Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
4 changes: 0 additions & 4 deletions docs/modules/demos/pages/end-to-end-security.adoc
Original file line number Diff line number Diff line change
Expand Up @@ -227,8 +227,6 @@ The ACLs configuring this behavior (written with the {rego}[Rego language]) on t
----
package trino_policies
import rego.v1
policies := {
"tables": [
{
Expand Down Expand Up @@ -270,8 +268,6 @@ The Rego rule for this behavior looks like this (again a snippet from the {trino
----
package trino_policies
import rego.v1
policies := {
"tables": [
{
Expand Down
4 changes: 1 addition & 3 deletions stacks/data-lakehouse-iceberg-trino-spark/trino.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -114,7 +114,7 @@ metadata:
name: opa
spec:
image:
productVersion: 0.67.1
productVersion: 1.0.0
servers:
roleGroups:
default: {}
Expand All @@ -129,8 +129,6 @@ data:
trino.rego: |
package trino
import rego.v1
default allow = false
# Allow non-batched access
Expand Down
4 changes: 1 addition & 3 deletions stacks/dual-hive-hdfs-s3/trino.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -86,7 +86,7 @@ metadata:
name: opa
spec:
image:
productVersion: 0.67.1
productVersion: 1.0.0
servers:
roleGroups:
default:
Expand All @@ -102,8 +102,6 @@ data:
trino.rego: |
package trino
import rego.v1
default allow = false
# Allow non-batched access
Expand Down
2 changes: 0 additions & 2 deletions stacks/end-to-end-security/hdfs-regorules.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -9,8 +9,6 @@ data:
hdfs.rego: |
package hdfs
import rego.v1
default allow := false
default matches_identity(identity) := false
Expand Down
2 changes: 1 addition & 1 deletion stacks/end-to-end-security/opa.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -5,7 +5,7 @@ metadata:
name: opa
spec:
image:
productVersion: 0.67.1
productVersion: 1.0.0
clusterConfig:
userInfo:
backend:
Expand Down
2 changes: 0 additions & 2 deletions stacks/end-to-end-security/trino-policies.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -9,8 +9,6 @@ data:
trino_policies.rego: |
package trino_policies
import rego.v1
policies := {
"catalogs": [
# Needed to bootstrap schemas and tables
Expand Down
10 changes: 0 additions & 10 deletions stacks/end-to-end-security/trino-regorules.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -11,7 +11,6 @@ data:
package trino

import data.util
import rego.v1

# This file contains functions to determine the actual permissions
# defined in the Trino policies for the given user and requested
Expand All @@ -36,7 +35,6 @@ data:
#
# Example:
# package trino_policies
# import rego.v1
# extra_groups := groups if {
# request := {
# "method": "POST",
Expand Down Expand Up @@ -579,7 +577,6 @@ data:
package trino

import data.util
import rego.v1

# The final policies are a combination of policies offered by Stackable,
# policies provided externally, and default policies.
Expand All @@ -596,7 +593,6 @@ data:
#
# Example:
# package trino_policies
# import rego.v1
# policies := {
# "catalogs": [
# {
Expand Down Expand Up @@ -757,8 +753,6 @@ data:
requested_permissions.rego: |
package trino

import rego.v1

# This file contains the requested_permissions rule which returns a set
# of required permissions for the given operation including the
# requested resource. Operations with the same set of required
Expand Down Expand Up @@ -1439,8 +1433,6 @@ data:
# - data.trino_policies.policies: schema.policies
package trino

import rego.v1

# METADATA
# description: |
# Entry point for OPA policies, configured in the Trino property
Expand Down Expand Up @@ -1780,8 +1772,6 @@ data:
# description: Utility package which extends the built-in functions
package util

import rego.v1

# METADATA
# description: |
# Matches the entire string against a regular expression.
Expand Down
2 changes: 1 addition & 1 deletion stacks/keycloak-opa-poc/opa.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -5,7 +5,7 @@ metadata:
name: opa
spec:
image:
productVersion: 0.67.1
productVersion: 1.0.0
servers:
roleGroups:
default: {}
2 changes: 0 additions & 2 deletions stacks/keycloak-opa-poc/policies.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,6 @@ metadata:
data:
trino.rego: |
package trino
import rego.v1

default allow = false

Expand All @@ -31,7 +30,6 @@ data:
druid.rego: |
package druid
import data.bundles.opagroups.admins
import rego.v1

default allow = false

Expand Down
4 changes: 1 addition & 3 deletions stacks/trino-iceberg/trino.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -99,7 +99,7 @@ metadata:
name: opa
spec:
image:
productVersion: 0.67.1
productVersion: 1.0.0
servers:
roleGroups:
default:
Expand All @@ -115,8 +115,6 @@ data:
trino.rego: |
package trino

import rego.v1

default allow = false

# Allow non-batched access
Expand Down
4 changes: 1 addition & 3 deletions stacks/trino-superset-s3/trino.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -71,7 +71,7 @@ metadata:
name: opa
spec:
image:
productVersion: 0.67.1
productVersion: 1.0.0
servers:
roleGroups:
default: {}
Expand All @@ -86,8 +86,6 @@ data:
trino.rego: |
package trino

import rego.v1

default allow = false

# Allow non-batched access
Expand Down
Loading