Skip to content
This repository was archived by the owner on Jul 14, 2025. It is now read-only.

Commit 14cd826

Browse files
authored
Publish 0.0.1 (#11)
1 parent 2097fdc commit 14cd826

File tree

4 files changed

+41
-6
lines changed

4 files changed

+41
-6
lines changed

CHANGELOG.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,7 @@
11
# Change Log
22

3-
## [Unreleased]
3+
## 0.0.1
44

5-
- Initial release
5+
* Install Open Policy Agent as an admission controller
6+
* Deploy `.rego` files to the `opa` namespace to participate in admission control
7+
* List policies in the Kubernetes cluster explorer without changing to the `opa` namespace

README.md

Lines changed: 22 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,2 +1,24 @@
11
# Open Policy Agent for Kubernetes for VS Code
22

3+
This snappily-titled extension helps you to test your Open Policy Agent policies
4+
(`.rego` files) in a Kubernetes development cluster. It provides the following features:
5+
6+
* One-click install of Open Policy Agent as an admission controller, together
7+
with supporting configuration such as the standard 'system main' policy hook
8+
and having it read from Kubernetes configmaps in the `opa` namespace
9+
* While editing a `.rego` file, deploy it as a configmap in the `opa` namespace
10+
where the Open Policy Agent will pick it up and start enforcing it
11+
* View policies without needing to switch to the `opa` namespace and with visual
12+
feedback on their status.
13+
14+
## Notes
15+
16+
**This is a very early iteration - expect some fit and finish to be missing!** For
17+
example, you can currently see that a policy has errors but you can't see what they
18+
are. It's all very much work in progress!
19+
20+
**The deployment configuration is designed for convenience of development, not for secure deployment.**
21+
If you're putting Open Policy Agent into production, _design deployment strategies for production_.
22+
For example, you may want to deploy policies using bundles and servers rather than config maps.
23+
And you certainly want to be conscious about permissions and roles. **Don't use this extension
24+
to deploy OPA to production.**

package-lock.json

Lines changed: 3 additions & 3 deletions
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

package.json

Lines changed: 12 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,13 +3,24 @@
33
"displayName": "Open Policy Agent for Kubernetes",
44
"description": "Work with Open Policy Agent as a Kubernetes admission controller",
55
"version": "0.0.1",
6+
"preview": true,
67
"publisher": "ms-kubernetes-tools",
8+
"license": "MIT",
9+
"repository": {
10+
"type": "git",
11+
"url": "https://github.com/deislabs/kubernetes-opa-vscode"
12+
},
713
"engines": {
814
"vscode": "^1.40.0"
915
},
1016
"categories": [
1117
"Other"
1218
],
19+
"keywords": [
20+
"kubernetes",
21+
"open policy agent",
22+
"opa"
23+
],
1324
"activationEvents": [
1425
"onCommand:opak8s.install",
1526
"onCommand:opak8s.deployRego",
@@ -66,7 +77,7 @@
6677
"@types/node": "^8.10.25",
6778
"@types/tmp": "^0.1.0",
6879
"tslint": "^5.8.0",
69-
"typescript": "^2.6.1",
80+
"typescript": "^3.7.2",
7081
"vscode": "^1.1.6"
7182
},
7283
"extensionDependencies": [

0 commit comments

Comments
 (0)