Abe Clark
08/19/2025, 6:47 AMAbe Clark
08/19/2025, 6:59 AMGET <https://api.permit.io/v2/facts/963052528a05464f81806c264751d0ea/8671f6b2ae42487fa851e9f6c43a8cbd/user_invites/fe250482c2ab403795f8312f06a48aa0>
Including Authorization Bearer header
{
"id": "73576d6c002d4a60bfe01d1b51ee729c",
"title": "The request could not be completed",
"error_code": "UNEXPECTED_ERROR",
"message": "You did nothing wrong, but we could not finish your request due to a technical issue on our end. Please try again.\nIf the issue keeps happening, contact our support on Slack for further guidance."
}
Thillai
08/21/2025, 2:00 PMThillai
08/25/2025, 5:30 AMRodrigo Mayer
08/25/2025, 5:42 PM[25/Aug/2025:14:28:16] [2025-08-25T14:28:16Z ERROR pdp_server::api::authz::user_permissions] Failed to send request to OPA: Failed to send request to OPA: error sending request for url (<http://localhost:8181/v1/data/permit/user_permissions>)
[25/Aug/2025:14:28:16] [2025-08-25T14:28:16Z ERROR pdp_server::api::authz::allowed_bulk] Failed to send request to OPA: Failed to send request to OPA: error sending request for url (<http://localhost:8181/v1/data/permit/bulk>)
We restarted the PDP deployment and the issue was fixed.
Could you help us understand what's causing this issue and how to fix it?
Thanks in advance.Bálint Richly
08/26/2025, 6:22 AMSlackbot
08/27/2025, 10:23 AMLiam Taylor
08/27/2025, 10:24 AMLewis Youl
08/27/2025, 11:49 AM{
"key": "megatest",
"type": "resourceset",
"resource_id": "document",
"name": "megatest",
"description": "megatest",
"conditions": {
"allOf": [
{
"allOf": [
{
"resource.documentTypeId": {
"equals": "roflcopter"
}
},
{
"resource.owner": {
"equals": "123456"
}
}
]
}
]
},
"parent_id": null
}
Thillai
08/28/2025, 7:01 AMpermit.check()
expects a user_id as the subject, and evaluates permissions based on that user’s assigned roles/policies.
Is there a supported way to directly check permissions for a role (e.g. "admin"
) without going through a user? Or should we always create a test user with that role when we want to validate role-based access? Thanks.Lewis Youl
08/28/2025, 11:26 AMPermit Support Automation
08/28/2025, 11:26 AMYilmaz Alizadeh
08/28/2025, 1:24 PMPermit Support Automation
08/28/2025, 1:24 PMRoberto Macaotela
08/28/2025, 10:50 PMLewis Youl
08/29/2025, 8:28 AMPermit Support Automation
08/29/2025, 8:28 AMLewis Youl
08/29/2025, 5:07 PMPATCH /v2/facts/9aa8bcdc454049cd8c1459f6d1215b4f/890e358221b34dee9ac6fb6103b762f8/resource_instances/3804d4a9ef3144ec98aa17b22e274a1b
Body
{
"attributes": {
"id": "83136998-510c-4f3d-8316-97e503a4ff4a",
"name": "2nd Wood Doc",
"owner": "7ca6992a-726f-4ddf-bdbc-8d5b8baa0c0e",
"tenant": "c8217bd9-ed07-4898-b455-f9c9eb615977",
"documentTypeId": "8f419f7a-7ea3-413e-a09b-2142504c579f",
"isSmartDocument": true
}
}
workspace = alex-trustflight-sandbox
project = sandbox
env = lewisdevelopmentSam Jakos
08/31/2025, 1:12 PMSam Jakos
08/31/2025, 1:57 PMJames Wu
09/02/2025, 12:37 AMSam Jakos
09/03/2025, 11:15 AMMíla Votradovec
09/04/2025, 10:54 AMSam Jakos
09/04/2025, 11:45 AMBradley Herrup
09/04/2025, 8:55 PMBradley Herrup
09/04/2025, 9:15 PMTaha ÇEKEN
09/05/2025, 8:54 AM/allowed_url
, the PDP correctly returns "allow": true
for my user and URL.
Example PDP request:
POST http://172.24.16.56:7766/allowed_url
{
"user": { "key": "ae454a25-958b-40c0-b004-a02495c0293f" },
"url": "https://api.abex.com.tr/test/api/booking/en/bookings/",
"http_method": "GET",
"tenant": "default"
}
RESPONSE
{
"allow": true,
"query": {},
"debug": {
"rbac": {
"allow": true,
"allowing_roles": [
"Employee"
],
"code": "allow",
"reason": "user 'ae454a25-958b-40c0-b004-a02495c0293f' has the role 'Employee' in tenant 'default', role 'Employee' has the 'read' permission on resources of type 'document'"
},
"request": {
"action": "read",
"resource": {
"attributes": {
"booking_id": "",
"type": "document"
},
"type": "document"
},
"tenant": "default",
"user": {
"attributes": {
"email": "employee@test.com",
"key": "ae454a25-958b-40c0-b004-a02495c0293f",
"roles": [
"Employee"
],
"tenants": [
"default"
]
},
"key": "ae454a25-958b-40c0-b004-a02495c0293f",
"synced": true
}
}
},
"result": true
}
However, when I call the Permit.io proxy endpoint: https://proxy.api.permit.io/proxy/46686b3e7f804317a3143ad1e3a757bc?url=https://api.abex.com.tr/test/api/booking/en/bookings/
I always get the following error:
{
"detail": "Proxy rule not found, consider checking your 'URL' parameter and the request method, or adding a new mapping rule. Hint: pay attention to the trailing slash, or lack thereof."
}
my current proxy config
{
"key": "api-abex",
"id": "46686b3e7f804317a3143ad1e3a757bc",
"organization_id": "50b10af7e4d44b9aae623be4c2466e5a",
"project_id": "167998e377d0412d9822b65450d740ba",
"environment_id": "8fb17dd891a741c4bcc55bf2d4c4dd55",
"created_at": "2025-09-05T072121+00:00",
"updated_at": "2025-09-05T073503+00:00",
"secret": "permit_key_3SJZ915SqaxuMSf6GU7WxGk1VDZ9JWzm4Xw3i8HQCGguq3Ra5IZ8gMGVPJ0H8gHWkFiVRdtS2xDrH78JevtQqS",
"name": "api-abex",
"mapping_rules": [
{
"url": "https://api.abex.com.tr/test/api/booking/en/bookings/{booking_id}",
"url_type": null,
"http_method": "get",
"resource": "document",
"headers": {},
"action": "read",
"priority": null
},
{
"url": "https://api.abex.com.tr/test/api/booking/en/bookings/",
"url_type": null,
"http_method": "get",
"resource": "document",
"headers": {},
"action": "read",
"priority": null
}
],
"auth_mechanism": "Bearer"
}
and proxy config screenshot added as attachment
Thank you!Yilmaz Alizadeh
09/05/2025, 12:10 PMLewis Youl
09/05/2025, 3:02 PMalex-trustflight-sandbox
to just trustflight
.Taha ÇEKEN
09/08/2025, 6:10 AM/allowed_url
endpoint?