Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[BLOCKED] Validation of Policies with PolicyTemplates provided by PolicyHub #452

Open
9 tasks
mkanal opened this issue Feb 28, 2024 · 2 comments
Open
9 tasks
Assignees
Labels
BLOCKED Items which are blocked by dependencies dependencies Pull requests that update a dependency file

Comments

@mkanal
Copy link
Contributor

mkanal commented Feb 28, 2024

As CATENA-X data space
I want products using compliant and valid policy definition
so that data sovereignty is guaranteed without using policies improperly or incorrectly

Link

Info

After releasing the blocked by eclipse-tractusx/policy-hub#64 the concept has to be reworked according to new api endpoint

Hints / Details

"technicalEnforced": false /true:
It informs you whether this policy is automatically validated. If the value is 'true', it indicates that the requesting customer compliance of that policy will get validated as part of the communication between the connectors. Please let me know if you have any suggestions for better wording.

Acceptance Criteria

  • The policies accepted by the Policy Store must comply with the specifications (PolicyTemplates) defined by the Policy Hub.
  • Each policy must be evaluated against a policy template and MUST only be accepted in case the entire policy meets the requirements of the template.
  • Implementation according to concept
  • Documentation OpenAPI, Arc42, Admin Manual is adjusted
  • E2E Test Cases are adjusted
  • Mocks for INT tests are adjusted

NFR

  • [ ]Performance: A user who wants to register a policy with a maximum of 10 constraints in the Policy Store will receive feedback on whether the policy is valid in less than a second.
  • If a user registers one or more non-compliant policies, he receives a meaningful error message with instructions on how to correct the policy.
  • OpenAPI 3.0 endpoints contain a sufficient and meaningful description, including instructions how to correct policy.
  • Fail fast strategy for api endpoints is implemented. If several policies are registered and at least one policy is not valid, all policies are not accepted.

Out of Scope

  • ...
@mkanal mkanal added this to IRS Feb 28, 2024
@github-project-automation github-project-automation bot moved this to inbox in IRS Feb 28, 2024
@mkanal
Copy link
Contributor Author

mkanal commented Feb 28, 2024

@jzbmw This is the outcome pbi for the data soverignty guardrails for 24.5 please have a look.

@jzbmw jzbmw added the dependencies Pull requests that update a dependency file label Mar 5, 2024
@mkanal mkanal added the BLOCKED Items which are blocked by dependencies label Mar 8, 2024
@mkanal
Copy link
Contributor Author

mkanal commented Mar 21, 2024

BLOCKED as After releasing the blocked by eclipse-tractusx/policy-hub#64 the concept has to be reworked according to new api endpoint

@mkanal mkanal changed the title Validation of Policies with PolicyTemplates provided by PolicyHub [BLOCKED] Validation of Policies with PolicyTemplates provided by PolicyHub Mar 21, 2024
@jzbmw jzbmw moved this from inbox to backlog in IRS Apr 12, 2024
@jzbmw jzbmw removed the status in IRS Apr 12, 2024
ds-jhartmann added a commit that referenced this issue Jun 13, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
BLOCKED Items which are blocked by dependencies dependencies Pull requests that update a dependency file
Projects
Status: No status
Development

No branches or pull requests

2 participants