-
Notifications
You must be signed in to change notification settings - Fork 8
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
rego context aware #364
rego context aware #364
Conversation
93407bc
to
6accdd3
Compare
This allows a better organization of the code Signed-off-by: Flavio Castelli <fcastelli@suse.com>
Add some fixtures to be used by Rego policies making use of context aware data Signed-off-by: Flavio Castelli <fcastelli@suse.com>
Allow to obtain the plural name of a Kubernetes resource via a callback query. This is required to enable OPA policies to be context aware. Signed-off-by: Flavio Castelli <fcastelli@suse.com>
6accdd3
to
f5cac78
Compare
I've rebased against the |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM! Nice :).
Added some docstrings quibbles, feel free to batch them in a single commit through the UI.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM! thanks
f5cac78
to
49d5726
Compare
Allow Rego policies, both OPA and Gatekeeper ones, to leverage Kubernetes data at evaluation time. This change doesn't break the API of policy-evaluator, nor requires any special action by the consumers of this crate. Signed-off-by: Flavio Castelli <fcastelli@suse.com>
5104232
to
2c19206
Compare
This PR allows Rego policies to be context aware.
No change to the API of the crate is done. No special action must be done by the consumers of this library.
Fixes: #353