Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

The [opa eval] command is unable to access Rego policies located on other drives on windows #6922

Commits on Aug 12, 2024

  1. The [opa eval] command is unable to access Rego policies located on o…

    …ther drives in Windows. For more details, see open-policy-agent#6910 and open-policy-agent/conftest#979.
    
    OPA should be capable of accessing Rego policies from specified paths including drives (e.g., c:\a\b\c.rego).
    
    The code has been updated to allow OPA to load Rego policies from paths with drives. Now, OPA can load Rego policies from paths, URLs, and drives.
    
    Fixes open-policy-agent#6910
    
    Signed-off-by: pckvcode <pck@veracode.com>
    pckvcode committed Aug 12, 2024
    Configuration menu
    Copy the full SHA
    3a9a702 View commit details
    Browse the repository at this point in the history

Commits on Aug 21, 2024

  1. Opa should be capable of accessing Rego policies from the following i…

    …nput sources:
    
    Existing Inputs:
    1. Absolute file paths (e.g., /a/b/c/example.rego)
    2. Paths with URLs (e.g., file:///path/to/file.json)
    3. Paths with drive letters and URLs (e.g., "C:file:///C:/a/b/c")
    
    New Inputs:
    1. Paths with drive letters (e.g., C:\a\b\c\example.rego)
    
    This requirement ensures that Opa can handle a variety of input formats, including local file paths, remote URLs, and even mixed formats that include both drive letters and URLs.
    
    open-policy-agent#6910
    Signed-off-by: pckvcode <pck@veracode.com>
    pckvcode committed Aug 21, 2024
    Configuration menu
    Copy the full SHA
    02dc039 View commit details
    Browse the repository at this point in the history

Commits on Aug 22, 2024

  1. Configuration menu
    Copy the full SHA
    9601e7e View commit details
    Browse the repository at this point in the history

Commits on Aug 23, 2024

  1. Adding unit tests to support loading Rego policies from paths that in…

    …clude a Windows drive letter (e.g., C:\a\b\c\example.rego). When tests are run on Windows, temporary directories are created on the C drive (e.g., C:\Users\<username>\AppData\Local\Temp).
    
    Fixes: open-policy-agent#6910
    
    Signed-off-by: pckvcode <pck@veracode.com>
    pckvcode committed Aug 23, 2024
    Configuration menu
    Copy the full SHA
    b2f071f View commit details
    Browse the repository at this point in the history
  2. Fixing lint in loader_test.go

    Signed-off-by: pckvcode <pck@veracode.com>
    pckvcode committed Aug 23, 2024
    Configuration menu
    Copy the full SHA
    035070d View commit details
    Browse the repository at this point in the history