ©2009-2025 Movatter.jp