Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

add cel-based policies #390

Open
sozercan opened this issue Aug 16, 2023 · 5 comments
Open

add cel-based policies #390

sozercan opened this issue Aug 16, 2023 · 5 comments
Labels

Comments

@sozercan
Copy link
Member

No description provided.

@stale
Copy link

stale bot commented Oct 15, 2023

This issue/PR has been automatically marked as stale because it has not had recent activity. It will be closed in 14 days if no further activity occurs. Thank you for your contributions.

@stale stale bot added the stale label Oct 15, 2023
@maxsmythe
Copy link
Contributor

still salient

@stale stale bot removed the stale label Oct 17, 2023
@sozercan
Copy link
Member Author

sozercan commented Mar 13, 2024

Notes from March 13, 2024 community meeting:

  • User configurable priority for rego vs vap (use-vap is a better option here so no need)
  • Max to find which min version of gk is required for multiple policies per CT min version required is v3.12 (see below)
  • Gator unit and conformance tests for K8sNativeValidation CEL (need flag to enable)
  • Rely on gator only instead of standalone unit tests
  • If multiple versions, add K8sNativeValidation CEL to last version only
  • Rego and cel must be in parity for pr for existing CTs
  • New policies will need to have both K8sNativeValidation CEL and Rego for a TBD period
  • Update website and ArtifactHub to indicate “supports K8sNativeValidation CEL/Rego”

@maxsmythe
Copy link
Contributor

WRT min version for multiple languages per CT:

@JaydipGabani
Copy link
Contributor

Tracking the migration with #541

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

No branches or pull requests

3 participants