From 29a4636d6b0f2134a2b038a87915792aa6522c85 Mon Sep 17 00:00:00 2001 From: Safin Wasi <6601566+SafinWasi@users.noreply.github.com> Date: Fri, 13 Mar 2026 02:27:59 +0000 Subject: [PATCH 001/113] fix: delete file --- ...83e13f332b1b35eac6ffa93187fbd1c648085.json | 164 ------------------ 1 file changed, 164 deletions(-) delete mode 100644 449805c83e13f332b1b35eac6ffa93187fbd1c648085.json diff --git a/449805c83e13f332b1b35eac6ffa93187fbd1c648085.json b/449805c83e13f332b1b35eac6ffa93187fbd1c648085.json deleted file mode 100644 index 5f3495b..0000000 --- a/449805c83e13f332b1b35eac6ffa93187fbd1c648085.json +++ /dev/null @@ -1,164 +0,0 @@ -{ - "cedar_version": "4.4.0", - "policy_stores": { - "449805c83e13f332b1b35eac6ffa93187fbd1c648085": { - "name": "tarpDemo", - "description": "", - "policies": { - "76acfe86fb09731682f92c4fbf7d2e066813ce639404": { - "description": "allow_teacher_secretdocument", - "creation_date": "2025-06-04T14:41:49.809437", - "policy_content": "QGlkKCJhbGxvd190ZWFjaGVyX3NlY3JldGRvY3VtZW50IikKcGVybWl0KAogIHByaW5jaXBhbCBpbiBKYW5zOjpSb2xlOjoiVGVhY2hlciIsCiAgYWN0aW9uLAogIHJlc291cmNlIGlzIEphbnM6OlNlY3JldERvY3VtZW50Cik7" - }, - "a6f9c66ddcadeeec9e0f65420c89715b00a835ffdaec": { - "description": "allow_student_read", - "creation_date": "2025-10-23T02:34:43.316922", - "policy_content": "QGlkKCJhbGxvd19zdHVkZW50X3JlYWQiKQpwZXJtaXQgKAogIHByaW5jaXBhbCBpbiBKYW5zOjpSb2xlOjoiU3R1ZGVudCIsCiAgYWN0aW9uIGluIFtKYW5zOjpBY3Rpb246OiJSZWFkIl0sCiAgcmVzb3VyY2UKKTs=" - }, - "91b2611a1ea9859cb7ce780ca16adf3b2a68f892786a": { - "description": "user_can_read", - "creation_date": "2025-12-17T03:23:22.073817", - "policy_content": "QGlkKCJ1c2VyX2Nhbl9yZWFkIikKcGVybWl0ICgKICBwcmluY2lwYWwgaXMgSmFuczo6VXNlciwKICBhY3Rpb24gPT0gSmFuczo6QWN0aW9uOjoiUmVhZCIsCiAgcmVzb3VyY2UgaXMgSmFuczo6QXBwbGljYXRpb24KKTs=" - }, - "13b34711a196f382ade96677cefd513a2a6deff1b949": { - "description": "admin_can_write_to_application", - "creation_date": "2025-12-17T03:27:11.348191", - "policy_content": "QGlkKCJhZG1pbl9jYW5fd3JpdGVfdG9fYXBwbGljYXRpb24iKQpwZXJtaXQgKAogIHByaW5jaXBhbCBpbiBKYW5zOjpSb2xlOjoiYWRtaW4iLAogIGFjdGlvbiA9PSBKYW5zOjpBY3Rpb246OiJXcml0ZSIsCiAgcmVzb3VyY2UgaXMgSmFuczo6QXBwbGljYXRpb24KKTs=" - }, - "e76eb1853f0c6a199ca383cd9714e0113dfd851e079a": { - "description": "user_can_execute", - "creation_date": "2025-12-17T03:29:29.697429", - "policy_content": "QGlkKCJ1c2VyX2Nhbl9leGVjdXRlIikKcGVybWl0ICgKICBwcmluY2lwYWwgaXMgSmFuczo6VXNlciwKICBhY3Rpb24gPT0gSmFuczo6QWN0aW9uOjoiRXhlY3V0ZSIsCiAgcmVzb3VyY2UgaXMgSmFuczo6QXBwbGljYXRpb24KKTs=" - }, - "6e46e36071466cc37c0e9bbd65f16c51ea2ab152c6fc": { - "description": "user_can_search", - "creation_date": "2025-12-17T03:30:23.395550", - "policy_content": "QGlkKCJ1c2VyX2Nhbl9zZWFyY2giKQpwZXJtaXQgKAogIHByaW5jaXBhbCBpcyBKYW5zOjpVc2VyLAogIGFjdGlvbiA9PSBKYW5zOjpBY3Rpb246OiJTZWFyY2giLAogIHJlc291cmNlIGlzIEphbnM6OkFwcGxpY2F0aW9uCik7" - }, - "c4729e4ab456b4c8e74102593e5b32e04176bc837cc5": { - "description": "user_can_compare", - "creation_date": "2025-12-17T03:31:56.340687", - "policy_content": "QGlkKCJ1c2VyX2Nhbl9jb21wYXJlIikKcGVybWl0ICgKICBwcmluY2lwYWwgaXMgSmFuczo6VXNlciwKICBhY3Rpb24gPT0gSmFuczo6QWN0aW9uOjoiQ29tcGFyZSIsCiAgcmVzb3VyY2UgaXMgSmFuczo6QXBwbGljYXRpb24KKTs=" - }, - "b5111ecf0d218da2cdbece83aeb77cb6b479d3b5d85c": { - "description": "user_can_monitor", - "creation_date": "2025-12-17T03:36:25.922696", - "policy_content": "QGlkKCJ1c2VyX2Nhbl9tb25pdG9yIikKcGVybWl0ICgKICBwcmluY2lwYWwgaXMgSmFuczo6VXNlciwKICBhY3Rpb24gPT0gSmFuczo6QWN0aW9uOjoiTW9uaXRvciIsCiAgcmVzb3VyY2UgaXMgSmFuczo6QXBwbGljYXRpb24KKTs=" - }, - "fe84f983188f1639a03ed77c0753fc893fbe0d4cf155": { - "description": "editor_can_share", - "creation_date": "2025-12-17T03:42:20.479615", - "policy_content": "QGlkKCJlZGl0b3JfY2FuX3NoYXJlIikKcGVybWl0ICgKICBwcmluY2lwYWwgaW4gSmFuczo6Um9sZTo6IkVkaXRvciIsCiAgYWN0aW9uID09IEphbnM6OkFjdGlvbjo6IlNoYXJlIiwKICByZXNvdXJjZSBpcyBKYW5zOjpBcHBsaWNhdGlvbgopOw==" - }, - "4ab79a92feac06a1a005373b741ed50e07d23d98f9a5": { - "description": "user_can_tag", - "creation_date": "2025-12-17T03:46:40.203758", - "policy_content": "QGlkKCJ1c2VyX2Nhbl90YWciKQpwZXJtaXQgKAogIHByaW5jaXBhbCBpcyBKYW5zOjpVc2VyLAogIGFjdGlvbiA9PSBKYW5zOjpBY3Rpb246OiJUYWciLAogIHJlc291cmNlIGlzIEphbnM6OkFwcGxpY2F0aW9uCik7" - }, - "f38f10e80c6f429153cf97781a4c6bcf29761a04259f": { - "description": "cannot_write_if_not_admin", - "creation_date": "2025-12-17T03:58:32.886850", - "policy_content": "QGlkKCJjYW5ub3Rfd3JpdGVfaWZfbm90X2FkbWluIikKZm9yYmlkICgKICBwcmluY2lwYWwgaXMgSmFuczo6VXNlciwKICBhY3Rpb24gPT0gSmFuczo6QWN0aW9uOjoiV3JpdGUiLAogIHJlc291cmNlIGlzIEphbnM6OkFwcGxpY2F0aW9uCikgd2hlbiB7CiAgcHJpbmNpcGFsIGhhcyByb2xlICYmCiAgIXByaW5jaXBhbC5yb2xlLmNvbnRhaW5zKCJhZG1pbiIpCn07" - }, - "420184da127304d1b2898761893a974096f6dbade45a": { - "description": "user_cannot_execute_on_public_network", - "creation_date": "2025-12-17T04:00:52.937385", - "policy_content": "QGlkKCJ1c2VyX2Nhbm5vdF9leGVjdXRlX29uX3B1YmxpY19uZXR3b3JrIikKZm9yYmlkICgKICBwcmluY2lwYWwgaXMgSmFuczo6VXNlciwKICBhY3Rpb24gPT0gSmFuczo6QWN0aW9uOjoiRXhlY3V0ZSIsCiAgcmVzb3VyY2UgaXMgSmFuczo6QXBwbGljYXRpb24KKSB3aGVuIHsKICBjb250ZXh0IGhhcyBuZXR3b3JrX3R5cGUgJiYKICBjb250ZXh0Lm5ldHdvcmtfdHlwZSA9PSAicHVibGljIgp9Owo=" - }, - "e459eba6691d141497dd1317e44d3d5b3bdd9fd65150": { - "description": "user_can_read_if_confidential_role", - "creation_date": "2025-12-17T04:08:48.207025", - "policy_content": "QGlkKCJ1c2VyX2Nhbl9yZWFkX2lmX2NvbmZpZGVudGlhbF9yb2xlIikKcGVybWl0ICgKICBwcmluY2lwYWwgaW4gSmFuczo6Um9sZTo6ImNvbmZpZGVudGlhbCIsCiAgYWN0aW9uID09IEphbnM6OkFjdGlvbjo6IlJlYWQiLAogIHJlc291cmNlIGlzIEphbnM6OlNlY3JldERvY3VtZW50Cik7" - }, - "9e2f1520bd292765609e8ce57add8d3c134e3a91759d": { - "description": "security_admin_can_write_to_secretdocument", - "creation_date": "2025-12-17T04:17:56.420102", - "policy_content": "QGlkKCJzZWN1cml0eV9hZG1pbl9jYW5fd3JpdGVfdG9fc2VjcmV0ZG9jdW1lbnQiKQpwZXJtaXQgKAogIHByaW5jaXBhbCBpbiBKYW5zOjpSb2xlOjoic2VjdXJpdHktYWRtaW4iLAogIGFjdGlvbiA9PSBKYW5zOjpBY3Rpb246OiJXcml0ZSIsCiAgcmVzb3VyY2UgaXMgSmFuczo6U2VjcmV0RG9jdW1lbnQKKTs=" - }, - "689edd369c276afb5a163119dcd92c74196a4e0c7bdb": { - "description": "user_cannot_read_if_compromised", - "creation_date": "2025-12-17T10:14:47.702218", - "policy_content": "QGlkKCJ1c2VyX2Nhbm5vdF9yZWFkX2lmX2NvbXByb21pc2VkIikKZm9yYmlkICgKICBwcmluY2lwYWwgaXMgSmFuczo6VXNlciwKICBhY3Rpb24gPT0gSmFuczo6QWN0aW9uOjoiUmVhZCIsCiAgcmVzb3VyY2UgaXMgSmFuczo6U2VjcmV0RG9jdW1lbnQKKSB3aGVuIHsKICBjb250ZXh0IGhhcyBkZXZpY2VfaGVhbHRoICYmCiAgY29udGV4dC5kZXZpY2VfaGVhbHRoLmNvbnRhaW5zKCJjb21wcm9taXNlZCIpCn07" - }, - "fe83e4b2338614b970559ce4141b6d3e60559d79282c": { - "description": "user_can_read_in_corp_network", - "creation_date": "2025-12-17T10:15:23.244030", - "policy_content": "QGlkKCJ1c2VyX2Nhbl9yZWFkX2luX2NvcnBfbmV0d29yayIpCnBlcm1pdCAoCiAgcHJpbmNpcGFsIGlzIEphbnM6OlVzZXIsCiAgYWN0aW9uID09IEphbnM6OkFjdGlvbjo6IlJlYWQiLAogIHJlc291cmNlIGlzIEphbnM6OlNlY3JldERvY3VtZW50Cikgd2hlbiB7CiAgY29udGV4dCBoYXMgbmV0d29yayAmJgogIGNvbnRleHQubmV0d29yayA9PSAiY29ycCIKfTs=" - }, - "c367d06f19af8db1ec69354044334c799ff4cd2021ae": { - "description": "user_cannot_read_if_fraudulent", - "creation_date": "2025-12-17T10:16:52.386299", - "policy_content": "QGlkKCJ1c2VyX2Nhbm5vdF9yZWFkX2lmX2ZyYXVkdWxlbnQiKQpmb3JiaWQgKAogIHByaW5jaXBhbCBpcyBKYW5zOjpVc2VyLAogIGFjdGlvbiA9PSBKYW5zOjpBY3Rpb246OiJSZWFkIiwKICByZXNvdXJjZSBpcyBKYW5zOjpTZWNyZXREb2N1bWVudAopIHdoZW4gewogIGNvbnRleHQgaGFzIGZyYXVkX2luZGljYXRvcnMgJiYKICBjb250ZXh0LmZyYXVkX2luZGljYXRvcnMuY29udGFpbnMoImhpZ2hfcmlzayIpCn07" - }, - "50c0ea31a9ed25a575b7538dec38cb953431651e7bec": { - "description": "user_can_read_if_email_is_example", - "creation_date": "2025-12-17T10:21:47.433255", - "policy_content": "QGlkKCJ1c2VyX2Nhbl9yZWFkX2lmX2VtYWlsX2lzX2V4YW1wbGUiKQpwZXJtaXQgKAogIHByaW5jaXBhbCBpcyBKYW5zOjpVc2VyLAogIGFjdGlvbiA9PSBKYW5zOjpBY3Rpb246OiJSZWFkIiwKICByZXNvdXJjZSBpcyBKYW5zOjpTZWNyZXREb2N1bWVudAopCndoZW4gewogIHByaW5jaXBhbCBoYXMgZW1haWwgJiYKICBwcmluY2lwYWwuZW1haWwuZG9tYWluID09ICJleGFtcGxlLmNvbSIKfTs=" - }, - "28e83add6e203af0d3814f06228e45a0eeb5c1269b08": { - "description": "user_cannot_write_from_restricted_country", - "creation_date": "2025-12-17T10:25:47.641641", - "policy_content": "QGlkKCJ1c2VyX2Nhbm5vdF93cml0ZV9mcm9tX3Jlc3RyaWN0ZWRfY291bnRyeSIpCmZvcmJpZCAoCiAgcHJpbmNpcGFsIGlzIEphbnM6OlVzZXIsCiAgYWN0aW9uID09IEphbnM6OkFjdGlvbjo6IldyaXRlIiwKICByZXNvdXJjZSBpcyBKYW5zOjpTZWNyZXREb2N1bWVudAopIHdoZW4gewogIGNvbnRleHQgaGFzIGdlb2xvY2F0aW9uICYmCiAgY29udGV4dC5nZW9sb2NhdGlvbi5jb250YWlucygicmVzdHJpY3RlZCIpCn07" - } - }, - "trusted_issuers": { - "1985d6d8767b87d752035c9f9c0078daf057ad2cd5ea": { - "name": "Jans", - "description": "", - "openid_configuration_endpoint": "https://test-jans.gluu.info/.well-known/openid-configuration", - "token_metadata": { - "access_token": { - "trusted": true, - "entity_type_name": "Jans::Access_token", - "user_id": "sub", - "token_id": "jti", - "workload_id": "rp_id", - "claim_mapping": {}, - "required_claims": [ - "jti", - "iss", - "aud", - "sub", - "exp", - "nbf" - ], - "role_mapping": "role", - "principal_mapping": [ - "Jans::Workload" - ] - }, - "id_token": { - "trusted": true, - "entity_type_name": "Jans::id_token", - "user_id": "sub", - "token_id": "jti", - "role_mapping": "role", - "claim_mapping": {}, - "principal_mapping": [ - "Jans::User" - ] - }, - "userinfo_token": { - "trusted": true, - "entity_type_name": "Jans::Userinfo_token", - "user_id": "sub", - "token_id": "jti", - "role_mapping": "role", - "claim_mapping": {}, - "principal_mapping": [ - "Jans::User" - ] - }, - "tx_token": { - "trusted": true, - "entity_type_name": "Jans::Access_token", - "user_id": "sub", - "token_id": "jti" - } - } - } - }, - "schema": "{"Jans":{"commonTypes":{"Context":{"type":"Record","attributes":{"current_time":{"type":"EntityOrCommon","required":false,"name":"Long"},"device_health":{"type":"Set","required":false,"element":{"type":"EntityOrCommon","name":"String"}},"fraud_indicators":{"type":"Set","required":false,"element":{"type":"EntityOrCommon","name":"String"}},"geolocation":{"type":"Set","required":false,"element":{"type":"EntityOrCommon","name":"String"}},"network":{"type":"EntityOrCommon","required":false,"name":"String"},"network_type":{"type":"EntityOrCommon","required":false,"name":"String"},"operating_system":{"type":"EntityOrCommon","required":false,"name":"String"},"tokens":{"type":"EntityOrCommon","required":false,"name":"TokensContext"},"user_agent":{"type":"EntityOrCommon","required":false,"name":"String"}}},"email_address":{"type":"Record","attributes":{"domain":{"type":"EntityOrCommon","name":"String"},"uid":{"type":"EntityOrCommon","name":"String"}}},"TokensContext":{"type":"Record","attributes":{"total_token_count":{"type":"EntityOrCommon","name":"Long"}}},"Url":{"type":"Record","attributes":{"host":{"type":"EntityOrCommon","name":"String"},"path":{"type":"EntityOrCommon","name":"String"},"protocol":{"type":"EntityOrCommon","name":"String"}}}},"entityTypes":{"Access_token":{"shape":{"type":"Record","attributes":{"aud":{"type":"EntityOrCommon","required":false,"name":"String"},"exp":{"type":"EntityOrCommon","required":false,"name":"Long"},"iat":{"type":"EntityOrCommon","required":false,"name":"Long"},"iss":{"type":"EntityOrCommon","required":false,"name":"TrustedIssuer"},"jti":{"type":"EntityOrCommon","required":false,"name":"String"},"nbf":{"type":"EntityOrCommon","required":false,"name":"Long"},"scope":{"type":"Set","required":false,"element":{"type":"EntityOrCommon","name":"String"}},"token_type":{"type":"EntityOrCommon","required":false,"name":"String"},"validated_at":{"type":"EntityOrCommon","required":false,"name":"Long"}}},"tags":{"type":"Set","element":{"type":"EntityOrCommon","name":"String"}}},"Application":{"shape":{"type":"Record","attributes":{"app_id":{"type":"EntityOrCommon","name":"String"},"name":{"type":"EntityOrCommon","name":"String"},"url":{"type":"EntityOrCommon","name":"Url"}}}},"HTTP_Request":{"shape":{"type":"Record","attributes":{"header":{"type":"Record","attributes":{"Accept":{"type":"EntityOrCommon","required":false,"name":"String"}}},"url":{"type":"EntityOrCommon","name":"Url"}}}},"id_token":{"shape":{"type":"Record","attributes":{"acr":{"type":"EntityOrCommon","required":false,"name":"String"},"amr":{"type":"Set","required":false,"element":{"type":"EntityOrCommon","name":"String"}},"aud":{"type":"Set","required":false,"element":{"type":"EntityOrCommon","name":"String"}},"azp":{"type":"EntityOrCommon","required":false,"name":"String"},"birthdate":{"type":"EntityOrCommon","required":false,"name":"String"},"email":{"type":"EntityOrCommon","required":false,"name":"email_address"},"exp":{"type":"EntityOrCommon","required":false,"name":"Long"},"iat":{"type":"EntityOrCommon","required":false,"name":"Long"},"iss":{"type":"EntityOrCommon","required":false,"name":"TrustedIssuer"},"jti":{"type":"EntityOrCommon","required":false,"name":"String"},"name":{"type":"EntityOrCommon","required":false,"name":"String"},"phone_number":{"type":"EntityOrCommon","required":false,"name":"String"},"role":{"type":"Set","required":false,"element":{"type":"EntityOrCommon","name":"String"}},"sub":{"type":"EntityOrCommon","required":false,"name":"String"},"token_type":{"type":"EntityOrCommon","required":false,"name":"String"},"validated_at":{"type":"EntityOrCommon","required":false,"name":"Long"}}},"tags":{"type":"Set","element":{"type":"EntityOrCommon","name":"String"}}},"Role":{"shape":{"type":"Record","attributes":{}}},"SecretDocument":{"shape":{"type":"Record","attributes":{}}},"TrustedIssuer":{"shape":{"type":"Record","attributes":{"issuer_entity_id":{"type":"EntityOrCommon","name":"Url"}}}},"User":{"shape":{"type":"Record","attributes":{"email":{"type":"EntityOrCommon","required":false,"name":"email_address"},"id_token":{"type":"EntityOrCommon","required":false,"name":"id_token"},"phone_number":{"type":"EntityOrCommon","required":false,"name":"String"},"role":{"type":"Set","element":{"type":"EntityOrCommon","name":"String"}},"sub":{"type":"EntityOrCommon","name":"String"},"userinfo_token":{"type":"EntityOrCommon","required":false,"name":"Userinfo_token"},"username":{"type":"EntityOrCommon","required":false,"name":"String"}}},"memberOfTypes":["Role"]},"Userinfo_token":{"shape":{"type":"Record","attributes":{"aud":{"type":"EntityOrCommon","required":false,"name":"String"},"birthdate":{"type":"EntityOrCommon","required":false,"name":"String"},"email":{"type":"EntityOrCommon","required":false,"name":"email_address"},"exp":{"type":"EntityOrCommon","required":false,"name":"Long"},"iat":{"type":"EntityOrCommon","required":false,"name":"Long"},"iss":{"type":"EntityOrCommon","required":false,"name":"TrustedIssuer"},"jti":{"type":"EntityOrCommon","required":false,"name":"String"},"name":{"type":"EntityOrCommon","required":false,"name":"String"},"phone_number":{"type":"EntityOrCommon","required":false,"name":"String"},"role":{"type":"Set","required":false,"element":{"type":"EntityOrCommon","name":"String"}},"sub":{"type":"EntityOrCommon","required":false,"name":"String"},"token_type":{"type":"EntityOrCommon","required":false,"name":"String"},"validated_at":{"type":"EntityOrCommon","required":false,"name":"Long"}}},"tags":{"type":"Set","element":{"type":"EntityOrCommon","name":"String"}}},"Workload":{"shape":{"type":"Record","attributes":{"access_token":{"type":"EntityOrCommon","required":false,"name":"Access_token"},"client_id":{"type":"EntityOrCommon","name":"String"},"iss":{"type":"EntityOrCommon","required":false,"name":"TrustedIssuer"},"name":{"type":"EntityOrCommon","required":false,"name":"String"},"rp_id":{"type":"EntityOrCommon","required":false,"name":"String"},"spiffe_id":{"type":"EntityOrCommon","required":false,"name":"String"}}}}},"actions":{"Compare":{"appliesTo":{"principalTypes":["User","Workload"],"resourceTypes":["Application"],"context":{"type":"Context"}}},"DELETE":{"appliesTo":{"principalTypes":["Workload"],"resourceTypes":["HTTP_Request"],"context":{"type":"Context"}}},"Execute":{"appliesTo":{"principalTypes":["User","Workload"],"resourceTypes":["Application"],"context":{"type":"Context"}}},"GET":{"appliesTo":{"principalTypes":["Workload"],"resourceTypes":["HTTP_Request"],"context":{"type":"Context"}}},"HEAD":{"appliesTo":{"principalTypes":["Workload"],"resourceTypes":["HTTP_Request"],"context":{"type":"Context"}}},"Monitor":{"appliesTo":{"principalTypes":["User","Workload"],"resourceTypes":["Application"],"context":{"type":"Context"}}},"PATCH":{"appliesTo":{"principalTypes":["Workload"],"resourceTypes":["HTTP_Request"],"context":{"type":"Context"}}},"POST":{"appliesTo":{"principalTypes":["Workload"],"resourceTypes":["HTTP_Request"],"context":{"type":"Context"}}},"PUT":{"appliesTo":{"principalTypes":["Workload"],"resourceTypes":["HTTP_Request"],"context":{"type":"Context"}}},"Read":{"appliesTo":{"principalTypes":["User","Workload"],"resourceTypes":["Application","SecretDocument"],"context":{"type":"Context"}}},"Search":{"appliesTo":{"principalTypes":["User","Workload"],"resourceTypes":["Application"],"context":{"type":"Context"}}},"Share":{"appliesTo":{"principalTypes":["User","Workload"],"resourceTypes":["Application"],"context":{"type":"Context"}}},"Tag":{"appliesTo":{"principalTypes":["User","Workload"],"resourceTypes":["Application"],"context":{"type":"Context"}}},"Write":{"appliesTo":{"principalTypes":["User","Workload"],"resourceTypes":["Application","SecretDocument"],"context":{"type":"Context"}}}}}}" - } - } -} From 31b814f829f17ba111d4779700179585020c8368 Mon Sep 17 00:00:00 2001 From: Safin Wasi <6601566+SafinWasi@users.noreply.github.com> Date: Fri, 13 Mar 2026 02:28:01 +0000 Subject: [PATCH 002/113] fix: delete file --- ...b2d44ad4e7aa8f1182cde9f72dcbaa244f4327.json | 18 ------------------ 1 file changed, 18 deletions(-) delete mode 100644 6d9f73b2d44ad4e7aa8f1182cde9f72dcbaa244f4327.json diff --git a/6d9f73b2d44ad4e7aa8f1182cde9f72dcbaa244f4327.json b/6d9f73b2d44ad4e7aa8f1182cde9f72dcbaa244f4327.json deleted file mode 100644 index d906c3e..0000000 --- a/6d9f73b2d44ad4e7aa8f1182cde9f72dcbaa244f4327.json +++ /dev/null @@ -1,18 +0,0 @@ -{ - "cedar_version": "4.3.0", - "policy_stores": { - "6d9f73b2d44ad4e7aa8f1182cde9f72dcbaa244f4327": { - "name": "tarpUnsignedDemo", - "description": "", - "policies": { - "a2d0458ac26b69e4b191193fa307d941e8ab0ca2d5b1": { - "description": "allow_teacher", - "creation_date": "2025-04-07T16:02:31.260907", - "policy_content": "QGlkKCJhbGxvd190ZWFjaGVyIikKcGVybWl0KAogIHByaW5jaXBhbCBpcyBKYW5zOjpVc2VyLAogIGFjdGlvbiwKICByZXNvdXJjZQopCndoZW4gewogIHByaW5jaXBhbCBoYXMgcm9sZSAmJgogIHByaW5jaXBhbC5yb2xlLmNvbnRhaW5zKCJUZWFjaGVyIikKfTs=" - } - }, - "trusted_issuers": {}, - "schema": "{"Jans":{"commonTypes":{"Context":{"type":"Record","attributes":{"current_time":{"type":"EntityOrCommon","required":false,"name":"Long"},"device_health":{"type":"Set","required":false,"element":{"type":"EntityOrCommon","name":"String"}},"fraud_indicators":{"type":"Set","required":false,"element":{"type":"EntityOrCommon","name":"String"}},"geolocation":{"type":"Set","required":false,"element":{"type":"EntityOrCommon","name":"String"}},"network":{"type":"EntityOrCommon","required":false,"name":"String"},"network_type":{"type":"EntityOrCommon","required":false,"name":"String"},"operating_system":{"type":"EntityOrCommon","required":false,"name":"String"},"tokens":{"type":"EntityOrCommon","required":false,"name":"TokensContext"},"user_agent":{"type":"EntityOrCommon","required":false,"name":"String"}}},"email_address":{"type":"Record","attributes":{"domain":{"type":"EntityOrCommon","name":"String"},"uid":{"type":"EntityOrCommon","name":"String"}}},"TokensContext":{"type":"Record","attributes":{"total_token_count":{"type":"EntityOrCommon","name":"Long"}}},"Url":{"type":"Record","attributes":{"host":{"type":"EntityOrCommon","name":"String"},"path":{"type":"EntityOrCommon","name":"String"},"protocol":{"type":"EntityOrCommon","name":"String"}}}},"entityTypes":{"Access_token":{"shape":{"type":"Record","attributes":{"aud":{"type":"EntityOrCommon","required":false,"name":"String"},"exp":{"type":"EntityOrCommon","required":false,"name":"Long"},"iat":{"type":"EntityOrCommon","required":false,"name":"Long"},"iss":{"type":"EntityOrCommon","required":false,"name":"TrustedIssuer"},"jti":{"type":"EntityOrCommon","required":false,"name":"String"},"nbf":{"type":"EntityOrCommon","required":false,"name":"Long"},"scope":{"type":"Set","required":false,"element":{"type":"EntityOrCommon","name":"String"}},"token_type":{"type":"EntityOrCommon","required":false,"name":"String"},"validated_at":{"type":"EntityOrCommon","required":false,"name":"Long"}}},"tags":{"type":"Set","element":{"type":"EntityOrCommon","name":"String"}}},"Application":{"shape":{"type":"Record","attributes":{"app_id":{"type":"EntityOrCommon","name":"String"},"name":{"type":"EntityOrCommon","name":"String"},"url":{"type":"EntityOrCommon","name":"Url"}}}},"HTTP_Request":{"shape":{"type":"Record","attributes":{"header":{"type":"Record","attributes":{"Accept":{"type":"EntityOrCommon","required":false,"name":"String"}}},"url":{"type":"EntityOrCommon","name":"Url"}}}},"id_token":{"shape":{"type":"Record","attributes":{"acr":{"type":"EntityOrCommon","required":false,"name":"String"},"amr":{"type":"Set","required":false,"element":{"type":"EntityOrCommon","name":"String"}},"aud":{"type":"Set","required":false,"element":{"type":"EntityOrCommon","name":"String"}},"azp":{"type":"EntityOrCommon","required":false,"name":"String"},"birthdate":{"type":"EntityOrCommon","required":false,"name":"String"},"email":{"type":"EntityOrCommon","required":false,"name":"email_address"},"exp":{"type":"EntityOrCommon","required":false,"name":"Long"},"iat":{"type":"EntityOrCommon","required":false,"name":"Long"},"iss":{"type":"EntityOrCommon","required":false,"name":"TrustedIssuer"},"jti":{"type":"EntityOrCommon","required":false,"name":"String"},"name":{"type":"EntityOrCommon","required":false,"name":"String"},"phone_number":{"type":"EntityOrCommon","required":false,"name":"String"},"role":{"type":"Set","required":false,"element":{"type":"EntityOrCommon","name":"String"}},"sub":{"type":"EntityOrCommon","required":false,"name":"String"},"token_type":{"type":"EntityOrCommon","required":false,"name":"String"},"validated_at":{"type":"EntityOrCommon","required":false,"name":"Long"}}},"tags":{"type":"Set","element":{"type":"EntityOrCommon","name":"String"}}},"Role":{"shape":{"type":"Record","attributes":{}}},"SecretDocument":{"shape":{"type":"Record","attributes":{}}},"TrustedIssuer":{"shape":{"type":"Record","attributes":{"issuer_entity_id":{"type":"EntityOrCommon","name":"Url"}}}},"User":{"shape":{"type":"Record","attributes":{"email":{"type":"EntityOrCommon","required":false,"name":"email_address"},"id_token":{"type":"EntityOrCommon","required":false,"name":"id_token"},"phone_number":{"type":"EntityOrCommon","required":false,"name":"String"},"role":{"type":"Set","element":{"type":"EntityOrCommon","name":"String"}},"sub":{"type":"EntityOrCommon","name":"String"},"userinfo_token":{"type":"EntityOrCommon","required":false,"name":"Userinfo_token"},"username":{"type":"EntityOrCommon","required":false,"name":"String"}}},"memberOfTypes":["Role"]},"Userinfo_token":{"shape":{"type":"Record","attributes":{"aud":{"type":"EntityOrCommon","required":false,"name":"String"},"birthdate":{"type":"EntityOrCommon","required":false,"name":"String"},"email":{"type":"EntityOrCommon","required":false,"name":"email_address"},"exp":{"type":"EntityOrCommon","required":false,"name":"Long"},"iat":{"type":"EntityOrCommon","required":false,"name":"Long"},"iss":{"type":"EntityOrCommon","required":false,"name":"TrustedIssuer"},"jti":{"type":"EntityOrCommon","required":false,"name":"String"},"name":{"type":"EntityOrCommon","required":false,"name":"String"},"phone_number":{"type":"EntityOrCommon","required":false,"name":"String"},"role":{"type":"Set","required":false,"element":{"type":"EntityOrCommon","name":"String"}},"sub":{"type":"EntityOrCommon","required":false,"name":"String"},"token_type":{"type":"EntityOrCommon","required":false,"name":"String"},"validated_at":{"type":"EntityOrCommon","required":false,"name":"Long"}}},"tags":{"type":"Set","element":{"type":"EntityOrCommon","name":"String"}}},"Workload":{"shape":{"type":"Record","attributes":{"access_token":{"type":"EntityOrCommon","required":false,"name":"Access_token"},"client_id":{"type":"EntityOrCommon","name":"String"},"iss":{"type":"EntityOrCommon","required":false,"name":"TrustedIssuer"},"name":{"type":"EntityOrCommon","required":false,"name":"String"},"rp_id":{"type":"EntityOrCommon","required":false,"name":"String"},"spiffe_id":{"type":"EntityOrCommon","required":false,"name":"String"}}}}},"actions":{"Compare":{"appliesTo":{"principalTypes":["User","Workload"],"resourceTypes":["Application"],"context":{"type":"Context"}}},"DELETE":{"appliesTo":{"principalTypes":["Workload"],"resourceTypes":["HTTP_Request"],"context":{"type":"Context"}}},"Execute":{"appliesTo":{"principalTypes":["User","Workload"],"resourceTypes":["Application"],"context":{"type":"Context"}}},"GET":{"appliesTo":{"principalTypes":["Workload"],"resourceTypes":["HTTP_Request"],"context":{"type":"Context"}}},"HEAD":{"appliesTo":{"principalTypes":["Workload"],"resourceTypes":["HTTP_Request"],"context":{"type":"Context"}}},"Monitor":{"appliesTo":{"principalTypes":["User","Workload"],"resourceTypes":["Application"],"context":{"type":"Context"}}},"PATCH":{"appliesTo":{"principalTypes":["Workload"],"resourceTypes":["HTTP_Request"],"context":{"type":"Context"}}},"POST":{"appliesTo":{"principalTypes":["Workload"],"resourceTypes":["HTTP_Request"],"context":{"type":"Context"}}},"PUT":{"appliesTo":{"principalTypes":["Workload"],"resourceTypes":["HTTP_Request"],"context":{"type":"Context"}}},"Read":{"appliesTo":{"principalTypes":["User","Workload"],"resourceTypes":["Application","SecretDocument"],"context":{"type":"Context"}}},"Search":{"appliesTo":{"principalTypes":["User","Workload"],"resourceTypes":["Application"],"context":{"type":"Context"}}},"Share":{"appliesTo":{"principalTypes":["User","Workload"],"resourceTypes":["Application"],"context":{"type":"Context"}}},"Tag":{"appliesTo":{"principalTypes":["User","Workload"],"resourceTypes":["Application"],"context":{"type":"Context"}}},"Write":{"appliesTo":{"principalTypes":["User","Workload"],"resourceTypes":["Application","SecretDocument"],"context":{"type":"Context"}}}}}}" - } - } -} \ No newline at end of file From c88b93eaddcb6c711b46442f09140cd509d44fa6 Mon Sep 17 00:00:00 2001 From: Safin Wasi <6601566+SafinWasi@users.noreply.github.com> Date: Fri, 13 Mar 2026 02:28:03 +0000 Subject: [PATCH 003/113] fix: delete file --- LICENSE | 201 -------------------------------------------------------- 1 file changed, 201 deletions(-) delete mode 100644 LICENSE diff --git a/LICENSE b/LICENSE deleted file mode 100644 index 261eeb9..0000000 --- a/LICENSE +++ /dev/null @@ -1,201 +0,0 @@ - Apache License - Version 2.0, January 2004 - http://www.apache.org/licenses/ - - TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION - - 1. Definitions. - - "License" shall mean the terms and conditions for use, reproduction, - and distribution as defined by Sections 1 through 9 of this document. - - "Licensor" shall mean the copyright owner or entity authorized by - the copyright owner that is granting the License. - - "Legal Entity" shall mean the union of the acting entity and all - other entities that control, are controlled by, or are under common - control with that entity. For the purposes of this definition, - "control" means (i) the power, direct or indirect, to cause the - direction or management of such entity, whether by contract or - otherwise, or (ii) ownership of fifty percent (50%) or more of the - outstanding shares, or (iii) beneficial ownership of such entity. - - "You" (or "Your") shall mean an individual or Legal Entity - exercising permissions granted by this License. - - "Source" form shall mean the preferred form for making modifications, - including but not limited to software source code, documentation - source, and configuration files. - - "Object" form shall mean any form resulting from mechanical - transformation or translation of a Source form, including but - not limited to compiled object code, generated documentation, - and conversions to other media types. - - "Work" shall mean the work of authorship, whether in Source or - Object form, made available under the License, as indicated by a - copyright notice that is included in or attached to the work - (an example is provided in the Appendix below). - - "Derivative Works" shall mean any work, whether in Source or Object - form, that is based on (or derived from) the Work and for which the - editorial revisions, annotations, elaborations, or other modifications - represent, as a whole, an original work of authorship. For the purposes - of this License, Derivative Works shall not include works that remain - separable from, or merely link (or bind by name) to the interfaces of, - the Work and Derivative Works thereof. - - "Contribution" shall mean any work of authorship, including - the original version of the Work and any modifications or additions - to that Work or Derivative Works thereof, that is intentionally - submitted to Licensor for inclusion in the Work by the copyright owner - or by an individual or Legal Entity authorized to submit on behalf of - the copyright owner. For the purposes of this definition, "submitted" - means any form of electronic, verbal, or written communication sent - to the Licensor or its representatives, including but not limited to - communication on electronic mailing lists, source code control systems, - and issue tracking systems that are managed by, or on behalf of, the - Licensor for the purpose of discussing and improving the Work, but - excluding communication that is conspicuously marked or otherwise - designated in writing by the copyright owner as "Not a Contribution." - - "Contributor" shall mean Licensor and any individual or Legal Entity - on behalf of whom a Contribution has been received by Licensor and - subsequently incorporated within the Work. - - 2. Grant of Copyright License. Subject to the terms and conditions of - this License, each Contributor hereby grants to You a perpetual, - worldwide, non-exclusive, no-charge, royalty-free, irrevocable - copyright license to reproduce, prepare Derivative Works of, - publicly display, publicly perform, sublicense, and distribute the - Work and such Derivative Works in Source or Object form. - - 3. Grant of Patent License. Subject to the terms and conditions of - this License, each Contributor hereby grants to You a perpetual, - worldwide, non-exclusive, no-charge, royalty-free, irrevocable - (except as stated in this section) patent license to make, have made, - use, offer to sell, sell, import, and otherwise transfer the Work, - where such license applies only to those patent claims licensable - by such Contributor that are necessarily infringed by their - Contribution(s) alone or by combination of their Contribution(s) - with the Work to which such Contribution(s) was submitted. If You - institute patent litigation against any entity (including a - cross-claim or counterclaim in a lawsuit) alleging that the Work - or a Contribution incorporated within the Work constitutes direct - or contributory patent infringement, then any patent licenses - granted to You under this License for that Work shall terminate - as of the date such litigation is filed. - - 4. Redistribution. You may reproduce and distribute copies of the - Work or Derivative Works thereof in any medium, with or without - modifications, and in Source or Object form, provided that You - meet the following conditions: - - (a) You must give any other recipients of the Work or - Derivative Works a copy of this License; and - - (b) You must cause any modified files to carry prominent notices - stating that You changed the files; and - - (c) You must retain, in the Source form of any Derivative Works - that You distribute, all copyright, patent, trademark, and - attribution notices from the Source form of the Work, - excluding those notices that do not pertain to any part of - the Derivative Works; and - - (d) If the Work includes a "NOTICE" text file as part of its - distribution, then any Derivative Works that You distribute must - include a readable copy of the attribution notices contained - within such NOTICE file, excluding those notices that do not - pertain to any part of the Derivative Works, in at least one - of the following places: within a NOTICE text file distributed - as part of the Derivative Works; within the Source form or - documentation, if provided along with the Derivative Works; or, - within a display generated by the Derivative Works, if and - wherever such third-party notices normally appear. The contents - of the NOTICE file are for informational purposes only and - do not modify the License. You may add Your own attribution - notices within Derivative Works that You distribute, alongside - or as an addendum to the NOTICE text from the Work, provided - that such additional attribution notices cannot be construed - as modifying the License. - - You may add Your own copyright statement to Your modifications and - may provide additional or different license terms and conditions - for use, reproduction, or distribution of Your modifications, or - for any such Derivative Works as a whole, provided Your use, - reproduction, and distribution of the Work otherwise complies with - the conditions stated in this License. - - 5. Submission of Contributions. Unless You explicitly state otherwise, - any Contribution intentionally submitted for inclusion in the Work - by You to the Licensor shall be under the terms and conditions of - this License, without any additional terms or conditions. - Notwithstanding the above, nothing herein shall supersede or modify - the terms of any separate license agreement you may have executed - with Licensor regarding such Contributions. - - 6. Trademarks. This License does not grant permission to use the trade - names, trademarks, service marks, or product names of the Licensor, - except as required for reasonable and customary use in describing the - origin of the Work and reproducing the content of the NOTICE file. - - 7. Disclaimer of Warranty. Unless required by applicable law or - agreed to in writing, Licensor provides the Work (and each - Contributor provides its Contributions) on an "AS IS" BASIS, - WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or - implied, including, without limitation, any warranties or conditions - of TITLE, NON-INFRINGEMENT, MERCHANTABILITY, or FITNESS FOR A - PARTICULAR PURPOSE. You are solely responsible for determining the - appropriateness of using or redistributing the Work and assume any - risks associated with Your exercise of permissions under this License. - - 8. Limitation of Liability. In no event and under no legal theory, - whether in tort (including negligence), contract, or otherwise, - unless required by applicable law (such as deliberate and grossly - negligent acts) or agreed to in writing, shall any Contributor be - liable to You for damages, including any direct, indirect, special, - incidental, or consequential damages of any character arising as a - result of this License or out of the use or inability to use the - Work (including but not limited to damages for loss of goodwill, - work stoppage, computer failure or malfunction, or any and all - other commercial damages or losses), even if such Contributor - has been advised of the possibility of such damages. - - 9. Accepting Warranty or Additional Liability. While redistributing - the Work or Derivative Works thereof, You may choose to offer, - and charge a fee for, acceptance of support, warranty, indemnity, - or other liability obligations and/or rights consistent with this - License. However, in accepting such obligations, You may act only - on Your own behalf and on Your sole responsibility, not on behalf - of any other Contributor, and only if You agree to indemnify, - defend, and hold each Contributor harmless for any liability - incurred by, or claims asserted against, such Contributor by reason - of your accepting any such warranty or additional liability. - - END OF TERMS AND CONDITIONS - - APPENDIX: How to apply the Apache License to your work. - - To apply the Apache License to your work, attach the following - boilerplate notice, with the fields enclosed by brackets "[]" - replaced with your own identifying information. (Don't include - the brackets!) The text should be enclosed in the appropriate - comment syntax for the file format. We also recommend that a - file or class name and description of purpose be included on the - same "printed page" as the copyright notice for easier - identification within third-party archives. - - Copyright [yyyy] [name of copyright owner] - - Licensed under the Apache License, Version 2.0 (the "License"); - you may not use this file except in compliance with the License. - You may obtain a copy of the License at - - http://www.apache.org/licenses/LICENSE-2.0 - - Unless required by applicable law or agreed to in writing, software - distributed under the License is distributed on an "AS IS" BASIS, - WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. - See the License for the specific language governing permissions and - limitations under the License. From 9a36fcf69bde0b1c19732c24e86c4f201acaac2a Mon Sep 17 00:00:00 2001 From: Safin Wasi <6601566+SafinWasi@users.noreply.github.com> Date: Fri, 13 Mar 2026 02:28:06 +0000 Subject: [PATCH 004/113] feat: delete tarpDemo --- ...13b34711a196f382ade96677cefd513a2a6deff1b949.policy | 6 ------ ...28e83add6e203af0d3814f06228e45a0eeb5c1269b08.policy | 9 --------- ...420184da127304d1b2898761893a974096f6dbade45a.policy | 9 --------- ...4ab79a92feac06a1a005373b741ed50e07d23d98f9a5.policy | 6 ------ ...50c0ea31a9ed25a575b7538dec38cb953431651e7bec.policy | 10 ---------- ...689edd369c276afb5a163119dcd92c74196a4e0c7bdb.policy | 9 --------- ...6e46e36071466cc37c0e9bbd65f16c51ea2ab152c6fc.policy | 6 ------ ...76acfe86fb09731682f92c4fbf7d2e066813ce639404.policy | 6 ------ ...870eaec25d9c8e9a642c4ed4d08b1ad480e6bc1348c7.policy | 6 ------ ...91b2611a1ea9859cb7ce780ca16adf3b2a68f892786a.policy | 6 ------ ...9e2f1520bd292765609e8ce57add8d3c134e3a91759d.policy | 6 ------ tarpDemo/README.md | 1 - ...a6f9c66ddcadeeec9e0f65420c89715b00a835ffdaec.policy | 6 ------ ...b5111ecf0d218da2cdbece83aeb77cb6b479d3b5d85c.policy | 6 ------ ...c367d06f19af8db1ec69354044334c799ff4cd2021ae.policy | 9 --------- ...c4729e4ab456b4c8e74102593e5b32e04176bc837cc5.policy | 6 ------ ...e459eba6691d141497dd1317e44d3d5b3bdd9fd65150.policy | 6 ------ ...e76eb1853f0c6a199ca383cd9714e0113dfd851e079a.policy | 6 ------ ...f38f10e80c6f429153cf97781a4c6bcf29761a04259f.policy | 9 --------- ...fe83e4b2338614b970559ce4141b6d3e60559d79282c.policy | 9 --------- ...fe84f983188f1639a03ed77c0753fc893fbe0d4cf155.policy | 6 ------ 21 files changed, 143 deletions(-) delete mode 100644 tarpDemo/13b34711a196f382ade96677cefd513a2a6deff1b949.policy delete mode 100644 tarpDemo/28e83add6e203af0d3814f06228e45a0eeb5c1269b08.policy delete mode 100644 tarpDemo/420184da127304d1b2898761893a974096f6dbade45a.policy delete mode 100644 tarpDemo/4ab79a92feac06a1a005373b741ed50e07d23d98f9a5.policy delete mode 100644 tarpDemo/50c0ea31a9ed25a575b7538dec38cb953431651e7bec.policy delete mode 100644 tarpDemo/689edd369c276afb5a163119dcd92c74196a4e0c7bdb.policy delete mode 100644 tarpDemo/6e46e36071466cc37c0e9bbd65f16c51ea2ab152c6fc.policy delete mode 100644 tarpDemo/76acfe86fb09731682f92c4fbf7d2e066813ce639404.policy delete mode 100644 tarpDemo/870eaec25d9c8e9a642c4ed4d08b1ad480e6bc1348c7.policy delete mode 100644 tarpDemo/91b2611a1ea9859cb7ce780ca16adf3b2a68f892786a.policy delete mode 100644 tarpDemo/9e2f1520bd292765609e8ce57add8d3c134e3a91759d.policy delete mode 100644 tarpDemo/README.md delete mode 100644 tarpDemo/a6f9c66ddcadeeec9e0f65420c89715b00a835ffdaec.policy delete mode 100644 tarpDemo/b5111ecf0d218da2cdbece83aeb77cb6b479d3b5d85c.policy delete mode 100644 tarpDemo/c367d06f19af8db1ec69354044334c799ff4cd2021ae.policy delete mode 100644 tarpDemo/c4729e4ab456b4c8e74102593e5b32e04176bc837cc5.policy delete mode 100644 tarpDemo/e459eba6691d141497dd1317e44d3d5b3bdd9fd65150.policy delete mode 100644 tarpDemo/e76eb1853f0c6a199ca383cd9714e0113dfd851e079a.policy delete mode 100644 tarpDemo/f38f10e80c6f429153cf97781a4c6bcf29761a04259f.policy delete mode 100644 tarpDemo/fe83e4b2338614b970559ce4141b6d3e60559d79282c.policy delete mode 100644 tarpDemo/fe84f983188f1639a03ed77c0753fc893fbe0d4cf155.policy diff --git a/tarpDemo/13b34711a196f382ade96677cefd513a2a6deff1b949.policy b/tarpDemo/13b34711a196f382ade96677cefd513a2a6deff1b949.policy deleted file mode 100644 index d8e59de..0000000 --- a/tarpDemo/13b34711a196f382ade96677cefd513a2a6deff1b949.policy +++ /dev/null @@ -1,6 +0,0 @@ -@id("admin_can_write_to_application") -permit ( - principal in Jans::Role::"admin", - action == Jans::Action::"Write", - resource is Jans::Application -); \ No newline at end of file diff --git a/tarpDemo/28e83add6e203af0d3814f06228e45a0eeb5c1269b08.policy b/tarpDemo/28e83add6e203af0d3814f06228e45a0eeb5c1269b08.policy deleted file mode 100644 index 15b9f4e..0000000 --- a/tarpDemo/28e83add6e203af0d3814f06228e45a0eeb5c1269b08.policy +++ /dev/null @@ -1,9 +0,0 @@ -@id("user_cannot_write_from_restricted_country") -forbid ( - principal is Jans::User, - action == Jans::Action::"Write", - resource is Jans::SecretDocument -) when { - context has geolocation && - context.geolocation.contains("restricted") -}; \ No newline at end of file diff --git a/tarpDemo/420184da127304d1b2898761893a974096f6dbade45a.policy b/tarpDemo/420184da127304d1b2898761893a974096f6dbade45a.policy deleted file mode 100644 index da536ec..0000000 --- a/tarpDemo/420184da127304d1b2898761893a974096f6dbade45a.policy +++ /dev/null @@ -1,9 +0,0 @@ -@id("user_cannot_execute_on_public_network") -forbid ( - principal is Jans::User, - action == Jans::Action::"Execute", - resource is Jans::Application -) when { - context has network_type && - context.network_type == "public" -}; diff --git a/tarpDemo/4ab79a92feac06a1a005373b741ed50e07d23d98f9a5.policy b/tarpDemo/4ab79a92feac06a1a005373b741ed50e07d23d98f9a5.policy deleted file mode 100644 index a473034..0000000 --- a/tarpDemo/4ab79a92feac06a1a005373b741ed50e07d23d98f9a5.policy +++ /dev/null @@ -1,6 +0,0 @@ -@id("user_can_tag") -permit ( - principal is Jans::User, - action == Jans::Action::"Tag", - resource is Jans::Application -); \ No newline at end of file diff --git a/tarpDemo/50c0ea31a9ed25a575b7538dec38cb953431651e7bec.policy b/tarpDemo/50c0ea31a9ed25a575b7538dec38cb953431651e7bec.policy deleted file mode 100644 index c7cccc3..0000000 --- a/tarpDemo/50c0ea31a9ed25a575b7538dec38cb953431651e7bec.policy +++ /dev/null @@ -1,10 +0,0 @@ -@id("user_can_read_if_email_is_example") -permit ( - principal is Jans::User, - action == Jans::Action::"Read", - resource is Jans::SecretDocument -) -when { - principal has email && - principal.email.domain == "example.com" -}; \ No newline at end of file diff --git a/tarpDemo/689edd369c276afb5a163119dcd92c74196a4e0c7bdb.policy b/tarpDemo/689edd369c276afb5a163119dcd92c74196a4e0c7bdb.policy deleted file mode 100644 index 0951e86..0000000 --- a/tarpDemo/689edd369c276afb5a163119dcd92c74196a4e0c7bdb.policy +++ /dev/null @@ -1,9 +0,0 @@ -@id("user_cannot_read_if_compromised") -forbid ( - principal is Jans::User, - action == Jans::Action::"Read", - resource is Jans::SecretDocument -) when { - context has device_health && - context.device_health.contains("compromised") -}; \ No newline at end of file diff --git a/tarpDemo/6e46e36071466cc37c0e9bbd65f16c51ea2ab152c6fc.policy b/tarpDemo/6e46e36071466cc37c0e9bbd65f16c51ea2ab152c6fc.policy deleted file mode 100644 index ba70df5..0000000 --- a/tarpDemo/6e46e36071466cc37c0e9bbd65f16c51ea2ab152c6fc.policy +++ /dev/null @@ -1,6 +0,0 @@ -@id("user_can_search") -permit ( - principal is Jans::User, - action == Jans::Action::"Search", - resource is Jans::Application -); \ No newline at end of file diff --git a/tarpDemo/76acfe86fb09731682f92c4fbf7d2e066813ce639404.policy b/tarpDemo/76acfe86fb09731682f92c4fbf7d2e066813ce639404.policy deleted file mode 100644 index b1f618f..0000000 --- a/tarpDemo/76acfe86fb09731682f92c4fbf7d2e066813ce639404.policy +++ /dev/null @@ -1,6 +0,0 @@ -@id("allow_teacher_secretdocument") -permit( - principal in Jans::Role::"Teacher", - action, - resource is Jans::SecretDocument -); \ No newline at end of file diff --git a/tarpDemo/870eaec25d9c8e9a642c4ed4d08b1ad480e6bc1348c7.policy b/tarpDemo/870eaec25d9c8e9a642c4ed4d08b1ad480e6bc1348c7.policy deleted file mode 100644 index 82440e5..0000000 --- a/tarpDemo/870eaec25d9c8e9a642c4ed4d08b1ad480e6bc1348c7.policy +++ /dev/null @@ -1,6 +0,0 @@ -@id("user_cannot_write_to_secretdocument") -forbid ( - principal is Jans::User, - action == Jans::Action::"Write", - resource is Jans::SecretDocument -); \ No newline at end of file diff --git a/tarpDemo/91b2611a1ea9859cb7ce780ca16adf3b2a68f892786a.policy b/tarpDemo/91b2611a1ea9859cb7ce780ca16adf3b2a68f892786a.policy deleted file mode 100644 index 50cec10..0000000 --- a/tarpDemo/91b2611a1ea9859cb7ce780ca16adf3b2a68f892786a.policy +++ /dev/null @@ -1,6 +0,0 @@ -@id("user_can_read") -permit ( - principal is Jans::User, - action == Jans::Action::"Read", - resource is Jans::Application -); \ No newline at end of file diff --git a/tarpDemo/9e2f1520bd292765609e8ce57add8d3c134e3a91759d.policy b/tarpDemo/9e2f1520bd292765609e8ce57add8d3c134e3a91759d.policy deleted file mode 100644 index 8fce2dc..0000000 --- a/tarpDemo/9e2f1520bd292765609e8ce57add8d3c134e3a91759d.policy +++ /dev/null @@ -1,6 +0,0 @@ -@id("security_admin_can_write_to_secretdocument") -permit ( - principal in Jans::Role::"security-admin", - action == Jans::Action::"Write", - resource is Jans::SecretDocument -); \ No newline at end of file diff --git a/tarpDemo/README.md b/tarpDemo/README.md deleted file mode 100644 index f2a2ba0..0000000 --- a/tarpDemo/README.md +++ /dev/null @@ -1 +0,0 @@ -### tarpDemo \ No newline at end of file diff --git a/tarpDemo/a6f9c66ddcadeeec9e0f65420c89715b00a835ffdaec.policy b/tarpDemo/a6f9c66ddcadeeec9e0f65420c89715b00a835ffdaec.policy deleted file mode 100644 index 191c794..0000000 --- a/tarpDemo/a6f9c66ddcadeeec9e0f65420c89715b00a835ffdaec.policy +++ /dev/null @@ -1,6 +0,0 @@ -@id("allow_student_read") -permit ( - principal in Jans::Role::"Student", - action in [Jans::Action::"Read"], - resource -); \ No newline at end of file diff --git a/tarpDemo/b5111ecf0d218da2cdbece83aeb77cb6b479d3b5d85c.policy b/tarpDemo/b5111ecf0d218da2cdbece83aeb77cb6b479d3b5d85c.policy deleted file mode 100644 index a96a71b..0000000 --- a/tarpDemo/b5111ecf0d218da2cdbece83aeb77cb6b479d3b5d85c.policy +++ /dev/null @@ -1,6 +0,0 @@ -@id("user_can_monitor") -permit ( - principal is Jans::User, - action == Jans::Action::"Monitor", - resource is Jans::Application -); \ No newline at end of file diff --git a/tarpDemo/c367d06f19af8db1ec69354044334c799ff4cd2021ae.policy b/tarpDemo/c367d06f19af8db1ec69354044334c799ff4cd2021ae.policy deleted file mode 100644 index eb63ca9..0000000 --- a/tarpDemo/c367d06f19af8db1ec69354044334c799ff4cd2021ae.policy +++ /dev/null @@ -1,9 +0,0 @@ -@id("user_cannot_read_if_fraudulent") -forbid ( - principal is Jans::User, - action == Jans::Action::"Read", - resource is Jans::SecretDocument -) when { - context has fraud_indicators && - context.fraud_indicators.contains("high_risk") -}; \ No newline at end of file diff --git a/tarpDemo/c4729e4ab456b4c8e74102593e5b32e04176bc837cc5.policy b/tarpDemo/c4729e4ab456b4c8e74102593e5b32e04176bc837cc5.policy deleted file mode 100644 index 056b1cb..0000000 --- a/tarpDemo/c4729e4ab456b4c8e74102593e5b32e04176bc837cc5.policy +++ /dev/null @@ -1,6 +0,0 @@ -@id("user_can_compare") -permit ( - principal is Jans::User, - action == Jans::Action::"Compare", - resource is Jans::Application -); \ No newline at end of file diff --git a/tarpDemo/e459eba6691d141497dd1317e44d3d5b3bdd9fd65150.policy b/tarpDemo/e459eba6691d141497dd1317e44d3d5b3bdd9fd65150.policy deleted file mode 100644 index a9a8a9f..0000000 --- a/tarpDemo/e459eba6691d141497dd1317e44d3d5b3bdd9fd65150.policy +++ /dev/null @@ -1,6 +0,0 @@ -@id("user_can_read_if_confidential_role") -permit ( - principal in Jans::Role::"confidential", - action == Jans::Action::"Read", - resource is Jans::SecretDocument -); \ No newline at end of file diff --git a/tarpDemo/e76eb1853f0c6a199ca383cd9714e0113dfd851e079a.policy b/tarpDemo/e76eb1853f0c6a199ca383cd9714e0113dfd851e079a.policy deleted file mode 100644 index b16dd9e..0000000 --- a/tarpDemo/e76eb1853f0c6a199ca383cd9714e0113dfd851e079a.policy +++ /dev/null @@ -1,6 +0,0 @@ -@id("user_can_execute") -permit ( - principal is Jans::User, - action == Jans::Action::"Execute", - resource is Jans::Application -); \ No newline at end of file diff --git a/tarpDemo/f38f10e80c6f429153cf97781a4c6bcf29761a04259f.policy b/tarpDemo/f38f10e80c6f429153cf97781a4c6bcf29761a04259f.policy deleted file mode 100644 index 1b62876..0000000 --- a/tarpDemo/f38f10e80c6f429153cf97781a4c6bcf29761a04259f.policy +++ /dev/null @@ -1,9 +0,0 @@ -@id("cannot_write_if_not_admin") -forbid ( - principal is Jans::User, - action == Jans::Action::"Write", - resource is Jans::Application -) when { - principal has role && - !principal.role.contains("admin") -}; \ No newline at end of file diff --git a/tarpDemo/fe83e4b2338614b970559ce4141b6d3e60559d79282c.policy b/tarpDemo/fe83e4b2338614b970559ce4141b6d3e60559d79282c.policy deleted file mode 100644 index f0502fb..0000000 --- a/tarpDemo/fe83e4b2338614b970559ce4141b6d3e60559d79282c.policy +++ /dev/null @@ -1,9 +0,0 @@ -@id("user_can_read_in_corp_network") -permit ( - principal is Jans::User, - action == Jans::Action::"Read", - resource is Jans::SecretDocument -) when { - context has network && - context.network == "corp" -}; \ No newline at end of file diff --git a/tarpDemo/fe84f983188f1639a03ed77c0753fc893fbe0d4cf155.policy b/tarpDemo/fe84f983188f1639a03ed77c0753fc893fbe0d4cf155.policy deleted file mode 100644 index 1da6c83..0000000 --- a/tarpDemo/fe84f983188f1639a03ed77c0753fc893fbe0d4cf155.policy +++ /dev/null @@ -1,6 +0,0 @@ -@id("editor_can_share") -permit ( - principal in Jans::Role::"Editor", - action == Jans::Action::"Share", - resource is Jans::Application -); \ No newline at end of file From 72b2ff2320cc5604606c56b58e53aab3bf311b7a Mon Sep 17 00:00:00 2001 From: Safin Wasi <6601566+SafinWasi@users.noreply.github.com> Date: Fri, 13 Mar 2026 02:28:07 +0000 Subject: [PATCH 005/113] feat: delete tarpUnsignedDemo --- tarpUnsignedDemo/README.md | 1 - ...a2d0458ac26b69e4b191193fa307d941e8ab0ca2d5b1.policy | 10 ---------- 2 files changed, 11 deletions(-) delete mode 100644 tarpUnsignedDemo/README.md delete mode 100644 tarpUnsignedDemo/a2d0458ac26b69e4b191193fa307d941e8ab0ca2d5b1.policy diff --git a/tarpUnsignedDemo/README.md b/tarpUnsignedDemo/README.md deleted file mode 100644 index 10a9af2..0000000 --- a/tarpUnsignedDemo/README.md +++ /dev/null @@ -1 +0,0 @@ -### tarpUnsignedDemo \ No newline at end of file diff --git a/tarpUnsignedDemo/a2d0458ac26b69e4b191193fa307d941e8ab0ca2d5b1.policy b/tarpUnsignedDemo/a2d0458ac26b69e4b191193fa307d941e8ab0ca2d5b1.policy deleted file mode 100644 index 3865fc8..0000000 --- a/tarpUnsignedDemo/a2d0458ac26b69e4b191193fa307d941e8ab0ca2d5b1.policy +++ /dev/null @@ -1,10 +0,0 @@ -@id("allow_teacher") -permit( - principal is Jans::User, - action, - resource -) -when { - principal has role && - principal.role.contains("Teacher") -}; \ No newline at end of file From f1bbd470fb32441712d85cd6fe1a736c44075c58 Mon Sep 17 00:00:00 2001 From: Safin Wasi <6601566+SafinWasi@users.noreply.github.com> Date: Fri, 13 Mar 2026 02:28:19 +0000 Subject: [PATCH 006/113] feat: importing policy stores --- tarpDemo/metadata.json | 11 + ...a196f382ade96677cefd513a2a6deff1b949.cedar | 6 + ...6e203af0d3814f06228e45a0eeb5c1269b08.cedar | 9 + ...127304d1b2898761893a974096f6dbade45a.cedar | 9 + ...feac06a1a005373b741ed50e07d23d98f9a5.cedar | 6 + ...a9ed25a575b7538dec38cb953431651e7bec.cedar | 10 + ...9c276afb5a163119dcd92c74196a4e0c7bdb.cedar | 9 + ...71466cc37c0e9bbd65f16c51ea2ab152c6fc.cedar | 6 + ...fb09731682f92c4fbf7d2e066813ce639404.cedar | 6 + ...1ea9859cb7ce780ca16adf3b2a68f892786a.cedar | 6 + ...bd292765609e8ce57add8d3c134e3a91759d.cedar | 6 + ...dcadeeec9e0f65420c89715b00a835ffdaec.cedar | 6 + ...0d218da2cdbece83aeb77cb6b479d3b5d85c.cedar | 6 + ...19af8db1ec69354044334c799ff4cd2021ae.cedar | 9 + ...b456b4c8e74102593e5b32e04176bc837cc5.cedar | 6 + ...691d141497dd1317e44d3d5b3bdd9fd65150.cedar | 6 + ...3f0c6a199ca383cd9714e0113dfd851e079a.cedar | 6 + ...0c6f429153cf97781a4c6bcf29761a04259f.cedar | 9 + ...338614b970559ce4141b6d3e60559d79282c.cedar | 9 + ...188f1639a03ed77c0753fc893fbe0d4cf155.cedar | 6 + tarpDemo/schema.cedarschema | 199 ++++++++++++++++++ ...8767b87d752035c9f9c0078daf057ad2cd5ea.json | 56 +++++ tarpUnsignedDemo/metadata.json | 11 + ...c26b69e4b191193fa307d941e8ab0ca2d5b1.cedar | 10 + tarpUnsignedDemo/schema.cedarschema | 199 ++++++++++++++++++ 25 files changed, 622 insertions(+) create mode 100644 tarpDemo/metadata.json create mode 100644 tarpDemo/policies/13b34711a196f382ade96677cefd513a2a6deff1b949.cedar create mode 100644 tarpDemo/policies/28e83add6e203af0d3814f06228e45a0eeb5c1269b08.cedar create mode 100644 tarpDemo/policies/420184da127304d1b2898761893a974096f6dbade45a.cedar create mode 100644 tarpDemo/policies/4ab79a92feac06a1a005373b741ed50e07d23d98f9a5.cedar create mode 100644 tarpDemo/policies/50c0ea31a9ed25a575b7538dec38cb953431651e7bec.cedar create mode 100644 tarpDemo/policies/689edd369c276afb5a163119dcd92c74196a4e0c7bdb.cedar create mode 100644 tarpDemo/policies/6e46e36071466cc37c0e9bbd65f16c51ea2ab152c6fc.cedar create mode 100644 tarpDemo/policies/76acfe86fb09731682f92c4fbf7d2e066813ce639404.cedar create mode 100644 tarpDemo/policies/91b2611a1ea9859cb7ce780ca16adf3b2a68f892786a.cedar create mode 100644 tarpDemo/policies/9e2f1520bd292765609e8ce57add8d3c134e3a91759d.cedar create mode 100644 tarpDemo/policies/a6f9c66ddcadeeec9e0f65420c89715b00a835ffdaec.cedar create mode 100644 tarpDemo/policies/b5111ecf0d218da2cdbece83aeb77cb6b479d3b5d85c.cedar create mode 100644 tarpDemo/policies/c367d06f19af8db1ec69354044334c799ff4cd2021ae.cedar create mode 100644 tarpDemo/policies/c4729e4ab456b4c8e74102593e5b32e04176bc837cc5.cedar create mode 100644 tarpDemo/policies/e459eba6691d141497dd1317e44d3d5b3bdd9fd65150.cedar create mode 100644 tarpDemo/policies/e76eb1853f0c6a199ca383cd9714e0113dfd851e079a.cedar create mode 100644 tarpDemo/policies/f38f10e80c6f429153cf97781a4c6bcf29761a04259f.cedar create mode 100644 tarpDemo/policies/fe83e4b2338614b970559ce4141b6d3e60559d79282c.cedar create mode 100644 tarpDemo/policies/fe84f983188f1639a03ed77c0753fc893fbe0d4cf155.cedar create mode 100644 tarpDemo/schema.cedarschema create mode 100644 tarpDemo/trusted-issuers/1985d6d8767b87d752035c9f9c0078daf057ad2cd5ea.json create mode 100644 tarpUnsignedDemo/metadata.json create mode 100644 tarpUnsignedDemo/policies/a2d0458ac26b69e4b191193fa307d941e8ab0ca2d5b1.cedar create mode 100644 tarpUnsignedDemo/schema.cedarschema diff --git a/tarpDemo/metadata.json b/tarpDemo/metadata.json new file mode 100644 index 0000000..1a400d9 --- /dev/null +++ b/tarpDemo/metadata.json @@ -0,0 +1,11 @@ +{ + "cedar_version": "4.9.0", + "policy_store": { + "id": "449805c83e13f332b1b35eac6ffa93187fbd1c648085", + "name": "tarpDemo", + "description": "", + "version": "0.0.1", + "created_date": "2026-03-13T02:28:08.460796+00:00", + "updated_date": "2026-03-13T02:28:08.460796+00:00" + } +} \ No newline at end of file diff --git a/tarpDemo/policies/13b34711a196f382ade96677cefd513a2a6deff1b949.cedar b/tarpDemo/policies/13b34711a196f382ade96677cefd513a2a6deff1b949.cedar new file mode 100644 index 0000000..d8e59de --- /dev/null +++ b/tarpDemo/policies/13b34711a196f382ade96677cefd513a2a6deff1b949.cedar @@ -0,0 +1,6 @@ +@id("admin_can_write_to_application") +permit ( + principal in Jans::Role::"admin", + action == Jans::Action::"Write", + resource is Jans::Application +); \ No newline at end of file diff --git a/tarpDemo/policies/28e83add6e203af0d3814f06228e45a0eeb5c1269b08.cedar b/tarpDemo/policies/28e83add6e203af0d3814f06228e45a0eeb5c1269b08.cedar new file mode 100644 index 0000000..15b9f4e --- /dev/null +++ b/tarpDemo/policies/28e83add6e203af0d3814f06228e45a0eeb5c1269b08.cedar @@ -0,0 +1,9 @@ +@id("user_cannot_write_from_restricted_country") +forbid ( + principal is Jans::User, + action == Jans::Action::"Write", + resource is Jans::SecretDocument +) when { + context has geolocation && + context.geolocation.contains("restricted") +}; \ No newline at end of file diff --git a/tarpDemo/policies/420184da127304d1b2898761893a974096f6dbade45a.cedar b/tarpDemo/policies/420184da127304d1b2898761893a974096f6dbade45a.cedar new file mode 100644 index 0000000..da536ec --- /dev/null +++ b/tarpDemo/policies/420184da127304d1b2898761893a974096f6dbade45a.cedar @@ -0,0 +1,9 @@ +@id("user_cannot_execute_on_public_network") +forbid ( + principal is Jans::User, + action == Jans::Action::"Execute", + resource is Jans::Application +) when { + context has network_type && + context.network_type == "public" +}; diff --git a/tarpDemo/policies/4ab79a92feac06a1a005373b741ed50e07d23d98f9a5.cedar b/tarpDemo/policies/4ab79a92feac06a1a005373b741ed50e07d23d98f9a5.cedar new file mode 100644 index 0000000..a473034 --- /dev/null +++ b/tarpDemo/policies/4ab79a92feac06a1a005373b741ed50e07d23d98f9a5.cedar @@ -0,0 +1,6 @@ +@id("user_can_tag") +permit ( + principal is Jans::User, + action == Jans::Action::"Tag", + resource is Jans::Application +); \ No newline at end of file diff --git a/tarpDemo/policies/50c0ea31a9ed25a575b7538dec38cb953431651e7bec.cedar b/tarpDemo/policies/50c0ea31a9ed25a575b7538dec38cb953431651e7bec.cedar new file mode 100644 index 0000000..c7cccc3 --- /dev/null +++ b/tarpDemo/policies/50c0ea31a9ed25a575b7538dec38cb953431651e7bec.cedar @@ -0,0 +1,10 @@ +@id("user_can_read_if_email_is_example") +permit ( + principal is Jans::User, + action == Jans::Action::"Read", + resource is Jans::SecretDocument +) +when { + principal has email && + principal.email.domain == "example.com" +}; \ No newline at end of file diff --git a/tarpDemo/policies/689edd369c276afb5a163119dcd92c74196a4e0c7bdb.cedar b/tarpDemo/policies/689edd369c276afb5a163119dcd92c74196a4e0c7bdb.cedar new file mode 100644 index 0000000..0951e86 --- /dev/null +++ b/tarpDemo/policies/689edd369c276afb5a163119dcd92c74196a4e0c7bdb.cedar @@ -0,0 +1,9 @@ +@id("user_cannot_read_if_compromised") +forbid ( + principal is Jans::User, + action == Jans::Action::"Read", + resource is Jans::SecretDocument +) when { + context has device_health && + context.device_health.contains("compromised") +}; \ No newline at end of file diff --git a/tarpDemo/policies/6e46e36071466cc37c0e9bbd65f16c51ea2ab152c6fc.cedar b/tarpDemo/policies/6e46e36071466cc37c0e9bbd65f16c51ea2ab152c6fc.cedar new file mode 100644 index 0000000..ba70df5 --- /dev/null +++ b/tarpDemo/policies/6e46e36071466cc37c0e9bbd65f16c51ea2ab152c6fc.cedar @@ -0,0 +1,6 @@ +@id("user_can_search") +permit ( + principal is Jans::User, + action == Jans::Action::"Search", + resource is Jans::Application +); \ No newline at end of file diff --git a/tarpDemo/policies/76acfe86fb09731682f92c4fbf7d2e066813ce639404.cedar b/tarpDemo/policies/76acfe86fb09731682f92c4fbf7d2e066813ce639404.cedar new file mode 100644 index 0000000..b1f618f --- /dev/null +++ b/tarpDemo/policies/76acfe86fb09731682f92c4fbf7d2e066813ce639404.cedar @@ -0,0 +1,6 @@ +@id("allow_teacher_secretdocument") +permit( + principal in Jans::Role::"Teacher", + action, + resource is Jans::SecretDocument +); \ No newline at end of file diff --git a/tarpDemo/policies/91b2611a1ea9859cb7ce780ca16adf3b2a68f892786a.cedar b/tarpDemo/policies/91b2611a1ea9859cb7ce780ca16adf3b2a68f892786a.cedar new file mode 100644 index 0000000..50cec10 --- /dev/null +++ b/tarpDemo/policies/91b2611a1ea9859cb7ce780ca16adf3b2a68f892786a.cedar @@ -0,0 +1,6 @@ +@id("user_can_read") +permit ( + principal is Jans::User, + action == Jans::Action::"Read", + resource is Jans::Application +); \ No newline at end of file diff --git a/tarpDemo/policies/9e2f1520bd292765609e8ce57add8d3c134e3a91759d.cedar b/tarpDemo/policies/9e2f1520bd292765609e8ce57add8d3c134e3a91759d.cedar new file mode 100644 index 0000000..8fce2dc --- /dev/null +++ b/tarpDemo/policies/9e2f1520bd292765609e8ce57add8d3c134e3a91759d.cedar @@ -0,0 +1,6 @@ +@id("security_admin_can_write_to_secretdocument") +permit ( + principal in Jans::Role::"security-admin", + action == Jans::Action::"Write", + resource is Jans::SecretDocument +); \ No newline at end of file diff --git a/tarpDemo/policies/a6f9c66ddcadeeec9e0f65420c89715b00a835ffdaec.cedar b/tarpDemo/policies/a6f9c66ddcadeeec9e0f65420c89715b00a835ffdaec.cedar new file mode 100644 index 0000000..191c794 --- /dev/null +++ b/tarpDemo/policies/a6f9c66ddcadeeec9e0f65420c89715b00a835ffdaec.cedar @@ -0,0 +1,6 @@ +@id("allow_student_read") +permit ( + principal in Jans::Role::"Student", + action in [Jans::Action::"Read"], + resource +); \ No newline at end of file diff --git a/tarpDemo/policies/b5111ecf0d218da2cdbece83aeb77cb6b479d3b5d85c.cedar b/tarpDemo/policies/b5111ecf0d218da2cdbece83aeb77cb6b479d3b5d85c.cedar new file mode 100644 index 0000000..a96a71b --- /dev/null +++ b/tarpDemo/policies/b5111ecf0d218da2cdbece83aeb77cb6b479d3b5d85c.cedar @@ -0,0 +1,6 @@ +@id("user_can_monitor") +permit ( + principal is Jans::User, + action == Jans::Action::"Monitor", + resource is Jans::Application +); \ No newline at end of file diff --git a/tarpDemo/policies/c367d06f19af8db1ec69354044334c799ff4cd2021ae.cedar b/tarpDemo/policies/c367d06f19af8db1ec69354044334c799ff4cd2021ae.cedar new file mode 100644 index 0000000..eb63ca9 --- /dev/null +++ b/tarpDemo/policies/c367d06f19af8db1ec69354044334c799ff4cd2021ae.cedar @@ -0,0 +1,9 @@ +@id("user_cannot_read_if_fraudulent") +forbid ( + principal is Jans::User, + action == Jans::Action::"Read", + resource is Jans::SecretDocument +) when { + context has fraud_indicators && + context.fraud_indicators.contains("high_risk") +}; \ No newline at end of file diff --git a/tarpDemo/policies/c4729e4ab456b4c8e74102593e5b32e04176bc837cc5.cedar b/tarpDemo/policies/c4729e4ab456b4c8e74102593e5b32e04176bc837cc5.cedar new file mode 100644 index 0000000..056b1cb --- /dev/null +++ b/tarpDemo/policies/c4729e4ab456b4c8e74102593e5b32e04176bc837cc5.cedar @@ -0,0 +1,6 @@ +@id("user_can_compare") +permit ( + principal is Jans::User, + action == Jans::Action::"Compare", + resource is Jans::Application +); \ No newline at end of file diff --git a/tarpDemo/policies/e459eba6691d141497dd1317e44d3d5b3bdd9fd65150.cedar b/tarpDemo/policies/e459eba6691d141497dd1317e44d3d5b3bdd9fd65150.cedar new file mode 100644 index 0000000..a9a8a9f --- /dev/null +++ b/tarpDemo/policies/e459eba6691d141497dd1317e44d3d5b3bdd9fd65150.cedar @@ -0,0 +1,6 @@ +@id("user_can_read_if_confidential_role") +permit ( + principal in Jans::Role::"confidential", + action == Jans::Action::"Read", + resource is Jans::SecretDocument +); \ No newline at end of file diff --git a/tarpDemo/policies/e76eb1853f0c6a199ca383cd9714e0113dfd851e079a.cedar b/tarpDemo/policies/e76eb1853f0c6a199ca383cd9714e0113dfd851e079a.cedar new file mode 100644 index 0000000..b16dd9e --- /dev/null +++ b/tarpDemo/policies/e76eb1853f0c6a199ca383cd9714e0113dfd851e079a.cedar @@ -0,0 +1,6 @@ +@id("user_can_execute") +permit ( + principal is Jans::User, + action == Jans::Action::"Execute", + resource is Jans::Application +); \ No newline at end of file diff --git a/tarpDemo/policies/f38f10e80c6f429153cf97781a4c6bcf29761a04259f.cedar b/tarpDemo/policies/f38f10e80c6f429153cf97781a4c6bcf29761a04259f.cedar new file mode 100644 index 0000000..1b62876 --- /dev/null +++ b/tarpDemo/policies/f38f10e80c6f429153cf97781a4c6bcf29761a04259f.cedar @@ -0,0 +1,9 @@ +@id("cannot_write_if_not_admin") +forbid ( + principal is Jans::User, + action == Jans::Action::"Write", + resource is Jans::Application +) when { + principal has role && + !principal.role.contains("admin") +}; \ No newline at end of file diff --git a/tarpDemo/policies/fe83e4b2338614b970559ce4141b6d3e60559d79282c.cedar b/tarpDemo/policies/fe83e4b2338614b970559ce4141b6d3e60559d79282c.cedar new file mode 100644 index 0000000..f0502fb --- /dev/null +++ b/tarpDemo/policies/fe83e4b2338614b970559ce4141b6d3e60559d79282c.cedar @@ -0,0 +1,9 @@ +@id("user_can_read_in_corp_network") +permit ( + principal is Jans::User, + action == Jans::Action::"Read", + resource is Jans::SecretDocument +) when { + context has network && + context.network == "corp" +}; \ No newline at end of file diff --git a/tarpDemo/policies/fe84f983188f1639a03ed77c0753fc893fbe0d4cf155.cedar b/tarpDemo/policies/fe84f983188f1639a03ed77c0753fc893fbe0d4cf155.cedar new file mode 100644 index 0000000..1da6c83 --- /dev/null +++ b/tarpDemo/policies/fe84f983188f1639a03ed77c0753fc893fbe0d4cf155.cedar @@ -0,0 +1,6 @@ +@id("editor_can_share") +permit ( + principal in Jans::Role::"Editor", + action == Jans::Action::"Share", + resource is Jans::Application +); \ No newline at end of file diff --git a/tarpDemo/schema.cedarschema b/tarpDemo/schema.cedarschema new file mode 100644 index 0000000..9ab5e50 --- /dev/null +++ b/tarpDemo/schema.cedarschema @@ -0,0 +1,199 @@ +namespace Jans { + type Context = { + current_time?: Long, + device_health?: Set, + fraud_indicators?: Set, + geolocation?: Set, + network?: String, + network_type?: String, + operating_system?: String, + tokens?: TokensContext, + user_agent?: String + }; + + type TokensContext = { + total_token_count: Long + }; + + type Url = { + host: String, + path: String, + protocol: String + }; + + type email_address = { + domain: String, + uid: String + }; + + entity Access_token = { + aud?: String, + exp?: Long, + iat?: Long, + iss?: TrustedIssuer, + jti?: String, + nbf?: Long, + scope?: Set, + token_type?: String, + validated_at?: Long + } tags Set; + + entity Application = { + app_id: String, + name: String, + url: Url + }; + + entity HTTP_Request = { + header: { + Accept?: String + }, + url: Url + }; + + entity Role; + + entity SecretDocument; + + entity TrustedIssuer = { + issuer_entity_id: Url + }; + + entity User in [Role] = { + email?: email_address, + id_token?: id_token, + phone_number?: String, + role: Set, + sub: String, + userinfo_token?: Userinfo_token, + username?: String + }; + + entity Userinfo_token = { + aud?: String, + birthdate?: String, + email?: email_address, + exp?: Long, + iat?: Long, + iss?: TrustedIssuer, + jti?: String, + name?: String, + phone_number?: String, + role?: Set, + sub?: String, + token_type?: String, + validated_at?: Long + } tags Set; + + entity Workload = { + access_token?: Access_token, + client_id: String, + iss?: TrustedIssuer, + name?: String, + rp_id?: String, + spiffe_id?: String + }; + + entity id_token = { + acr?: String, + amr?: Set, + aud?: Set, + azp?: String, + birthdate?: String, + email?: email_address, + exp?: Long, + iat?: Long, + iss?: TrustedIssuer, + jti?: String, + name?: String, + phone_number?: String, + role?: Set, + sub?: String, + token_type?: String, + validated_at?: Long + } tags Set; + + action "Compare" appliesTo { + principal: [User, Workload], + resource: [Application], + context: Context + }; + + action "DELETE" appliesTo { + principal: [Workload], + resource: [HTTP_Request], + context: Context + }; + + action "Execute" appliesTo { + principal: [User, Workload], + resource: [Application], + context: Context + }; + + action "GET" appliesTo { + principal: [Workload], + resource: [HTTP_Request], + context: Context + }; + + action "HEAD" appliesTo { + principal: [Workload], + resource: [HTTP_Request], + context: Context + }; + + action "Monitor" appliesTo { + principal: [User, Workload], + resource: [Application], + context: Context + }; + + action "PATCH" appliesTo { + principal: [Workload], + resource: [HTTP_Request], + context: Context + }; + + action "POST" appliesTo { + principal: [Workload], + resource: [HTTP_Request], + context: Context + }; + + action "PUT" appliesTo { + principal: [Workload], + resource: [HTTP_Request], + context: Context + }; + + action "Read" appliesTo { + principal: [User, Workload], + resource: [Application, SecretDocument], + context: Context + }; + + action "Search" appliesTo { + principal: [User, Workload], + resource: [Application], + context: Context + }; + + action "Share" appliesTo { + principal: [User, Workload], + resource: [Application], + context: Context + }; + + action "Tag" appliesTo { + principal: [User, Workload], + resource: [Application], + context: Context + }; + + action "Write" appliesTo { + principal: [User, Workload], + resource: [Application, SecretDocument], + context: Context + }; +} diff --git a/tarpDemo/trusted-issuers/1985d6d8767b87d752035c9f9c0078daf057ad2cd5ea.json b/tarpDemo/trusted-issuers/1985d6d8767b87d752035c9f9c0078daf057ad2cd5ea.json new file mode 100644 index 0000000..c1d55bc --- /dev/null +++ b/tarpDemo/trusted-issuers/1985d6d8767b87d752035c9f9c0078daf057ad2cd5ea.json @@ -0,0 +1,56 @@ +{ + "id": "1985d6d8767b87d752035c9f9c0078daf057ad2cd5ea", + "name": "Jans", + "description": "", + "configuration_endpoint": "https://test-jans.gluu.info/.well-known/openid-configuration", + "token_metadata": { + "access_token": { + "trusted": true, + "entity_type_name": "Jans::Access_token", + "user_id": "sub", + "token_id": "jti", + "workload_id": "rp_id", + "claim_mapping": {}, + "required_claims": [ + "jti", + "iss", + "aud", + "sub", + "exp", + "nbf" + ], + "role_mapping": "role", + "principal_mapping": [ + "Jans::Workload" + ] + }, + "id_token": { + "trusted": true, + "entity_type_name": "Jans::id_token", + "user_id": "sub", + "token_id": "jti", + "role_mapping": "role", + "claim_mapping": {}, + "principal_mapping": [ + "Jans::User" + ] + }, + "userinfo_token": { + "trusted": true, + "entity_type_name": "Jans::Userinfo_token", + "user_id": "sub", + "token_id": "jti", + "role_mapping": "role", + "claim_mapping": {}, + "principal_mapping": [ + "Jans::User" + ] + }, + "tx_token": { + "trusted": true, + "entity_type_name": "Jans::Access_token", + "user_id": "sub", + "token_id": "jti" + } + } +} \ No newline at end of file diff --git a/tarpUnsignedDemo/metadata.json b/tarpUnsignedDemo/metadata.json new file mode 100644 index 0000000..775ee63 --- /dev/null +++ b/tarpUnsignedDemo/metadata.json @@ -0,0 +1,11 @@ +{ + "cedar_version": "4.9.0", + "policy_store": { + "id": "6d9f73b2d44ad4e7aa8f1182cde9f72dcbaa244f4327", + "name": "tarpUnsignedDemo", + "description": "", + "version": "0.0.1", + "created_date": "2026-03-13T02:28:08.461238+00:00", + "updated_date": "2026-03-13T02:28:08.461238+00:00" + } +} \ No newline at end of file diff --git a/tarpUnsignedDemo/policies/a2d0458ac26b69e4b191193fa307d941e8ab0ca2d5b1.cedar b/tarpUnsignedDemo/policies/a2d0458ac26b69e4b191193fa307d941e8ab0ca2d5b1.cedar new file mode 100644 index 0000000..3865fc8 --- /dev/null +++ b/tarpUnsignedDemo/policies/a2d0458ac26b69e4b191193fa307d941e8ab0ca2d5b1.cedar @@ -0,0 +1,10 @@ +@id("allow_teacher") +permit( + principal is Jans::User, + action, + resource +) +when { + principal has role && + principal.role.contains("Teacher") +}; \ No newline at end of file diff --git a/tarpUnsignedDemo/schema.cedarschema b/tarpUnsignedDemo/schema.cedarschema new file mode 100644 index 0000000..9ab5e50 --- /dev/null +++ b/tarpUnsignedDemo/schema.cedarschema @@ -0,0 +1,199 @@ +namespace Jans { + type Context = { + current_time?: Long, + device_health?: Set, + fraud_indicators?: Set, + geolocation?: Set, + network?: String, + network_type?: String, + operating_system?: String, + tokens?: TokensContext, + user_agent?: String + }; + + type TokensContext = { + total_token_count: Long + }; + + type Url = { + host: String, + path: String, + protocol: String + }; + + type email_address = { + domain: String, + uid: String + }; + + entity Access_token = { + aud?: String, + exp?: Long, + iat?: Long, + iss?: TrustedIssuer, + jti?: String, + nbf?: Long, + scope?: Set, + token_type?: String, + validated_at?: Long + } tags Set; + + entity Application = { + app_id: String, + name: String, + url: Url + }; + + entity HTTP_Request = { + header: { + Accept?: String + }, + url: Url + }; + + entity Role; + + entity SecretDocument; + + entity TrustedIssuer = { + issuer_entity_id: Url + }; + + entity User in [Role] = { + email?: email_address, + id_token?: id_token, + phone_number?: String, + role: Set, + sub: String, + userinfo_token?: Userinfo_token, + username?: String + }; + + entity Userinfo_token = { + aud?: String, + birthdate?: String, + email?: email_address, + exp?: Long, + iat?: Long, + iss?: TrustedIssuer, + jti?: String, + name?: String, + phone_number?: String, + role?: Set, + sub?: String, + token_type?: String, + validated_at?: Long + } tags Set; + + entity Workload = { + access_token?: Access_token, + client_id: String, + iss?: TrustedIssuer, + name?: String, + rp_id?: String, + spiffe_id?: String + }; + + entity id_token = { + acr?: String, + amr?: Set, + aud?: Set, + azp?: String, + birthdate?: String, + email?: email_address, + exp?: Long, + iat?: Long, + iss?: TrustedIssuer, + jti?: String, + name?: String, + phone_number?: String, + role?: Set, + sub?: String, + token_type?: String, + validated_at?: Long + } tags Set; + + action "Compare" appliesTo { + principal: [User, Workload], + resource: [Application], + context: Context + }; + + action "DELETE" appliesTo { + principal: [Workload], + resource: [HTTP_Request], + context: Context + }; + + action "Execute" appliesTo { + principal: [User, Workload], + resource: [Application], + context: Context + }; + + action "GET" appliesTo { + principal: [Workload], + resource: [HTTP_Request], + context: Context + }; + + action "HEAD" appliesTo { + principal: [Workload], + resource: [HTTP_Request], + context: Context + }; + + action "Monitor" appliesTo { + principal: [User, Workload], + resource: [Application], + context: Context + }; + + action "PATCH" appliesTo { + principal: [Workload], + resource: [HTTP_Request], + context: Context + }; + + action "POST" appliesTo { + principal: [Workload], + resource: [HTTP_Request], + context: Context + }; + + action "PUT" appliesTo { + principal: [Workload], + resource: [HTTP_Request], + context: Context + }; + + action "Read" appliesTo { + principal: [User, Workload], + resource: [Application, SecretDocument], + context: Context + }; + + action "Search" appliesTo { + principal: [User, Workload], + resource: [Application], + context: Context + }; + + action "Share" appliesTo { + principal: [User, Workload], + resource: [Application], + context: Context + }; + + action "Tag" appliesTo { + principal: [User, Workload], + resource: [Application], + context: Context + }; + + action "Write" appliesTo { + principal: [User, Workload], + resource: [Application, SecretDocument], + context: Context + }; +} From 36658fbe4904199803090f2ba8e3934bdac5bcbd Mon Sep 17 00:00:00 2001 From: Safin Wasi <6601566+SafinWasi@users.noreply.github.com> Date: Fri, 13 Mar 2026 02:28:21 +0000 Subject: [PATCH 007/113] feat: update manifest --- tarpDemo/manifest.json | 94 ++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 94 insertions(+) create mode 100644 tarpDemo/manifest.json diff --git a/tarpDemo/manifest.json b/tarpDemo/manifest.json new file mode 100644 index 0000000..430bf5d --- /dev/null +++ b/tarpDemo/manifest.json @@ -0,0 +1,94 @@ +{ + "policy_store_id": "449805c83e13f332b1b35eac6ffa93187fbd1c648085", + "generated_date": "2026-03-13T02:28:20.768473+00:00", + "files": { + "metadata.json": { + "size": 325, + "checksum": "sha1:1a400d983f713432e611699bd747d23438c54861" + }, + "policies/13b34711a196f382ade96677cefd513a2a6deff1b949.cedar": { + "size": 152, + "checksum": "sha1:d8e59de682c3fdeffe62017b9026f2063346c504" + }, + "policies/28e83add6e203af0d3814f06228e45a0eeb5c1269b08.cedar": { + "size": 240, + "checksum": "sha1:15b9f4e017f07666a0c6b093670e53bc9be5fb2f" + }, + "policies/420184da127304d1b2898761893a974096f6dbade45a.cedar": { + "size": 227, + "checksum": "sha1:da536ecbff7806020db9d1eddbbb72658069d317" + }, + "policies/4ab79a92feac06a1a005373b741ed50e07d23d98f9a5.cedar": { + "size": 123, + "checksum": "sha1:a473034d33f80704f3a2cac39867f91351587395" + }, + "policies/50c0ea31a9ed25a575b7538dec38cb953431651e7bec.cedar": { + "size": 224, + "checksum": "sha1:c7cccc3f2d06b10bd0ec6084612eb821df78eddc" + }, + "policies/689edd369c276afb5a163119dcd92c74196a4e0c7bdb.cedar": { + "size": 234, + "checksum": "sha1:0951e86c967dcd184cd83ff1928917f17422d41e" + }, + "policies/6e46e36071466cc37c0e9bbd65f16c51ea2ab152c6fc.cedar": { + "size": 129, + "checksum": "sha1:ba70df5d5b9d44112fba4ce96ab50e3ac0d38ca2" + }, + "policies/76acfe86fb09731682f92c4fbf7d2e066813ce639404.cedar": { + "size": 129, + "checksum": "sha1:b1f618fe1e7eca7d01410f5bca6f313b9f64b58b" + }, + "policies/91b2611a1ea9859cb7ce780ca16adf3b2a68f892786a.cedar": { + "size": 125, + "checksum": "sha1:50cec10426a21afe2f7fe8cb6bfc9be185f966da" + }, + "policies/9e2f1520bd292765609e8ce57add8d3c134e3a91759d.cedar": { + "size": 176, + "checksum": "sha1:8fce2dc995abd19a9794d2e23e4a037f36d00e1e" + }, + "policies/a6f9c66ddcadeeec9e0f65420c89715b00a835ffdaec.cedar": { + "size": 122, + "checksum": "sha1:191c7949720d26a44002b1eacb22e63e35e8fa9a" + }, + "policies/b5111ecf0d218da2cdbece83aeb77cb6b479d3b5d85c.cedar": { + "size": 131, + "checksum": "sha1:a96a71b7679d9baf6d2169f8f6ee3cd1aff4b841" + }, + "policies/c367d06f19af8db1ec69354044334c799ff4cd2021ae.cedar": { + "size": 237, + "checksum": "sha1:eb63ca96c7118ce411ce3890675e1a7ba456697a" + }, + "policies/c4729e4ab456b4c8e74102593e5b32e04176bc837cc5.cedar": { + "size": 131, + "checksum": "sha1:056b1cbe636683ae77a13c540da789e2f2b9b83b" + }, + "policies/e459eba6691d141497dd1317e44d3d5b3bdd9fd65150.cedar": { + "size": 165, + "checksum": "sha1:a9a8a9f68dff0cd1a69e36caf588076264e8f600" + }, + "policies/e76eb1853f0c6a199ca383cd9714e0113dfd851e079a.cedar": { + "size": 131, + "checksum": "sha1:b16dd9e2f6513fa1eed36aafd8b5ff3afb9f106e" + }, + "policies/f38f10e80c6f429153cf97781a4c6bcf29761a04259f.cedar": { + "size": 207, + "checksum": "sha1:1b628765b25e1de50a0b571f13d8e7bc87f81580" + }, + "policies/fe83e4b2338614b970559ce4141b6d3e60559d79282c.cedar": { + "size": 206, + "checksum": "sha1:f0502fb3eeb91a34f0a65647e1100d3b03ae1053" + }, + "policies/fe84f983188f1639a03ed77c0753fc893fbe0d4cf155.cedar": { + "size": 139, + "checksum": "sha1:1da6c83ffffc535319e2ef868b4b00a3960b37c1" + }, + "schema.cedarschema": { + "size": 3765, + "checksum": "sha1:9ab5e508c9209fbd74447b57900075ec6826a411" + }, + "trusted-issuers/1985d6d8767b87d752035c9f9c0078daf057ad2cd5ea.json": { + "size": 1608, + "checksum": "sha1:c1d55bcc6e0fb8be86d521af53a7a513343b2f9e" + } + } +} \ No newline at end of file From 631fb8e1df115db6e748e14c68523eb0905cc39e Mon Sep 17 00:00:00 2001 From: Safin Wasi <6601566+SafinWasi@users.noreply.github.com> Date: Fri, 13 Mar 2026 02:28:22 +0000 Subject: [PATCH 008/113] feat: update manifest --- tarpUnsignedDemo/manifest.json | 18 ++++++++++++++++++ 1 file changed, 18 insertions(+) create mode 100644 tarpUnsignedDemo/manifest.json diff --git a/tarpUnsignedDemo/manifest.json b/tarpUnsignedDemo/manifest.json new file mode 100644 index 0000000..4aef7a4 --- /dev/null +++ b/tarpUnsignedDemo/manifest.json @@ -0,0 +1,18 @@ +{ + "policy_store_id": "6d9f73b2d44ad4e7aa8f1182cde9f72dcbaa244f4327", + "generated_date": "2026-03-13T02:28:22.283762+00:00", + "files": { + "metadata.json": { + "size": 333, + "checksum": "sha1:775ee637a9578c56e46f1a5c6e8a29987720bc03" + }, + "policies/a2d0458ac26b69e4b191193fa307d941e8ab0ca2d5b1.cedar": { + "size": 149, + "checksum": "sha1:3865fc8acb05bf0c464aaefabd5225e03d41ade3" + }, + "schema.cedarschema": { + "size": 3765, + "checksum": "sha1:9ab5e508c9209fbd74447b57900075ec6826a411" + } + } +} \ No newline at end of file From c30f00ab987e05b85e87b99d4a685a39bc742de0 Mon Sep 17 00:00:00 2001 From: Safin Wasi <6601566+SafinWasi@users.noreply.github.com> Date: Fri, 13 Mar 2026 02:30:05 +0000 Subject: [PATCH 009/113] feat: update metadata.json --- tarpUnsignedDemo/metadata.json | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/tarpUnsignedDemo/metadata.json b/tarpUnsignedDemo/metadata.json index 775ee63..306039a 100644 --- a/tarpUnsignedDemo/metadata.json +++ b/tarpUnsignedDemo/metadata.json @@ -4,7 +4,7 @@ "id": "6d9f73b2d44ad4e7aa8f1182cde9f72dcbaa244f4327", "name": "tarpUnsignedDemo", "description": "", - "version": "0.0.1", + "version": "0.1.0", "created_date": "2026-03-13T02:28:08.461238+00:00", "updated_date": "2026-03-13T02:28:08.461238+00:00" } From 6e8267f3e80c5e548b7d6a43d38b829c1da3ca5b Mon Sep 17 00:00:00 2001 From: Safin Wasi <6601566+SafinWasi@users.noreply.github.com> Date: Fri, 13 Mar 2026 03:13:51 +0000 Subject: [PATCH 010/113] feat: update schema.cedarschema --- tarpDemo/schema.cedarschema | 3 +++ 1 file changed, 3 insertions(+) diff --git a/tarpDemo/schema.cedarschema b/tarpDemo/schema.cedarschema index 9ab5e50..4993929 100644 --- a/tarpDemo/schema.cedarschema +++ b/tarpDemo/schema.cedarschema @@ -12,6 +12,9 @@ namespace Jans { }; type TokensContext = { + jans_access_token?: Access_token, + jans_id_token?: id_token, + jans_userinfo_token?: Userinfo_token, total_token_count: Long }; From 9f4d108e559edb24ba871e0cd7bf1f7ac565d9c3 Mon Sep 17 00:00:00 2001 From: Safin Wasi <6601566+SafinWasi@users.noreply.github.com> Date: Fri, 13 Mar 2026 03:13:52 +0000 Subject: [PATCH 011/113] feat: update metadata.json --- tarpDemo/metadata.json | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/tarpDemo/metadata.json b/tarpDemo/metadata.json index 1a400d9..d4c87ea 100644 --- a/tarpDemo/metadata.json +++ b/tarpDemo/metadata.json @@ -6,6 +6,6 @@ "description": "", "version": "0.0.1", "created_date": "2026-03-13T02:28:08.460796+00:00", - "updated_date": "2026-03-13T02:28:08.460796+00:00" + "updated_date": "2026-03-13T03:13:50.628190+00:00" } } \ No newline at end of file From 11a4c58521c7a69361a0a82985591cd001990b71 Mon Sep 17 00:00:00 2001 From: Safin Wasi <6601566+SafinWasi@users.noreply.github.com> Date: Fri, 13 Mar 2026 03:13:54 +0000 Subject: [PATCH 012/113] feat: update manifest.json --- tarpDemo/manifest.json | 12 ++++++++---- 1 file changed, 8 insertions(+), 4 deletions(-) diff --git a/tarpDemo/manifest.json b/tarpDemo/manifest.json index 430bf5d..e013cc8 100644 --- a/tarpDemo/manifest.json +++ b/tarpDemo/manifest.json @@ -1,10 +1,14 @@ { "policy_store_id": "449805c83e13f332b1b35eac6ffa93187fbd1c648085", - "generated_date": "2026-03-13T02:28:20.768473+00:00", + "generated_date": "2026-03-13T03:13:53.708113+00:00", "files": { + "manifest.json": { + "size": 4055, + "checksum": "sha1:430bf5dcff57337d55bb42e6787675d7b6832cd4" + }, "metadata.json": { "size": 325, - "checksum": "sha1:1a400d983f713432e611699bd747d23438c54861" + "checksum": "sha1:d4c87ea5068c99a0da40ea41802b0554b93f62c8" }, "policies/13b34711a196f382ade96677cefd513a2a6deff1b949.cedar": { "size": 152, @@ -83,8 +87,8 @@ "checksum": "sha1:1da6c83ffffc535319e2ef868b4b00a3960b37c1" }, "schema.cedarschema": { - "size": 3765, - "checksum": "sha1:9ab5e508c9209fbd74447b57900075ec6826a411" + "size": 3875, + "checksum": "sha1:49939290b8ad6745f79a067d4ce7ca200f68c6ff" }, "trusted-issuers/1985d6d8767b87d752035c9f9c0078daf057ad2cd5ea.json": { "size": 1608, From e878dabe9f1b68b8f3fd2135fb68f3334e7ea4dc Mon Sep 17 00:00:00 2001 From: Safin Wasi <6601566+SafinWasi@users.noreply.github.com> Date: Fri, 13 Mar 2026 03:14:17 +0000 Subject: [PATCH 013/113] feat: update 13b34711a196f382ade96677cefd513a2a6deff1b949.cedar --- .../13b34711a196f382ade96677cefd513a2a6deff1b949.cedar | 6 ++++-- 1 file changed, 4 insertions(+), 2 deletions(-) diff --git a/tarpDemo/policies/13b34711a196f382ade96677cefd513a2a6deff1b949.cedar b/tarpDemo/policies/13b34711a196f382ade96677cefd513a2a6deff1b949.cedar index d8e59de..411e715 100644 --- a/tarpDemo/policies/13b34711a196f382ade96677cefd513a2a6deff1b949.cedar +++ b/tarpDemo/policies/13b34711a196f382ade96677cefd513a2a6deff1b949.cedar @@ -1,6 +1,8 @@ @id("admin_can_write_to_application") permit ( - principal in Jans::Role::"admin", + principal, action == Jans::Action::"Write", resource is Jans::Application -); \ No newline at end of file +) when { +context has tokens.jans_id_token +}; \ No newline at end of file From 82cb34045522ef44a8a34eb7cedce3c28db9a4ef Mon Sep 17 00:00:00 2001 From: Safin Wasi <6601566+SafinWasi@users.noreply.github.com> Date: Fri, 13 Mar 2026 03:14:19 +0000 Subject: [PATCH 014/113] feat: update manifest.json --- tarpDemo/manifest.json | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-) diff --git a/tarpDemo/manifest.json b/tarpDemo/manifest.json index e013cc8..a6e8495 100644 --- a/tarpDemo/manifest.json +++ b/tarpDemo/manifest.json @@ -1,18 +1,18 @@ { "policy_store_id": "449805c83e13f332b1b35eac6ffa93187fbd1c648085", - "generated_date": "2026-03-13T03:13:53.708113+00:00", + "generated_date": "2026-03-13T03:14:18.736469+00:00", "files": { "manifest.json": { - "size": 4055, - "checksum": "sha1:430bf5dcff57337d55bb42e6787675d7b6832cd4" + "size": 4191, + "checksum": "sha1:e013cc8ef21eb3637a11895f0a00837842ea274d" }, "metadata.json": { "size": 325, "checksum": "sha1:d4c87ea5068c99a0da40ea41802b0554b93f62c8" }, "policies/13b34711a196f382ade96677cefd513a2a6deff1b949.cedar": { - "size": 152, - "checksum": "sha1:d8e59de682c3fdeffe62017b9026f2063346c504" + "size": 171, + "checksum": "sha1:411e7151fab69e6df5e7648f3ff72542d98e7b5d" }, "policies/28e83add6e203af0d3814f06228e45a0eeb5c1269b08.cedar": { "size": 240, From b7ba14e1ad652e5badd0c7725e5168bdcd578e1d Mon Sep 17 00:00:00 2001 From: Safin Wasi <6601566+SafinWasi@users.noreply.github.com> Date: Fri, 13 Mar 2026 03:15:11 +0000 Subject: [PATCH 015/113] feat: renaming policy 13b34711a196f382ade96677cefd513a2a6deff1b949 --- ...13a2a6deff1b949.cedar => admin_can_write_to_application.cedar} | 0 1 file changed, 0 insertions(+), 0 deletions(-) rename tarpDemo/policies/{13b34711a196f382ade96677cefd513a2a6deff1b949.cedar => admin_can_write_to_application.cedar} (100%) diff --git a/tarpDemo/policies/13b34711a196f382ade96677cefd513a2a6deff1b949.cedar b/tarpDemo/policies/admin_can_write_to_application.cedar similarity index 100% rename from tarpDemo/policies/13b34711a196f382ade96677cefd513a2a6deff1b949.cedar rename to tarpDemo/policies/admin_can_write_to_application.cedar From fc92e8b787cf6d67ccd7b9e8d9cbdf44d6867bdc Mon Sep 17 00:00:00 2001 From: Safin Wasi <6601566+SafinWasi@users.noreply.github.com> Date: Fri, 13 Mar 2026 03:15:12 +0000 Subject: [PATCH 016/113] feat: update admin_can_write_to_application.cedar --- tarpDemo/policies/admin_can_write_to_application.cedar | 7 +++++-- 1 file changed, 5 insertions(+), 2 deletions(-) diff --git a/tarpDemo/policies/admin_can_write_to_application.cedar b/tarpDemo/policies/admin_can_write_to_application.cedar index 411e715..847ed6f 100644 --- a/tarpDemo/policies/admin_can_write_to_application.cedar +++ b/tarpDemo/policies/admin_can_write_to_application.cedar @@ -3,6 +3,9 @@ permit ( principal, action == Jans::Action::"Write", resource is Jans::Application -) when { -context has tokens.jans_id_token +) +when { + context has tokens.jans_id_token && + context.tokens.jans_id_token.hasTag("role") && + context.tokens.jans_id_token.getTag("role").contains("admin") }; \ No newline at end of file From 8fad057dc954333db73d47a7f7db0cf34c2f66b1 Mon Sep 17 00:00:00 2001 From: Safin Wasi <6601566+SafinWasi@users.noreply.github.com> Date: Fri, 13 Mar 2026 03:15:14 +0000 Subject: [PATCH 017/113] feat: update manifest.json --- tarpDemo/manifest.json | 12 ++++++------ 1 file changed, 6 insertions(+), 6 deletions(-) diff --git a/tarpDemo/manifest.json b/tarpDemo/manifest.json index a6e8495..e95329c 100644 --- a/tarpDemo/manifest.json +++ b/tarpDemo/manifest.json @@ -1,19 +1,15 @@ { "policy_store_id": "449805c83e13f332b1b35eac6ffa93187fbd1c648085", - "generated_date": "2026-03-13T03:14:18.736469+00:00", + "generated_date": "2026-03-13T03:15:14.249812+00:00", "files": { "manifest.json": { "size": 4191, - "checksum": "sha1:e013cc8ef21eb3637a11895f0a00837842ea274d" + "checksum": "sha1:a6e8495e7398971dcdfbd9c369d125fc52963ded" }, "metadata.json": { "size": 325, "checksum": "sha1:d4c87ea5068c99a0da40ea41802b0554b93f62c8" }, - "policies/13b34711a196f382ade96677cefd513a2a6deff1b949.cedar": { - "size": 171, - "checksum": "sha1:411e7151fab69e6df5e7648f3ff72542d98e7b5d" - }, "policies/28e83add6e203af0d3814f06228e45a0eeb5c1269b08.cedar": { "size": 240, "checksum": "sha1:15b9f4e017f07666a0c6b093670e53bc9be5fb2f" @@ -54,6 +50,10 @@ "size": 122, "checksum": "sha1:191c7949720d26a44002b1eacb22e63e35e8fa9a" }, + "policies/admin_can_write_to_application.cedar": { + "size": 289, + "checksum": "sha1:847ed6fceaa723f1a64aa69b181dce19a527cbd5" + }, "policies/b5111ecf0d218da2cdbece83aeb77cb6b479d3b5d85c.cedar": { "size": 131, "checksum": "sha1:a96a71b7679d9baf6d2169f8f6ee3cd1aff4b841" From 20debcd1198aba7cc39c339849889ae9535b5f41 Mon Sep 17 00:00:00 2001 From: Safin Wasi <6601566+SafinWasi@users.noreply.github.com> Date: Fri, 13 Mar 2026 03:15:44 +0000 Subject: [PATCH 018/113] feat: renaming policy 28e83add6e203af0d3814f06228e45a0eeb5c1269b08 --- ...9b08.cedar => user_cannot_write_from_restricted_country.cedar} | 0 1 file changed, 0 insertions(+), 0 deletions(-) rename tarpDemo/policies/{28e83add6e203af0d3814f06228e45a0eeb5c1269b08.cedar => user_cannot_write_from_restricted_country.cedar} (100%) diff --git a/tarpDemo/policies/28e83add6e203af0d3814f06228e45a0eeb5c1269b08.cedar b/tarpDemo/policies/user_cannot_write_from_restricted_country.cedar similarity index 100% rename from tarpDemo/policies/28e83add6e203af0d3814f06228e45a0eeb5c1269b08.cedar rename to tarpDemo/policies/user_cannot_write_from_restricted_country.cedar From 9645a4f6282ce9098aa4b529e2f4431a19866aa6 Mon Sep 17 00:00:00 2001 From: Safin Wasi <6601566+SafinWasi@users.noreply.github.com> Date: Fri, 13 Mar 2026 03:15:45 +0000 Subject: [PATCH 019/113] feat: update user_cannot_write_from_restricted_country.cedar --- .../policies/user_cannot_write_from_restricted_country.cedar | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) diff --git a/tarpDemo/policies/user_cannot_write_from_restricted_country.cedar b/tarpDemo/policies/user_cannot_write_from_restricted_country.cedar index 15b9f4e..f3778f9 100644 --- a/tarpDemo/policies/user_cannot_write_from_restricted_country.cedar +++ b/tarpDemo/policies/user_cannot_write_from_restricted_country.cedar @@ -1,9 +1,10 @@ @id("user_cannot_write_from_restricted_country") forbid ( - principal is Jans::User, + principal, action == Jans::Action::"Write", resource is Jans::SecretDocument -) when { +) +when { context has geolocation && context.geolocation.contains("restricted") }; \ No newline at end of file From 3763ce379203fd2efb5c027e92f7897149ba5c85 Mon Sep 17 00:00:00 2001 From: Safin Wasi <6601566+SafinWasi@users.noreply.github.com> Date: Fri, 13 Mar 2026 03:15:47 +0000 Subject: [PATCH 020/113] feat: update manifest.json --- tarpDemo/manifest.json | 14 +++++++------- 1 file changed, 7 insertions(+), 7 deletions(-) diff --git a/tarpDemo/manifest.json b/tarpDemo/manifest.json index e95329c..782d619 100644 --- a/tarpDemo/manifest.json +++ b/tarpDemo/manifest.json @@ -1,19 +1,15 @@ { "policy_store_id": "449805c83e13f332b1b35eac6ffa93187fbd1c648085", - "generated_date": "2026-03-13T03:15:14.249812+00:00", + "generated_date": "2026-03-13T03:15:46.856860+00:00", "files": { "manifest.json": { - "size": 4191, - "checksum": "sha1:a6e8495e7398971dcdfbd9c369d125fc52963ded" + "size": 4177, + "checksum": "sha1:e95329cd70746c8679d4da7e34ff4f9b637b2677" }, "metadata.json": { "size": 325, "checksum": "sha1:d4c87ea5068c99a0da40ea41802b0554b93f62c8" }, - "policies/28e83add6e203af0d3814f06228e45a0eeb5c1269b08.cedar": { - "size": 240, - "checksum": "sha1:15b9f4e017f07666a0c6b093670e53bc9be5fb2f" - }, "policies/420184da127304d1b2898761893a974096f6dbade45a.cedar": { "size": 227, "checksum": "sha1:da536ecbff7806020db9d1eddbbb72658069d317" @@ -86,6 +82,10 @@ "size": 139, "checksum": "sha1:1da6c83ffffc535319e2ef868b4b00a3960b37c1" }, + "policies/user_cannot_write_from_restricted_country.cedar": { + "size": 226, + "checksum": "sha1:f3778f9139df04fb2c7ef86cf42b0dd7f271d4cd" + }, "schema.cedarschema": { "size": 3875, "checksum": "sha1:49939290b8ad6745f79a067d4ce7ca200f68c6ff" From ac993f6f72e55f0fdf225e7b7c824bcee16fe148 Mon Sep 17 00:00:00 2001 From: Safin Wasi <6601566+SafinWasi@users.noreply.github.com> Date: Fri, 13 Mar 2026 03:16:18 +0000 Subject: [PATCH 021/113] feat: renaming policy 420184da127304d1b2898761893a974096f6dbade45a --- ...dbade45a.cedar => user_cannot_execute_on_public_network.cedar} | 0 1 file changed, 0 insertions(+), 0 deletions(-) rename tarpDemo/policies/{420184da127304d1b2898761893a974096f6dbade45a.cedar => user_cannot_execute_on_public_network.cedar} (100%) diff --git a/tarpDemo/policies/420184da127304d1b2898761893a974096f6dbade45a.cedar b/tarpDemo/policies/user_cannot_execute_on_public_network.cedar similarity index 100% rename from tarpDemo/policies/420184da127304d1b2898761893a974096f6dbade45a.cedar rename to tarpDemo/policies/user_cannot_execute_on_public_network.cedar From 3495ce213819006735f193d55bee5689e0175f95 Mon Sep 17 00:00:00 2001 From: Safin Wasi <6601566+SafinWasi@users.noreply.github.com> Date: Fri, 13 Mar 2026 03:16:19 +0000 Subject: [PATCH 022/113] feat: update user_cannot_execute_on_public_network.cedar --- .../policies/user_cannot_execute_on_public_network.cedar | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) diff --git a/tarpDemo/policies/user_cannot_execute_on_public_network.cedar b/tarpDemo/policies/user_cannot_execute_on_public_network.cedar index da536ec..8c7bf80 100644 --- a/tarpDemo/policies/user_cannot_execute_on_public_network.cedar +++ b/tarpDemo/policies/user_cannot_execute_on_public_network.cedar @@ -3,7 +3,8 @@ forbid ( principal is Jans::User, action == Jans::Action::"Execute", resource is Jans::Application -) when { +) +when { context has network_type && context.network_type == "public" -}; +}; \ No newline at end of file From 1ea111cf09a696bba1d1718110e38f4c9cccb93c Mon Sep 17 00:00:00 2001 From: Safin Wasi <6601566+SafinWasi@users.noreply.github.com> Date: Fri, 13 Mar 2026 03:16:21 +0000 Subject: [PATCH 023/113] feat: update manifest.json --- tarpDemo/manifest.json | 14 +++++++------- 1 file changed, 7 insertions(+), 7 deletions(-) diff --git a/tarpDemo/manifest.json b/tarpDemo/manifest.json index 782d619..12c87d1 100644 --- a/tarpDemo/manifest.json +++ b/tarpDemo/manifest.json @@ -1,19 +1,15 @@ { "policy_store_id": "449805c83e13f332b1b35eac6ffa93187fbd1c648085", - "generated_date": "2026-03-13T03:15:46.856860+00:00", + "generated_date": "2026-03-13T03:16:20.551744+00:00", "files": { "manifest.json": { - "size": 4177, - "checksum": "sha1:e95329cd70746c8679d4da7e34ff4f9b637b2677" + "size": 4174, + "checksum": "sha1:782d619611b48cd3c278fccac0d9e1cc0f5c8297" }, "metadata.json": { "size": 325, "checksum": "sha1:d4c87ea5068c99a0da40ea41802b0554b93f62c8" }, - "policies/420184da127304d1b2898761893a974096f6dbade45a.cedar": { - "size": 227, - "checksum": "sha1:da536ecbff7806020db9d1eddbbb72658069d317" - }, "policies/4ab79a92feac06a1a005373b741ed50e07d23d98f9a5.cedar": { "size": 123, "checksum": "sha1:a473034d33f80704f3a2cac39867f91351587395" @@ -82,6 +78,10 @@ "size": 139, "checksum": "sha1:1da6c83ffffc535319e2ef868b4b00a3960b37c1" }, + "policies/user_cannot_execute_on_public_network.cedar": { + "size": 226, + "checksum": "sha1:8c7bf803b8268dfe022acbf988d4ba4851e7dd41" + }, "policies/user_cannot_write_from_restricted_country.cedar": { "size": 226, "checksum": "sha1:f3778f9139df04fb2c7ef86cf42b0dd7f271d4cd" From 41c37a8b38c351ead49abfae450f1794c1596c94 Mon Sep 17 00:00:00 2001 From: Safin Wasi <6601566+SafinWasi@users.noreply.github.com> Date: Fri, 13 Mar 2026 03:16:51 +0000 Subject: [PATCH 024/113] feat: renaming policy 4ab79a92feac06a1a005373b741ed50e07d23d98f9a5 --- ...c06a1a005373b741ed50e07d23d98f9a5.cedar => user_can_tag.cedar} | 0 1 file changed, 0 insertions(+), 0 deletions(-) rename tarpDemo/policies/{4ab79a92feac06a1a005373b741ed50e07d23d98f9a5.cedar => user_can_tag.cedar} (100%) diff --git a/tarpDemo/policies/4ab79a92feac06a1a005373b741ed50e07d23d98f9a5.cedar b/tarpDemo/policies/user_can_tag.cedar similarity index 100% rename from tarpDemo/policies/4ab79a92feac06a1a005373b741ed50e07d23d98f9a5.cedar rename to tarpDemo/policies/user_can_tag.cedar From 8060dda9f3dc2977988c0694578dcff0325b15a0 Mon Sep 17 00:00:00 2001 From: Safin Wasi <6601566+SafinWasi@users.noreply.github.com> Date: Fri, 13 Mar 2026 03:16:52 +0000 Subject: [PATCH 025/113] feat: update user_can_tag.cedar From f9ad169b15b42637cb20029de5712fd49396e768 Mon Sep 17 00:00:00 2001 From: Safin Wasi <6601566+SafinWasi@users.noreply.github.com> Date: Fri, 13 Mar 2026 03:16:54 +0000 Subject: [PATCH 026/113] feat: update manifest.json --- tarpDemo/manifest.json | 14 +++++++------- 1 file changed, 7 insertions(+), 7 deletions(-) diff --git a/tarpDemo/manifest.json b/tarpDemo/manifest.json index 12c87d1..8318895 100644 --- a/tarpDemo/manifest.json +++ b/tarpDemo/manifest.json @@ -1,19 +1,15 @@ { "policy_store_id": "449805c83e13f332b1b35eac6ffa93187fbd1c648085", - "generated_date": "2026-03-13T03:16:20.551744+00:00", + "generated_date": "2026-03-13T03:16:54.373038+00:00", "files": { "manifest.json": { - "size": 4174, - "checksum": "sha1:782d619611b48cd3c278fccac0d9e1cc0f5c8297" + "size": 4167, + "checksum": "sha1:12c87d1e8d223ebfd7dcf876207b9098d4fdd601" }, "metadata.json": { "size": 325, "checksum": "sha1:d4c87ea5068c99a0da40ea41802b0554b93f62c8" }, - "policies/4ab79a92feac06a1a005373b741ed50e07d23d98f9a5.cedar": { - "size": 123, - "checksum": "sha1:a473034d33f80704f3a2cac39867f91351587395" - }, "policies/50c0ea31a9ed25a575b7538dec38cb953431651e7bec.cedar": { "size": 224, "checksum": "sha1:c7cccc3f2d06b10bd0ec6084612eb821df78eddc" @@ -78,6 +74,10 @@ "size": 139, "checksum": "sha1:1da6c83ffffc535319e2ef868b4b00a3960b37c1" }, + "policies/user_can_tag.cedar": { + "size": 123, + "checksum": "sha1:a473034d33f80704f3a2cac39867f91351587395" + }, "policies/user_cannot_execute_on_public_network.cedar": { "size": 226, "checksum": "sha1:8c7bf803b8268dfe022acbf988d4ba4851e7dd41" From af0d640569b8275ae3a933031fa150033f54dca0 Mon Sep 17 00:00:00 2001 From: Safin Wasi <6601566+SafinWasi@users.noreply.github.com> Date: Fri, 13 Mar 2026 03:18:31 +0000 Subject: [PATCH 027/113] feat: update 1985d6d8767b87d752035c9f9c0078daf057ad2cd5ea.json From d5bdf7fce9c5c529982f7f1ab0bf2bf6813766a8 Mon Sep 17 00:00:00 2001 From: Safin Wasi <6601566+SafinWasi@users.noreply.github.com> Date: Fri, 13 Mar 2026 03:18:32 +0000 Subject: [PATCH 028/113] feat: update manifest.json --- tarpDemo/manifest.json | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/tarpDemo/manifest.json b/tarpDemo/manifest.json index 8318895..5471c39 100644 --- a/tarpDemo/manifest.json +++ b/tarpDemo/manifest.json @@ -1,10 +1,10 @@ { "policy_store_id": "449805c83e13f332b1b35eac6ffa93187fbd1c648085", - "generated_date": "2026-03-13T03:16:54.373038+00:00", + "generated_date": "2026-03-13T03:18:32.385959+00:00", "files": { "manifest.json": { - "size": 4167, - "checksum": "sha1:12c87d1e8d223ebfd7dcf876207b9098d4fdd601" + "size": 4135, + "checksum": "sha1:83188952721a22fe3a5ca3ca9421dc3f2bdc1a69" }, "metadata.json": { "size": 325, From 24a1785d07b29f9fa8e283d381276ca941b9fdbf Mon Sep 17 00:00:00 2001 From: Safin Wasi <6601566+SafinWasi@users.noreply.github.com> Date: Fri, 13 Mar 2026 03:22:52 +0000 Subject: [PATCH 029/113] feat: renaming policy 50c0ea31a9ed25a575b7538dec38cb953431651e7bec --- ...3431651e7bec.cedar => user_can_read_if_email_is_example.cedar} | 0 1 file changed, 0 insertions(+), 0 deletions(-) rename tarpDemo/policies/{50c0ea31a9ed25a575b7538dec38cb953431651e7bec.cedar => user_can_read_if_email_is_example.cedar} (100%) diff --git a/tarpDemo/policies/50c0ea31a9ed25a575b7538dec38cb953431651e7bec.cedar b/tarpDemo/policies/user_can_read_if_email_is_example.cedar similarity index 100% rename from tarpDemo/policies/50c0ea31a9ed25a575b7538dec38cb953431651e7bec.cedar rename to tarpDemo/policies/user_can_read_if_email_is_example.cedar From 83220b09c6a4a522218082e4e4d061a44092d291 Mon Sep 17 00:00:00 2001 From: Safin Wasi <6601566+SafinWasi@users.noreply.github.com> Date: Fri, 13 Mar 2026 03:22:53 +0000 Subject: [PATCH 030/113] feat: update user_can_read_if_email_is_example.cedar --- tarpDemo/policies/user_can_read_if_email_is_example.cedar | 7 ++++--- 1 file changed, 4 insertions(+), 3 deletions(-) diff --git a/tarpDemo/policies/user_can_read_if_email_is_example.cedar b/tarpDemo/policies/user_can_read_if_email_is_example.cedar index c7cccc3..709cc56 100644 --- a/tarpDemo/policies/user_can_read_if_email_is_example.cedar +++ b/tarpDemo/policies/user_can_read_if_email_is_example.cedar @@ -1,10 +1,11 @@ @id("user_can_read_if_email_is_example") permit ( - principal is Jans::User, + principal, action == Jans::Action::"Read", resource is Jans::SecretDocument ) when { - principal has email && - principal.email.domain == "example.com" + context has tokens.jans_id_token && + context.tokens.jans_id_token.hasTag("email") && + context.tokens.jans_id_token.getTag("email").contains("admin@example.com") }; \ No newline at end of file From 5fbd978530bc7b149d6f70d36bb6362bc92387ff Mon Sep 17 00:00:00 2001 From: Safin Wasi <6601566+SafinWasi@users.noreply.github.com> Date: Fri, 13 Mar 2026 03:22:55 +0000 Subject: [PATCH 031/113] feat: update manifest.json --- tarpDemo/manifest.json | 12 ++++++------ 1 file changed, 6 insertions(+), 6 deletions(-) diff --git a/tarpDemo/manifest.json b/tarpDemo/manifest.json index 5471c39..cffc031 100644 --- a/tarpDemo/manifest.json +++ b/tarpDemo/manifest.json @@ -1,19 +1,15 @@ { "policy_store_id": "449805c83e13f332b1b35eac6ffa93187fbd1c648085", - "generated_date": "2026-03-13T03:18:32.385959+00:00", + "generated_date": "2026-03-13T03:22:54.690804+00:00", "files": { "manifest.json": { "size": 4135, - "checksum": "sha1:83188952721a22fe3a5ca3ca9421dc3f2bdc1a69" + "checksum": "sha1:5471c3932fb93e26d94720edc1d97dee9a93ea1c" }, "metadata.json": { "size": 325, "checksum": "sha1:d4c87ea5068c99a0da40ea41802b0554b93f62c8" }, - "policies/50c0ea31a9ed25a575b7538dec38cb953431651e7bec.cedar": { - "size": 224, - "checksum": "sha1:c7cccc3f2d06b10bd0ec6084612eb821df78eddc" - }, "policies/689edd369c276afb5a163119dcd92c74196a4e0c7bdb.cedar": { "size": 234, "checksum": "sha1:0951e86c967dcd184cd83ff1928917f17422d41e" @@ -74,6 +70,10 @@ "size": 139, "checksum": "sha1:1da6c83ffffc535319e2ef868b4b00a3960b37c1" }, + "policies/user_can_read_if_email_is_example.cedar": { + "size": 308, + "checksum": "sha1:709cc56403e9e6664106a9e6c39ed663558bd14a" + }, "policies/user_can_tag.cedar": { "size": 123, "checksum": "sha1:a473034d33f80704f3a2cac39867f91351587395" From 9913738fa357df5322f909b4ce0348b65a5bbe09 Mon Sep 17 00:00:00 2001 From: Safin Wasi <6601566+SafinWasi@users.noreply.github.com> Date: Fri, 13 Mar 2026 03:23:09 +0000 Subject: [PATCH 032/113] feat: renaming policy 689edd369c276afb5a163119dcd92c74196a4e0c7bdb --- ...74196a4e0c7bdb.cedar => user_cannot_read_if_compromised.cedar} | 0 1 file changed, 0 insertions(+), 0 deletions(-) rename tarpDemo/policies/{689edd369c276afb5a163119dcd92c74196a4e0c7bdb.cedar => user_cannot_read_if_compromised.cedar} (100%) diff --git a/tarpDemo/policies/689edd369c276afb5a163119dcd92c74196a4e0c7bdb.cedar b/tarpDemo/policies/user_cannot_read_if_compromised.cedar similarity index 100% rename from tarpDemo/policies/689edd369c276afb5a163119dcd92c74196a4e0c7bdb.cedar rename to tarpDemo/policies/user_cannot_read_if_compromised.cedar From 12cc76945620d06b7bf119155dcf31939fcded15 Mon Sep 17 00:00:00 2001 From: Safin Wasi <6601566+SafinWasi@users.noreply.github.com> Date: Fri, 13 Mar 2026 03:23:10 +0000 Subject: [PATCH 033/113] feat: update user_cannot_read_if_compromised.cedar --- tarpDemo/policies/user_cannot_read_if_compromised.cedar | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) diff --git a/tarpDemo/policies/user_cannot_read_if_compromised.cedar b/tarpDemo/policies/user_cannot_read_if_compromised.cedar index 0951e86..3c320f5 100644 --- a/tarpDemo/policies/user_cannot_read_if_compromised.cedar +++ b/tarpDemo/policies/user_cannot_read_if_compromised.cedar @@ -1,9 +1,10 @@ @id("user_cannot_read_if_compromised") forbid ( - principal is Jans::User, + principal, action == Jans::Action::"Read", resource is Jans::SecretDocument -) when { +) +when { context has device_health && context.device_health.contains("compromised") }; \ No newline at end of file From 09930aeca92b5c6db0dcd7716be6b43afa040b08 Mon Sep 17 00:00:00 2001 From: Safin Wasi <6601566+SafinWasi@users.noreply.github.com> Date: Fri, 13 Mar 2026 03:23:11 +0000 Subject: [PATCH 034/113] feat: update manifest.json --- tarpDemo/manifest.json | 14 +++++++------- 1 file changed, 7 insertions(+), 7 deletions(-) diff --git a/tarpDemo/manifest.json b/tarpDemo/manifest.json index cffc031..46ac373 100644 --- a/tarpDemo/manifest.json +++ b/tarpDemo/manifest.json @@ -1,19 +1,15 @@ { "policy_store_id": "449805c83e13f332b1b35eac6ffa93187fbd1c648085", - "generated_date": "2026-03-13T03:22:54.690804+00:00", + "generated_date": "2026-03-13T03:23:11.416972+00:00", "files": { "manifest.json": { - "size": 4135, - "checksum": "sha1:5471c3932fb93e26d94720edc1d97dee9a93ea1c" + "size": 4124, + "checksum": "sha1:cffc031fa23cbb2769ff5607693f34dac8bd323b" }, "metadata.json": { "size": 325, "checksum": "sha1:d4c87ea5068c99a0da40ea41802b0554b93f62c8" }, - "policies/689edd369c276afb5a163119dcd92c74196a4e0c7bdb.cedar": { - "size": 234, - "checksum": "sha1:0951e86c967dcd184cd83ff1928917f17422d41e" - }, "policies/6e46e36071466cc37c0e9bbd65f16c51ea2ab152c6fc.cedar": { "size": 129, "checksum": "sha1:ba70df5d5b9d44112fba4ce96ab50e3ac0d38ca2" @@ -82,6 +78,10 @@ "size": 226, "checksum": "sha1:8c7bf803b8268dfe022acbf988d4ba4851e7dd41" }, + "policies/user_cannot_read_if_compromised.cedar": { + "size": 220, + "checksum": "sha1:3c320f56bf422f342f79e8ffce19b675eaf72113" + }, "policies/user_cannot_write_from_restricted_country.cedar": { "size": 226, "checksum": "sha1:f3778f9139df04fb2c7ef86cf42b0dd7f271d4cd" From 651595a0abbe76ade86eecc8e478c3f1fcb96b4b Mon Sep 17 00:00:00 2001 From: Safin Wasi <6601566+SafinWasi@users.noreply.github.com> Date: Fri, 13 Mar 2026 03:23:50 +0000 Subject: [PATCH 035/113] feat: renaming policy 6e46e36071466cc37c0e9bbd65f16c51ea2ab152c6fc --- ...c37c0e9bbd65f16c51ea2ab152c6fc.cedar => user_can_search.cedar} | 0 1 file changed, 0 insertions(+), 0 deletions(-) rename tarpDemo/policies/{6e46e36071466cc37c0e9bbd65f16c51ea2ab152c6fc.cedar => user_can_search.cedar} (100%) diff --git a/tarpDemo/policies/6e46e36071466cc37c0e9bbd65f16c51ea2ab152c6fc.cedar b/tarpDemo/policies/user_can_search.cedar similarity index 100% rename from tarpDemo/policies/6e46e36071466cc37c0e9bbd65f16c51ea2ab152c6fc.cedar rename to tarpDemo/policies/user_can_search.cedar From b3780df7c93b0ddf6dedce27203cb33c2d97ce79 Mon Sep 17 00:00:00 2001 From: Safin Wasi <6601566+SafinWasi@users.noreply.github.com> Date: Fri, 13 Mar 2026 03:23:51 +0000 Subject: [PATCH 036/113] feat: update user_can_search.cedar --- tarpDemo/policies/user_can_search.cedar | 6 ++++-- 1 file changed, 4 insertions(+), 2 deletions(-) diff --git a/tarpDemo/policies/user_can_search.cedar b/tarpDemo/policies/user_can_search.cedar index ba70df5..9632a82 100644 --- a/tarpDemo/policies/user_can_search.cedar +++ b/tarpDemo/policies/user_can_search.cedar @@ -1,6 +1,8 @@ @id("user_can_search") permit ( - principal is Jans::User, + principal, action == Jans::Action::"Search", resource is Jans::Application -); \ No newline at end of file +) when { + context has tokens.jans_userinfo_token +}; \ No newline at end of file From dae8eace6dca0fecc6b37217dae8a48fe599891d Mon Sep 17 00:00:00 2001 From: Safin Wasi <6601566+SafinWasi@users.noreply.github.com> Date: Fri, 13 Mar 2026 03:23:53 +0000 Subject: [PATCH 037/113] feat: update manifest.json --- tarpDemo/manifest.json | 14 +++++++------- 1 file changed, 7 insertions(+), 7 deletions(-) diff --git a/tarpDemo/manifest.json b/tarpDemo/manifest.json index 46ac373..e1c44aa 100644 --- a/tarpDemo/manifest.json +++ b/tarpDemo/manifest.json @@ -1,19 +1,15 @@ { "policy_store_id": "449805c83e13f332b1b35eac6ffa93187fbd1c648085", - "generated_date": "2026-03-13T03:23:11.416972+00:00", + "generated_date": "2026-03-13T03:23:53.073976+00:00", "files": { "manifest.json": { - "size": 4124, - "checksum": "sha1:cffc031fa23cbb2769ff5607693f34dac8bd323b" + "size": 4111, + "checksum": "sha1:46ac373a7c785359e90fb3f491a3b267180af9b7" }, "metadata.json": { "size": 325, "checksum": "sha1:d4c87ea5068c99a0da40ea41802b0554b93f62c8" }, - "policies/6e46e36071466cc37c0e9bbd65f16c51ea2ab152c6fc.cedar": { - "size": 129, - "checksum": "sha1:ba70df5d5b9d44112fba4ce96ab50e3ac0d38ca2" - }, "policies/76acfe86fb09731682f92c4fbf7d2e066813ce639404.cedar": { "size": 129, "checksum": "sha1:b1f618fe1e7eca7d01410f5bca6f313b9f64b58b" @@ -70,6 +66,10 @@ "size": 308, "checksum": "sha1:709cc56403e9e6664106a9e6c39ed663558bd14a" }, + "policies/user_can_search.cedar": { + "size": 165, + "checksum": "sha1:9632a82fa98c5844c77b52f2fd47f4dd43ed986c" + }, "policies/user_can_tag.cedar": { "size": 123, "checksum": "sha1:a473034d33f80704f3a2cac39867f91351587395" From ba7fa6ff1292ad727012c97b72e98995df1252af Mon Sep 17 00:00:00 2001 From: Safin Wasi <6601566+SafinWasi@users.noreply.github.com> Date: Fri, 13 Mar 2026 03:25:17 +0000 Subject: [PATCH 038/113] feat: renaming policy 76acfe86fb09731682f92c4fbf7d2e066813ce639404 --- ...d2e066813ce639404.cedar => allow_teacher_secretdocument.cedar} | 0 1 file changed, 0 insertions(+), 0 deletions(-) rename tarpDemo/policies/{76acfe86fb09731682f92c4fbf7d2e066813ce639404.cedar => allow_teacher_secretdocument.cedar} (100%) diff --git a/tarpDemo/policies/76acfe86fb09731682f92c4fbf7d2e066813ce639404.cedar b/tarpDemo/policies/allow_teacher_secretdocument.cedar similarity index 100% rename from tarpDemo/policies/76acfe86fb09731682f92c4fbf7d2e066813ce639404.cedar rename to tarpDemo/policies/allow_teacher_secretdocument.cedar From 565ed151c4aad93eebfe2535686acc12579d19a9 Mon Sep 17 00:00:00 2001 From: Safin Wasi <6601566+SafinWasi@users.noreply.github.com> Date: Fri, 13 Mar 2026 03:25:18 +0000 Subject: [PATCH 039/113] feat: update allow_teacher_secretdocument.cedar --- tarpDemo/policies/allow_teacher_secretdocument.cedar | 8 ++++++-- 1 file changed, 6 insertions(+), 2 deletions(-) diff --git a/tarpDemo/policies/allow_teacher_secretdocument.cedar b/tarpDemo/policies/allow_teacher_secretdocument.cedar index b1f618f..d2c577a 100644 --- a/tarpDemo/policies/allow_teacher_secretdocument.cedar +++ b/tarpDemo/policies/allow_teacher_secretdocument.cedar @@ -1,6 +1,10 @@ @id("allow_teacher_secretdocument") permit( - principal in Jans::Role::"Teacher", + principal, action, resource is Jans::SecretDocument -); \ No newline at end of file +) when { + context has tokens.jans_id_token && + context.tokens.jans_id_token.hasTag("role") && + context.tokens.jans_id_token.getTag("role").contains("Teacher") +}; \ No newline at end of file From d1123047225af3f73325a061b16205dc4e785252 Mon Sep 17 00:00:00 2001 From: Safin Wasi <6601566+SafinWasi@users.noreply.github.com> Date: Fri, 13 Mar 2026 03:25:20 +0000 Subject: [PATCH 040/113] feat: update manifest.json --- tarpDemo/manifest.json | 14 +++++++------- 1 file changed, 7 insertions(+), 7 deletions(-) diff --git a/tarpDemo/manifest.json b/tarpDemo/manifest.json index e1c44aa..934d846 100644 --- a/tarpDemo/manifest.json +++ b/tarpDemo/manifest.json @@ -1,19 +1,15 @@ { "policy_store_id": "449805c83e13f332b1b35eac6ffa93187fbd1c648085", - "generated_date": "2026-03-13T03:23:53.073976+00:00", + "generated_date": "2026-03-13T03:25:20.329430+00:00", "files": { "manifest.json": { - "size": 4111, - "checksum": "sha1:46ac373a7c785359e90fb3f491a3b267180af9b7" + "size": 4082, + "checksum": "sha1:e1c44aad00f0cb051ffddde44d4667c899ade509" }, "metadata.json": { "size": 325, "checksum": "sha1:d4c87ea5068c99a0da40ea41802b0554b93f62c8" }, - "policies/76acfe86fb09731682f92c4fbf7d2e066813ce639404.cedar": { - "size": 129, - "checksum": "sha1:b1f618fe1e7eca7d01410f5bca6f313b9f64b58b" - }, "policies/91b2611a1ea9859cb7ce780ca16adf3b2a68f892786a.cedar": { "size": 125, "checksum": "sha1:50cec10426a21afe2f7fe8cb6bfc9be185f966da" @@ -30,6 +26,10 @@ "size": 289, "checksum": "sha1:847ed6fceaa723f1a64aa69b181dce19a527cbd5" }, + "policies/allow_teacher_secretdocument.cedar": { + "size": 266, + "checksum": "sha1:d2c577a4d8f8417ae0f1b331f616b6831aed266a" + }, "policies/b5111ecf0d218da2cdbece83aeb77cb6b479d3b5d85c.cedar": { "size": 131, "checksum": "sha1:a96a71b7679d9baf6d2169f8f6ee3cd1aff4b841" From cbe1eb95629f49b3a5bc508f6253104060023d4d Mon Sep 17 00:00:00 2001 From: Safin Wasi <6601566+SafinWasi@users.noreply.github.com> Date: Fri, 13 Mar 2026 03:26:37 +0000 Subject: [PATCH 041/113] feat: renaming policy 91b2611a1ea9859cb7ce780ca16adf3b2a68f892786a --- ...859cb7ce780ca16adf3b2a68f892786a.cedar => user_can_read.cedar} | 0 1 file changed, 0 insertions(+), 0 deletions(-) rename tarpDemo/policies/{91b2611a1ea9859cb7ce780ca16adf3b2a68f892786a.cedar => user_can_read.cedar} (100%) diff --git a/tarpDemo/policies/91b2611a1ea9859cb7ce780ca16adf3b2a68f892786a.cedar b/tarpDemo/policies/user_can_read.cedar similarity index 100% rename from tarpDemo/policies/91b2611a1ea9859cb7ce780ca16adf3b2a68f892786a.cedar rename to tarpDemo/policies/user_can_read.cedar From 10d158cba5e68802e837b8be2b3c4a68fbe9bfda Mon Sep 17 00:00:00 2001 From: Safin Wasi <6601566+SafinWasi@users.noreply.github.com> Date: Fri, 13 Mar 2026 03:26:38 +0000 Subject: [PATCH 042/113] feat: update user_can_read.cedar --- tarpDemo/policies/user_can_read.cedar | 6 ++++-- 1 file changed, 4 insertions(+), 2 deletions(-) diff --git a/tarpDemo/policies/user_can_read.cedar b/tarpDemo/policies/user_can_read.cedar index 50cec10..4176092 100644 --- a/tarpDemo/policies/user_can_read.cedar +++ b/tarpDemo/policies/user_can_read.cedar @@ -1,6 +1,8 @@ @id("user_can_read") permit ( - principal is Jans::User, + principal, action == Jans::Action::"Read", resource is Jans::Application -); \ No newline at end of file +) when { + context has tokens.jans_userinfo_token +}; \ No newline at end of file From 67870ef1a11107732d17a53943b3ca9a05389052 Mon Sep 17 00:00:00 2001 From: Safin Wasi <6601566+SafinWasi@users.noreply.github.com> Date: Fri, 13 Mar 2026 03:26:40 +0000 Subject: [PATCH 043/113] feat: update manifest.json --- tarpDemo/manifest.json | 14 +++++++------- 1 file changed, 7 insertions(+), 7 deletions(-) diff --git a/tarpDemo/manifest.json b/tarpDemo/manifest.json index 934d846..6f0e6e7 100644 --- a/tarpDemo/manifest.json +++ b/tarpDemo/manifest.json @@ -1,19 +1,15 @@ { "policy_store_id": "449805c83e13f332b1b35eac6ffa93187fbd1c648085", - "generated_date": "2026-03-13T03:25:20.329430+00:00", + "generated_date": "2026-03-13T03:26:39.732862+00:00", "files": { "manifest.json": { - "size": 4082, - "checksum": "sha1:e1c44aad00f0cb051ffddde44d4667c899ade509" + "size": 4066, + "checksum": "sha1:934d846f44a8fd165c026b97df4b24422acfdbbb" }, "metadata.json": { "size": 325, "checksum": "sha1:d4c87ea5068c99a0da40ea41802b0554b93f62c8" }, - "policies/91b2611a1ea9859cb7ce780ca16adf3b2a68f892786a.cedar": { - "size": 125, - "checksum": "sha1:50cec10426a21afe2f7fe8cb6bfc9be185f966da" - }, "policies/9e2f1520bd292765609e8ce57add8d3c134e3a91759d.cedar": { "size": 176, "checksum": "sha1:8fce2dc995abd19a9794d2e23e4a037f36d00e1e" @@ -62,6 +58,10 @@ "size": 139, "checksum": "sha1:1da6c83ffffc535319e2ef868b4b00a3960b37c1" }, + "policies/user_can_read.cedar": { + "size": 161, + "checksum": "sha1:4176092cc6f8e8f34c845752b740e9998be33ea1" + }, "policies/user_can_read_if_email_is_example.cedar": { "size": 308, "checksum": "sha1:709cc56403e9e6664106a9e6c39ed663558bd14a" From 7e0a3329a461c16169bdd12d3f51864319ac0682 Mon Sep 17 00:00:00 2001 From: Safin Wasi <6601566+SafinWasi@users.noreply.github.com> Date: Fri, 13 Mar 2026 03:27:52 +0000 Subject: [PATCH 044/113] feat: renaming policy 9e2f1520bd292765609e8ce57add8d3c134e3a91759d --- ...59d.cedar => security_admin_can_write_to_secretdocument.cedar} | 0 1 file changed, 0 insertions(+), 0 deletions(-) rename tarpDemo/policies/{9e2f1520bd292765609e8ce57add8d3c134e3a91759d.cedar => security_admin_can_write_to_secretdocument.cedar} (100%) diff --git a/tarpDemo/policies/9e2f1520bd292765609e8ce57add8d3c134e3a91759d.cedar b/tarpDemo/policies/security_admin_can_write_to_secretdocument.cedar similarity index 100% rename from tarpDemo/policies/9e2f1520bd292765609e8ce57add8d3c134e3a91759d.cedar rename to tarpDemo/policies/security_admin_can_write_to_secretdocument.cedar From 60369b24b2ebaff0d0ae33eae25aa04e637da818 Mon Sep 17 00:00:00 2001 From: Safin Wasi <6601566+SafinWasi@users.noreply.github.com> Date: Fri, 13 Mar 2026 03:27:53 +0000 Subject: [PATCH 045/113] feat: update security_admin_can_write_to_secretdocument.cedar --- .../security_admin_can_write_to_secretdocument.cedar | 8 ++++++-- 1 file changed, 6 insertions(+), 2 deletions(-) diff --git a/tarpDemo/policies/security_admin_can_write_to_secretdocument.cedar b/tarpDemo/policies/security_admin_can_write_to_secretdocument.cedar index 8fce2dc..53f7d49 100644 --- a/tarpDemo/policies/security_admin_can_write_to_secretdocument.cedar +++ b/tarpDemo/policies/security_admin_can_write_to_secretdocument.cedar @@ -1,6 +1,10 @@ @id("security_admin_can_write_to_secretdocument") permit ( - principal in Jans::Role::"security-admin", + principal, action == Jans::Action::"Write", resource is Jans::SecretDocument -); \ No newline at end of file +) when { + context has tokens.jans_id_token && + context.tokens.jans_id_token.hasTag("role") && + context.tokens.jans_id_token.getTag("role").contains("security-admin") +}; \ No newline at end of file From e6bcaca79bf5390d8484e015e96482745b388c22 Mon Sep 17 00:00:00 2001 From: Safin Wasi <6601566+SafinWasi@users.noreply.github.com> Date: Fri, 13 Mar 2026 03:27:54 +0000 Subject: [PATCH 046/113] feat: update manifest.json --- tarpDemo/manifest.json | 14 +++++++------- 1 file changed, 7 insertions(+), 7 deletions(-) diff --git a/tarpDemo/manifest.json b/tarpDemo/manifest.json index 6f0e6e7..ea3edfd 100644 --- a/tarpDemo/manifest.json +++ b/tarpDemo/manifest.json @@ -1,19 +1,15 @@ { "policy_store_id": "449805c83e13f332b1b35eac6ffa93187fbd1c648085", - "generated_date": "2026-03-13T03:26:39.732862+00:00", + "generated_date": "2026-03-13T03:27:54.357446+00:00", "files": { "manifest.json": { - "size": 4066, - "checksum": "sha1:934d846f44a8fd165c026b97df4b24422acfdbbb" + "size": 4035, + "checksum": "sha1:6f0e6e743756e5d51e877fc22409d281e44d1d0a" }, "metadata.json": { "size": 325, "checksum": "sha1:d4c87ea5068c99a0da40ea41802b0554b93f62c8" }, - "policies/9e2f1520bd292765609e8ce57add8d3c134e3a91759d.cedar": { - "size": 176, - "checksum": "sha1:8fce2dc995abd19a9794d2e23e4a037f36d00e1e" - }, "policies/a6f9c66ddcadeeec9e0f65420c89715b00a835ffdaec.cedar": { "size": 122, "checksum": "sha1:191c7949720d26a44002b1eacb22e63e35e8fa9a" @@ -58,6 +54,10 @@ "size": 139, "checksum": "sha1:1da6c83ffffc535319e2ef868b4b00a3960b37c1" }, + "policies/security_admin_can_write_to_secretdocument.cedar": { + "size": 313, + "checksum": "sha1:53f7d49026281484ae5f31a699d3c712a2d225c2" + }, "policies/user_can_read.cedar": { "size": 161, "checksum": "sha1:4176092cc6f8e8f34c845752b740e9998be33ea1" From 899b3db5e223a1c1feb3e21cbb72ed9c8d813388 Mon Sep 17 00:00:00 2001 From: Safin Wasi <6601566+SafinWasi@users.noreply.github.com> Date: Fri, 13 Mar 2026 03:28:57 +0000 Subject: [PATCH 047/113] feat: renaming policy a6f9c66ddcadeeec9e0f65420c89715b00a835ffdaec --- ...e0f65420c89715b00a835ffdaec.cedar => allow_student_read.cedar} | 0 1 file changed, 0 insertions(+), 0 deletions(-) rename tarpDemo/policies/{a6f9c66ddcadeeec9e0f65420c89715b00a835ffdaec.cedar => allow_student_read.cedar} (100%) diff --git a/tarpDemo/policies/a6f9c66ddcadeeec9e0f65420c89715b00a835ffdaec.cedar b/tarpDemo/policies/allow_student_read.cedar similarity index 100% rename from tarpDemo/policies/a6f9c66ddcadeeec9e0f65420c89715b00a835ffdaec.cedar rename to tarpDemo/policies/allow_student_read.cedar From 7c9a96cf81f15601a4afa3ddec5a7f50c7d9f3e7 Mon Sep 17 00:00:00 2001 From: Safin Wasi <6601566+SafinWasi@users.noreply.github.com> Date: Fri, 13 Mar 2026 03:28:58 +0000 Subject: [PATCH 048/113] feat: update allow_student_read.cedar --- tarpDemo/policies/allow_student_read.cedar | 8 ++++++-- 1 file changed, 6 insertions(+), 2 deletions(-) diff --git a/tarpDemo/policies/allow_student_read.cedar b/tarpDemo/policies/allow_student_read.cedar index 191c794..c0a7d7a 100644 --- a/tarpDemo/policies/allow_student_read.cedar +++ b/tarpDemo/policies/allow_student_read.cedar @@ -1,6 +1,10 @@ @id("allow_student_read") permit ( - principal in Jans::Role::"Student", + principal, action in [Jans::Action::"Read"], resource -); \ No newline at end of file +) when { + context has tokens.jans_id_token && + context.tokens.jans_id_token.hasTag("role") && + context.tokens.jans_id_token.getTag("role").contains("Student") +}; \ No newline at end of file From 60c4f191d2138f251406e40ad01c0b91e00a92ae Mon Sep 17 00:00:00 2001 From: Safin Wasi <6601566+SafinWasi@users.noreply.github.com> Date: Fri, 13 Mar 2026 03:28:59 +0000 Subject: [PATCH 049/113] feat: update manifest.json --- tarpDemo/manifest.json | 14 +++++++------- 1 file changed, 7 insertions(+), 7 deletions(-) diff --git a/tarpDemo/manifest.json b/tarpDemo/manifest.json index ea3edfd..7d30a6d 100644 --- a/tarpDemo/manifest.json +++ b/tarpDemo/manifest.json @@ -1,23 +1,23 @@ { "policy_store_id": "449805c83e13f332b1b35eac6ffa93187fbd1c648085", - "generated_date": "2026-03-13T03:27:54.357446+00:00", + "generated_date": "2026-03-13T03:28:59.424546+00:00", "files": { "manifest.json": { - "size": 4035, - "checksum": "sha1:6f0e6e743756e5d51e877fc22409d281e44d1d0a" + "size": 4033, + "checksum": "sha1:ea3edfdd8ebc9613aa5c81f0cfe7c1b112366c14" }, "metadata.json": { "size": 325, "checksum": "sha1:d4c87ea5068c99a0da40ea41802b0554b93f62c8" }, - "policies/a6f9c66ddcadeeec9e0f65420c89715b00a835ffdaec.cedar": { - "size": 122, - "checksum": "sha1:191c7949720d26a44002b1eacb22e63e35e8fa9a" - }, "policies/admin_can_write_to_application.cedar": { "size": 289, "checksum": "sha1:847ed6fceaa723f1a64aa69b181dce19a527cbd5" }, + "policies/allow_student_read.cedar": { + "size": 259, + "checksum": "sha1:c0a7d7a5cb82a84a492a1a28efc31b6efa40cc77" + }, "policies/allow_teacher_secretdocument.cedar": { "size": 266, "checksum": "sha1:d2c577a4d8f8417ae0f1b331f616b6831aed266a" From adb0b5b65d8e9c8cc30aaa23b70159e7b2e95e5e Mon Sep 17 00:00:00 2001 From: Safin Wasi <6601566+SafinWasi@users.noreply.github.com> Date: Fri, 13 Mar 2026 03:29:28 +0000 Subject: [PATCH 050/113] feat: renaming policy b5111ecf0d218da2cdbece83aeb77cb6b479d3b5d85c --- ...2cdbece83aeb77cb6b479d3b5d85c.cedar => user_can_monitor.cedar} | 0 1 file changed, 0 insertions(+), 0 deletions(-) rename tarpDemo/policies/{b5111ecf0d218da2cdbece83aeb77cb6b479d3b5d85c.cedar => user_can_monitor.cedar} (100%) diff --git a/tarpDemo/policies/b5111ecf0d218da2cdbece83aeb77cb6b479d3b5d85c.cedar b/tarpDemo/policies/user_can_monitor.cedar similarity index 100% rename from tarpDemo/policies/b5111ecf0d218da2cdbece83aeb77cb6b479d3b5d85c.cedar rename to tarpDemo/policies/user_can_monitor.cedar From 33651682540e6c400747a5ccf43fafa85795a935 Mon Sep 17 00:00:00 2001 From: Safin Wasi <6601566+SafinWasi@users.noreply.github.com> Date: Fri, 13 Mar 2026 03:29:29 +0000 Subject: [PATCH 051/113] feat: update user_can_monitor.cedar --- tarpDemo/policies/user_can_monitor.cedar | 6 ++++-- 1 file changed, 4 insertions(+), 2 deletions(-) diff --git a/tarpDemo/policies/user_can_monitor.cedar b/tarpDemo/policies/user_can_monitor.cedar index a96a71b..6aec722 100644 --- a/tarpDemo/policies/user_can_monitor.cedar +++ b/tarpDemo/policies/user_can_monitor.cedar @@ -1,6 +1,8 @@ @id("user_can_monitor") permit ( - principal is Jans::User, + principal, action == Jans::Action::"Monitor", resource is Jans::Application -); \ No newline at end of file +) when { + context has tokens.jans_userinfo_token +}; \ No newline at end of file From 8deab2c395f5e7c0f947c1fb9f3b7f81d58cd0ff Mon Sep 17 00:00:00 2001 From: Safin Wasi <6601566+SafinWasi@users.noreply.github.com> Date: Fri, 13 Mar 2026 03:29:31 +0000 Subject: [PATCH 052/113] feat: update manifest.json --- tarpDemo/manifest.json | 14 +++++++------- 1 file changed, 7 insertions(+), 7 deletions(-) diff --git a/tarpDemo/manifest.json b/tarpDemo/manifest.json index 7d30a6d..ce8b57a 100644 --- a/tarpDemo/manifest.json +++ b/tarpDemo/manifest.json @@ -1,10 +1,10 @@ { "policy_store_id": "449805c83e13f332b1b35eac6ffa93187fbd1c648085", - "generated_date": "2026-03-13T03:28:59.424546+00:00", + "generated_date": "2026-03-13T03:29:30.732564+00:00", "files": { "manifest.json": { - "size": 4033, - "checksum": "sha1:ea3edfdd8ebc9613aa5c81f0cfe7c1b112366c14" + "size": 4007, + "checksum": "sha1:7d30a6d4ae333677c3a12602f4cec2f75ed89dad" }, "metadata.json": { "size": 325, @@ -22,10 +22,6 @@ "size": 266, "checksum": "sha1:d2c577a4d8f8417ae0f1b331f616b6831aed266a" }, - "policies/b5111ecf0d218da2cdbece83aeb77cb6b479d3b5d85c.cedar": { - "size": 131, - "checksum": "sha1:a96a71b7679d9baf6d2169f8f6ee3cd1aff4b841" - }, "policies/c367d06f19af8db1ec69354044334c799ff4cd2021ae.cedar": { "size": 237, "checksum": "sha1:eb63ca96c7118ce411ce3890675e1a7ba456697a" @@ -58,6 +54,10 @@ "size": 313, "checksum": "sha1:53f7d49026281484ae5f31a699d3c712a2d225c2" }, + "policies/user_can_monitor.cedar": { + "size": 167, + "checksum": "sha1:6aec722807dbb0ef6c2351a490c1a113240f1057" + }, "policies/user_can_read.cedar": { "size": 161, "checksum": "sha1:4176092cc6f8e8f34c845752b740e9998be33ea1" From 7f028baf6081989e881b52dc85f9732687a71cfe Mon Sep 17 00:00:00 2001 From: Safin Wasi <6601566+SafinWasi@users.noreply.github.com> Date: Fri, 13 Mar 2026 03:30:09 +0000 Subject: [PATCH 053/113] feat: renaming policy c367d06f19af8db1ec69354044334c799ff4cd2021ae --- ...c799ff4cd2021ae.cedar => user_cannot_read_if_fraudulent.cedar} | 0 1 file changed, 0 insertions(+), 0 deletions(-) rename tarpDemo/policies/{c367d06f19af8db1ec69354044334c799ff4cd2021ae.cedar => user_cannot_read_if_fraudulent.cedar} (100%) diff --git a/tarpDemo/policies/c367d06f19af8db1ec69354044334c799ff4cd2021ae.cedar b/tarpDemo/policies/user_cannot_read_if_fraudulent.cedar similarity index 100% rename from tarpDemo/policies/c367d06f19af8db1ec69354044334c799ff4cd2021ae.cedar rename to tarpDemo/policies/user_cannot_read_if_fraudulent.cedar From b133fd5679979dfe1215748497a75bed0378dfe5 Mon Sep 17 00:00:00 2001 From: Safin Wasi <6601566+SafinWasi@users.noreply.github.com> Date: Fri, 13 Mar 2026 03:30:10 +0000 Subject: [PATCH 054/113] feat: update user_cannot_read_if_fraudulent.cedar --- tarpDemo/policies/user_cannot_read_if_fraudulent.cedar | 6 ++++-- 1 file changed, 4 insertions(+), 2 deletions(-) diff --git a/tarpDemo/policies/user_cannot_read_if_fraudulent.cedar b/tarpDemo/policies/user_cannot_read_if_fraudulent.cedar index eb63ca9..2fdfa89 100644 --- a/tarpDemo/policies/user_cannot_read_if_fraudulent.cedar +++ b/tarpDemo/policies/user_cannot_read_if_fraudulent.cedar @@ -1,9 +1,11 @@ @id("user_cannot_read_if_fraudulent") forbid ( - principal is Jans::User, + principal, action == Jans::Action::"Read", resource is Jans::SecretDocument -) when { +) +when { + context has tokens.jans_userinfo_token && context has fraud_indicators && context.fraud_indicators.contains("high_risk") }; \ No newline at end of file From b7589e8965883f0d8c56b59e220128c641ea5f34 Mon Sep 17 00:00:00 2001 From: Safin Wasi <6601566+SafinWasi@users.noreply.github.com> Date: Fri, 13 Mar 2026 03:30:12 +0000 Subject: [PATCH 055/113] feat: update manifest.json --- tarpDemo/manifest.json | 14 +++++++------- 1 file changed, 7 insertions(+), 7 deletions(-) diff --git a/tarpDemo/manifest.json b/tarpDemo/manifest.json index ce8b57a..5cab307 100644 --- a/tarpDemo/manifest.json +++ b/tarpDemo/manifest.json @@ -1,10 +1,10 @@ { "policy_store_id": "449805c83e13f332b1b35eac6ffa93187fbd1c648085", - "generated_date": "2026-03-13T03:29:30.732564+00:00", + "generated_date": "2026-03-13T03:30:12.176449+00:00", "files": { "manifest.json": { - "size": 4007, - "checksum": "sha1:7d30a6d4ae333677c3a12602f4cec2f75ed89dad" + "size": 3979, + "checksum": "sha1:ce8b57a17babbab3bd5925058b9b2040da27124c" }, "metadata.json": { "size": 325, @@ -22,10 +22,6 @@ "size": 266, "checksum": "sha1:d2c577a4d8f8417ae0f1b331f616b6831aed266a" }, - "policies/c367d06f19af8db1ec69354044334c799ff4cd2021ae.cedar": { - "size": 237, - "checksum": "sha1:eb63ca96c7118ce411ce3890675e1a7ba456697a" - }, "policies/c4729e4ab456b4c8e74102593e5b32e04176bc837cc5.cedar": { "size": 131, "checksum": "sha1:056b1cbe636683ae77a13c540da789e2f2b9b83b" @@ -82,6 +78,10 @@ "size": 220, "checksum": "sha1:3c320f56bf422f342f79e8ffce19b675eaf72113" }, + "policies/user_cannot_read_if_fraudulent.cedar": { + "size": 267, + "checksum": "sha1:2fdfa89f60e64e34efb9be550c602db5e0fd66a3" + }, "policies/user_cannot_write_from_restricted_country.cedar": { "size": 226, "checksum": "sha1:f3778f9139df04fb2c7ef86cf42b0dd7f271d4cd" From a7a158923af8d2cc5562672b9485724d5d75d235 Mon Sep 17 00:00:00 2001 From: Safin Wasi <6601566+SafinWasi@users.noreply.github.com> Date: Fri, 13 Mar 2026 03:30:53 +0000 Subject: [PATCH 056/113] feat: renaming policy c4729e4ab456b4c8e74102593e5b32e04176bc837cc5 --- ...8e74102593e5b32e04176bc837cc5.cedar => user_can_compare.cedar} | 0 1 file changed, 0 insertions(+), 0 deletions(-) rename tarpDemo/policies/{c4729e4ab456b4c8e74102593e5b32e04176bc837cc5.cedar => user_can_compare.cedar} (100%) diff --git a/tarpDemo/policies/c4729e4ab456b4c8e74102593e5b32e04176bc837cc5.cedar b/tarpDemo/policies/user_can_compare.cedar similarity index 100% rename from tarpDemo/policies/c4729e4ab456b4c8e74102593e5b32e04176bc837cc5.cedar rename to tarpDemo/policies/user_can_compare.cedar From 4369808cb68e13204a39a996386e4af6def7071a Mon Sep 17 00:00:00 2001 From: Safin Wasi <6601566+SafinWasi@users.noreply.github.com> Date: Fri, 13 Mar 2026 03:31:24 +0000 Subject: [PATCH 057/113] feat: update user_can_compare.cedar --- tarpDemo/policies/user_can_compare.cedar | 6 ++++-- 1 file changed, 4 insertions(+), 2 deletions(-) diff --git a/tarpDemo/policies/user_can_compare.cedar b/tarpDemo/policies/user_can_compare.cedar index 056b1cb..9f11aea 100644 --- a/tarpDemo/policies/user_can_compare.cedar +++ b/tarpDemo/policies/user_can_compare.cedar @@ -1,6 +1,8 @@ @id("user_can_compare") permit ( - principal is Jans::User, + principal, action == Jans::Action::"Compare", resource is Jans::Application -); \ No newline at end of file +) when { + context has tokens.jans_userinfo_token +}; \ No newline at end of file From 9e18d89680a01a18a143f1d41e3d4b45b203f289 Mon Sep 17 00:00:00 2001 From: Safin Wasi <6601566+SafinWasi@users.noreply.github.com> Date: Fri, 13 Mar 2026 03:31:26 +0000 Subject: [PATCH 058/113] feat: update manifest.json --- tarpDemo/manifest.json | 14 +++++++------- 1 file changed, 7 insertions(+), 7 deletions(-) diff --git a/tarpDemo/manifest.json b/tarpDemo/manifest.json index 5cab307..4364bdc 100644 --- a/tarpDemo/manifest.json +++ b/tarpDemo/manifest.json @@ -1,10 +1,10 @@ { "policy_store_id": "449805c83e13f332b1b35eac6ffa93187fbd1c648085", - "generated_date": "2026-03-13T03:30:12.176449+00:00", + "generated_date": "2026-03-13T03:31:26.193339+00:00", "files": { "manifest.json": { - "size": 3979, - "checksum": "sha1:ce8b57a17babbab3bd5925058b9b2040da27124c" + "size": 3965, + "checksum": "sha1:5cab30746a84871f187f2b9ec031fa7fcf0b5558" }, "metadata.json": { "size": 325, @@ -22,10 +22,6 @@ "size": 266, "checksum": "sha1:d2c577a4d8f8417ae0f1b331f616b6831aed266a" }, - "policies/c4729e4ab456b4c8e74102593e5b32e04176bc837cc5.cedar": { - "size": 131, - "checksum": "sha1:056b1cbe636683ae77a13c540da789e2f2b9b83b" - }, "policies/e459eba6691d141497dd1317e44d3d5b3bdd9fd65150.cedar": { "size": 165, "checksum": "sha1:a9a8a9f68dff0cd1a69e36caf588076264e8f600" @@ -50,6 +46,10 @@ "size": 313, "checksum": "sha1:53f7d49026281484ae5f31a699d3c712a2d225c2" }, + "policies/user_can_compare.cedar": { + "size": 167, + "checksum": "sha1:9f11aea60b0dd3f85cb721303cec06bd13c97159" + }, "policies/user_can_monitor.cedar": { "size": 167, "checksum": "sha1:6aec722807dbb0ef6c2351a490c1a113240f1057" From 3ae98431f145e7ed401faeeadf1f447c0665be06 Mon Sep 17 00:00:00 2001 From: Safin Wasi <6601566+SafinWasi@users.noreply.github.com> Date: Fri, 13 Mar 2026 03:32:55 +0000 Subject: [PATCH 059/113] feat: renaming policy e459eba6691d141497dd1317e44d3d5b3bdd9fd65150 --- ...bdd9fd65150.cedar => user_can_read_if_confidential_role.cedar} | 0 1 file changed, 0 insertions(+), 0 deletions(-) rename tarpDemo/policies/{e459eba6691d141497dd1317e44d3d5b3bdd9fd65150.cedar => user_can_read_if_confidential_role.cedar} (100%) diff --git a/tarpDemo/policies/e459eba6691d141497dd1317e44d3d5b3bdd9fd65150.cedar b/tarpDemo/policies/user_can_read_if_confidential_role.cedar similarity index 100% rename from tarpDemo/policies/e459eba6691d141497dd1317e44d3d5b3bdd9fd65150.cedar rename to tarpDemo/policies/user_can_read_if_confidential_role.cedar From 61bd427b21f6a9ba90e712723aa70cce3bf53937 Mon Sep 17 00:00:00 2001 From: Safin Wasi <6601566+SafinWasi@users.noreply.github.com> Date: Fri, 13 Mar 2026 03:32:56 +0000 Subject: [PATCH 060/113] feat: update user_can_read_if_confidential_role.cedar --- tarpDemo/policies/user_can_read_if_confidential_role.cedar | 6 +++++- 1 file changed, 5 insertions(+), 1 deletion(-) diff --git a/tarpDemo/policies/user_can_read_if_confidential_role.cedar b/tarpDemo/policies/user_can_read_if_confidential_role.cedar index a9a8a9f..3a8ef01 100644 --- a/tarpDemo/policies/user_can_read_if_confidential_role.cedar +++ b/tarpDemo/policies/user_can_read_if_confidential_role.cedar @@ -3,4 +3,8 @@ permit ( principal in Jans::Role::"confidential", action == Jans::Action::"Read", resource is Jans::SecretDocument -); \ No newline at end of file +) when { + context has tokens.jans_id_token && + context.tokens.jans_id_token.hasTag("role") && + context.tokens.jans_id_token.getTag("role").contains("confidential") +}; \ No newline at end of file From 1ad43cbc3f58bce5e67f497d1ebd780b6b66c488 Mon Sep 17 00:00:00 2001 From: Safin Wasi <6601566+SafinWasi@users.noreply.github.com> Date: Fri, 13 Mar 2026 03:32:58 +0000 Subject: [PATCH 061/113] feat: update manifest.json --- tarpDemo/manifest.json | 14 +++++++------- 1 file changed, 7 insertions(+), 7 deletions(-) diff --git a/tarpDemo/manifest.json b/tarpDemo/manifest.json index 4364bdc..53aa275 100644 --- a/tarpDemo/manifest.json +++ b/tarpDemo/manifest.json @@ -1,10 +1,10 @@ { "policy_store_id": "449805c83e13f332b1b35eac6ffa93187fbd1c648085", - "generated_date": "2026-03-13T03:31:26.193339+00:00", + "generated_date": "2026-03-13T03:32:58.301224+00:00", "files": { "manifest.json": { - "size": 3965, - "checksum": "sha1:5cab30746a84871f187f2b9ec031fa7fcf0b5558" + "size": 3937, + "checksum": "sha1:4364bdc9347227299fbd4f9dc0ee4f1aea4072f7" }, "metadata.json": { "size": 325, @@ -22,10 +22,6 @@ "size": 266, "checksum": "sha1:d2c577a4d8f8417ae0f1b331f616b6831aed266a" }, - "policies/e459eba6691d141497dd1317e44d3d5b3bdd9fd65150.cedar": { - "size": 165, - "checksum": "sha1:a9a8a9f68dff0cd1a69e36caf588076264e8f600" - }, "policies/e76eb1853f0c6a199ca383cd9714e0113dfd851e079a.cedar": { "size": 131, "checksum": "sha1:b16dd9e2f6513fa1eed36aafd8b5ff3afb9f106e" @@ -58,6 +54,10 @@ "size": 161, "checksum": "sha1:4176092cc6f8e8f34c845752b740e9998be33ea1" }, + "policies/user_can_read_if_confidential_role.cedar": { + "size": 332, + "checksum": "sha1:3a8ef01c2a5f280ed3903f78d31c39368f16785a" + }, "policies/user_can_read_if_email_is_example.cedar": { "size": 308, "checksum": "sha1:709cc56403e9e6664106a9e6c39ed663558bd14a" From c896524e7564980f753910b8dba925e2bc945fbe Mon Sep 17 00:00:00 2001 From: Safin Wasi <6601566+SafinWasi@users.noreply.github.com> Date: Fri, 13 Mar 2026 03:33:16 +0000 Subject: [PATCH 062/113] feat: update user_can_read_if_confidential_role.cedar --- tarpDemo/policies/user_can_read_if_confidential_role.cedar | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) diff --git a/tarpDemo/policies/user_can_read_if_confidential_role.cedar b/tarpDemo/policies/user_can_read_if_confidential_role.cedar index 3a8ef01..141cf42 100644 --- a/tarpDemo/policies/user_can_read_if_confidential_role.cedar +++ b/tarpDemo/policies/user_can_read_if_confidential_role.cedar @@ -1,9 +1,10 @@ @id("user_can_read_if_confidential_role") permit ( - principal in Jans::Role::"confidential", + principal, action == Jans::Action::"Read", resource is Jans::SecretDocument -) when { +) +when { context has tokens.jans_id_token && context.tokens.jans_id_token.hasTag("role") && context.tokens.jans_id_token.getTag("role").contains("confidential") From 3ca030a64efea4a6b7bcf77acf659623c57380a0 Mon Sep 17 00:00:00 2001 From: Safin Wasi <6601566+SafinWasi@users.noreply.github.com> Date: Fri, 13 Mar 2026 03:33:18 +0000 Subject: [PATCH 063/113] feat: update manifest.json --- tarpDemo/manifest.json | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-) diff --git a/tarpDemo/manifest.json b/tarpDemo/manifest.json index 53aa275..fbd44a7 100644 --- a/tarpDemo/manifest.json +++ b/tarpDemo/manifest.json @@ -1,10 +1,10 @@ { "policy_store_id": "449805c83e13f332b1b35eac6ffa93187fbd1c648085", - "generated_date": "2026-03-13T03:32:58.301224+00:00", + "generated_date": "2026-03-13T03:33:17.998653+00:00", "files": { "manifest.json": { - "size": 3937, - "checksum": "sha1:4364bdc9347227299fbd4f9dc0ee4f1aea4072f7" + "size": 3927, + "checksum": "sha1:53aa2758ab7f9f442cbd56d7966a2791756b0805" }, "metadata.json": { "size": 325, @@ -55,8 +55,8 @@ "checksum": "sha1:4176092cc6f8e8f34c845752b740e9998be33ea1" }, "policies/user_can_read_if_confidential_role.cedar": { - "size": 332, - "checksum": "sha1:3a8ef01c2a5f280ed3903f78d31c39368f16785a" + "size": 302, + "checksum": "sha1:141cf42a8f890e1aefe3703f5b73b9b2f59d5698" }, "policies/user_can_read_if_email_is_example.cedar": { "size": 308, From ad0c06373d3791597af35454fc95045851cc4eee Mon Sep 17 00:00:00 2001 From: Safin Wasi <6601566+SafinWasi@users.noreply.github.com> Date: Fri, 13 Mar 2026 03:34:13 +0000 Subject: [PATCH 064/113] feat: renaming policy e76eb1853f0c6a199ca383cd9714e0113dfd851e079a --- ...99ca383cd9714e0113dfd851e079a.cedar => user_can_execute.cedar} | 0 1 file changed, 0 insertions(+), 0 deletions(-) rename tarpDemo/policies/{e76eb1853f0c6a199ca383cd9714e0113dfd851e079a.cedar => user_can_execute.cedar} (100%) diff --git a/tarpDemo/policies/e76eb1853f0c6a199ca383cd9714e0113dfd851e079a.cedar b/tarpDemo/policies/user_can_execute.cedar similarity index 100% rename from tarpDemo/policies/e76eb1853f0c6a199ca383cd9714e0113dfd851e079a.cedar rename to tarpDemo/policies/user_can_execute.cedar From a4f1c13aa02573395a95bab5368974288781bcb5 Mon Sep 17 00:00:00 2001 From: Safin Wasi <6601566+SafinWasi@users.noreply.github.com> Date: Fri, 13 Mar 2026 03:34:14 +0000 Subject: [PATCH 065/113] feat: update user_can_execute.cedar --- tarpDemo/policies/user_can_execute.cedar | 6 ++++-- 1 file changed, 4 insertions(+), 2 deletions(-) diff --git a/tarpDemo/policies/user_can_execute.cedar b/tarpDemo/policies/user_can_execute.cedar index b16dd9e..cfcb731 100644 --- a/tarpDemo/policies/user_can_execute.cedar +++ b/tarpDemo/policies/user_can_execute.cedar @@ -1,6 +1,8 @@ @id("user_can_execute") permit ( - principal is Jans::User, + principal, action == Jans::Action::"Execute", resource is Jans::Application -); \ No newline at end of file +) when { + context has tokens.jans_userinfo_token +}; \ No newline at end of file From 5d02b9efd1d79cd553a4fd7dfd4a7005070eaaaf Mon Sep 17 00:00:00 2001 From: Safin Wasi <6601566+SafinWasi@users.noreply.github.com> Date: Fri, 13 Mar 2026 03:34:16 +0000 Subject: [PATCH 066/113] feat: update manifest.json --- tarpDemo/manifest.json | 12 ++++++------ 1 file changed, 6 insertions(+), 6 deletions(-) diff --git a/tarpDemo/manifest.json b/tarpDemo/manifest.json index fbd44a7..c6745b2 100644 --- a/tarpDemo/manifest.json +++ b/tarpDemo/manifest.json @@ -1,10 +1,10 @@ { "policy_store_id": "449805c83e13f332b1b35eac6ffa93187fbd1c648085", - "generated_date": "2026-03-13T03:33:17.998653+00:00", + "generated_date": "2026-03-13T03:34:15.633006+00:00", "files": { "manifest.json": { "size": 3927, - "checksum": "sha1:53aa2758ab7f9f442cbd56d7966a2791756b0805" + "checksum": "sha1:fbd44a74b02972079eb81e0f367cc1f64341c922" }, "metadata.json": { "size": 325, @@ -22,10 +22,6 @@ "size": 266, "checksum": "sha1:d2c577a4d8f8417ae0f1b331f616b6831aed266a" }, - "policies/e76eb1853f0c6a199ca383cd9714e0113dfd851e079a.cedar": { - "size": 131, - "checksum": "sha1:b16dd9e2f6513fa1eed36aafd8b5ff3afb9f106e" - }, "policies/f38f10e80c6f429153cf97781a4c6bcf29761a04259f.cedar": { "size": 207, "checksum": "sha1:1b628765b25e1de50a0b571f13d8e7bc87f81580" @@ -46,6 +42,10 @@ "size": 167, "checksum": "sha1:9f11aea60b0dd3f85cb721303cec06bd13c97159" }, + "policies/user_can_execute.cedar": { + "size": 167, + "checksum": "sha1:cfcb731c852e03f7e718367bf8a25c71848abc97" + }, "policies/user_can_monitor.cedar": { "size": 167, "checksum": "sha1:6aec722807dbb0ef6c2351a490c1a113240f1057" From e76b220f1e98817823bed47eb11f50feb2365437 Mon Sep 17 00:00:00 2001 From: Safin Wasi <6601566+SafinWasi@users.noreply.github.com> Date: Fri, 13 Mar 2026 03:35:37 +0000 Subject: [PATCH 067/113] feat: renaming policy f38f10e80c6f429153cf97781a4c6bcf29761a04259f --- ...1a4c6bcf29761a04259f.cedar => cannot_write_if_not_admin.cedar} | 0 1 file changed, 0 insertions(+), 0 deletions(-) rename tarpDemo/policies/{f38f10e80c6f429153cf97781a4c6bcf29761a04259f.cedar => cannot_write_if_not_admin.cedar} (100%) diff --git a/tarpDemo/policies/f38f10e80c6f429153cf97781a4c6bcf29761a04259f.cedar b/tarpDemo/policies/cannot_write_if_not_admin.cedar similarity index 100% rename from tarpDemo/policies/f38f10e80c6f429153cf97781a4c6bcf29761a04259f.cedar rename to tarpDemo/policies/cannot_write_if_not_admin.cedar From 1272cfd5fa0833765efd346bdc2e53f9c3adde12 Mon Sep 17 00:00:00 2001 From: Safin Wasi <6601566+SafinWasi@users.noreply.github.com> Date: Fri, 13 Mar 2026 03:35:38 +0000 Subject: [PATCH 068/113] feat: update cannot_write_if_not_admin.cedar --- tarpDemo/policies/cannot_write_if_not_admin.cedar | 10 ++++++---- 1 file changed, 6 insertions(+), 4 deletions(-) diff --git a/tarpDemo/policies/cannot_write_if_not_admin.cedar b/tarpDemo/policies/cannot_write_if_not_admin.cedar index 1b62876..6f5925e 100644 --- a/tarpDemo/policies/cannot_write_if_not_admin.cedar +++ b/tarpDemo/policies/cannot_write_if_not_admin.cedar @@ -1,9 +1,11 @@ @id("cannot_write_if_not_admin") forbid ( - principal is Jans::User, + principal, action == Jans::Action::"Write", resource is Jans::Application -) when { - principal has role && - !principal.role.contains("admin") +) +when { + context has tokens.jans_id_token && + context.tokens.jans_id_token.hasTag("role") && + !context.tokens.jans_id_token.getTag("role").contains("admin") }; \ No newline at end of file From f7c9e49842a163d89418e165a6126ff6d7ad5c2f Mon Sep 17 00:00:00 2001 From: Safin Wasi <6601566+SafinWasi@users.noreply.github.com> Date: Fri, 13 Mar 2026 03:35:40 +0000 Subject: [PATCH 069/113] feat: update manifest.json --- tarpDemo/manifest.json | 12 ++++++------ 1 file changed, 6 insertions(+), 6 deletions(-) diff --git a/tarpDemo/manifest.json b/tarpDemo/manifest.json index c6745b2..b8827f2 100644 --- a/tarpDemo/manifest.json +++ b/tarpDemo/manifest.json @@ -1,10 +1,10 @@ { "policy_store_id": "449805c83e13f332b1b35eac6ffa93187fbd1c648085", - "generated_date": "2026-03-13T03:34:15.633006+00:00", + "generated_date": "2026-03-13T03:35:40.331494+00:00", "files": { "manifest.json": { - "size": 3927, - "checksum": "sha1:fbd44a74b02972079eb81e0f367cc1f64341c922" + "size": 3899, + "checksum": "sha1:c6745b2f1634dd8097e7e169068b2b4d5be98aed" }, "metadata.json": { "size": 325, @@ -22,9 +22,9 @@ "size": 266, "checksum": "sha1:d2c577a4d8f8417ae0f1b331f616b6831aed266a" }, - "policies/f38f10e80c6f429153cf97781a4c6bcf29761a04259f.cedar": { - "size": 207, - "checksum": "sha1:1b628765b25e1de50a0b571f13d8e7bc87f81580" + "policies/cannot_write_if_not_admin.cedar": { + "size": 285, + "checksum": "sha1:6f5925ee1a124f9d958f730cc865ced2afa663aa" }, "policies/fe83e4b2338614b970559ce4141b6d3e60559d79282c.cedar": { "size": 206, From 4b605c1545f14ae1522d13509769a0fe8065f42a Mon Sep 17 00:00:00 2001 From: Safin Wasi <6601566+SafinWasi@users.noreply.github.com> Date: Fri, 13 Mar 2026 03:36:38 +0000 Subject: [PATCH 070/113] feat: renaming policy fe83e4b2338614b970559ce4141b6d3e60559d79282c --- ...6d3e60559d79282c.cedar => user_can_read_in_corp_network.cedar} | 0 1 file changed, 0 insertions(+), 0 deletions(-) rename tarpDemo/policies/{fe83e4b2338614b970559ce4141b6d3e60559d79282c.cedar => user_can_read_in_corp_network.cedar} (100%) diff --git a/tarpDemo/policies/fe83e4b2338614b970559ce4141b6d3e60559d79282c.cedar b/tarpDemo/policies/user_can_read_in_corp_network.cedar similarity index 100% rename from tarpDemo/policies/fe83e4b2338614b970559ce4141b6d3e60559d79282c.cedar rename to tarpDemo/policies/user_can_read_in_corp_network.cedar From aeede993b8fa3349164b6d4e8255375842fe8ff6 Mon Sep 17 00:00:00 2001 From: Safin Wasi <6601566+SafinWasi@users.noreply.github.com> Date: Fri, 13 Mar 2026 03:36:39 +0000 Subject: [PATCH 071/113] feat: update user_can_read_in_corp_network.cedar --- tarpDemo/policies/user_can_read_in_corp_network.cedar | 6 ++++-- 1 file changed, 4 insertions(+), 2 deletions(-) diff --git a/tarpDemo/policies/user_can_read_in_corp_network.cedar b/tarpDemo/policies/user_can_read_in_corp_network.cedar index f0502fb..a2c271e 100644 --- a/tarpDemo/policies/user_can_read_in_corp_network.cedar +++ b/tarpDemo/policies/user_can_read_in_corp_network.cedar @@ -1,9 +1,11 @@ @id("user_can_read_in_corp_network") permit ( - principal is Jans::User, + principal, action == Jans::Action::"Read", resource is Jans::SecretDocument -) when { +) +when { + context has tokens.jans_userinfo_token && context has network && context.network == "corp" }; \ No newline at end of file From 84049546c6be03abad278cfa8a0dcbfc63cb45ed Mon Sep 17 00:00:00 2001 From: Safin Wasi <6601566+SafinWasi@users.noreply.github.com> Date: Fri, 13 Mar 2026 03:36:41 +0000 Subject: [PATCH 072/113] feat: update manifest.json --- tarpDemo/manifest.json | 14 +++++++------- 1 file changed, 7 insertions(+), 7 deletions(-) diff --git a/tarpDemo/manifest.json b/tarpDemo/manifest.json index b8827f2..e8520c3 100644 --- a/tarpDemo/manifest.json +++ b/tarpDemo/manifest.json @@ -1,10 +1,10 @@ { "policy_store_id": "449805c83e13f332b1b35eac6ffa93187fbd1c648085", - "generated_date": "2026-03-13T03:35:40.331494+00:00", + "generated_date": "2026-03-13T03:36:40.888737+00:00", "files": { "manifest.json": { - "size": 3899, - "checksum": "sha1:c6745b2f1634dd8097e7e169068b2b4d5be98aed" + "size": 3880, + "checksum": "sha1:b8827f2726a12b2739f6c5c9750d3d688b173ef0" }, "metadata.json": { "size": 325, @@ -26,10 +26,6 @@ "size": 285, "checksum": "sha1:6f5925ee1a124f9d958f730cc865ced2afa663aa" }, - "policies/fe83e4b2338614b970559ce4141b6d3e60559d79282c.cedar": { - "size": 206, - "checksum": "sha1:f0502fb3eeb91a34f0a65647e1100d3b03ae1053" - }, "policies/fe84f983188f1639a03ed77c0753fc893fbe0d4cf155.cedar": { "size": 139, "checksum": "sha1:1da6c83ffffc535319e2ef868b4b00a3960b37c1" @@ -62,6 +58,10 @@ "size": 308, "checksum": "sha1:709cc56403e9e6664106a9e6c39ed663558bd14a" }, + "policies/user_can_read_in_corp_network.cedar": { + "size": 236, + "checksum": "sha1:a2c271e52da828d1a58778eb8e5ddb11bd11768e" + }, "policies/user_can_search.cedar": { "size": 165, "checksum": "sha1:9632a82fa98c5844c77b52f2fd47f4dd43ed986c" From 6f8929593d0dcd49dde9d2562dc9eeb8618b0bd0 Mon Sep 17 00:00:00 2001 From: Safin Wasi <6601566+SafinWasi@users.noreply.github.com> Date: Fri, 13 Mar 2026 03:41:03 +0000 Subject: [PATCH 073/113] feat: renaming policy fe84f983188f1639a03ed77c0753fc893fbe0d4cf155 --- ...9a03ed77c0753fc893fbe0d4cf155.cedar => editor_can_share.cedar} | 0 1 file changed, 0 insertions(+), 0 deletions(-) rename tarpDemo/policies/{fe84f983188f1639a03ed77c0753fc893fbe0d4cf155.cedar => editor_can_share.cedar} (100%) diff --git a/tarpDemo/policies/fe84f983188f1639a03ed77c0753fc893fbe0d4cf155.cedar b/tarpDemo/policies/editor_can_share.cedar similarity index 100% rename from tarpDemo/policies/fe84f983188f1639a03ed77c0753fc893fbe0d4cf155.cedar rename to tarpDemo/policies/editor_can_share.cedar From 721c115970cd9ad44d0f305e7ebbe248f18c7639 Mon Sep 17 00:00:00 2001 From: Safin Wasi <6601566+SafinWasi@users.noreply.github.com> Date: Fri, 13 Mar 2026 03:41:04 +0000 Subject: [PATCH 074/113] feat: update editor_can_share.cedar --- tarpDemo/policies/editor_can_share.cedar | 8 ++++++-- 1 file changed, 6 insertions(+), 2 deletions(-) diff --git a/tarpDemo/policies/editor_can_share.cedar b/tarpDemo/policies/editor_can_share.cedar index 1da6c83..fb132fa 100644 --- a/tarpDemo/policies/editor_can_share.cedar +++ b/tarpDemo/policies/editor_can_share.cedar @@ -1,6 +1,10 @@ @id("editor_can_share") permit ( - principal in Jans::Role::"Editor", + principal, action == Jans::Action::"Share", resource is Jans::Application -); \ No newline at end of file +) when { + context has tokens.jans_id_token && + context.tokens.jans_id_token.hasTag("role") && + context.tokens.jans_id_token.getTag("role").contains("Editor") +}; \ No newline at end of file From aa1b04bf0995166dcaf1fe8a7d69fc7f91c1a64a Mon Sep 17 00:00:00 2001 From: Safin Wasi <6601566+SafinWasi@users.noreply.github.com> Date: Fri, 13 Mar 2026 03:41:06 +0000 Subject: [PATCH 075/113] feat: update manifest.json --- tarpDemo/manifest.json | 12 ++++++------ 1 file changed, 6 insertions(+), 6 deletions(-) diff --git a/tarpDemo/manifest.json b/tarpDemo/manifest.json index e8520c3..10c2857 100644 --- a/tarpDemo/manifest.json +++ b/tarpDemo/manifest.json @@ -1,10 +1,10 @@ { "policy_store_id": "449805c83e13f332b1b35eac6ffa93187fbd1c648085", - "generated_date": "2026-03-13T03:36:40.888737+00:00", + "generated_date": "2026-03-13T03:41:06.379519+00:00", "files": { "manifest.json": { - "size": 3880, - "checksum": "sha1:b8827f2726a12b2739f6c5c9750d3d688b173ef0" + "size": 3865, + "checksum": "sha1:e8520c3599b531c2431c754c5e9d26883726a88c" }, "metadata.json": { "size": 325, @@ -26,9 +26,9 @@ "size": 