Skip to content

chore(opa): Bump to 1.0.0 #143

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 3 commits into from
Jan 24, 2025
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
4 changes: 0 additions & 4 deletions docs/modules/demos/pages/end-to-end-security.adoc
Original file line number Diff line number Diff line change
Expand Up @@ -227,8 +227,6 @@ The ACLs configuring this behavior (written with the {rego}[Rego language]) on t
----
package trino_policies

import rego.v1

policies := {
"tables": [
{
Expand Down Expand Up @@ -270,8 +268,6 @@ The Rego rule for this behavior looks like this (again a snippet from the {trino
----
package trino_policies

import rego.v1

policies := {
"tables": [
{
Expand Down
4 changes: 1 addition & 3 deletions stacks/data-lakehouse-iceberg-trino-spark/trino.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -114,7 +114,7 @@ metadata:
name: opa
spec:
image:
productVersion: 0.67.1
productVersion: 1.0.0
servers:
roleGroups:
default: {}
Expand All @@ -129,8 +129,6 @@ data:
trino.rego: |
package trino

import rego.v1

default allow = false

# Allow non-batched access
Expand Down
4 changes: 1 addition & 3 deletions stacks/dual-hive-hdfs-s3/trino.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -86,7 +86,7 @@ metadata:
name: opa
spec:
image:
productVersion: 0.67.1
productVersion: 1.0.0
servers:
roleGroups:
default:
Expand All @@ -102,8 +102,6 @@ data:
trino.rego: |
package trino

import rego.v1

default allow = false

# Allow non-batched access
Expand Down
2 changes: 0 additions & 2 deletions stacks/end-to-end-security/hdfs-regorules.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -9,8 +9,6 @@ data:
hdfs.rego: |
package hdfs

import rego.v1

default allow := false
default matches_identity(identity) := false

Expand Down
2 changes: 1 addition & 1 deletion stacks/end-to-end-security/opa.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -5,7 +5,7 @@ metadata:
name: opa
spec:
image:
productVersion: 0.67.1
productVersion: 1.0.0
clusterConfig:
userInfo:
backend:
Expand Down
2 changes: 0 additions & 2 deletions stacks/end-to-end-security/trino-policies.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -9,8 +9,6 @@ data:
trino_policies.rego: |
package trino_policies

import rego.v1

policies := {
"catalogs": [
# Needed to bootstrap schemas and tables
Expand Down
10 changes: 0 additions & 10 deletions stacks/end-to-end-security/trino-regorules.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -11,7 +11,6 @@ data:
package trino

import data.util
import rego.v1

# This file contains functions to determine the actual permissions
# defined in the Trino policies for the given user and requested
Expand All @@ -36,7 +35,6 @@ data:
#
# Example:
# package trino_policies
# import rego.v1
# extra_groups := groups if {
# request := {
# "method": "POST",
Expand Down Expand Up @@ -579,7 +577,6 @@ data:
package trino

import data.util
import rego.v1

# The final policies are a combination of policies offered by Stackable,
# policies provided externally, and default policies.
Expand All @@ -596,7 +593,6 @@ data:
#
# Example:
# package trino_policies
# import rego.v1
# policies := {
# "catalogs": [
# {
Expand Down Expand Up @@ -757,8 +753,6 @@ data:
requested_permissions.rego: |
package trino

import rego.v1

# This file contains the requested_permissions rule which returns a set
# of required permissions for the given operation including the
# requested resource. Operations with the same set of required
Expand Down Expand Up @@ -1439,8 +1433,6 @@ data:
# - data.trino_policies.policies: schema.policies
package trino

import rego.v1

# METADATA
# description: |
# Entry point for OPA policies, configured in the Trino property
Expand Down Expand Up @@ -1780,8 +1772,6 @@ data:
# description: Utility package which extends the built-in functions
package util

import rego.v1

# METADATA
# description: |
# Matches the entire string against a regular expression.
Expand Down
2 changes: 1 addition & 1 deletion stacks/keycloak-opa-poc/opa.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -5,7 +5,7 @@ metadata:
name: opa
spec:
image:
productVersion: 0.67.1
productVersion: 1.0.0
servers:
roleGroups:
default: {}
2 changes: 0 additions & 2 deletions stacks/keycloak-opa-poc/policies.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,6 @@ metadata:
data:
trino.rego: |
package trino
import rego.v1

default allow = false

Expand All @@ -31,7 +30,6 @@ data:
druid.rego: |
package druid
import data.bundles.opagroups.admins
import rego.v1

default allow = false

Expand Down
4 changes: 1 addition & 3 deletions stacks/trino-iceberg/trino.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -99,7 +99,7 @@ metadata:
name: opa
spec:
image:
productVersion: 0.67.1
productVersion: 1.0.0
servers:
roleGroups:
default:
Expand All @@ -115,8 +115,6 @@ data:
trino.rego: |
package trino

import rego.v1

default allow = false

# Allow non-batched access
Expand Down
4 changes: 1 addition & 3 deletions stacks/trino-superset-s3/trino.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -71,7 +71,7 @@ metadata:
name: opa
spec:
image:
productVersion: 0.67.1
productVersion: 1.0.0
servers:
roleGroups:
default: {}
Expand All @@ -86,8 +86,6 @@ data:
trino.rego: |
package trino

import rego.v1

default allow = false

# Allow non-batched access
Expand Down
Loading