Assignment and Equality
# assign variable x to value of field foo.bar.baz in input
x := input.foo.bar.baz
# check if variable x has same value as variable y
x == y
# check if variable x is a set containing "foo" and "bar"
x == {"foo", "bar"}
# OR
{"foo", "bar"} == x
Lookup
Arrays
# lookup value at index 0
val := arr[0]
# check if value at index 0 is "foo"
"foo" == arr[0]
# find all indices i that have value "foo"
"foo" == arr[i]
# lookup last value
val := arr[count(arr)-1]
# with `import future.keywords.in`
some 0, val in arr # lookup value at index 0
0, "foo" in arr # check if value at index 0 is "foo"
some i, "foo" in arr # find all indices i that have value "foo"
Objects
# lookup value for key "foo"
val := obj["foo"]
# check if value for key "foo" is "bar"
"bar" == obj["foo"]
# OR
"bar" == obj.foo
# check if key "foo" exists and is not false
obj.foo
# check if key assigned to variable k exists
k := "foo"
obj[k]
# check if path foo.bar.baz exists and is not false
obj.foo.bar.baz
# check if path foo.bar.baz, foo.bar, or foo does not exist or is false
not obj.foo.bar.baz
# with `import future.keywords.in`
o := {"foo": false}
# check if value exists: the expression will be true
false in o
# check if value for key "foo" is false
"foo", false in o
Sets
# check if "foo" belongs to the set
a_set["foo"]
# check if "foo" DOES NOT belong to the set
not a_set["foo"]
# check if the array ["a", "b", "c"] belongs to the set
a_set[["a", "b", "c"]]
# find all arrays of the form [x, "b", z] in the set
a_set[[x, "b", z]]
# with `import future.keywords.in`
"foo" in a_set
not "foo" in a_set
some ["a", "b", "c"] in a_set
some [x, "b", z] in a_set
Iteration
Arrays
# iterate over indices i
arr[i]
# iterate over values
val := arr[_]
# iterate over index/value pairs
val := arr[i]
# with `import future.keywords.in`
some val in arr # iterate over values
some i, _ in arr # iterate over indices
some i, val in arr # iterate over index/value pairs
Objects
# iterate over keys
obj[key]
# iterate over values
val := obj[_]
# iterate over key/value pairs
val := obj[key]
# with `import future.keywords.in`
some val in obj # iterate over values
some key, _ in obj # iterate over keys
some key, val in obj # key/value pairs
Sets
# iterate over values
set[val]
# with `import future.keywords.in`
some val in set
Advanced
# nested: find key k whose bar.baz array index i is 7
foo[k].bar.baz[i] == 7
# simultaneous: find keys in objects foo and bar with same value
foo[k1] == bar[k2]
# simultaneous self: find 2 keys in object foo with same value
foo[k1] == foo[k2]; k1 != k2
# multiple conditions: k has same value in both conditions
foo[k].bar.baz[i] == 7; foo[k].qux > 3
For All
# assert no values in set match predicate
count({x | set[x]; f(x)}) == 0
# assert all values in set make function f true
count({x | set[x]; f(x)}) == count(set)
# assert no values in set make function f true (using negation and helper rule)
not any_match
# assert all values in set make function f true (using negation and helper rule)
not any_not_match
any_match {
set[x]
f(x)
}
any_not_match {
set[x]
not f(x)
}
Rules
In the examples below ...
represents one or more conditions.
Constants
a = {1, 2, 3}
b = {4, 5, 6}
c = a | b
Conditionals (Boolean)
# p is true if ...
p = true { ... }
# OR
p { ... }
Conditionals
default a = 1
a = 5 { ... }
a = 100 { ... }
Incremental
# a_set will contain values of x and values of y
a_set[x] { ... }
a_set[y] { ... }
# a_map will contain key->value pairs x->y and w->z
a_map[x] = y { ... }
a_map[w] = z { ... }
Ordered (Else)
default a = 1
a = 5 { ... }
else = 10 { ... }
Functions (Boolean)
f(x, y) {
...
}
# OR
f(x, y) = true {
...
}
Functions (Conditionals)
f(x) = "A" { x >= 90 }
f(x) = "B" { x >= 80; x < 90 }
f(x) = "C" { x >= 70; x < 80 }
Tests
# define a rule that starts with test_
test_NAME { ... }
# override input.foo value using the 'with' keyword
data.foo.bar.deny with input.foo as {"bar": [1,2,3]}}
Built-in Functions
The built-in functions for the language provide basic operations to manipulate scalar values (e.g. numbers and strings), and aggregate functions that summarize complex types.
Comparison
Built-in | Description | Wasm Support |
---|---|---|
x == y | x is equal to y | ✅ |
x != y | x is not equal to y | ✅ |
x < y | x is less than y | ✅ |
x <= y | x is less than or equal to y | ✅ |
x > y | x is greater than y | ✅ |
x >= y | x is greater than or equal to y | ✅ |
Numbers
Built-in | Description | Wasm Support |
---|---|---|
z := x + y | z is the sum of x and y | ✅ |
z := x - y | z is the difference of x and y | ✅ |
z := x * y | z is the product of x and y | ✅ |
z := x / y | z is the quotient of x and y | ✅ |
z := x % y | z is the remainder from the division of x and y | ✅ |
output := round(x) | output is x rounded to the nearest integer | ✅ |
output := ceil(x) | output is x rounded up to the nearest integer | ✅ |
output := floor(x) | output is x rounded down the nearest integer | ✅ |
output := abs(x) | output is the absolute value of x | ✅ |
output := numbers.range(a, b) | output is the range of integer numbers between a and b (inclusive). If a == b then output == [a] . If a < b the range is in ascending order. If a > b the range is in descending order. | ✅ |
output := rand.intn(str, n) | output is a number in the range [0, abs(n )). If n is 0, then output is 0. For any given (str , n ) pair the output will be consistent throughout a query evaluation. | SDK-dependent |
Aggregates
Built-in | Description | Wasm Support |
---|---|---|
output := count(collection_or_string) | output is the length of the object, array, set, or string provided as input | ✅ |
output := sum(array_or_set) | output is the sum of the numbers in array_or_set | ✅ |
output := product(array_or_set) | output is the product of the numbers in array_or_set | ✅ |
output := max(array_or_set) | output is the maximum value in array_or_set | ✅ |
output := min(array_or_set) | output is the minimum value in array_or_set | ✅ |
output := sort(array_or_set) | output is the sorted array containing elements from array_or_set . | ✅ |
Arrays
Built-in | Description | Wasm Support |
---|---|---|
output := array.concat(array, array) | output is the result of concatenating the two input arrays together. | ✅ |
output := array.reverse(array) | output is the result of reversing the order of the elements in array . | ✅ |
output := array.slice(array, startIndex, stopIndex) | output is the part of the array from startIndex to stopIndex including the first but excluding the last. If startIndex >= stopIndex then output == [] . If both startIndex and stopIndex are less than zero, output == [] . Otherwise, startIndex and stopIndex are clamped to 0 and count(array) respectively. | ✅ |
Sets
Built-in | Description | Wasm Support |
---|---|---|
s3 := s1 & s2 | s3 is the intersection of s1 and s2 . | ✅ |
s3 := s1 | s2 | s3 is the union of s1 and s2 . | ✅ |
s3 := s1 - s2 | s3 is the difference between s1 and s2 , i.e., the elements in s1 that are not in s2 | ✅ |
output := intersection(set[set]) | output is the intersection of the sets in the input set | ✅ |
output := union(set[set]) | output is the union of the sets in the input set | ✅ |
Objects
Built-in | Description | Wasm Support |
---|---|---|
value := object.get(object, key, default) | value is the value stored by the object at key . If no value is found, default is returned. If the supplied key is an array , then object.get will search through a nested object or array using each key in turn. For example: object.get({"a": [{ "b": true }]}, ["a", 0, "b"], false) results in true | ✅ |
output := object.remove(object, keys) | output is a new object which is the result of removing the specified keys from object . keys must be either an array, object, or set of keys. | ✅ |
output := object.union(objectA, objectB) | output is a new object which is the result of an asymmetric recursive union of two objects where conflicts are resolved by choosing the key from the right-hand object (objectB ). For example: object.union({"a": 1, "b": 2, "c": {"d": 3}}, {"a": 7, "c": {"d": 4, "e": 5}}) will result in {"a": 7, "b": 2, "c": {"d": 4, "e": 5}} | ✅ |
output := object.union_n(array) | output is a new object which is the result of an asymmetric recursive union of all objects in array , merged from left to right, where conflicts are resolved by choosing the key from the right-hand object. For example: object.union_n([{"a": 1}, {"b": 2}, {"a": 3}]) will result in {"b": 2, "a": 3} | SDK-dependent |
filtered := object.filter(object, keys) | filtered is a new object with the remaining data from object with only keys specified in keys which is an array, object, or set of keys. For example: object.filter({"a": {"b": "x", "c": "y"}, "d": "z"}, ["a"]) will result in {"a": {"b": "x", "c": "y"}} ). | ✅ |
filtered := json.filter(object, paths) | filtered is the remaining data from object with only keys specified in paths which is an array or set of JSON string paths. For example: json.filter({"a": {"b": "x", "c": "y"}}, ["a/b"]) will result in {"a": {"b": "x"}} ). Paths are not filtered in-order and are deduplicated before being evaluated. | ✅ |
output := json.remove(object, paths) | output is a new object which is the result of removing all keys specified in paths which is an array or set of JSON string paths. For example: json.remove({"a": {"b": "x", "c": "y"}}, ["a/b"]) will result in {"a": {"c": "y"}} . Paths are not removed in-order and are deduplicated before being evaluated. | ✅ |
output := json.patch(object, patches) | output is a the object obtained after consecutively applying all JSON Patch operations in the array patches . For example: json.patch({"a": {"foo": 1}}, [{"op": "add", "path": "/a/bar", "value": 2}]) results in {"a": {"foo": 1, "bar": 2} . The patches are applied atomically: if any of them fails, the result will be undefined. | SDK-dependent |
When
keys
are provided as an object only the top level keys on the object will be used, values are ignored. For example:object.remove({"a": {"b": {"c": 2}}, "x": 123}, {"a": 1}) == {"x": 123}
regardless of the value for keya
in the keys object, the followingkeys
object gives the same resultobject.remove({"a": {"b": {"c": 2}}, "x": 123}, {"a": {"b": {"foo": "bar"}}}) == {"x": 123}
.The
json
stringpaths
may reference into array values by using index numbers. For example with the object{"a": ["x", "y", "z"]}
the patha/1
referencesy
. Nested structures are supported as well, for example:{"a": ["x", {"y": {"y1": {"y2": ["foo", "bar"]}}}, "z"]}
the patha/1/y1/y2/0
references"foo"
.The
json
stringpaths
support~0
, or~1
characters for~
and/
characters in key names. It does not support-
for last index of an array. For example the path/foo~1bar~0
will referencebaz
in{ "foo/bar~": "baz" }
.The
json
stringpaths
may be an array of string path segments rather than a/
separated string. For example the patha/b/c
can be passed in as["a", "b", "c"]
.
Strings
Built-in | Description | Wasm Support |
---|---|---|
output := concat(delimiter, array_or_set) | output is the result of joining together the elements of array_or_set with the string delimiter | ✅ |
contains(string, search) | true if string contains search | ✅ |
endswith(string, search) | true if string ends with search | ✅ |
output := format_int(number, base) | output is string representation of number in the given base | ✅ |
output := indexof(string, search) | output is the index inside string where search first occurs, or -1 if search does not exist | ✅ |
output := indexof_n(string, search) | output is array[number] representing the indexes inside string where search occurs | SDK-dependent |
output := lower(string) | output is string after converting to lower case | ✅ |
output := replace(string, old, new) | output is a string representing string with all instances of old replaced by new | ✅ |
output := strings.reverse(string) | output is string reversed | ✅ |
output := strings.replace_n(patterns, string) | patterns is an object with old, new string key value pairs (e.g. {"old1": "new1", "old2": "new2", ...} ). output is a string with all old strings inside patterns replaced by the new strings | ✅ |
output := split(string, delimiter) | output is array[string] representing elements of string separated by delimiter | ✅ |
output := sprintf(string, values) | output is a string representing string formatted by the values in the array values . | SDK-dependent |
startswith(string, search) | true if string begins with search | ✅ |
output := substring(string, start, length) | output is the portion of string from index start and having a length of length . If length is less than zero, length is the remainder of the string . If start is greater than the length of the string, output is empty. It is invalid to pass a negative offset to this function. | ✅ |
output := trim(string, cutset) | output is a string representing string with all leading and trailing instances of the characters in cutset removed. | ✅ |
output := trim_left(string, cutset) | output is a string representing string with all leading instances of the characters in cutset removed. | ✅ |
output := trim_prefix(string, prefix) | output is a string representing string with leading instance of prefix removed. If string doesn’t start with prefix, string is returned unchanged. | ✅ |
output := trim_right(string, cutset) | output is a string representing string with all trailing instances of the characters in cutset removed. | ✅ |
output := trim_suffix(string, suffix) | output is a string representing string with trailing instance of suffix removed. If string doesn’t end with suffix, string is returned unchanged. | ✅ |
output := trim_space(string) | output is a string representing string with all leading and trailing white space removed. | ✅ |
output := upper(string) | output is string after converting to upper case | ✅ |
Regex
Built-in | Description | Wasm Support |
---|---|---|
output := regex.match(pattern, value) | output is a boolean that indicates if value matches the regex pattern . | ✅ |
output := regex.is_valid(pattern) | output is a boolean that indicates if pattern is a valid regex pattern. The detailed syntax for regex patterns is defined by https://github.com/google/re2/wiki/Syntax. | ✅ |
output := regex.split(pattern, string) | output is array[string] representing elements of string separated by pattern | SDK-dependent |
regex.globs_match(glob1, glob2) | true if the intersection of regex-style globs glob1 and glob2 matches a non-empty set of non-empty strings. The set of regex symbols is limited for this builtin: only . , * , + , [ , - , ] and \ are treated as special symbols. | SDK-dependent |
output := regex.template_match(pattern, string, delimiter_start, delimiter_end) | output is true if string matches pattern . pattern is a string containing 0..n regular expressions delimited by delimiter_start and delimiter_end . Example regex.template_match("urn:foo:{.*}", "urn:foo:bar:baz", "{", "}") returns true . | SDK-dependent |
output := regex.find_n(pattern, string, number) | output is an array[string] with the number of values matching the pattern . A number of -1 means all matches. | SDK-dependent |
output := regex.find_all_string_submatch_n(pattern, string, number) | output is an array[array[string]] with the outer array including a number of matches which match the pattern . A number of -1 means all matches. | ✅ |
Glob
Built-in | Description | Wasm Support |
---|---|---|
output := glob.match(pattern, delimiters, match) | output is true if match can be found in pattern which is separated by delimiters . For valid patterns, check the table below. Argument delimiters is an array of single-characters (e.g. [".", ":"] ). If delimiters is empty, it defaults to ["."] . | ✅ |
output := glob.quote_meta(pattern) | output is the escaped string of pattern . Calling glob.quote_meta("*.github.com", output) returns \\*.github.com as output . | SDK-dependent |
The following table shows examples of how glob.match
works:
call | output | Description |
---|---|---|
output := glob.match("*.github.com", [], "api.github.com") | true | A glob with the default ["."] delimiter. |
output := glob.match("*.github.com", [], "api.cdn.github.com") | false | A glob with the default ["."] delimiter. |
output := glob.match("*:github:com", [":"], "api:github:com") | true | A glob with delimiters [":"] . |
output := glob.match("api.**.com", [], "api.github.com") | true | A super glob. |
output := glob.match("api.**.com", [], "api.cdn.github.com") | true | A super glob. |
output := glob.match("?at", [], "cat") | true | A glob with a single character wildcard. |
output := glob.match("?at", [], "at") | false | A glob with a single character wildcard. |
output := glob.match("[abc]at", [], "bat") | true | A glob with character-list matchers. |
output := glob.match("[abc]at", [], "cat") | true | A glob with character-list matchers. |
output := glob.match("[abc]at", [], "lat") | false | A glob with character-list matchers. |
output := glob.match("[!abc]at", [], "cat") | false | A glob with negated character-list matchers. |
output := glob.match("[!abc]at", [], "lat") | true | A glob with negated character-list matchers. |
output := glob.match("[a-c]at", [], "cat") | true | A glob with character-range matchers. |
output := glob.match("[a-c]at", [], "lat") | false | A glob with character-range matchers. |
output := glob.match("[!a-c]at", [], "cat") | false | A glob with negated character-range matchers. |
output := glob.match("[!a-c]at", [], "lat") | true | A glob with negated character-range matchers. |
output := glob.match("{cat,bat,[fr]at}", [], "cat") | true | A glob with pattern-alternatives matchers. |
output := glob.match("{cat,bat,[fr]at}", [], "bat") | true | A glob with pattern-alternatives matchers. |
output := glob.match("{cat,bat,[fr]at}", [], "rat") | true | A glob with pattern-alternatives matchers. |
output := glob.match("{cat,bat,[fr]at}", [], "at") | false | A glob with pattern-alternatives matchers. |
Bitwise
Built-in | Description | Wasm Support |
---|---|---|
z := bits.or(x, y) | z is the bitwise or of integers x and y | ✅ |
z := bits.and(x, y) | z is the bitwise and of integers x and y | ✅ |
z := bits.negate(x) | z is the bitwise negation (flip) of integer x | ✅ |
z := bits.xor(x, y) | z is the bitwise exclusive-or of integers x and y | ✅ |
z := bits.lsh(x, s) | z is the bitshift of integer x by s bits to the left | ✅ |
z := bits.rsh(x, s) | z is the bitshift of integer x by s bits to the right | ✅ |
Conversions
Built-in | Description | Wasm Support |
---|---|---|
output := to_number(x) | output is x converted to a number. null is converted to zero, true and false are converted to one and zero (respectively), string values are interpreted as base 10, and numbers are a no-op. Other types are not supported. | ✅ |
Units
Built-in | Description | Wasm Support |
---|---|---|
output := units.parse_bytes(x) | output is x converted to a number with support for standard byte units (e.g., KB, KiB, etc.) KB, MB, GB, and TB are treated as decimal units and KiB, MiB, GiB, and TiB are treated as binary units. The bytes symbol (b/B) in the unit is optional and omitting it wil give the same result (e.g. Mi and MiB) | SDK-dependent |
Types
Built-in | Description | Wasm Support |
---|---|---|
output := is_number(x) | output is true if x is a number; otherwise undefined | ✅ |
output := is_string(x) | output is true if x is a string; otherwise undefined | ✅ |
output := is_boolean(x) | output is true if x is a boolean; otherwise undefined | ✅ |
output := is_array(x) | output is true if x is an array; otherwise undefined | ✅ |
output := is_set(x) | output is true if x is a set; otherwise undefined | ✅ |
output := is_object(x) | output is true if x is an object; otherwise undefined | ✅ |
output := is_null(x) | output is true if x is null; otherwise undefined | ✅ |
output := type_name(x) | output is the type of x (e.g. "number" , "boolean" , …) | ✅ |
Encoding
Built-in | Description | Wasm Support |
---|---|---|
output := base64.encode(x) | output is x serialized to a base64 encoded string without padding | ✅ |
output := base64.decode(string) | output is x deserialized from a base64 encoding string without padding | ✅ |
output := base64url.encode(x) | output is x serialized to a base64url encoded string with padding | ✅ |
output := base64url.encode_no_pad(x) | output is x serialized to a base64url encoded string without padding | SDK-dependent |
output := base64url.decode(string) | output is string deserialized from a base64url encoded string with or without padding | ✅ |
output := urlquery.encode(string) | output is URL query parameter encoded string | SDK-dependent |
output := urlquery.encode_object(object) | output is URL query parameter encoded object | SDK-dependent |
output := urlquery.decode(string) | output is URL query parameter decoded string | SDK-dependent |
output := urlquery.decode_object(string) | output is URL query parameter decoded string represented as an object | SDK-dependent |
output := json.marshal(x) | output is x serialized to a JSON string | ✅ |
output := json.unmarshal(string) | output is string deserialized to a term from a JSON encoded string | ✅ |
output := json.is_valid(string) | output is a boolean that indicated whether string is a valid JSON document | ✅ |
output := yaml.marshal(x) | output is x serialized to a YAML string | SDK-dependent |
output := yaml.unmarshal(string) | output is string deserialized to a term from YAML encoded string | SDK-dependent |
output := yaml.is_valid(string) | output is a boolean that indicated whether string is a valid YAML document that can be decoded by yaml.unmarshal | SDK-dependent |
output := hex.encode(x) | output is x serialized to a hex encoded string | SDK-dependent |
output := hex.decode(string) | output is a string deserialized from a hex encoded string | SDK-dependent |
Token Signing
OPA provides two builtins that implement JSON Web Signature RFC7515 functionality.
io.jwt.encode_sign_raw()
takes three JSON Objects (strings) as parameters and returns their JWS Compact Serialization.
This builtin should be used by those that want maximum control over the signing and serialization procedure. It is
important to remember that StringOrURI values are compared as case-sensitive strings with no transformations or
canonicalizations applied. Therefore, line breaks and whitespaces are significant.
io.jwt.encode_sign()
takes three Rego Objects as parameters and returns their JWS Compact Serialization. This builtin
should be used by those that want to use rego objects for signing during policy evaluation.
Note that with
io.jwt.encode_sign
the Rego objects are serialized to JSON with standard formatting applied whereas theio.jwt.encode_sign_raw
built-in will not affect whitespace of the strings passed in. This will mean that the final encoded token may have different string values, but the decoded and parsed JSON will match.
The following algorithms are supported:
ES256 "ES256" // ECDSA using P-256 and SHA-256
ES384 "ES384" // ECDSA using P-384 and SHA-384
ES512 "ES512" // ECDSA using P-521 and SHA-512
HS256 "HS256" // HMAC using SHA-256
HS384 "HS384" // HMAC using SHA-384
HS512 "HS512" // HMAC using SHA-512
PS256 "PS256" // RSASSA-PSS using SHA256 and MGF1-SHA256
PS384 "PS384" // RSASSA-PSS using SHA384 and MGF1-SHA384
PS512 "PS512" // RSASSA-PSS using SHA512 and MGF1-SHA512
RS256 "RS256" // RSASSA-PKCS-v1.5 using SHA-256
RS384 "RS384" // RSASSA-PKCS-v1.5 using SHA-384
RS512 "RS512" // RSASSA-PKCS-v1.5 using SHA-512
Built-in | Description | Wasm Support |
---|---|---|
output := io.jwt.encode_sign_raw(headers, payload, key) | headers , payload and key as strings that represent the JWS Protected Header, JWS Payload and JSON Web Key (RFC7517) respectively. | SDK-dependent |
output := io.jwt.encode_sign(headers, payload, key) | headers , payload and key are JSON objects that represent the JWS Protected Header, JWS Payload and JSON Web Key (RFC7517) respectively. | SDK-dependent |
Note that the key’s provided should be base64 encoded (without padding) as per the specification (RFC7517). This differs from the plain text secrets provided with the algorithm specific verify built-ins described below.
Token Signing Examples
Symmetric Key (HMAC with SHA-256)
io.jwt.encode_sign({
"typ": "JWT",
"alg": "HS256"
}, {
"iss": "joe",
"exp": 1300819380,
"aud": ["bob", "saul"],
"http://example.com/is_root": true,
"privateParams": {
"private_one": "one",
"private_two": "two"
}
}, {
"kty": "oct",
"k": "AyM1SysPpbyDfgZld3umj1qzKObwVMkoqQ-EstJQLr_T-1qS0gZH75aKtMN3Yj0iPS4hcgUuTwjAzZr1Z9CAow"
})
"eyJhbGciOiAiSFMyNTYiLCAidHlwIjogIkpXVCJ9.eyJhdWQiOiBbImJvYiIsICJzYXVsIl0sICJleHAiOiAxMzAwODE5MzgwLCAiaHR0cDovL2V4YW1wbGUuY29tL2lzX3Jvb3QiOiB0cnVlLCAiaXNzIjogImpvZSIsICJwcml2YXRlUGFyYW1zIjogeyJwcml2YXRlX29uZSI6ICJvbmUiLCAicHJpdmF0ZV90d28iOiAidHdvIn19.M10TcaFADr_JYAx7qJ71wktdyuN4IAnhWvVbgrZ5j_4"
Symmetric Key with empty JSON payload
io.jwt.encode_sign({
"typ": "JWT",
"alg": "HS256"},
{}, {
"kty": "oct",
"k": "AyM1SysPpbyDfgZld3umj1qzKObwVMkoqQ-EstJQLr_T-1qS0gZH75aKtMN3Yj0iPS4hcgUuTwjAzZr1Z9CAow"
})
"eyJhbGciOiAiSFMyNTYiLCAidHlwIjogIkpXVCJ9.e30.Odp4A0Fj6NoKsV4Gyoy1NAmSs6KVZiC15S9VRGZyR20"
RSA Key (RSA Signature with SHA-256)
io.jwt.encode_sign({
"alg": "RS256"
}, {
"iss": "joe",
"exp": 1300819380,
"aud": ["bob", "saul"],
"http://example.com/is_root": true,
"privateParams": {
"private_one": "one",
"private_two": "two"
}
},
{
"kty": "RSA",
"n": "ofgWCuLjybRlzo0tZWJjNiuSfb4p4fAkd_wWJcyQoTbji9k0l8W26mPddxHmfHQp-Vaw-4qPCJrcS2mJPMEzP1Pt0Bm4d4QlL-yRT-SFd2lZS-pCgNMsD1W_YpRPEwOWvG6b32690r2jZ47soMZo9wGzjb_7OMg0LOL-bSf63kpaSHSXndS5z5rexMdbBYUsLA9e-KXBdQOS-UTo7WTBEMa2R2CapHg665xsmtdVMTBQY4uDZlxvb3qCo5ZwKh9kG4LT6_I5IhlJH7aGhyxXFvUK-DWNmoudF8NAco9_h9iaGNj8q2ethFkMLs91kzk2PAcDTW9gb54h4FRWyuXpoQ",
"e": "AQAB",
"d": "Eq5xpGnNCivDflJsRQBXHx1hdR1k6Ulwe2JZD50LpXyWPEAeP88vLNO97IjlA7_GQ5sLKMgvfTeXZx9SE-7YwVol2NXOoAJe46sui395IW_GO-pWJ1O0BkTGoVEn2bKVRUCgu-GjBVaYLU6f3l9kJfFNS3E0QbVdxzubSu3Mkqzjkn439X0M_V51gfpRLI9JYanrC4D4qAdGcopV_0ZHHzQlBjudU2QvXt4ehNYTCBr6XCLQUShb1juUO1ZdiYoFaFQT5Tw8bGUl_x_jTj3ccPDVZFD9pIuhLhBOneufuBiB4cS98l2SR_RQyGWSeWjnczT0QU91p1DhOVRuOopznQ",
"p": "4BzEEOtIpmVdVEZNCqS7baC4crd0pqnRH_5IB3jw3bcxGn6QLvnEtfdUdiYrqBdss1l58BQ3KhooKeQTa9AB0Hw_Py5PJdTJNPY8cQn7ouZ2KKDcmnPGBY5t7yLc1QlQ5xHdwW1VhvKn-nXqhJTBgIPgtldC-KDV5z-y2XDwGUc",
"q": "uQPEfgmVtjL0Uyyx88GZFF1fOunH3-7cepKmtH4pxhtCoHqpWmT8YAmZxaewHgHAjLYsp1ZSe7zFYHj7C6ul7TjeLQeZD_YwD66t62wDmpe_HlB-TnBA-njbglfIsRLtXlnDzQkv5dTltRJ11BKBBypeeF6689rjcJIDEz9RWdc",
"dp": "BwKfV3Akq5_MFZDFZCnW-wzl-CCo83WoZvnLQwCTeDv8uzluRSnm71I3QCLdhrqE2e9YkxvuxdBfpT_PI7Yz-FOKnu1R6HsJeDCjn12Sk3vmAktV2zb34MCdy7cpdTh_YVr7tss2u6vneTwrA86rZtu5Mbr1C1XsmvkxHQAdYo0",
"dq": "h_96-mK1R_7glhsum81dZxjTnYynPbZpHziZjeeHcXYsXaaMwkOlODsWa7I9xXDoRwbKgB719rrmI2oKr6N3Do9U0ajaHF-NKJnwgjMd2w9cjz3_-kyNlxAr2v4IKhGNpmM5iIgOS1VZnOZ68m6_pbLBSp3nssTdlqvd0tIiTHU",
"qi": "IYd7DHOhrWvxkwPQsRM2tOgrjbcrfvtQJipd-DlcxyVuuM9sQLdgjVk2oy26F0EmpScGLq2MowX7fhd_QJQ3ydy5cY7YIBi87w93IKLEdfnbJtoOPLUW0ITrJReOgo1cq9SbsxYawBgfp_gh6A5603k2-ZQwVK0JKSHuLFkuQ3U"
})
"eyJhbGciOiAiUlMyNTYifQ.eyJhdWQiOiBbImJvYiIsICJzYXVsIl0sICJleHAiOiAxMzAwODE5MzgwLCAiaHR0cDovL2V4YW1wbGUuY29tL2lzX3Jvb3QiOiB0cnVlLCAiaXNzIjogImpvZSIsICJwcml2YXRlUGFyYW1zIjogeyJwcml2YXRlX29uZSI6ICJvbmUiLCAicHJpdmF0ZV90d28iOiAidHdvIn19.ITpfhDICCeVV__1nHRN2CvUFni0yyYESvhNlt4ET0yiySMzJ5iySGynrsM3kgzAv7mVmx5uEtSCs_xPHyLVfVnADKmDFtkZfuvJ8jHfcOe8TUqR1f7j1Zf_kDkdqJAsuGuqkJoFJ3S_gxWcZNwtDXV56O3k_7Mq03Ixuuxtip2oF0X3fB7QtUzjzB8mWPTJDFG2TtLLOYCcobPHmn36aAgesHMzJZj8U8sRLmqPXsIc-Lo_btt8gIUc9zZSgRiy7NOSHxw5mYcIMlKl93qvLXu7AaAcVLvzlIOCGWEnFpGGcRFgSOLnShQX6hDylWavKLQG-VOUJKmtXH99KBK-OYQ"
Raw Token Signing
If you need to generate the signature for a serialized token you an use the
io.jwt.encode_sign_raw
built-in function which accepts JSON serialized string
parameters.
io.jwt.encode_sign_raw(
`{"typ":"JWT","alg":"HS256"}`,
`{"iss":"joe","exp":1300819380,"http://example.com/is_root":true}`,
`{"kty":"oct","k":"AyM1SysPpbyDfgZld3umj1qzKObwVMkoqQ-EstJQLr_T-1qS0gZH75aKtMN3Yj0iPS4hcgUuTwjAzZr1Z9CAow"}`
)
"eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJqb2UiLCJleHAiOjEzMDA4MTkzODAsImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.lliDzOlRAdGUCfCHCPx_uisb6ZfZ1LRQa0OJLeYTTpY"
Token Verification
Built-in | Description | Wasm Support |
---|---|---|
output := io.jwt.verify_rs256(string, certificate) | output is true if the RS256 signature of the input token is valid. certificate is the PEM encoded certificate, PEM encoded public key, or the JWK key (set) used to verify the RS256 signature | SDK-dependent |
output := io.jwt.verify_rs384(string, certificate) | output is true if the RS384 signature of the input token is valid. certificate is the PEM encoded certificate, PEM encoded public key, or the JWK key (set) used to verify the RS384 signature | SDK-dependent |
output := io.jwt.verify_rs512(string, certificate) | output is true if the RS512 signature of the input token is valid. certificate is the PEM encoded certificate, PEM encoded public key, or the JWK key (set) used to verify the RS512 signature | SDK-dependent |
output := io.jwt.verify_ps256(string, certificate) | output is true if the PS256 signature of the input token is valid. certificate is the PEM encoded certificate, PEM encoded public key or the JWK key (set) used to verify the PS256 signature | SDK-dependent |
output := io.jwt.verify_ps384(string, certificate) | output is true if the PS384 signature of the input token is valid. certificate is the PEM encoded certificate, PEM encoded public key or the JWK key (set) used to verify the PS384 signature | SDK-dependent |
output := io.jwt.verify_ps512(string, certificate) | output is true if the PS512 signature of the input token is valid. certificate is the PEM encoded certificate, PEM encoded public key or the JWK key (set) used to verify the PS512 signature | SDK-dependent |
output := io.jwt.verify_es256(string, certificate) | output is true if the ES256 signature of the input token is valid. certificate is the PEM encoded certificate, PEM encoded public key or the JWK key (set) used to verify the ES256 signature | SDK-dependent |
output := io.jwt.verify_es384(string, certificate) | output is true if the ES384 signature of the input token is valid. certificate is the PEM encoded certificate, PEM encoded public key or the JWK key (set) used to verify the ES384 signature | SDK-dependent |
output := io.jwt.verify_es512(string, certificate) | output is true if the ES512 signature of the input token is valid. certificate is the PEM encoded certificate, PEM encoded public key or the JWK key (set) used to verify the ES512 signature | SDK-dependent |
output := io.jwt.verify_hs256(string, secret) | output is true if the Secret signature of the input token is valid. secret is a plain text secret used to verify the HS256 signature | SDK-dependent |
output := io.jwt.verify_hs384(string, secret) | output is true if the Secret signature of the input token is valid. secret is a plain text secret used to verify the HS384 signature | SDK-dependent |
output := io.jwt.verify_hs512(string, secret) | output is true if the Secret signature of the input token is valid. secret is a plain text secret used to verify the HS512 signature | SDK-dependent |
output := io.jwt.decode(string) | output is of the form [header, payload, sig] . header and payload are object . sig is the hexadecimal representation of the signature on the token. | SDK-dependent |
output := io.jwt.decode_verify(string, constraints) | output is of the form [valid, header, payload] . If the input token verifies and meets the requirements of constraints then valid is true and header and payload are objects containing the JOSE header and the JWT claim set. Otherwise, valid is false and header and payload are {} . Supports the following algorithms: HS256, HS384, HS512, RS256, RS384, RS512, ES256, ES384, ES512, PS256, PS384 and PS512. | SDK-dependent |
Note that the
io.jwt.verify_XX
built-in methods verify only the signature. They do not provide any validation for the JWT payload and any claims specified. Theio.jwt.decode_verify
built-in will verify the payload and all standard claims.
The input string
is a JSON Web Token encoded with JWS Compact Serialization. JWE and JWS JSON Serialization are not supported. If nested signing was used, the header
, payload
and signature
will represent the most deeply nested token.
For io.jwt.decode_verify
, constraints
is an object with the following members:
Name | Meaning | Required |
---|---|---|
cert | A PEM encoded certificate, PEM encoded public key, or a JWK key (set) containing an RSA or ECDSA public key. | See below |
secret | The secret key for HS256, HS384 and HS512 verification. | See below |
alg | The JWA algorithm name to use. If it is absent then any algorithm that is compatible with the key is accepted. | Optional |
iss | The issuer string. If it is present the only tokens with this issuer are accepted. If it is absent then any issuer is accepted. | Optional |
time | The time in nanoseconds to verify the token at. If this is present then the exp and nbf claims are compared against this value. If it is absent then they are compared against the current time. | Optional |
aud | The audience that the verifier identifies with. If this is present then the aud claim is checked against it. If it is absent then the aud claim must be absent too. | Optional |
Exactly one of cert
and secret
must be present. If there are any
unrecognized constraints then the token is considered invalid.
Token Verification Examples
The examples below use the following token:
es256_token = "eyJ0eXAiOiAiSldUIiwgImFsZyI6ICJFUzI1NiJ9.eyJuYmYiOiAxNDQ0NDc4NDAwLCAiaXNzIjogInh4eCJ9.lArczfN-pIL8oUU-7PU83u-zfXougXBZj6drFeKFsPEoVhy9WAyiZlRshYqjTSXdaw8yw2L-ovt4zTUZb2PWMg"
Using JWKS
This example shows a two-step process to verify the token signature and then decode it for further checks of the payload content. This approach gives more flexibility in verifying only the claims that the policy needs to enforce.
jwks = `{
"keys": [{
"kty":"EC",
"crv":"P-256",
"x":"z8J91ghFy5o6f2xZ4g8LsLH7u2wEpT2ntj8loahnlsE",
"y":"7bdeXLH61KrGWRdh7ilnbcGQACxykaPKfmBccTHIOUo"
}]
}`
io.jwt.verify_es256(es256_token, jwks) # Verify the token with the JWKS
[header, payload, _] := io.jwt.decode(es256_token) # Decode the token
payload.iss == "xxx" # Ensure the issuer (`iss`) claim is the expected value
+-----------------------------+--------------------------------+
| header | payload |
+-----------------------------+--------------------------------+
| {"alg":"ES256","typ":"JWT"} | {"iss":"xxx","nbf":1444478400} |
+-----------------------------+--------------------------------+
The next example shows doing the token signature verification, decoding, and content checks
all in one call using io.jwt.decode_verify
. Note that this gives less flexibility in validating
the payload content as all claims defined in the JWT spec are verified with the provided
constraints.
[valid, header, payload] := io.jwt.decode_verify(es256_token, {
"cert": jwks,
"iss": "xxx",
})
+-----------------------------+--------------------------------+-------+
| header | payload | valid |
+-----------------------------+--------------------------------+-------+
| {"alg":"ES256","typ":"JWT"} | {"iss":"xxx","nbf":1444478400} | true |
+-----------------------------+--------------------------------+-------+
Using PEM encoded X.509 Certificate
The following examples will demonstrate verifying tokens using an X.509 Certificate defined as:
cert = `-----BEGIN CERTIFICATE-----
MIIBcDCCARagAwIBAgIJAMZmuGSIfvgzMAoGCCqGSM49BAMCMBMxETAPBgNVBAMM
CHdoYXRldmVyMB4XDTE4MDgxMDE0Mjg1NFoXDTE4MDkwOTE0Mjg1NFowEzERMA8G
A1UEAwwId2hhdGV2ZXIwWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATPwn3WCEXL
mjp/bFniDwuwsfu7bASlPae2PyWhqGeWwe23Xlyx+tSqxlkXYe4pZ23BkAAscpGj
yn5gXHExyDlKo1MwUTAdBgNVHQ4EFgQUElRjSoVgKjUqY5AXz2o74cLzzS8wHwYD
VR0jBBgwFoAUElRjSoVgKjUqY5AXz2o74cLzzS8wDwYDVR0TAQH/BAUwAwEB/zAK
BggqhkjOPQQDAgNIADBFAiEA4yQ/88ZrUX68c6kOe9G11u8NUaUzd8pLOtkKhniN
OHoCIHmNX37JOqTcTzGn2u9+c8NlnvZ0uDvsd1BmKPaUmjmm
-----END CERTIFICATE-----`
This example shows a two-step process to verify the token signature and then decode it for further checks of the payload content. This approach gives more flexibility in verifying only the claims that the policy needs to enforce.
io.jwt.verify_es256(es256_token, cert) # Verify the token with the certificate
[header, payload, _] := io.jwt.decode(es256_token) # Decode the token
payload.iss == "xxx" # Ensure the issuer claim is the expected value
+-----------------------------+--------------------------------+
| header | payload |
+-----------------------------+--------------------------------+
| {"alg":"ES256","typ":"JWT"} | {"iss":"xxx","nbf":1444478400} |
+-----------------------------+--------------------------------+
The next example shows doing the same token signature verification, decoding, and content checks
but instead with a single call to io.jwt.decode_verify
. Note that this gives less flexibility
in validating the payload content as all claims defined in the JWT spec are verified with the
provided constraints.
[valid, header, payload] := io.jwt.decode_verify( # Decode and verify in one-step
es256_token,
{ # With the supplied constraints:
"cert": cert, # Verify the token with the certificate
"iss": "xxx", # Ensure the issuer claim is the expected value
}
)
+-----------------------------+--------------------------------+-------+
| header | payload | valid |
+-----------------------------+--------------------------------+-------+
| {"alg":"ES256","typ":"JWT"} | {"iss":"xxx","nbf":1444478400} | true |
+-----------------------------+--------------------------------+-------+
Round Trip - Sign and Verify
This example shows how to encode a token, verify, and decode it with the different options available.
Start with using the io.jwt.encode_sign_raw
built-in:
raw_result_hs256 := io.jwt.encode_sign_raw(
`{"alg":"HS256","typ":"JWT"}`,
`{}`,
`{"kty":"oct","k":"Zm9v"}` # "Zm9v" == base64url.encode_no_pad("foo")
)
# Important!! - Use the un-encoded plain text secret to verify and decode
raw_result_valid_hs256 := io.jwt.verify_hs256(raw_result_hs256, "foo")
raw_result_parts_hs256 := io.jwt.decode_verify(raw_result_hs256, {"secret": "foo"})
+----------------------------------------------------------------------------------------+---------------------------------------+------------------------+
| raw_result_hs256 | raw_result_parts_hs256 | raw_result_valid_hs256 |
+----------------------------------------------------------------------------------------+---------------------------------------+------------------------+
| "eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.e30.Duw7jWmGY54yEu6kcqd2w1TKp1EspzboBnx8EeMc-z0" | [true,{"alg":"HS256","typ":"JWT"},{}] | true |
+----------------------------------------------------------------------------------------+---------------------------------------+------------------------+
Now encode the and sign the same token contents but with io.jwt.encode_sign
instead of the raw
varient.
result_hs256 := io.jwt.encode_sign(
{
"alg":"HS256",
"typ":"JWT"
},
{},
{
"kty":"oct",
"k":"Zm9v"
}
)
# Important!! - Use the un-encoded plain text secret to verify and decode
result_parts_hs256 := io.jwt.decode_verify(result_hs256, {"secret": "foo"})
result_valid_hs256 := io.jwt.verify_hs256(result_hs256, "foo")
+--------------------------------------------------------------------------------------------+---------------------------------------+--------------------+
| result_hs256 | result_parts_hs256 | result_valid_hs256 |
+--------------------------------------------------------------------------------------------+---------------------------------------+--------------------+
| "eyJhbGciOiAiSFMyNTYiLCAidHlwIjogIkpXVCJ9.e30.h4crob8QjgDq0JlZpf5mtylPvUzULS0XzdbG2-z_YKc" | [true,{"alg":"HS256","typ":"JWT"},{}] | true |
+--------------------------------------------------------------------------------------------+---------------------------------------+--------------------+
Note that the resulting encoded token is different from the first example using
io.jwt.encode_sign_raw
. The reason is that theio.jwt.encode_sign
function is using canonicalized formatting for the header and payload whereasio.jwt.encode_sign_raw
does not change the whitespace of the strings passed in. The decoded and parsed JSON values are still the same.
Time
Built-in | Description | Wasm Support |
---|---|---|
output := time.now_ns() | output is a number representing the current time since epoch in nanoseconds. | SDK-dependent |
output := time.parse_ns(layout, value) | output is a number representing the time value in nanoseconds since epoch; or undefined if outside the valid time range that can fit within an int64 . See the Go time package documentation for more details on layout . | SDK-dependent |
output := time.parse_rfc3339_ns(value) | output is a number representing the time value in nanoseconds since epoch; or undefined if outside the valid time range that can fit within an int64 . | SDK-dependent |
output := time.parse_duration_ns(duration) | output is a number representing the duration duration in nanoseconds. See the Go time package documentation for more details on duration . | SDK-dependent |
output := time.date(ns) output := time.date([ns, tz]) | output is of the form [year, month, day] , which includes the year , month (0-12), and day (0-31) as number s representing the date from the nanoseconds since epoch (ns ) in the timezone (tz ), if supplied, or as UTC. | SDK-dependent |
output := time.clock(ns) output := time.clock([ns, tz]) | output is of the form [hour, minute, second] , which outputs the hour , minute (0-59), and second (0-59) as number s representing the time of day for the nanoseconds since epoch (ns ) in the timezone (tz ), if supplied, or as UTC. | SDK-dependent |
day := time.weekday(ns) day := time.weekday([ns, tz]) | outputs the day as string representing the day of the week for the nanoseconds since epoch (ns ) in the timezone (tz ), if supplied, or as UTC. | SDK-dependent |
output := time.add_date(ns, years, months, days) | output is a number representing the time since epoch in nanoseconds after adding the years , months and days to ns ; or undefined if outside the valid time range that can fit within an int64 . See the Go time package documentation for more details on add_date . | SDK-dependent |
output := time.diff(ns1, ns2) output := time.diff([ns1, tz1], [ns2, tz2]) | output is of the form [year(s), month(s), day(s), hour(s), minute(s), second(s)] , which outputs year(s) , month(s) (0-11), day(s) (0-30), hour(s) (0-23), minute(s) (0-59) and second(s) (0-59) as number s representing the difference between the the two timestamps in nanoseconds since epoch (ns1 and ns2 ), in the timezones (tz1 and tz2 , respectively), if supplied, or as UTC. | SDK-dependent |
Multiple calls to the
time.now_ns
built-in function within a single policy evaluation query will always return the same value.
Timezones can be specified as
- an IANA Time Zone string e.g. “America/New_York”
- “UTC” or “”, which are equivalent to not passing a timezone (i.e. will return as UTC)
- “Local”, which will use the local timezone.
Note that the opa executable will need access to the timezone files in the environment it is running in (see the Go time.LoadLocation() documentation for more information).
Cryptography
Built-in | Description | Wasm Support |
---|---|---|
output := crypto.x509.parse_certificates(certs) | certs is base64 encoded DER or PEM data containing one or more certificates or a PEM string of one or more certificates. output is an array of X.509 certificates represented as JSON objects. | SDK-dependent |
output := crypto.x509.parse_and_verify_certificates(certs) | certs is base64 encoded DER or PEM data containing two or more certificates where the first is a root CA, the last is a leaf certificate, and all others are intermediate CAs. output is of the form [valid, certs] . If the input certificate chain could be verified then valid is true and certs is an array of X.509 certificates represented as JSON objects. If the input certificate chain could not be verified then valid is false and certs is [] . | SDK-dependent |
output := crypto.x509.parse_certificate_request(csr) | csr is a base64 string containing either a PEM encoded or DER CSR or a string containing a PEM CSR.output is an X.509 CSR represented as a JSON object. | SDK-dependent |
output := crypto.x509.parse_rsa_private_key(pem) | pem is a base64 string containing a PEM encoded RSA private key.output is a JWK as a JSON object. | SDK-dependent |
output := crypto.md5(string) | output is string md5 hashed. | SDK-dependent |
output := crypto.sha1(string) | output is string sha1 hashed. | SDK-dependent |
output := crypto.sha256(string) | output is string sha256 hashed. | SDK-dependent |
output := crypto.hmac.md5(string, key) | output is HMAC-MD5 of string using key | SDK-dependent |
output := crypto.hmac.sha1(string, key) | output is HMAC-SHA-1 of string using key | SDK-dependent |
output := crypto.hmac.sha256(string, key) | output is HMAC-SHA-256 of string using key | SDK-dependent |
output := crypto.hmac.sha512(string, key) | output is HMAC-SHA-512 of string using key | SDK-dependent |
Graphs
Built-in | Description | Wasm Support |
---|---|---|
walk(x, [path, value]) | walk is a relation that produces path and value pairs for documents under x . path is array representing a pointer to value in x . Queries can use walk to traverse documents nested under x (recursively). | ✅ |
output := graph.reachable(graph, initial) | output is the set of vertices reachable from the initial vertices in the directed graph . initial is a set or array of vertices, and graph is an object containing a set or array of neighboring vertices. | ✅ |
output := graph.reachable_paths(graph, initial) | output is the set of arrays of paths reachable from the initial vertices in the directed graph . initial is a set or array of paths, and graph is an object containing a set or array of root vertices. | SDK-dependent |
A common class of recursive rules can be reduced to a graph reachability
problem, so graph.reachable
is useful for more than just graph analysis.
This usually requires some pre- and postprocessing. The following example
shows you how to “flatten” a hierarchy of access permissions.
package graph_reachable_example
org_chart_data := {
"ceo": {},
"human_resources": {"owner": "ceo", "access": ["salaries", "complaints"]},
"staffing": {"owner": "human_resources", "access": ["interviews"]},
"internships": {"owner": "staffing", "access": ["blog"]}
}
org_chart_graph[entity_name] := edges {
org_chart_data[entity_name]
edges := {neighbor | org_chart_data[neighbor].owner == entity_name}
}
org_chart_permissions[entity_name] := access {
org_chart_data[entity_name]
reachable := graph.reachable(org_chart_graph, {entity_name})
access := {item | reachable[k]; item := org_chart_data[k].access[_]}
}
org_chart_permissions[entity_name]
+-------------------+-----------------------------------------------+
| entity_name | org_chart_permissions[entity_name] |
+-------------------+-----------------------------------------------+
| "ceo" | ["blog","complaints","interviews","salaries"] |
| "human_resources" | ["blog","complaints","interviews","salaries"] |
| "internships" | ["blog"] |
| "staffing" | ["blog","interviews"] |
+-------------------+-----------------------------------------------+
It may be useful to find all reachable paths from a root element. graph.reachable_paths
can be used for this. Note that cyclical paths will terminate on the repeated node. If an element references a nonexistent element, the path will be terminated, and excludes the nonexistent node.
package graph_reachable_paths_example
path_data := {
"aTop": [],
"cMiddle": ["aTop"],
"bBottom": ["cMiddle"],
"dIgnored": []
}
all_paths[root] := paths {
path_data[root]
paths := graph.reachable_paths(path_data, {root})
}
all_paths[entity_name]
+-------------+--------------------------------+
| entity_name | all_paths[entity_name] |
+-------------+--------------------------------+
| "aTop" | [["aTop"]] |
| "bBottom" | [["bBottom","cMiddle","aTop"]] |
| "cMiddle" | [["cMiddle","aTop"]] |
| "dIgnored" | [["dIgnored"]] |
+-------------+--------------------------------+
HTTP
Built-in | Description | Wasm Support |
---|---|---|
response := http.send(request) | http.send executes an HTTP request and returns a response . | SDK-dependent |
The request
object parameter may contain the following fields:
Field | Required | Type | Description |
---|---|---|---|
url | yes | string | HTTP URL to specify in the request (e.g., "https://www.openpolicyagent.org" ). |
method | yes | string | HTTP method to specify in request (e.g., "GET" , "POST" , "PUT" , etc.) |
body | no | any | HTTP message body to include in request. The value will be serialized to JSON. |
raw_body | no | string | HTTP message body to include in request. The value WILL NOT be serialized. Use this for non-JSON messages. |
headers | no | object | HTTP headers to include in the request (e.g,. {"X-Opa": "rules"} ). |
enable_redirect | no | boolean | Follow HTTP redirects. Default: false . |
force_json_decode | no | boolean | Decode the HTTP response message body as JSON even if the Content-Type header is missing. Default: false . |
force_yaml_decode | no | boolean | Decode the HTTP response message body as YAML even if the Content-Type header is missing. Default: false . |
tls_use_system_certs | no | boolean | Use the system certificate pool. Default: true when tls_ca_cert , tls_ca_cert_file , tls_ca_cert_env_variable are unset. Ignored on Windows due to the system certificate pool not being accessible in the same way as it is for other platforms. |
tls_ca_cert | no | string | String containing a root certificate in PEM encoded format. |
tls_ca_cert_file | no | string | Path to file containing a root certificate in PEM encoded format. |
tls_ca_cert_env_variable | no | string | Environment variable containing a root certificate in PEM encoded format. |
tls_client_cert | no | string | String containing a client certificate in PEM encoded format. |
tls_client_cert_file | no | string | Path to file containing a client certificate in PEM encoded format. |
tls_client_cert_env_variable | no | string | Environment variable containing a client certificate in PEM encoded format. |
tls_client_key | no | string | String containing a key in PEM encoded format. |
tls_client_key_file | no | string | Path to file containing a key in PEM encoded format. |
tls_client_key_env_variable | no | string | Environment variable containing a client key in PEM encoded format. |
timeout | no | string or number | Timeout for the HTTP request with a default of 5 seconds (5s ). Numbers provided are in nanoseconds. Strings must be a valid duration string where a duration string is a possibly signed sequence of decimal numbers, each with optional fraction and a unit suffix, such as “300ms”, “-1.5h” or “2h45m”. Valid time units are “ns”, “us” (or “µs”), “ms”, “s”, “m”, “h”. A zero timeout means no timeout. |
tls_insecure_skip_verify | no | bool | Allows for skipping TLS verification when calling a network endpoint. Not recommended for production. |
tls_server_name | no | string | Sets the hostname that is sent in the client Server Name Indication and that be will be used for server certificate validation. If this is not set, the value of the Host header (if present) will be used. If neither are set, the host name from the requested URL is used. |
cache | no | boolean | Cache HTTP response across OPA queries. Default: false . |
force_cache | no | boolean | Cache HTTP response across OPA queries and override cache directives defined by the server. Default: false . |
force_cache_duration_seconds | no | number | If force_cache is set, this field specifies the duration in seconds for the freshness of a cached response. |
caching_mode | no | string | Controls the format in which items are inserted into the inter-query cache. Allowed modes are serialized and deserialized . In the serialized mode, items will be serialized before inserting into the cache. This mode is helpful if memory conservation is preferred over higher latency during cache lookup. This is the default mode. In the deserialized mode, an item will be inserted in the cache without any serialization. This means when items are fetched from the cache, there won’t be a need to decode them. This mode helps to make the cache lookup faster at the expense of more memory consumption. If this mode is enabled, the configured caching.inter_query_builtin_cache.max_size_bytes value will be ignored. This means an unlimited cache size will be assumed. |
raise_error | no | bool | If raise_error is set, errors returned by http.send will halt policy evaluation. Default: true . |
If the Host
header is included in headers
, its value will be used as the Host
header of the request. The url
parameter will continue to specify the server to connect to.
When sending HTTPS requests with client certificates at least one the following combinations must be included
tls_client_cert
andtls_client_key
tls_client_cert_file
andtls_client_key_file
tls_client_cert_env_variable
andtls_client_key_env_variable
To validate TLS server certificates, the user must also provide trusted root CA certificates through the
tls_ca_cert
,tls_ca_cert_file
andtls_ca_cert_env_variable
fields. If thetls_use_system_certs
field istrue
, the system certificate pool will be used as well as any additional CA certificates.
The response
object parameter will contain the following fields:
Field | Type | Description |
---|---|---|
status | string | HTTP status message (e.g., "200 OK" ). |
status_code | number | HTTP status code (e.g., 200 ). If raise_error is false , this field will be set to 0 if http.send encounters an error. |
body | any | Any value. If the HTTP response message body was not deserialized from JSON or YAML (by force or via the expected Content-Type headers application/json ; or application/yaml or application/x-yaml ), this field is set to null . |
raw_body | string | The entire raw HTTP response message body represented as a string. |
headers | object | An object containing the response headers. The values will be an array of strings, repeated headers are grouped under the same keys with all values in the array. |
error | object | If raise_error is false , this field will represent the error encountered while running http.send . The error object contains a message key which holds the actual error message and a code key which represents if the error was caused due to a network issue or during policy evaluation. |
By default, an error returned by http.send
halts the policy evaluation. This behaviour can be altered such that
instead of halting evaluation, if http.send
encounters an error, it can return a response
object with status_code
set to 0
and error
describing the actual error. This can be activated by setting the raise_error
field
in the request
object to false
.
If the cache
field in the request
object is true
, http.send
will return a cached response after it checks its freshness and validity.
http.send
uses the Cache-Control
and Expires
response headers to check the freshness of the cached response.
Specifically if the max-age Cache-Control
directive is set, http.send
will use it to determine if the cached response is fresh or not. If max-age
is not set, the Expires
header will be used instead.
If the cached response is stale, http.send
uses the Etag
and Last-Modified
response headers to check with the server if the
cached response is in fact still fresh. If the server responds with a 200
(OK
) response, http.send
will update the cache
with the new response. On a 304
(Not Modified
) server response, http.send
will update the headers in cached response with
their corresponding values in the 304
response.
The force_cache
field can be used to override the cache directives defined by the server. This field is used in
conjunction with the force_cache_duration_seconds
field. If force_cache
is true
, then force_cache_duration_seconds
must be specified and http.send
will use this value to check the freshness of the cached response.
Also, if force_cache
is true
, it overrides the cache
field.
The table below shows examples of calling http.send
:
Example | Comments |
---|---|
Accessing Google using System Cert Pool | http.send({"method": "get", "url": "https://www.google.com", "tls_use_system_certs": true }) |
Files containing TLS material | http.send({"method": "get", "url": "https://127.0.0.1:65331", "tls_ca_cert_file": "testdata/ca.pem", "tls_client_cert_file": "testdata/client-cert.pem", "tls_client_key_file": "testdata/client-key.pem"}) |
Environment variables containing TLS material | http.send({"method": "get", "url": "https://127.0.0.1:65360", "tls_ca_cert_env_variable": "CLIENT_CA_ENV", "tls_client_cert_env_variable": "CLIENT_CERT_ENV", "tls_client_key_env_variable": "CLIENT_KEY_ENV"}) |
Unix Socket URL Format | http.send({"method": "get", "url": "unix://localhost/?socket=%F2path%F2file.socket"}) |
Net
Built-in | Description | Wasm Support |
---|---|---|
net.lookup_ip_addr(name) | output is a set of IP addresses (both v4 and v6, strings) that the domain name resolves to using standard name resolution, see the notes below. | SDK-dependent |
net.cidr_contains(cidr, cidr_or_ip) | output is true if cidr_or_ip (e.g. 127.0.0.64/26 or 127.0.0.1 ) is contained within cidr (e.g. 127.0.0.1/24 ) and false otherwise. Supports both IPv4 and IPv6 notations. | ✅ |
output := net.cidr_contains_matches(cidrs, cidrs_or_ips) | output is a set of tuples identifying matches where cidrs_or_ips are contained within cidrs . This function is similar to net.cidr_contains except it allows callers to pass collections of CIDRs or IPs as arguments and returns the matches (as opposed to a boolean result indicating a match between two CIDRs/IPs.) See below for examples. | SDK-dependent |
net.cidr_intersects(cidr1, cidr2) | output is true if cidr1 (e.g. 192.168.0.0/16 ) overlaps with cidr2 (e.g. 192.168.1.0/24 ) and false otherwise. Supports both IPv4 and IPv6 notations. | ✅ |
net.cidr_expand(cidr) | output is the set of hosts in cidr (e.g., net.cidr_expand("192.168.0.0/30") generates 4 hosts: {"192.168.0.0", "192.168.0.1", "192.168.0.2", "192.168.0.3"} | SDK-dependent |
net.cidr_merge(cidrs_or_ips) | output is the smallest possible set of CIDRs obtained after merging the provided list of IP addresses and subnets in cidrs_or_ips (e.g., net.cidr_merge(["192.0.128.0/24", "192.0.129.0/24"]) generates {"192.0.128.0/23"} . This function merges adjacent subnets where possible, those contained within others and also removes any duplicates. Supports both IPv4 and IPv6 notations. IPv6 inputs need a prefix length (e.g. “/128”). | SDK-dependent |
Notes on Name Resolution (net.lookup_ip_addr
)
The lookup mechanism uses either the pure-Go, or the cgo-based resolver, depending on the operating system and availability of cgo.
The latter depends on flags that can be provided when building OPA as a Go library, and can be adjusted at runtime via the GODEBUG enviroment variable.
See these docs on the net
package for details.
Note that the cgo-based resolver is often preferrable: It will take advantage of host-based DNS caching in place. This built-in function only caches DNS lookups within a single policy evaluation.
Examples of net.cidr_contains_matches
The output := net.cidr_contains_matches(a, b)
function allows callers to supply
strings, arrays, sets, or objects for either a
or b
. The output
value in
all cases is a set of tuples (2-element arrays) that identify matches, i.e.,
elements of b
contained by elements of a
. The first tuple element refers to
the match in a
and the second tuple element refers to the match in b
.
Input Type | Output Type |
---|---|
string | string |
array | array index |
set | set element |
object | object key |
If both operands are string values the function is similar to net.cidr_contains
.
net.cidr_contains_matches("1.1.1.0/24", "1.1.1.128")
[
[
"1.1.1.0/24",
"1.1.1.128"
]
]
Either (or both) operand(s) may be an array, set, or object.
net.cidr_contains_matches(["1.1.1.0/24", "1.1.2.0/24"], "1.1.1.128")
[
[
0,
"1.1.1.128"
]
]
The array/set/object elements may be arrays. In that case, the first element must be a valid CIDR/IP.
net.cidr_contains_matches([["1.1.0.0/16", "foo"], "1.1.2.0/24"], ["1.1.1.128", ["1.1.254.254", "bar"]])
[
[
0,
0
],
[
0,
1
]
]
If the operand is a set, the outputs are matching elements. If the operand is an object, the outputs are matching keys.
net.cidr_contains_matches({["1.1.0.0/16", "foo"], "1.1.2.0/24"}, {"x": "1.1.1.128", "y": ["1.1.254.254", "bar"]})
[
[
[
"1.1.0.0/16",
"foo"
],
"x"
],
[
[
"1.1.0.0/16",
"foo"
],
"y"
]
]
UUID
Built-in | Description | Wasm Support |
---|---|---|
output := uuid.rfc4122(str) | output is string representing a version 4 uuid. For any given str the output will be consistent throughout a query evaluation. | SDK-dependent |
Semantic Versions
Built-in | Description | Wasm Support |
---|---|---|
output := semver.is_valid(str) | output is a boolean . true means the input is a valid SemVer string (e.g. “1.0.0”). false is returned for invalid version strings and non-string input. | SDK-dependent |
output := semver.compare(str, str) | output is a number . -1 means the version in the first operand is less than the second. 1 means the version in the first operand is greater than the second. 0 means the versions are equal. Only valid SemVer strings are accepted e.g. 1.2.3 or 0.1.0 | SDK-dependent |
Rego
Built-in | Description | Wasm Support |
---|---|---|
output := rego.parse_module(filename, string) | rego.parse_module parses the input string as a Rego module and returns the AST as a JSON object output . | SDK-dependent |
output := rego.metadata.chain() | Each entry in the output array represents a node in the path ancestry (chain) of the active rule that also has declared annotations.output is ordered starting at the active rule, going outward to the most distant node in its package ancestry. A chain entry is a JSON document with two members: path , an array representing the path of the node; and annotations , a JSON document containing the annotations declared for the node. The first entry in the chain always points to the active rule, even if it has no declared annotations (in which case the annotations member is not present). | ✅ |
output := rego.metadata.rule() | Returns a JSON object output containing the set of annotations declared for the active rule and using the rule scope. If no annotations are declared, an empty object is returned. | ✅ |
Metadata Merge strategies
When multiple annotations are declared along the path ancestry (chain) for a rule, how any given annotation should be selected, inherited or merged depends on the semantics of the annotation, the context of the rule, and the preferences of the developer. OPA doesn’t presume what merge strategy is appropriate; instead, this lies in the hands of the developer. The following example demonstrates how some string and list type annotations in a metadata chain can be merged into a single metadata object.
# METADATA
# title: My Example Package
# description: A set of rules illustrating how metadata annotations can be merged.
# authors:
# - John Doe <john@example.com>
# organizations:
# - Acme Corp.
package example
import future.keywords.in
# METADATA
# scope: document
# description: A rule that merges metadata annotations in various ways.
# METADATA
# title: My Allow Rule
# authors:
# - Jane Doe <jane@example.com>
allow {
meta := merge(rego.metadata.chain())
meta.title == "My Allow Rule" # 'title' pulled from 'rule' scope
meta.description == "A rule that merges metadata annotations in various ways." # 'description' pulled from 'document' scope
meta.authors == { # 'authors' joined from 'package' and 'rule' scopes
{"email": "jane@example.com", "name": "Jane Doe"},
{"email": "john@example.com", "name": "John Doe"}
}
meta.organizations == {"Acme Corp."} # 'organizations' pulled from 'package' scope
}
allow {
meta := merge(rego.metadata.chain())
meta.title == null # No 'title' present in 'rule' or 'document' scopes
meta.description == "A rule that merges metadata annotations in various ways." # 'description' pulled from 'document' scope
meta.authors == { # 'authors' pulled from 'package' scope
{"email": "john@example.com", "name": "John Doe"}
}
meta.organizations == {"Acme Corp."} # 'organizations' pulled from 'package' scope
}
merge(chain) = meta {
ruleAndDoc := ["rule", "document"]
meta := {
"title": override_annot(chain, "title", ruleAndDoc), # looks for 'title' in 'rule' scope, then 'document' scope
"description": override_annot(chain, "description", ruleAndDoc), # looks for 'description' in 'rule' scope, then 'document' scope
"related_resources": override_annot(chain, "related_resources", ruleAndDoc), # looks for 'related_resources' in 'rule' scope, then 'document' scope
"authors": merge_annot(chain, "authors"), # merges all 'authors' across all scopes
"organizations": merge_annot(chain, "organizations"), # merges all 'organizations' across all scopes
}
}
override_annot(chain, name, scopes) = val {
val := [v |
link := chain[_]
link.annotations.scope in scopes
v := link.annotations[name]
][0]
} else = null
merge_annot(chain, name) = val {
val := {v |
v := chain[_].annotations[name][_]
}
} else = null
OPA
Built-in | Description | Wasm Support |
---|---|---|
output := opa.runtime() | opa.runtime returns a JSON object output that describes the runtime environment where OPA is deployed. Caution: Policies that depend on the output of opa.runtime may return different answers depending on how OPA was started. If possible, prefer using an explicit input or data value instead of opa.runtime . The output of opa.runtime will include a "config" key if OPA was started with a configuration file. The output of opa.runtime will include a "env" key containing the environment variables that the OPA process was started with. The output of opa.runtime will include "version" and "commit" keys containing the semantic version and build commit of OPA. | SDK-dependent |
Debugging
Built-in | Description | Wasm Support |
---|---|---|
print(...) | print is used to output the values of variables for debugging purposes. print calls have no affect on the result of queries or rules. All variables passed to print must be assigned inside of the query or rule. If any of the print arguments are undefined, their values are represented as <undefined> in the output stream. Because policies can be invoked via different interfaces (e.g., CLI, HTTP API, etc.) the exact output format differs. See the table below for details. | SDK-dependent |
API | Output | Memo |
---|---|---|
opa eval | stderr | |
opa run (REPL) | stderr | |
opa test | stdout | Specify -v to see output for passing tests. Output for failing tests is displayed automatically. |
opa run -s (server) | stderr | Specify --log-level=info (default) or higher. Output is sent to the log stream. Use --log-format=text for pretty output. |
Go (library) | io.Writer | https://pkg.go.dev/github.com/open-policy-agent/opa/rego#example-Rego-Print_statements |
Tracing
Built-in | Description | Wasm Support |
---|---|---|
trace(string) | trace emits string as a Note event in the query explanation. Query explanations show the exact expressions evaluated by OPA during policy execution. For example, trace("Hello There!") includes Note "Hello There!" in the query explanation. To include variables in the message, use sprintf . For example, person := "Bob"; trace(sprintf("Hello There! %v", [person])) will emit Note "Hello There! Bob" inside of the explanation. | SDK-dependent |
By default, explanations are disabled. The following table summarizes how you can enable tracing:
API | Parameter | Example | Memo |
---|---|---|---|
CLI | --explain | opa eval --explain=notes --format=pretty 'trace("hello world")' | |
HTTP | explain=notes | curl localhost:8181/v1/data/example/allow?explain=notes&pretty | |
REPL | notes | n/a | The “notes” command enables trace explanations. See help for more details. |
Reserved Names
The following words are reserved and cannot be used as variable names, rule names, or dot-access style reference arguments:
as
default
else
false
import
package
not
null
some
true
with
Grammar
Rego’s syntax is defined by the following grammar:
module = package { import } policy
package = "package" ref
import = "import" package [ "as" var ]
policy = { rule }
rule = [ "default" ] rule-head { rule-body }
rule-head = var [ "(" rule-args ")" ] [ "[" term "]" ] [ ( ":=" | "=" ) term ]
rule-args = term { "," term }
rule-body = [ "else" [ ( ":=" | "=" ) term ] ] "{" query "}"
query = literal { ( ";" | ( [CR] LF ) ) literal }
literal = ( some-decl | expr | "not" expr ) { with-modifier }
with-modifier = "with" term "as" term
some-decl = "some" term { "," term } { "in" expr }
expr = term | expr-call | expr-infix | expr-every
expr-call = var [ "." var ] "(" [ expr { "," expr } ] ")"
expr-infix = [ term "=" ] expr infix-operator expr
expr-every = "every" var { "," var } "in" ( term | expr-call | expr-infix ) "{" query "}"
term = ref | var | scalar | array | object | set | array-compr | object-compr | set-compr
array-compr = "[" term "|" rule-body "]"
set-compr = "{" term "|" rule-body "}"
object-compr = "{" object-item "|" rule-body "}"
infix-operator = bool-operator | arith-operator | bin-operator
bool-operator = "==" | "!=" | "<" | ">" | ">=" | "<="
arith-operator = "+" | "-" | "*" | "/"
bin-operator = "&" | "|"
ref = ( var | array | object | set | array-compr | object-compr | set-compr | expr-call ) { ref-arg }
ref-arg = ref-arg-dot | ref-arg-brack
ref-arg-brack = "[" ( scalar | var | array | object | set | "_" ) "]"
ref-arg-dot = "." var
var = ( ALPHA | "_" ) { ALPHA | DIGIT | "_" }
scalar = string | NUMBER | TRUE | FALSE | NULL
string = STRING | raw-string
raw-string = "`" { CHAR-"`" } "`"
array = "[" term { "," term } "]"
object = "{" object-item { "," object-item } "}"
object-item = ( scalar | ref | var ) ":" term
set = empty-set | non-empty-set
non-empty-set = "{" term { "," term } "}"
empty-set = "set(" ")"
The grammar defined above makes use of the following syntax. See the Wikipedia page on EBNF for more details:
[] optional (zero or one instances)
{} repetition (zero or more instances)
| alternation (one of the instances)
() grouping (order of expansion)
STRING JSON string
NUMBER JSON number
TRUE JSON true
FALSE JSON false
NULL JSON null
CHAR Unicode character
ALPHA ASCII characters A-Z and a-z
DIGIT ASCII characters 0-9
CR Carriage Return
LF Line Feed
Feedback
Was this page helpful?
Glad to hear it! Please tell us how we can improve.
Sorry to hear that. Please tell us how we can improve.