-
Notifications
You must be signed in to change notification settings - Fork 91
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Clarification Needed on Valid Identifiers in Policies #1278
Comments
Currently, the |
Hi @cdisselkoen - just to clarify, I see this as a warning in the Cedar CLI, but it actually blocks the creation of policies in the Cedar AWS console. It lists the same error as being a validation warning, but you are blocked from actually creating the policy. The Chrome console states that it is running against Cedar 3.3.0. |
Understood, but this is a problem in the Verified Permissions service or console, not in Cedar. Cedar reports it as a warning and not an error, as you say. So even though Cedar could improve by not reporting a warning at all in this case (#621), the behavior of blocking policy creation is somewhere in Verified Permissions code. |
Got it - any suggestions on where to forward this issue re: the console? |
You can use the "feedback" button in the footer of the console. If you have an AWS support contract or account manager, I recommend going through them instead / as well. If you're internal to AWS, ping me internally (@CDiss) and I'll give you internal details on how to report. |
Closing this, feel free to open a new issue if needed. |
FYI, we've merged a fix to substantially limit when we emit this warning on the Cedar side in #1336. AVP console should pick up this change eventually, but I don't have timeline. |
Before opening, please confirm:
Bug Category
Schemas and Validation
Describe the bug
I have been encountering errors of this type when setting up AVP w/ Cedar to perform route-based API authorization:
API route identifiers of the flavor
get /foo
seem to violate constraints Cedar is expecting, but are used in documentation such as this:https://aws.amazon.com/blogs/security/authorize-api-gateway-apis-using-amazon-verified-permissions-and-amazon-cognito/
I have also encountered this issue in the console when using the automated 'Set up with API Gateway and an identity provider' starting action.
Expected behavior
According to the documentation, API routes of the format
get /foo
should be valid actions.Reproduction steps
get /foo
endpoint.Log output
Additional configuration
No response
Operating System
No response
Additional information and screenshots
No response
The text was updated successfully, but these errors were encountered: