diff --git a/cedar b/cedar index c4bbbb353..9e576d76e 160000 --- a/cedar +++ b/cedar @@ -1 +1 @@ -Subproject commit c4bbbb353675780746276c9ad2b6b9f7eb265fc9 +Subproject commit 9e576d76eec2d9e04a26858e5b3599b1e0ce4692 diff --git a/cedar-drt/fuzz/fuzz_targets/rbac-authorizer.rs b/cedar-drt/fuzz/fuzz_targets/rbac-authorizer.rs index c483db729..16df75f65 100644 --- a/cedar-drt/fuzz/fuzz_targets/rbac-authorizer.rs +++ b/cedar-drt/fuzz/fuzz_targets/rbac-authorizer.rs @@ -19,6 +19,7 @@ use cedar_drt::*; use cedar_drt_inner::*; use cedar_policy_core::ast; use cedar_policy_core::entities::Entities; +use cedar_policy_core::extensions::Extensions; use cedar_policy_core::parser; use libfuzzer_sys::arbitrary::{self, Arbitrary}; use serde::Serialize; @@ -103,7 +104,10 @@ fuzz_target!(|input: AuthorizerInputAbstractEvaluator| { "Action::\"read\"".parse().expect("should be valid"), "Resource::\"foo\"".parse().expect("should be valid"), ast::Context::empty(), - ); + None::<&ast::RequestSchemaAllPass>, + Extensions::none(), + ) + .expect("we aren't doing request validation here, so new() can't fail"); // Check agreement with definitional engine. Note that run_auth_test returns // the result of the call to is_authorized. diff --git a/cedar-policy-generators/src/request.rs b/cedar-policy-generators/src/request.rs index b9a125009..84e234274 100644 --- a/cedar-policy-generators/src/request.rs +++ b/cedar-policy-generators/src/request.rs @@ -1,8 +1,8 @@ use crate::collections::HashMap; use crate::hierarchy::Hierarchy; use arbitrary::Unstructured; -use cedar_policy_core::ast; -use cedar_policy_core::ast::{EntityUID, RestrictedExpr}; +use cedar_policy_core::ast::{self, EntityUID, RestrictedExpr}; +use cedar_policy_core::extensions::Extensions; use smol_str::SmolStr; /// Data structure representing an authorization request @@ -43,7 +43,10 @@ impl From for ast::Request { req.resource, ast::Context::from_pairs(req.context) .expect("can't have duplicate keys because `req.context` was already a HashMap"), + None::<&ast::RequestSchemaAllPass>, + Extensions::none(), ) + .expect("we aren't doing request validation here, so new() can't fail") } }