Skip to content

feat: refactor authorization logic to load policies per group and improve error handling#1673

Merged
Artuomka merged 1 commit intomainfrom
backend_ceard_permissions_priority
Mar 17, 2026
Merged

feat: refactor authorization logic to load policies per group and improve error handling#1673
Artuomka merged 1 commit intomainfrom
backend_ceard_permissions_priority

Conversation

@Artuomka
Copy link
Copy Markdown
Collaborator

No description provided.

Copilot AI review requested due to automatic review settings March 17, 2026 15:01
@Artuomka Artuomka enabled auto-merge March 17, 2026 15:01
Copy link
Copy Markdown
Contributor

Copilot AI left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Pull request overview

Refactors Cedar authorization evaluation to load/evaluate policies on a per-group basis, aiming to improve resiliency and error visibility when individual group policies are invalid.

Changes:

  • Replaced “combine all group policies into one static policy set” with per-group policy evaluation and early-return on first allow.
  • Introduced per-group authorization error logging during evaluation.
  • Replaced cached per-user policy loading with a per-group policy loader.

💡 Add Copilot custom instructions for smarter, more guided reviews. Learn how to get started.

Comment on lines +205 to +209
const result = cedarWasm.isAuthorized(call as Parameters<typeof cedarWasm.isAuthorized>[0]);
if (result.type === 'success') {
if (result.response.decision === 'allow') {
return true;
}
Comment on lines +218 to 222
private async loadPoliciesPerGroup(connectionId: string, userGroups: Array<GroupEntity>): Promise<string[]> {
const groups = await this.globalDbContext.groupRepository.findAllGroupsInConnection(connectionId);
const userGroupIdSet = new Set(userGroupIds);
const policyTexts = groups
const userGroupIdSet = new Set(userGroups.map((g) => g.id));
return groups
.filter((g) => userGroupIdSet.has(g.id))
Comment on lines +210 to +212
} else {
this.logger.warn(`Cedar authorization error for group policy: ${JSON.stringify(result.errors)}`);
}
Comment on lines +189 to 193
const groupPolicies = await this.loadPoliciesPerGroup(connectionId, userGroups);
if (groupPolicies.length === 0) return false;

const entities = buildCedarEntities(userId, userGroups, connectionId, tableName, dashboardId);

@Artuomka Artuomka merged commit 4d4c1e5 into main Mar 17, 2026
21 of 23 checks passed
@Artuomka Artuomka deleted the backend_ceard_permissions_priority branch March 17, 2026 15:17
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants