You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
However, evaluating rules in OPA will always return 200 (if the rule evaluation itself worked), but the content of the response will contain the result of the evaluation.
Therefore it's in the response body that we have a JSON containing a key with a boolean.
Describe your ideal solution
One solution would be to specify in the authorization handler configuration the JSON path to follow in the response body that should contain a boolean value.
If it's set, then we can ignore the HTTP response code for allow/deny, but rather use the value of this boolean.
The handler could raise an error if the response is not JSON, the path does not exist, or the value found is not a boolean 🙂
I'm not sure how to configure the JSON path, it could use the jq syntax.
Which would extract the boolean from a JSON response body:
{
"result": true
}
Workarounds or alternatives
Our current workaround is to have a tiny proxy service between Oathkeeper and OPA.
It forwards requests from Oathkeeper to OPA, and returns the expected HTTP code to Oathkeeper depending on the OPA response body.
It works, but it would be great if Oathkeeper could talk directly to OPA.
Version
v0.40.6
Additional Context
Once the design is validated, we would be able to give some time to implement the feature if necessary :)
On a side note, it was also discussed on OPA side if this couldn't be handled by OPA directly: open-policy-agent/opa#3539. But the discussions point to an OPA plugin/contrib which was never implemented I reckon.
The text was updated successfully, but these errors were encountered:
I am marking this issue as stale as it has not received any engagement from the community or maintainers for a year. That does not imply that the issue has no merit! If you feel strongly about this issue
open a PR referencing and resolving the issue;
leave a comment on it and discuss ideas on how you could contribute towards resolving it;
leave a comment and describe in detail why this issue is critical for your use case;
open a new issue with updated details and a plan for resolving the issue.
Throughout its lifetime, Ory has received over 10.000 issues and PRs. To sustain that growth, we need to prioritize and focus on issues that are important to the community. A good indication of importance, and thus priority, is activity on a topic.
Unfortunately, burnout has become a topic of concern amongst open-source projects.
It can lead to severe personal and health issues as well as opening catastrophic attack vectors.
The motivation for this automation is to help prioritize issues in the backlog and not ignore, reject, or belittle anyone.
If this issue was marked as stale erroneously you can exempt it by adding the backlog label, assigning someone, or setting a milestone for it.
Thank you for your understanding and to anyone who participated in the conversation! And as written above, please do participate in the conversation if this topic is important to you!
Preflight checklist
Describe your problem
We've set up Oathkeeper to query OPA for authorization through a
remote_json
handler.To allow or deny a request, Oathkeeper requires the remote to return the correct HTTP code.
Source: https://www.ory.sh/docs/oathkeeper/pipeline/authz#remote_json-configuration
However, evaluating rules in OPA will always return 200 (if the rule evaluation itself worked), but the content of the response will contain the result of the evaluation.
Therefore it's in the response body that we have a JSON containing a key with a boolean.
Describe your ideal solution
One solution would be to specify in the authorization handler configuration the JSON path to follow in the response body that should contain a boolean value.
If it's set, then we can ignore the HTTP response code for allow/deny, but rather use the value of this boolean.
The handler could raise an error if the response is not JSON, the path does not exist, or the value found is not a boolean 🙂
I'm not sure how to configure the JSON path, it could use the jq syntax.
For instance:
Which would extract the boolean from a JSON response body:
Workarounds or alternatives
Our current workaround is to have a tiny proxy service between Oathkeeper and OPA.
It forwards requests from Oathkeeper to OPA, and returns the expected HTTP code to Oathkeeper depending on the OPA response body.
It works, but it would be great if Oathkeeper could talk directly to OPA.
Version
v0.40.6
Additional Context
Once the design is validated, we would be able to give some time to implement the feature if necessary :)
On a side note, it was also discussed on OPA side if this couldn't be handled by OPA directly: open-policy-agent/opa#3539. But the discussions point to an OPA plugin/contrib which was never implemented I reckon.
The text was updated successfully, but these errors were encountered: