-
Notifications
You must be signed in to change notification settings - Fork 41
Saulparedes/genpolicy sync [DO NOT MERGE] #170
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Changes from all commits
9b04994
7868fdb
3cc0745
9fca523
98c5af6
b03927a
6c94770
57aca5b
c7c7a93
3bea00f
8c523b1
be8b0ff
f6fb0e2
d59cc4f
33a652e
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
| Original file line number | Diff line number | Diff line change |
|---|---|---|
|
|
@@ -83,10 +83,10 @@ $ genpolicy -j my-settings.json -y test.yaml | |
|
|
||
| # Use a custom path to `genpolicy` input files | ||
|
|
||
| By default, the `genpolicy` input files [`rules.rego`](rules.rego) and [`genpolicy-settings.json`](genpolicy-settings.json) must be present in the current directory - otherwise `genpolicy` returns an error. Users can specify a different path to these two files, using the `-i` command line parameter - e.g., | ||
| By default, the `genpolicy` input files [`rules.rego`](rules.rego) and [`genpolicy-settings.json`](genpolicy-settings.json) must be present in the current directory - otherwise `genpolicy` returns an error. Users can specify different paths to these two files, using the `-p` and `-j` command line parameters - e.g., | ||
|
|
||
| ```bash | ||
| $ genpolicy -i /tmp -y test.yaml | ||
| $ genpolicy -p /tmp/rules.rego -j /tmp/genpolicy-settings.json -y test.yaml | ||
|
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Do we need to update MSFT tests for this? |
||
| ``` | ||
|
|
||
| # Silently ignore unsupported input `YAML` fields | ||
|
|
||
| Original file line number | Diff line number | Diff line change |
|---|---|---|
|
|
@@ -136,6 +136,17 @@ | |
| }, | ||
| "volumes": { | ||
| "emptyDir": { | ||
| "mount_type": "local", | ||
| "mount_source": "^$(cpath)/$(sandbox-id)/rootfs/local/", | ||
|
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. These paths might need to change when using confidential=true at MSFT. They are probably specific to main code on Mariner, without confidential enabled. |
||
| "mount_point": "^$(cpath)/$(sandbox-id)/local/", | ||
| "driver": "local", | ||
| "source": "local", | ||
| "fstype": "local", | ||
| "options": [ | ||
| "mode=0777" | ||
| ] | ||
| }, | ||
| "confidential_emptyDir": { | ||
| "mount_type": "local", | ||
| "mount_source": "^$(cpath)/$(sandbox-id)/local/", | ||
| "mount_point": "^$(cpath)/$(sandbox-id)/local/", | ||
|
|
@@ -277,7 +288,10 @@ | |
| ] | ||
| }, | ||
| "kata_config": { | ||
| "confidential_guest": true | ||
| "confidential_guest": false | ||
|
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. I believe MSFT needs this to be true. |
||
| }, | ||
| "cluster_config": { | ||
| "default_namespace": "default" | ||
| }, | ||
| "request_defaults": { | ||
| "CreateContainerRequest": { | ||
|
|
@@ -306,6 +320,7 @@ | |
| }, | ||
| "ReadStreamRequest": true, | ||
| "UpdateEphemeralMountsRequest": false, | ||
| "CloseStdinRequest": false, | ||
| "WriteStreamRequest": false | ||
| } | ||
| } | ||
| } | ||
| Original file line number | Diff line number | Diff line change |
|---|---|---|
|
|
@@ -116,10 +116,6 @@ impl yaml::K8sResource for ConfigMap { | |
| panic!("Unsupported"); | ||
| } | ||
|
|
||
| fn get_namespace(&self) -> String { | ||
|
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Removing this code seems suspect at a quick look. |
||
| panic!("Unsupported"); | ||
| } | ||
|
|
||
| fn get_container_mounts_and_storages( | ||
| &self, | ||
| _policy_mounts: &mut Vec<policy::KataMount>, | ||
|
|
||
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This breaking change requires a corresponding change in az confcom. Seth didn't mind making this change several weeks ago, but we need to sync up with him again.