285, "checksum": "sha1:6f5925ee1a124f9d958f730cc865ced2afa663aa" }, - "policies/fe84f983188f1639a03ed77c0753fc893fbe0d4cf155.cedar": { - "size": 139, - "checksum": "sha1:1da6c83ffffc535319e2ef868b4b00a3960b37c1" + "policies/editor_can_share.cedar": { + "size": 276, + "checksum": "sha1:fb132fa865d980b00132b249c582d20a2b1c41f1" }, "policies/security_admin_can_write_to_secretdocument.cedar": { "size": 313, From ea09beeda8e5e0a373887f4d0372c46dc2a77c2b Mon Sep 17 00:00:00 2001 From: Safin Wasi <6601566+SafinWasi@users.noreply.github.com> Date: Fri, 13 Mar 2026 03:41:38 +0000 Subject: [PATCH 076/113] feat: update user_cannot_write_from_restricted_country.cedar --- .../policies/user_cannot_write_from_restricted_country.cedar | 1 + 1 file changed, 1 insertion(+) diff --git a/tarpDemo/policies/user_cannot_write_from_restricted_country.cedar b/tarpDemo/policies/user_cannot_write_from_restricted_country.cedar index f3778f9..af3a66a 100644 --- a/tarpDemo/policies/user_cannot_write_from_restricted_country.cedar +++ b/tarpDemo/policies/user_cannot_write_from_restricted_country.cedar @@ -5,6 +5,7 @@ forbid ( resource is Jans::SecretDocument ) when { + context has tokens.jans_userinfo_token && context has geolocation && context.geolocation.contains("restricted") }; \ No newline at end of file From e23bf7720a204a9f3e405468506460d86d9e710b Mon Sep 17 00:00:00 2001 From: Safin Wasi <6601566+SafinWasi@users.noreply.github.com> Date: Fri, 13 Mar 2026 03:41:40 +0000 Subject: [PATCH 077/113] feat: update manifest.json --- tarpDemo/manifest.json | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-) diff --git a/tarpDemo/manifest.json b/tarpDemo/manifest.json index 10c2857..ea8cf94 100644 --- a/tarpDemo/manifest.json +++ b/tarpDemo/manifest.json @@ -1,10 +1,10 @@ { "policy_store_id": "449805c83e13f332b1b35eac6ffa93187fbd1c648085", - "generated_date": "2026-03-13T03:41:06.379519+00:00", + "generated_date": "2026-03-13T03:41:39.777680+00:00", "files": { "manifest.json": { - "size": 3865, - "checksum": "sha1:e8520c3599b531c2431c754c5e9d26883726a88c" + "size": 3837, + "checksum": "sha1:10c2857b8bd6f10dd01dbd902b53bf7f0d664d53" }, "metadata.json": { "size": 325, @@ -83,8 +83,8 @@ "checksum": "sha1:2fdfa89f60e64e34efb9be550c602db5e0fd66a3" }, "policies/user_cannot_write_from_restricted_country.cedar": { - "size": 226, - "checksum": "sha1:f3778f9139df04fb2c7ef86cf42b0dd7f271d4cd" + "size": 270, + "checksum": "sha1:af3a66a7011c8588e9af0461be57a766dae74baf" }, "schema.cedarschema": { "size": 3875, From 59d4fba16407658daebd3d6259610f5579f11797 Mon Sep 17 00:00:00 2001 From: Safin Wasi <6601566+SafinWasi@users.noreply.github.com> Date: Fri, 13 Mar 2026 03:42:16 +0000 Subject: [PATCH 078/113] feat: update user_cannot_read_if_compromised.cedar --- tarpDemo/policies/user_cannot_read_if_compromised.cedar | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/tarpDemo/policies/user_cannot_read_if_compromised.cedar b/tarpDemo/policies/user_cannot_read_if_compromised.cedar index 3c320f5..ccbb35d 100644 --- a/tarpDemo/policies/user_cannot_read_if_compromised.cedar +++ b/tarpDemo/policies/user_cannot_read_if_compromised.cedar @@ -4,7 +4,8 @@ forbid ( action == Jans::Action::"Read", resource is Jans::SecretDocument ) -when { +when { + context has tokens.jans_userinfo_token && context has device_health && context.device_health.contains("compromised") }; \ No newline at end of file From 7a2830535f588c290833e235e7677c0b653b0dd9 Mon Sep 17 00:00:00 2001 From: Safin Wasi <6601566+SafinWasi@users.noreply.github.com> Date: Fri, 13 Mar 2026 03:42:17 +0000 Subject: [PATCH 079/113] feat: update manifest.json --- tarpDemo/manifest.json | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/tarpDemo/manifest.json b/tarpDemo/manifest.json index ea8cf94..2b26ab6 100644 --- a/tarpDemo/manifest.json +++ b/tarpDemo/manifest.json @@ -1,10 +1,10 @@ { "policy_store_id": "449805c83e13f332b1b35eac6ffa93187fbd1c648085", - "generated_date": "2026-03-13T03:41:39.777680+00:00", + "generated_date": "2026-03-13T03:42:17.411613+00:00", "files": { "manifest.json": { "size": 3837, - "checksum": "sha1:10c2857b8bd6f10dd01dbd902b53bf7f0d664d53" + "checksum": "sha1:ea8cf94e2aed9d71054a4f8a7912bb84c7c5a69d" }, "metadata.json": { "size": 325, @@ -75,8 +75,8 @@ "checksum": "sha1:8c7bf803b8268dfe022acbf988d4ba4851e7dd41" }, "policies/user_cannot_read_if_compromised.cedar": { - "size": 220, - "checksum": "sha1:3c320f56bf422f342f79e8ffce19b675eaf72113" + "size": 266, + "checksum": "sha1:ccbb35dc20f1c01c449d096ac2d6a6d63245eb9e" }, "policies/user_cannot_read_if_fraudulent.cedar": { "size": 267, From 3ce0929db96fa913d1eb189d7966fea9a1465b56 Mon Sep 17 00:00:00 2001 From: Safin Wasi <6601566+SafinWasi@users.noreply.github.com> Date: Fri, 13 Mar 2026 03:43:12 +0000 Subject: [PATCH 080/113] feat: update user_cannot_execute_on_public_network.cedar --- tarpDemo/policies/user_cannot_execute_on_public_network.cedar | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/tarpDemo/policies/user_cannot_execute_on_public_network.cedar b/tarpDemo/policies/user_cannot_execute_on_public_network.cedar index 8c7bf80..4cf94d9 100644 --- a/tarpDemo/policies/user_cannot_execute_on_public_network.cedar +++ b/tarpDemo/policies/user_cannot_execute_on_public_network.cedar @@ -1,10 +1,11 @@ @id("user_cannot_execute_on_public_network") forbid ( - principal is Jans::User, + principal, action == Jans::Action::"Execute", resource is Jans::Application ) when { + context has tokens.jans_userinfo_token && context has network_type && context.network_type == "public" }; \ No newline at end of file From 60965ef42984626760a48d1c77d7e6ac8e74639a Mon Sep 17 00:00:00 2001 From: Safin Wasi <6601566+SafinWasi@users.noreply.github.com> Date: Fri, 13 Mar 2026 03:43:14 +0000 Subject: [PATCH 081/113] feat: update manifest.json --- tarpDemo/manifest.json | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/tarpDemo/manifest.json b/tarpDemo/manifest.json index 2b26ab6..eb1b043 100644 --- a/tarpDemo/manifest.json +++ b/tarpDemo/manifest.json @@ -1,10 +1,10 @@ { "policy_store_id": "449805c83e13f332b1b35eac6ffa93187fbd1c648085", - "generated_date": "2026-03-13T03:42:17.411613+00:00", + "generated_date": "2026-03-13T03:43:14.189156+00:00", "files": { "manifest.json": { "size": 3837, - "checksum": "sha1:ea8cf94e2aed9d71054a4f8a7912bb84c7c5a69d" + "checksum": "sha1:2b26ab6c617a661c4e7aee5de4fd3be848232ce1" }, "metadata.json": { "size": 325, @@ -71,8 +71,8 @@ "checksum": "sha1:a473034d33f80704f3a2cac39867f91351587395" }, "policies/user_cannot_execute_on_public_network.cedar": { - "size": 226, - "checksum": "sha1:8c7bf803b8268dfe022acbf988d4ba4851e7dd41" + "size": 256, + "checksum": "sha1:4cf94d94531a62dc33e77726ac74e574902adb34" }, "policies/user_cannot_read_if_compromised.cedar": { "size": 266, From 919882cc02671521168852882b497fd076125b98 Mon Sep 17 00:00:00 2001 From: Safin Wasi <6601566+SafinWasi@users.noreply.github.com> Date: Fri, 13 Mar 2026 03:47:45 +0000 Subject: [PATCH 082/113] feat: update user_can_tag.cedar --- tarpDemo/policies/user_can_tag.cedar | 6 ++++-- 1 file changed, 4 insertions(+), 2 deletions(-) diff --git a/tarpDemo/policies/user_can_tag.cedar b/tarpDemo/policies/user_can_tag.cedar index a473034..4361e3b 100644 --- a/tarpDemo/policies/user_can_tag.cedar +++ b/tarpDemo/policies/user_can_tag.cedar @@ -1,6 +1,8 @@ @id("user_can_tag") permit ( - principal is Jans::User, + principal, action == Jans::Action::"Tag", resource is Jans::Application -); \ No newline at end of file +) when { + context has tokens.jans_userinfo_token +}; \ No newline at end of file From 260528b4b9a84d5666ca1053be8244842ef0048b Mon Sep 17 00:00:00 2001 From: Safin Wasi <6601566+SafinWasi@users.noreply.github.com> Date: Fri, 13 Mar 2026 03:47:46 +0000 Subject: [PATCH 083/113] feat: update manifest.json --- tarpDemo/manifest.json | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/tarpDemo/manifest.json b/tarpDemo/manifest.json index eb1b043..50ebbf2 100644 --- a/tarpDemo/manifest.json +++ b/tarpDemo/manifest.json @@ -1,10 +1,10 @@ { "policy_store_id": "449805c83e13f332b1b35eac6ffa93187fbd1c648085", - "generated_date": "2026-03-13T03:43:14.189156+00:00", + "generated_date": "2026-03-13T03:47:46.489987+00:00", "files": { "manifest.json": { "size": 3837, - "checksum": "sha1:2b26ab6c617a661c4e7aee5de4fd3be848232ce1" + "checksum": "sha1:eb1b0437a005e8d4a03d95cbb3f098f9da9ca2ff" }, "metadata.json": { "size": 325, @@ -67,8 +67,8 @@ "checksum": "sha1:9632a82fa98c5844c77b52f2fd47f4dd43ed986c" }, "policies/user_can_tag.cedar": { - "size": 123, - "checksum": "sha1:a473034d33f80704f3a2cac39867f91351587395" + "size": 159, + "checksum": "sha1:4361e3bff33ce403ce9f188815ff79e58a2f72af" }, "policies/user_cannot_execute_on_public_network.cedar": { "size": 256, From cdde34d3f4eb74aa400ae3ecd0608cadcbefff52 Mon Sep 17 00:00:00 2001 From: Safin Wasi <6601566+SafinWasi@users.noreply.github.com> Date: Fri, 13 Mar 2026 03:48:29 +0000 Subject: [PATCH 084/113] Rename 1985d6d8767b87d752035c9f9c0078daf057ad2cd5ea.json to jans.json --- ...5d6d8767b87d752035c9f9c0078daf057ad2cd5ea.json => jans.json} | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) rename tarpDemo/trusted-issuers/{1985d6d8767b87d752035c9f9c0078daf057ad2cd5ea.json => jans.json} (99%) diff --git a/tarpDemo/trusted-issuers/1985d6d8767b87d752035c9f9c0078daf057ad2cd5ea.json b/tarpDemo/trusted-issuers/jans.json similarity index 99% rename from tarpDemo/trusted-issuers/1985d6d8767b87d752035c9f9c0078daf057ad2cd5ea.json rename to tarpDemo/trusted-issuers/jans.json index c1d55bc..6ea1219 100644 --- a/tarpDemo/trusted-issuers/1985d6d8767b87d752035c9f9c0078daf057ad2cd5ea.json +++ b/tarpDemo/trusted-issuers/jans.json @@ -53,4 +53,4 @@ "token_id": "jti" } } -} \ No newline at end of file +} From c72cb69a9da472fb67c0f7d828d52f51ac047de8 Mon Sep 17 00:00:00 2001 From: Safin Wasi <6601566+SafinWasi@users.noreply.github.com> Date: Fri, 13 Mar 2026 04:07:18 +0000 Subject: [PATCH 085/113] feat: update metadata.json --- tarpDemo/metadata.json | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/tarpDemo/metadata.json b/tarpDemo/metadata.json index d4c87ea..8d4403d 100644 --- a/tarpDemo/metadata.json +++ b/tarpDemo/metadata.json @@ -4,7 +4,7 @@ "id": "449805c83e13f332b1b35eac6ffa93187fbd1c648085", "name": "tarpDemo", "description": "", - "version": "0.0.1", + "version": "0.1.1", "created_date": "2026-03-13T02:28:08.460796+00:00", "updated_date": "2026-03-13T03:13:50.628190+00:00" } From e3bd4b394af0407aa781b6954c513eab37aa37cf Mon Sep 17 00:00:00 2001 From: Safin Wasi <6601566+SafinWasi@users.noreply.github.com> Date: Fri, 13 Mar 2026 04:08:12 +0000 Subject: [PATCH 086/113] feat: update jans.json --- tarpDemo/trusted-issuers/jans.json | 10 ++-------- 1 file changed, 2 insertions(+), 8 deletions(-) diff --git a/tarpDemo/trusted-issuers/jans.json b/tarpDemo/trusted-issuers/jans.json index 6ea1219..9dd40f3 100644 --- a/tarpDemo/trusted-issuers/jans.json +++ b/tarpDemo/trusted-issuers/jans.json @@ -2,7 +2,7 @@ "id": "1985d6d8767b87d752035c9f9c0078daf057ad2cd5ea", "name": "Jans", "description": "", - "configuration_endpoint": "https://test-jans.gluu.info/.well-known/openid-configuration", + "configuration_endpoint": "http://jans.test/.well-known/openid-configuration", "token_metadata": { "access_token": { "trusted": true, @@ -45,12 +45,6 @@ "principal_mapping": [ "Jans::User" ] - }, - "tx_token": { - "trusted": true, - "entity_type_name": "Jans::Access_token", - "user_id": "sub", - "token_id": "jti" } } -} +} \ No newline at end of file From 385e1fbf3ebe67e2c8798639b217b3910a872b53 Mon Sep 17 00:00:00 2001 From: Safin Wasi <6601566+SafinWasi@users.noreply.github.com> Date: Fri, 13 Mar 2026 04:08:14 +0000 Subject: [PATCH 087/113] feat: update manifest.json --- tarpDemo/manifest.json | 12 ++++++------ 1 file changed, 6 insertions(+), 6 deletions(-) diff --git a/tarpDemo/manifest.json b/tarpDemo/manifest.json index 50ebbf2..2a459be 100644 --- a/tarpDemo/manifest.json +++ b/tarpDemo/manifest.json @@ -1,14 +1,14 @@ { "policy_store_id": "449805c83e13f332b1b35eac6ffa93187fbd1c648085", - "generated_date": "2026-03-13T03:47:46.489987+00:00", + "generated_date": "2026-03-13T04:08:13.950437+00:00", "files": { "manifest.json": { "size": 3837, - "checksum": "sha1:eb1b0437a005e8d4a03d95cbb3f098f9da9ca2ff" + "checksum": "sha1:50ebbf28869fd1ca90e746cf36701abe21a7012d" }, "metadata.json": { "size": 325, - "checksum": "sha1:d4c87ea5068c99a0da40ea41802b0554b93f62c8" + "checksum": "sha1:8d4403d04476b088d0a4682ca9865990fe34c7fd" }, "policies/admin_can_write_to_application.cedar": { "size": 289, @@ -90,9 +90,9 @@ "size": 3875, "checksum": "sha1:49939290b8ad6745f79a067d4ce7ca200f68c6ff" }, - "trusted-issuers/1985d6d8767b87d752035c9f9c0078daf057ad2cd5ea.json": { - "size": 1608, - "checksum": "sha1:c1d55bcc6e0fb8be86d521af53a7a513343b2f9e" + "trusted-issuers/jans.json": { + "size": 1421, + "checksum": "sha1:9dd40f319ad4365be9d23332dc6a842e62a7c403" } } } \ No newline at end of file From 2eafe41de2cfdc161f1e7a10b0236f3590f49565 Mon Sep 17 00:00:00 2001 From: Safin Wasi <6601566+SafinWasi@users.noreply.github.com> Date: Fri, 13 Mar 2026 04:08:39 +0000 Subject: [PATCH 088/113] feat: update metadata.json --- tarpDemo/metadata.json | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/tarpDemo/metadata.json b/tarpDemo/metadata.json index 8d4403d..cc90042 100644 --- a/tarpDemo/metadata.json +++ b/tarpDemo/metadata.json @@ -4,7 +4,7 @@ "id": "449805c83e13f332b1b35eac6ffa93187fbd1c648085", "name": "tarpDemo", "description": "", - "version": "0.1.1", + "version": "0.1.2", "created_date": "2026-03-13T02:28:08.460796+00:00", "updated_date": "2026-03-13T03:13:50.628190+00:00" } From 6d1a4ccb70e08ea694dfa957cfc5423a71c0f3da Mon Sep 17 00:00:00 2001 From: Safin Wasi <6601566+SafinWasi@users.noreply.github.com> Date: Fri, 13 Mar 2026 04:22:08 +0000 Subject: [PATCH 089/113] feat: update jans.json --- tarpDemo/trusted-issuers/jans.json | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/tarpDemo/trusted-issuers/jans.json b/tarpDemo/trusted-issuers/jans.json index 9dd40f3..0379e57 100644 --- a/tarpDemo/trusted-issuers/jans.json +++ b/tarpDemo/trusted-issuers/jans.json @@ -2,7 +2,7 @@ "id": "1985d6d8767b87d752035c9f9c0078daf057ad2cd5ea", "name": "Jans", "description": "", - "configuration_endpoint": "http://jans.test/.well-known/openid-configuration", + "configuration_endpoint": "https://jans.test/.well-known/openid-configuration", "token_metadata": { "access_token": { "trusted": true, From 0bfbc6cb36d935276668f634d92008da0bfb24e5 Mon Sep 17 00:00:00 2001 From: Safin Wasi <6601566+SafinWasi@users.noreply.github.com> Date: Fri, 13 Mar 2026 04:22:10 +0000 Subject: [PATCH 090/113] feat: update manifest.json --- tarpDemo/manifest.json | 12 ++++++------ 1 file changed, 6 insertions(+), 6 deletions(-) diff --git a/tarpDemo/manifest.json b/tarpDemo/manifest.json index 2a459be..24770a4 100644 --- a/tarpDemo/manifest.json +++ b/tarpDemo/manifest.json @@ -1,14 +1,14 @@ { "policy_store_id": "449805c83e13f332b1b35eac6ffa93187fbd1c648085", - "generated_date": "2026-03-13T04:08:13.950437+00:00", + "generated_date": "2026-03-13T04:22:09.945143+00:00", "files": { "manifest.json": { - "size": 3837, - "checksum": "sha1:50ebbf28869fd1ca90e746cf36701abe21a7012d" + "size": 3797, + "checksum": "sha1:2a459bedc270ef3d528bad6e3c756685fa26d70b" }, "metadata.json": { "size": 325, - "checksum": "sha1:8d4403d04476b088d0a4682ca9865990fe34c7fd" + "checksum": "sha1:cc90042918018123d16bceb574506563d1402671" }, "policies/admin_can_write_to_application.cedar": { "size": 289, @@ -91,8 +91,8 @@ "checksum": "sha1:49939290b8ad6745f79a067d4ce7ca200f68c6ff" }, "trusted-issuers/jans.json": { - "size": 1421, - "checksum": "sha1:9dd40f319ad4365be9d23332dc6a842e62a7c403" + "size": 1422, + "checksum": "sha1:0379e573ba00b0d45cccf9bcf17bd806759e0dc3" } } } \ No newline at end of file From c743ff786c11c15e7729eaf035bf99f104e89b74 Mon Sep 17 00:00:00 2001 From: Safin Wasi <6601566+SafinWasi@users.noreply.github.com> Date: Fri, 13 Mar 2026 04:24:18 +0000 Subject: [PATCH 091/113] feat: update metadata.json --- tarpDemo/metadata.json | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/tarpDemo/metadata.json b/tarpDemo/metadata.json index cc90042..d51c653 100644 --- a/tarpDemo/metadata.json +++ b/tarpDemo/metadata.json @@ -4,7 +4,7 @@ "id": "449805c83e13f332b1b35eac6ffa93187fbd1c648085", "name": "tarpDemo", "description": "", - "version": "0.1.2", + "version": "0.1.3", "created_date": "2026-03-13T02:28:08.460796+00:00", "updated_date": "2026-03-13T03:13:50.628190+00:00" } From d10c426a35ee374530e61cb0347042136894c4de Mon Sep 17 00:00:00 2001 From: Safin Wasi <6601566+SafinWasi@users.noreply.github.com> Date: Fri, 13 Mar 2026 04:29:40 +0000 Subject: [PATCH 092/113] feat: update allow_teacher_secretdocument.cedar --- tarpDemo/policies/allow_teacher_secretdocument.cedar | 9 +++++---- 1 file changed, 5 insertions(+), 4 deletions(-) diff --git a/tarpDemo/policies/allow_teacher_secretdocument.cedar b/tarpDemo/policies/allow_teacher_secretdocument.cedar index d2c577a..72fbfbc 100644 --- a/tarpDemo/policies/allow_teacher_secretdocument.cedar +++ b/tarpDemo/policies/allow_teacher_secretdocument.cedar @@ -3,8 +3,9 @@ permit( principal, action, resource is Jans::SecretDocument -) when { - context has tokens.jans_id_token && - context.tokens.jans_id_token.hasTag("role") && - context.tokens.jans_id_token.getTag("role").contains("Teacher") +) +when { + context has tokens.jans_userinfo_token && + context.tokens.jans_userinfo_token.hasTag("role") && + context.tokens.jans_userinfo_token.getTag("role").contains("Teacher") }; \ No newline at end of file From 0823cbeab494b4e3d698b80b4e6d56a99a5866f2 Mon Sep 17 00:00:00 2001 From: Safin Wasi <6601566+SafinWasi@users.noreply.github.com> Date: Fri, 13 Mar 2026 04:29:42 +0000 Subject: [PATCH 093/113] feat: update manifest.json --- tarpDemo/manifest.json | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-) diff --git a/tarpDemo/manifest.json b/tarpDemo/manifest.json index 24770a4..29b68b6 100644 --- a/tarpDemo/manifest.json +++ b/tarpDemo/manifest.json @@ -1,14 +1,14 @@ { "policy_store_id": "449805c83e13f332b1b35eac6ffa93187fbd1c648085", - "generated_date": "2026-03-13T04:22:09.945143+00:00", + "generated_date": "2026-03-13T04:29:42.158436+00:00", "files": { "manifest.json": { "size": 3797, - "checksum": "sha1:2a459bedc270ef3d528bad6e3c756685fa26d70b" + "checksum": "sha1:24770a428acc56b479071ca59aedabe961e5799c" }, "metadata.json": { "size": 325, - "checksum": "sha1:cc90042918018123d16bceb574506563d1402671" + "checksum": "sha1:d51c653cfd14bfe49f71daa70f1f48e933822020" }, "policies/admin_can_write_to_application.cedar": { "size": 289, @@ -19,8 +19,8 @@ "checksum": "sha1:c0a7d7a5cb82a84a492a1a28efc31b6efa40cc77" }, "policies/allow_teacher_secretdocument.cedar": { - "size": 266, - "checksum": "sha1:d2c577a4d8f8417ae0f1b331f616b6831aed266a" + "size": 284, + "checksum": "sha1:72fbfbc0bfdcbd7e9649d2527e81560e2f4bab69" }, "policies/cannot_write_if_not_admin.cedar": { "size": 285, From f51704849b9dc1616fd3ff79b5bb2e3090c91197 Mon Sep 17 00:00:00 2001 From: Safin Wasi <6601566+SafinWasi@users.noreply.github.com> Date: Fri, 13 Mar 2026 04:30:03 +0000 Subject: [PATCH 094/113] feat: update admin_can_write_to_application.cedar --- tarpDemo/policies/admin_can_write_to_application.cedar | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/tarpDemo/policies/admin_can_write_to_application.cedar b/tarpDemo/policies/admin_can_write_to_application.cedar index 847ed6f..5575164 100644 --- a/tarpDemo/policies/admin_can_write_to_application.cedar +++ b/tarpDemo/policies/admin_can_write_to_application.cedar @@ -5,7 +5,7 @@ permit ( resource is Jans::Application ) when { - context has tokens.jans_id_token && - context.tokens.jans_id_token.hasTag("role") && - context.tokens.jans_id_token.getTag("role").contains("admin") + context has tokens.jans_userinfo_token && + context.tokens.jans_userinfo_token.hasTag("role") && + context.tokens.jans_userinfo_token.getTag("role").contains("admin") }; \ No newline at end of file From 5bbfe9a93779752c3ee337d6fa1c60f4ec3776b1 Mon Sep 17 00:00:00 2001 From: Safin Wasi <6601566+SafinWasi@users.noreply.github.com> Date: Fri, 13 Mar 2026 04:30:05 +0000 Subject: [PATCH 095/113] feat: update manifest.json --- tarpDemo/manifest.json | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/tarpDemo/manifest.json b/tarpDemo/manifest.json index 29b68b6..daf6e78 100644 --- a/tarpDemo/manifest.json +++ b/tarpDemo/manifest.json @@ -1,18 +1,18 @@ { "policy_store_id": "449805c83e13f332b1b35eac6ffa93187fbd1c648085", - "generated_date": "2026-03-13T04:29:42.158436+00:00", + "generated_date": "2026-03-13T04:30:04.957845+00:00", "files": { "manifest.json": { "size": 3797, - "checksum": "sha1:24770a428acc56b479071ca59aedabe961e5799c" + "checksum": "sha1:29b68b6dc81c79b3be4eca8091cc8518a5dcfc4c" }, "metadata.json": { "size": 325, "checksum": "sha1:d51c653cfd14bfe49f71daa70f1f48e933822020" }, "policies/admin_can_write_to_application.cedar": { - "size": 289, - "checksum": "sha1:847ed6fceaa723f1a64aa69b181dce19a527cbd5" + "size": 307, + "checksum": "sha1:557516498e371c2771b92d04b97dea4eacb7181f" }, "policies/allow_student_read.cedar": { "size": 259, From 6e57590aad83f03a6ba4fe271ceb1504f9c432ce Mon Sep 17 00:00:00 2001 From: Safin Wasi <6601566+SafinWasi@users.noreply.github.com> Date: Fri, 13 Mar 2026 04:30:13 +0000 Subject: [PATCH 096/113] feat: update allow_student_read.cedar --- tarpDemo/policies/allow_student_read.cedar | 9 +++++---- 1 file changed, 5 insertions(+), 4 deletions(-) diff --git a/tarpDemo/policies/allow_student_read.cedar b/tarpDemo/policies/allow_student_read.cedar index c0a7d7a..ee59049 100644 --- a/tarpDemo/policies/allow_student_read.cedar +++ b/tarpDemo/policies/allow_student_read.cedar @@ -3,8 +3,9 @@ permit ( principal, action in [Jans::Action::"Read"], resource -) when { - context has tokens.jans_id_token && - context.tokens.jans_id_token.hasTag("role") && - context.tokens.jans_id_token.getTag("role").contains("Student") +) +when { + context has tokens.jans_userinfo_token && + context.tokens.jans_userinfo_token.hasTag("role") && + context.tokens.jans_userinfo_token.getTag("role").contains("Student") }; \ No newline at end of file From cc870050617244f36c0f8bdf0eeeb1714786d864 Mon Sep 17 00:00:00 2001 From: Safin Wasi <6601566+SafinWasi@users.noreply.github.com> Date: Fri, 13 Mar 2026 04:30:15 +0000 Subject: [PATCH 097/113] feat: update manifest.json --- tarpDemo/manifest.json | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/tarpDemo/manifest.json b/tarpDemo/manifest.json index daf6e78..fe6a56d 100644 --- a/tarpDemo/manifest.json +++ b/tarpDemo/manifest.json @@ -1,10 +1,10 @@ { "policy_store_id": "449805c83e13f332b1b35eac6ffa93187fbd1c648085", - "generated_date": "2026-03-13T04:30:04.957845+00:00", + "generated_date": "2026-03-13T04:30:14.703596+00:00", "files": { "manifest.json": { "size": 3797, - "checksum": "sha1:29b68b6dc81c79b3be4eca8091cc8518a5dcfc4c" + "checksum": "sha1:daf6e78a52a14dbc88a78459be14ff80743c5b83" }, "metadata.json": { "size": 325, @@ -15,8 +15,8 @@ "checksum": "sha1:557516498e371c2771b92d04b97dea4eacb7181f" }, "policies/allow_student_read.cedar": { - "size": 259, - "checksum": "sha1:c0a7d7a5cb82a84a492a1a28efc31b6efa40cc77" + "size": 277, + "checksum": "sha1:ee59049ff450163333c6b1e29d96059ea5190239" }, "policies/allow_teacher_secretdocument.cedar": { "size": 284, From 33da2412233e1f429ed13be66cb92a02634906ca Mon Sep 17 00:00:00 2001 From: Safin Wasi <6601566+SafinWasi@users.noreply.github.com> Date: Fri, 13 Mar 2026 04:30:27 +0000 Subject: [PATCH 098/113] feat: update cannot_write_if_not_admin.cedar --- tarpDemo/policies/cannot_write_if_not_admin.cedar | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/tarpDemo/policies/cannot_write_if_not_admin.cedar b/tarpDemo/policies/cannot_write_if_not_admin.cedar index 6f5925e..60698b6 100644 --- a/tarpDemo/policies/cannot_write_if_not_admin.cedar +++ b/tarpDemo/policies/cannot_write_if_not_admin.cedar @@ -5,7 +5,7 @@ forbid ( resource is Jans::Application ) when { - context has tokens.jans_id_token && - context.tokens.jans_id_token.hasTag("role") && - !context.tokens.jans_id_token.getTag("role").contains("admin") + context has tokens.jans_userinfo_token && + context.tokens.jans_userinfo_token.hasTag("role") && + !context.tokens.jans_userinfo_token.getTag("role").contains("admin") }; \ No newline at end of file From 2b698b44317ba060c1f2ff793a5ca042bc7902b9 Mon Sep 17 00:00:00 2001 From: Safin Wasi <6601566+SafinWasi@users.noreply.github.com> Date: Fri, 13 Mar 2026 04:30:29 +0000 Subject: [PATCH 099/113] feat: update manifest.json --- tarpDemo/manifest.json | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/tarpDemo/manifest.json b/tarpDemo/manifest.json index fe6a56d..8fba78d 100644 --- a/tarpDemo/manifest.json +++ b/tarpDemo/manifest.json @@ -1,10 +1,10 @@ { "policy_store_id": "449805c83e13f332b1b35eac6ffa93187fbd1c648085", - "generated_date": "2026-03-13T04:30:14.703596+00:00", + "generated_date": "2026-03-13T04:30:28.976603+00:00", "files": { "manifest.json": { "size": 