Skip to content

Commit

Permalink
Publish 0.0.1 (#11)
Browse files Browse the repository at this point in the history
  • Loading branch information
itowlson authored Dec 3, 2019
1 parent 2097fdc commit 14cd826
Show file tree
Hide file tree
Showing 4 changed files with 41 additions and 6 deletions.
6 changes: 4 additions & 2 deletions CHANGELOG.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,7 @@
# Change Log

## [Unreleased]
## 0.0.1

- Initial release
* Install Open Policy Agent as an admission controller
* Deploy `.rego` files to the `opa` namespace to participate in admission control
* List policies in the Kubernetes cluster explorer without changing to the `opa` namespace
22 changes: 22 additions & 0 deletions README.md
Original file line number Diff line number Diff line change
@@ -1,2 +1,24 @@
# Open Policy Agent for Kubernetes for VS Code

This snappily-titled extension helps you to test your Open Policy Agent policies
(`.rego` files) in a Kubernetes development cluster. It provides the following features:

* One-click install of Open Policy Agent as an admission controller, together
with supporting configuration such as the standard 'system main' policy hook
and having it read from Kubernetes configmaps in the `opa` namespace
* While editing a `.rego` file, deploy it as a configmap in the `opa` namespace
where the Open Policy Agent will pick it up and start enforcing it
* View policies without needing to switch to the `opa` namespace and with visual
feedback on their status.

## Notes

**This is a very early iteration - expect some fit and finish to be missing!** For
example, you can currently see that a policy has errors but you can't see what they
are. It's all very much work in progress!

**The deployment configuration is designed for convenience of development, not for secure deployment.**
If you're putting Open Policy Agent into production, _design deployment strategies for production_.
For example, you may want to deploy policies using bundles and servers rather than config maps.
And you certainly want to be conscious about permissions and roles. **Don't use this extension
to deploy OPA to production.**
6 changes: 3 additions & 3 deletions package-lock.json

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

13 changes: 12 additions & 1 deletion package.json
Original file line number Diff line number Diff line change
Expand Up @@ -3,13 +3,24 @@
"displayName": "Open Policy Agent for Kubernetes",
"description": "Work with Open Policy Agent as a Kubernetes admission controller",
"version": "0.0.1",
"preview": true,
"publisher": "ms-kubernetes-tools",
"license": "MIT",
"repository": {
"type": "git",
"url": "https://github.com/deislabs/kubernetes-opa-vscode"
},
"engines": {
"vscode": "^1.40.0"
},
"categories": [
"Other"
],
"keywords": [
"kubernetes",
"open policy agent",
"opa"
],
"activationEvents": [
"onCommand:opak8s.install",
"onCommand:opak8s.deployRego",
Expand Down Expand Up @@ -66,7 +77,7 @@
"@types/node": "^8.10.25",
"@types/tmp": "^0.1.0",
"tslint": "^5.8.0",
"typescript": "^2.6.1",
"typescript": "^3.7.2",
"vscode": "^1.1.6"
},
"extensionDependencies": [
Expand Down

0 comments on commit 14cd826

Please sign in to comment.