3797, - "checksum": "sha1:daf6e78a52a14dbc88a78459be14ff80743c5b83" + "checksum": "sha1:fe6a56d761cf1ab0c7d23ada8c1e24118d344bc7" }, "metadata.json": { "size": 325, @@ -23,8 +23,8 @@ "checksum": "sha1:72fbfbc0bfdcbd7e9649d2527e81560e2f4bab69" }, "policies/cannot_write_if_not_admin.cedar": { - "size": 285, - "checksum": "sha1:6f5925ee1a124f9d958f730cc865ced2afa663aa" + "size": 303, + "checksum": "sha1:60698b65b41f3ec01ce3d8fdef3f9886368391f5" }, "policies/editor_can_share.cedar": { "size": 276, From 1ec81864832703bed08c86ad0ec6dd2d5570bef8 Mon Sep 17 00:00:00 2001 From: Safin Wasi <6601566+SafinWasi@users.noreply.github.com> Date: Fri, 13 Mar 2026 04:30:39 +0000 Subject: [PATCH 100/113] feat: update editor_can_share.cedar --- tarpDemo/policies/editor_can_share.cedar | 9 +++++---- 1 file changed, 5 insertions(+), 4 deletions(-) diff --git a/tarpDemo/policies/editor_can_share.cedar b/tarpDemo/policies/editor_can_share.cedar index fb132fa..e8eff33 100644 --- a/tarpDemo/policies/editor_can_share.cedar +++ b/tarpDemo/policies/editor_can_share.cedar @@ -3,8 +3,9 @@ permit ( principal, action == Jans::Action::"Share", resource is Jans::Application -) when { - context has tokens.jans_id_token && - context.tokens.jans_id_token.hasTag("role") && - context.tokens.jans_id_token.getTag("role").contains("Editor") +) +when { + context has tokens.jans_userinfo_token && + context.tokens.jans_userinfo_token.hasTag("role") && + context.tokens.jans_userinfo_token.getTag("role").contains("Editor") }; \ No newline at end of file From c34d57528576d05eb81678d143c60a6f1c65abee Mon Sep 17 00:00:00 2001 From: Safin Wasi <6601566+SafinWasi@users.noreply.github.com> Date: Fri, 13 Mar 2026 04:30:41 +0000 Subject: [PATCH 101/113] feat: update manifest.json --- tarpDemo/manifest.json | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/tarpDemo/manifest.json b/tarpDemo/manifest.json index 8fba78d..b460e58 100644 --- a/tarpDemo/manifest.json +++ b/tarpDemo/manifest.json @@ -1,10 +1,10 @@ { "policy_store_id": "449805c83e13f332b1b35eac6ffa93187fbd1c648085", - "generated_date": "2026-03-13T04:30:28.976603+00:00", + "generated_date": "2026-03-13T04:30:41.199534+00:00", "files": { "manifest.json": { "size": 3797, - "checksum": "sha1:fe6a56d761cf1ab0c7d23ada8c1e24118d344bc7" + "checksum": "sha1:8fba78db22ed532848819b4faa0d092b5bd32299" }, "metadata.json": { "size": 325, @@ -27,8 +27,8 @@ "checksum": "sha1:60698b65b41f3ec01ce3d8fdef3f9886368391f5" }, "policies/editor_can_share.cedar": { - "size": 276, - "checksum": "sha1:fb132fa865d980b00132b249c582d20a2b1c41f1" + "size": 294, + "checksum": "sha1:e8eff337ce68d0612a9b86adeb0d36d253a3140c" }, "policies/security_admin_can_write_to_secretdocument.cedar": { "size": 313, From 56dbc710c1bcbae52dfa3e39228ac0faade5ecc8 Mon Sep 17 00:00:00 2001 From: Safin Wasi <6601566+SafinWasi@users.noreply.github.com> Date: Fri, 13 Mar 2026 04:30:50 +0000 Subject: [PATCH 102/113] feat: update security_admin_can_write_to_secretdocument.cedar --- .../security_admin_can_write_to_secretdocument.cedar | 9 +++++---- 1 file changed, 5 insertions(+), 4 deletions(-) diff --git a/tarpDemo/policies/security_admin_can_write_to_secretdocument.cedar b/tarpDemo/policies/security_admin_can_write_to_secretdocument.cedar index 53f7d49..1a36f25 100644 --- a/tarpDemo/policies/security_admin_can_write_to_secretdocument.cedar +++ b/tarpDemo/policies/security_admin_can_write_to_secretdocument.cedar @@ -3,8 +3,9 @@ permit ( principal, action == Jans::Action::"Write", resource is Jans::SecretDocument -) when { - context has tokens.jans_id_token && - context.tokens.jans_id_token.hasTag("role") && - context.tokens.jans_id_token.getTag("role").contains("security-admin") +) +when { + context has tokens.jans_userinfo_token && + context.tokens.jans_userinfo_token.hasTag("role") && + context.tokens.jans_userinfo_token.getTag("role").contains("security-admin") }; \ No newline at end of file From 21ad589a6b4ddeaee030ed8d396e4dc8395b7292 Mon Sep 17 00:00:00 2001 From: Safin Wasi <6601566+SafinWasi@users.noreply.github.com> Date: Fri, 13 Mar 2026 04:30:52 +0000 Subject: [PATCH 103/113] feat: update manifest.json --- tarpDemo/manifest.json | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/tarpDemo/manifest.json b/tarpDemo/manifest.json index b460e58..ad33882 100644 --- a/tarpDemo/manifest.json +++ b/tarpDemo/manifest.json @@ -1,10 +1,10 @@ { "policy_store_id": "449805c83e13f332b1b35eac6ffa93187fbd1c648085", - "generated_date": "2026-03-13T04:30:41.199534+00:00", + "generated_date": "2026-03-13T04:30:51.877936+00:00", "files": { "manifest.json": { "size": 3797, - "checksum": "sha1:8fba78db22ed532848819b4faa0d092b5bd32299" + "checksum": "sha1:b460e58aa4ccd0108fd159e5bf0e87b18155798f" }, "metadata.json": { "size": 325, @@ -31,8 +31,8 @@ "checksum": "sha1:e8eff337ce68d0612a9b86adeb0d36d253a3140c" }, "policies/security_admin_can_write_to_secretdocument.cedar": { - "size": 313, - "checksum": "sha1:53f7d49026281484ae5f31a699d3c712a2d225c2" + "size": 331, + "checksum": "sha1:1a36f2551c7044b5e89ca5af0b0a14dc198ea25f" }, "policies/user_can_compare.cedar": { "size": 167, From 8538fe8f385b4f0c7b975093a89b5f44bbb604b0 Mon Sep 17 00:00:00 2001 From: Safin Wasi <6601566+SafinWasi@users.noreply.github.com> Date: Fri, 13 Mar 2026 04:31:11 +0000 Subject: [PATCH 104/113] feat: update user_can_read_if_confidential_role.cedar --- tarpDemo/policies/user_can_read_if_confidential_role.cedar | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/tarpDemo/policies/user_can_read_if_confidential_role.cedar b/tarpDemo/policies/user_can_read_if_confidential_role.cedar index 141cf42..da798dd 100644 --- a/tarpDemo/policies/user_can_read_if_confidential_role.cedar +++ b/tarpDemo/policies/user_can_read_if_confidential_role.cedar @@ -5,7 +5,7 @@ permit ( resource is Jans::SecretDocument ) when { - context has tokens.jans_id_token && - context.tokens.jans_id_token.hasTag("role") && - context.tokens.jans_id_token.getTag("role").contains("confidential") + context has tokens.jans_userinfo_token && + context.tokens.jans_userinfo_token.hasTag("role") && + context.tokens.jans_userinfo_token.getTag("role").contains("confidential") }; \ No newline at end of file From 66f9eab9fbe369dd87e4a27c705dfc7db723fa01 Mon Sep 17 00:00:00 2001 From: Safin Wasi <6601566+SafinWasi@users.noreply.github.com> Date: Fri, 13 Mar 2026 04:31:13 +0000 Subject: [PATCH 105/113] feat: update manifest.json --- tarpDemo/manifest.json | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/tarpDemo/manifest.json b/tarpDemo/manifest.json index ad33882..8be23bf 100644 --- a/tarpDemo/manifest.json +++ b/tarpDemo/manifest.json @@ -1,10 +1,10 @@ { "policy_store_id": "449805c83e13f332b1b35eac6ffa93187fbd1c648085", - "generated_date": "2026-03-13T04:30:51.877936+00:00", + "generated_date": "2026-03-13T04:31:13.460433+00:00", "files": { "manifest.json": { "size": 3797, - "checksum": "sha1:b460e58aa4ccd0108fd159e5bf0e87b18155798f" + "checksum": "sha1:ad33882e8497e5ab990f7b31af90d785c79fc190" }, "metadata.json": { "size": 325, @@ -51,8 +51,8 @@ "checksum": "sha1:4176092cc6f8e8f34c845752b740e9998be33ea1" }, "policies/user_can_read_if_confidential_role.cedar": { - "size": 302, - "checksum": "sha1:141cf42a8f890e1aefe3703f5b73b9b2f59d5698" + "size": 320, + "checksum": "sha1:da798dd4a1983901776a1d3b16d7e59a01fac4eb" }, "policies/user_can_read_if_email_is_example.cedar": { "size": 308, From db53112f9931b76b117231d722d0be9a057a4132 Mon Sep 17 00:00:00 2001 From: Safin Wasi <6601566+SafinWasi@users.noreply.github.com> Date: Fri, 13 Mar 2026 04:33:47 +0000 Subject: [PATCH 106/113] feat: update metadata.json --- tarpDemo/metadata.json | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/tarpDemo/metadata.json b/tarpDemo/metadata.json index d51c653..7e7534c 100644 --- a/tarpDemo/metadata.json +++ b/tarpDemo/metadata.json @@ -4,7 +4,7 @@ "id": "449805c83e13f332b1b35eac6ffa93187fbd1c648085", "name": "tarpDemo", "description": "", - "version": "0.1.3", + "version": "0.1.4", "created_date": "2026-03-13T02:28:08.460796+00:00", "updated_date": "2026-03-13T03:13:50.628190+00:00" } From f4b46ef94820a49334153578fd5142771b236ef3 Mon Sep 17 00:00:00 2001 From: Safin Wasi <6601566+SafinWasi@users.noreply.github.com> Date: Fri, 13 Mar 2026 04:35:54 +0000 Subject: [PATCH 107/113] Delete tarpDemo/manifest.json --- tarpDemo/manifest.json | 98 ------------------------------------------ 1 file changed, 98 deletions(-) delete mode 100644 tarpDemo/manifest.json diff --git a/tarpDemo/manifest.json b/tarpDemo/manifest.json deleted file mode 100644 index 8be23bf..0000000 --- a/tarpDemo/manifest.json +++ /dev/null @@ -1,98 +0,0 @@ -{ - "policy_store_id": "449805c83e13f332b1b35eac6ffa93187fbd1c648085", - "generated_date": "2026-03-13T04:31:13.460433+00:00", - "files": { - "manifest.json": { - "size": 3797, - "checksum": "sha1:ad33882e8497e5ab990f7b31af90d785c79fc190" - }, - "metadata.json": { - "size": 325, - "checksum": "sha1:d51c653cfd14bfe49f71daa70f1f48e933822020" - }, - "policies/admin_can_write_to_application.cedar": { - "size": 307, - "checksum": "sha1:557516498e371c2771b92d04b97dea4eacb7181f" - }, - "policies/allow_student_read.cedar": { - "size": 277, - "checksum": "sha1:ee59049ff450163333c6b1e29d96059ea5190239" - }, - "policies/allow_teacher_secretdocument.cedar": { - "size": 284, - "checksum": "sha1:72fbfbc0bfdcbd7e9649d2527e81560e2f4bab69" - }, - "policies/cannot_write_if_not_admin.cedar": { - "size": 303, - "checksum": "sha1:60698b65b41f3ec01ce3d8fdef3f9886368391f5" - }, - "policies/editor_can_share.cedar": { - "size": 294, - "checksum": "sha1:e8eff337ce68d0612a9b86adeb0d36d253a3140c" - }, - "policies/security_admin_can_write_to_secretdocument.cedar": { - "size": 331, - "checksum": "sha1:1a36f2551c7044b5e89ca5af0b0a14dc198ea25f" - }, - "policies/user_can_compare.cedar": { - "size": 167, - "checksum": "sha1:9f11aea60b0dd3f85cb721303cec06bd13c97159" - }, - "policies/user_can_execute.cedar": { - "size": 167, - "checksum": "sha1:cfcb731c852e03f7e718367bf8a25c71848abc97" - }, - "policies/user_can_monitor.cedar": { - "size": 167, - "checksum": "sha1:6aec722807dbb0ef6c2351a490c1a113240f1057" - }, - "policies/user_can_read.cedar": { - "size": 161, - "checksum": "sha1:4176092cc6f8e8f34c845752b740e9998be33ea1" - }, - "policies/user_can_read_if_confidential_role.cedar": { - "size": 320, - "checksum": "sha1:da798dd4a1983901776a1d3b16d7e59a01fac4eb" - }, - "policies/user_can_read_if_email_is_example.cedar": { - "size": 308, - "checksum": "sha1:709cc56403e9e6664106a9e6c39ed663558bd14a" - }, - "policies/user_can_read_in_corp_network.cedar": { - "size": 236, - "checksum": "sha1:a2c271e52da828d1a58778eb8e5ddb11bd11768e" - }, - "policies/user_can_search.cedar": { - "size": 165, - "checksum": "sha1:9632a82fa98c5844c77b52f2fd47f4dd43ed986c" - }, - "policies/user_can_tag.cedar": { - "size": 159, - "checksum": "sha1:4361e3bff33ce403ce9f188815ff79e58a2f72af" - }, - "policies/user_cannot_execute_on_public_network.cedar": { - "size": 256, - "checksum": "sha1:4cf94d94531a62dc33e77726ac74e574902adb34" - }, - "policies/user_cannot_read_if_compromised.cedar": { - "size": 266, - "checksum": "sha1:ccbb35dc20f1c01c449d096ac2d6a6d63245eb9e" - }, - "policies/user_cannot_read_if_fraudulent.cedar": { - "size": 267, - "checksum": "sha1:2fdfa89f60e64e34efb9be550c602db5e0fd66a3" - }, - "policies/user_cannot_write_from_restricted_country.cedar": { - "size": 270, - "checksum": "sha1:af3a66a7011c8588e9af0461be57a766dae74baf" - }, - "schema.cedarschema": { - "size": 3875, - "checksum": "sha1:49939290b8ad6745f79a067d4ce7ca200f68c6ff" - }, - "trusted-issuers/jans.json": { - "size": 1422, - "checksum": "sha1:0379e573ba00b0d45cccf9bcf17bd806759e0dc3" - } - } -} \ No newline at end of file From 891f98ae70df15d5144b075860579f371f41a35e Mon Sep 17 00:00:00 2001 From: Safin Wasi <6601566+SafinWasi@users.noreply.github.com> Date: Fri, 13 Mar 2026 04:36:16 +0000 Subject: [PATCH 108/113] Delete tarpUnsignedDemo/manifest.json --- tarpUnsignedDemo/manifest.json | 18 ------------------ 1 file changed, 18 deletions(-) delete mode 100644 tarpUnsignedDemo/manifest.json diff --git a/tarpUnsignedDemo/manifest.json b/tarpUnsignedDemo/manifest.json deleted file mode 100644 index 4aef7a4..0000000 --- a/tarpUnsignedDemo/manifest.json +++ /dev/null @@ -1,18 +0,0 @@ -{ - "policy_store_id": "6d9f73b2d44ad4e7aa8f1182cde9f72dcbaa244f4327", - "generated_date": "2026-03-13T02:28:22.283762+00:00", - "files": { - "metadata.json": { - "size": 333, - "checksum": "sha1:775ee637a9578c56e46f1a5c6e8a29987720bc03" - }, - "policies/a2d0458ac26b69e4b191193fa307d941e8ab0ca2d5b1.cedar": { - "size": 149, - "checksum": "sha1:3865fc8acb05bf0c464aaefabd5225e03d41ade3" - }, - "schema.cedarschema": { - "size": 3765, - "checksum": "sha1:9ab5e508c9209fbd74447b57900075ec6826a411" - } - } -} \ No newline at end of file From 6d211dcb88307f9f57e219a8451d87f78630914c Mon Sep 17 00:00:00 2001 From: Safin Wasi <6601566+SafinWasi@users.noreply.github.com> Date: Fri, 13 Mar 2026 04:39:42 +0000 Subject: [PATCH 109/113] feat: update jans.json --- tarpDemo/trusted-issuers/jans.json | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/tarpDemo/trusted-issuers/jans.json b/tarpDemo/trusted-issuers/jans.json index 0379e57..e3d8bc0 100644 --- a/tarpDemo/trusted-issuers/jans.json +++ b/tarpDemo/trusted-issuers/jans.json @@ -2,7 +2,7 @@ "id": "1985d6d8767b87d752035c9f9c0078daf057ad2cd5ea", "name": "Jans", "description": "", - "configuration_endpoint": "https://jans.test/.well-known/openid-configuration", + "configuration_endpoint": "https://test-jans.gluu.info/.well-known/openid-configuration", "token_metadata": { "access_token": { "trusted": true, From 2362c75480be9188bc525f8332a87b47e8593fb5 Mon Sep 17 00:00:00 2001 From: Safin Wasi <6601566+SafinWasi@users.noreply.github.com> Date: Fri, 13 Mar 2026 04:39:44 +0000 Subject: [PATCH 110/113] feat: update manifest --- tarpDemo/manifest.json | 94 ++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 94 insertions(+) create mode 100644 tarpDemo/manifest.json diff --git a/tarpDemo/manifest.json b/tarpDemo/manifest.json new file mode 100644 index 0000000..77efab3 --- /dev/null +++ b/tarpDemo/manifest.json @@ -0,0 +1,94 @@ +{ + "policy_store_id": "449805c83e13f332b1b35eac6ffa93187fbd1c648085", + "generated_date": "2026-03-13T04:39:44.053309+00:00", + "files": { + "metadata.json": { + "size": 325, + "checksum": "sha1:7e7534ce4b7ca6dd69fac397b1059b57ff2caa2c" + }, + "policies/admin_can_write_to_application.cedar": { + "size": 307, + "checksum": "sha1:557516498e371c2771b92d04b97dea4eacb7181f" + }, + "policies/allow_student_read.cedar": { + "size": 277, + "checksum": "sha1:ee59049ff450163333c6b1e29d96059ea5190239" + }, + "policies/allow_teacher_secretdocument.cedar": { + "size": 284, + "checksum": "sha1:72fbfbc0bfdcbd7e9649d2527e81560e2f4bab69" + }, + "policies/cannot_write_if_not_admin.cedar": { + "size": 303, + "checksum": "sha1:60698b65b41f3ec01ce3d8fdef3f9886368391f5" + }, + "policies/editor_can_share.cedar": { + "size": 294, + "checksum": "sha1:e8eff337ce68d0612a9b86adeb0d36d253a3140c" + }, + "policies/security_admin_can_write_to_secretdocument.cedar": { + "size": 331, + "checksum": "sha1:1a36f2551c7044b5e89ca5af0b0a14dc198ea25f" + }, + "policies/user_can_compare.cedar": { + "size": 167, + "checksum": "sha1:9f11aea60b0dd3f85cb721303cec06bd13c97159" + }, + "policies/user_can_execute.cedar": { + "size": 167, + "checksum": "sha1:cfcb731c852e03f7e718367bf8a25c71848abc97" + }, + "policies/user_can_monitor.cedar": { + "size": 167, + "checksum": "sha1:6aec722807dbb0ef6c2351a490c1a113240f1057" + }, + "policies/user_can_read.cedar": { + "size": 161, + "checksum": "sha1:4176092cc6f8e8f34c845752b740e9998be33ea1" + }, + "policies/user_can_read_if_confidential_role.cedar": { + "size": 320, + "checksum": "sha1:da798dd4a1983901776a1d3b16d7e59a01fac4eb" + }, + "policies/user_can_read_if_email_is_example.cedar": { + "size": 308, + "checksum": "sha1:709cc56403e9e6664106a9e6c39ed663558bd14a" + }, + "policies/user_can_read_in_corp_network.cedar": { + "size": 236, + "checksum": "sha1:a2c271e52da828d1a58778eb8e5ddb11bd11768e" + }, + "policies/user_can_search.cedar": { + "size": 165, + "checksum": "sha1:9632a82fa98c5844c77b52f2fd47f4dd43ed986c" + }, + "policies/user_can_tag.cedar": { + "size": 159, + "checksum": "sha1:4361e3bff33ce403ce9f188815ff79e58a2f72af" + }, + "policies/user_cannot_execute_on_public_network.cedar": { + "size": 256, + "checksum": "sha1:4cf94d94531a62dc33e77726ac74e574902adb34" + }, + "policies/user_cannot_read_if_compromised.cedar": { + "size": 266, + "checksum": "sha1:ccbb35dc20f1c01c449d096ac2d6a6d63245eb9e" + }, + "policies/user_cannot_read_if_fraudulent.cedar": { + "size": 267, + "checksum": "sha1:2fdfa89f60e64e34efb9be550c602db5e0fd66a3" + }, + "policies/user_cannot_write_from_restricted_country.cedar": { + "size": 270, + "checksum": "sha1:af3a66a7011c8588e9af0461be57a766dae74baf" + }, + "schema.cedarschema": { + "size": 3875, + "checksum": "sha1:49939290b8ad6745f79a067d4ce7ca200f68c6ff" + }, + "trusted-issuers/jans.json": { + "size": 1432, + "checksum": "sha1:e3d8bc023006e626a9dd7df6f44449d0d9527471" + } + } +} \ No newline at end of file From 28985b377dba58980d69fb1f1fd71d412a66d4ce Mon Sep 17 00:00:00 2001 From: Safin Wasi <6601566+SafinWasi@users.noreply.github.com> Date: Fri, 13 Mar 2026 04:45:37 +0000 Subject: [PATCH 111/113] Delete tarpDemo/manifest.json --- tarpDemo/manifest.json | 94 ------------------------------------------ 1 file changed, 94 deletions(-) delete mode 100644 tarpDemo/manifest.json diff --git a/tarpDemo/manifest.json b/tarpDemo/manifest.json deleted file mode 100644 index 77efab3..0000000 --- a/tarpDemo/manifest.json +++ /dev/null @@ -1,94 +0,0 @@ -{ - "policy_store_id": "449805c83e13f332b1b35eac6ffa93187fbd1c648085", - "generated_date": "2026-03-13T04:39:44.053309+00:00", - "files": { - "metadata.json": { - "size": 325, - "checksum": "sha1:7e7534ce4b7ca6dd69fac397b1059b57ff2caa2c" - }, - "policies/admin_can_write_to_application.cedar": { - "size": 307, - "checksum": "sha1:557516498e371c2771b92d04b97dea4eacb7181f" - }, - "policies/allow_student_read.cedar": { - "size": 277, - "checksum": "sha1:ee59049ff450163333c6b1e29d96059ea5190239" - }, - "policies/allow_teacher_secretdocument.cedar": { - "size": 284, - "checksum": "sha1:72fbfbc0bfdcbd7e9649d2527e81560e2f4bab69" - }, - "policies/cannot_write_if_not_admin.cedar": { - "size": 303, - "checksum": "sha1:60698b65b41f3ec01ce3d8fdef3f9886368391f5" - }, - "policies/editor_can_share.cedar": { - "size": 294, - "checksum": "sha1:e8eff337ce68d0612a9b86adeb0d36d253a3140c" - }, - "policies/security_admin_can_write_to_secretdocument.cedar": { - "size": 331, - "checksum": "sha1:1a36f2551c7044b5e89ca5af0b0a14dc198ea25f" - }, - "policies/user_can_compare.cedar": { - "size": 167, - "checksum": "sha1:9f11aea60b0dd3f85cb721303cec06bd13c97159" - }, - "policies/user_can_execute.cedar": { - "size": 167, - "checksum": "sha1:cfcb731c852e03f7e718367bf8a25c71848abc97" - }, - "policies/user_can_monitor.cedar": { - "size": 167, - "checksum": "sha1:6aec722807dbb0ef6c2351a490c1a113240f1057" - }, - "policies/user_can_read.cedar": { - "size": 161, - "checksum": "sha1:4176092cc6f8e8f34c845752b740e9998be33ea1" - }, - "policies/user_can_read_if_confidential_role.cedar": { - "size": 320, - "checksum": "sha1:da798dd4a1983901776a1d3b16d7e59a01fac4eb" - }, - "policies/user_can_read_if_email_is_example.cedar": { - "size": 308, - "checksum": "sha1:709cc56403e9e6664106a9e6c39ed663558bd14a" - }, - "policies/user_can_read_in_corp_network.cedar": { - "size": 236, - "checksum": "sha1:a2c271e52da828d1a58778eb8e5ddb11bd11768e" - }, - "policies/user_can_search.cedar": { - "size": 165, - "checksum": "sha1:9632a82fa98c5844c77b52f2fd47f4dd43ed986c" - }, - "policies/user_can_tag.cedar": { - "size": 159, - "checksum": "sha1:4361e3bff33ce403ce9f188815ff79e58a2f72af" - }, - "policies/user_cannot_execute_on_public_network.cedar": { - "size": 256, - "checksum": "sha1:4cf94d94531a62dc33e77726ac74e574902adb34" - }, - "policies/user_cannot_read_if_compromised.cedar": { - "size": 266, - "checksum": "sha1:ccbb35dc20f1c01c449d096ac2d6a6d63245eb9e" - }, - "policies/user_cannot_read_if_fraudulent.cedar": { - "size": 267, - "checksum": "sha1:2fdfa89f60e64e34efb9be550c602db5e0fd66a3" - }, - "policies/user_cannot_write_from_restricted_country.cedar": { - "size": 270, - "checksum": "sha1:af3a66a7011c8588e9af0461be57a766dae74baf" - }, - "schema.cedarschema": { - "size": 3875, - "checksum": "sha1:49939290b8ad6745f79a067d4ce7ca200f68c6ff" - }, - "trusted-issuers/jans.json": { - "size": 1432, - "checksum": "sha1:e3d8bc023006e626a9dd7df6f44449d0d9527471" - } - } -} \ No newline at end of file From 35651b5171a0702c0cb8b3db1c1fe8fd716cfd9f Mon Sep 17 00:00:00 2001 From: Safin Wasi <6601566+SafinWasi@users.noreply.github.com> Date: Fri, 13 Mar 2026 04:55:06 +0000 Subject: [PATCH 112/113] Create manifest.json --- tarpDemo/manifest.json | 94 ++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 94 insertions(+) create mode 100644 tarpDemo/manifest.json diff --git a/tarpDemo/manifest.json b/tarpDemo/manifest.json new file mode 100644 index 0000000..31afe31 --- /dev/null +++ b/tarpDemo/manifest.json @@ -0,0 +1,94 @@ +{ + "policy_store_id": "449805c83e13f332b1b35eac6ffa93187fbd1c648085", + "generated_date": "2026-03-13T04:39:44.053309+00:00", + "files": { + "metadata.json": { + "size": 325, + "checksum": "sha1:7e7534ce4b7ca6dd69fac397b1059b57ff2caa2c" + }, + "policies/admin_can_write_to_application.cedar": { + "size": 307, + "checksum": "sha1:557516498e371c2771b92d04b97dea4eacb7181f" + }, + "policies/allow_student_read.cedar": { + "size": 277, + "checksum": "sha1:ee59049ff450163333c6b1e29d96059ea5190239" + }, + "policies/allow_teacher_secretdocument.cedar": { + "size": 284, + "checksum": "sha1:72fbfbc0bfdcbd7e9649d2527e81560e2f4bab69" + }, + "policies/cannot_write_if_not_admin.cedar": { + "size": 303, + "checksum": "sha1:60698b65b41f3ec01ce3d8fdef3f9886368391f5" + }, + "policies/editor_can_share.cedar": { + "size": 294, + "checksum": "sha1:e8eff337ce68d0612a9b86adeb0d36d253a3140c" + }, + "policies/security_admin_can_write_to_secretdocument.cedar": { + "size": 331, + "checksum": "sha1:1a36f2551c7044b5e89ca5af0b0a14dc198ea25f" + }, + "policies/user_can_compare.cedar": { + "size": 167, + "checksum": "sha1:9f11aea60b0dd3f85cb721303cec06bd13c97159" + }, + "policies/user_can_execute.cedar": { + "size": 167, + "checksum": "sha1:cfcb731c852e03f7e718367bf8a25c71848abc97" + }, + "policies/user_can_monitor.cedar": { + "size": 167, + "checksum": "sha1:6aec722807dbb0ef6c2351a490c1a113240f1057" + }, + "policies/user_can_read.cedar": { + "size": 161, + "checksum": "sha1:4176092cc6f8e8f34c845752b740e9998be33ea1" + }, + "policies/user_can_read_if_confidential_role.cedar": { + "size": 320, + "checksum": "sha1:da798dd4a1983901776a1d3b16d7e59a01fac4eb" + }, + "policies/user_can_read_if_email_is_example.cedar": { + "size": 308, + "checksum": "sha1:709cc56403e9e6664106a9e6c39ed663558bd14a" + }, + "policies/user_can_read_in_corp_network.cedar": { + "size": 236, + "checksum": "sha1:a2c271e52da828d1a58778eb8e5ddb11bd11768e" + }, + "policies/user_can_search.cedar": { + "size": 165, + "checksum": "sha1:9632a82fa98c5844c77b52f2fd47f4dd43ed986c" + }, + "policies/user_can_tag.cedar": { + "size": 159, + "checksum": "sha1:4361e3bff33ce403ce9f188815ff79e58a2f72af" + }, + "policies/user_cannot_execute_on_public_network.cedar": { + "size": 256, + "checksum": "sha1:4cf94d94531a62dc33e77726ac74e574902adb34" + }, + "policies/user_cannot_read_if_compromised.cedar": { + "size": 266, + "checksum": "sha1:ccbb35dc20f1c01c449d096ac2d6a6d63245eb9e" + }, + "policies/user_cannot_read_if_fraudulent.cedar": { + "size": 267, + "checksum": "sha1:2fdfa89f60e64e34efb9be550c602db5e0fd66a3" + }, + "policies/user_cannot_write_from_restricted_country.cedar": { + "size": 270, + "checksum": "sha1:af3a66a7011c8588e9af0461be57a766dae74baf" + }, + "schema.cedarschema": { + "size": 3875, + "checksum": "sha1:49939290b8ad6745f79a067d4ce7ca200f68c6ff" + }, + "trusted-issuers/jans.json": { + "size": 1432, + "checksum": "sha1:e3d8bc023006e626a9dd7df6f44449d0d9527471" + } + } +} From 73159bd49c62221952e0523a83c6540f6d5484ce Mon Sep 17 00:00:00 2001 From: Safin Wasi <6601566+SafinWasi@users.noreply.github.com> Date: Fri, 13 Mar 2026 04:55:49 +0000 Subject: [PATCH 113/113] Create manifest.json --- tarpUnsignedDemo/manifest.json | 18 ++++++++++++++++++ 1 file changed, 18 insertions(+) create mode 100644 tarpUnsignedDemo/manifest.json diff --git a/tarpUnsignedDemo/manifest.json b/tarpUnsignedDemo/manifest.json new file mode 100644 index 0000000..09b22c3 --- /dev/null +++ b/tarpUnsignedDemo/manifest.json @@ -0,0 +1,18 @@ +{ + "policy_store_id": "6d9f73b2d44ad4e7aa8f1182cde9f72dcbaa244f4327", + "generated_date": "2026-03-13T02:28:22.283762+00:00", + "files": { + "metadata.json": { + "size": 333, + "checksum": "sha1:775ee637a9578c56e46f1a5c6e8a29987720bc03" + }, + "policies/a2d0458ac26b69e4b191193fa307d941e8ab0ca2d5b1.cedar": { + "size": 149, + "checksum": "sha1:3865fc8acb05bf0c464aaefabd5225e03d41ade3" + }, + "schema.cedarschema": { + "size": 3765, + "checksum": "sha1:9ab5e508c9209fbd74447b57900075ec6826a411" + } + } +}