Replies: 2 comments 10 replies
-
Hi @mlajkim, thank you for starting the discussion. I’m sorry to hear about your situation and will do my best to assist. First, in case you were unaware, there is a That said, I encourage you and the team to consider this point:
With the tools available now, the process may be less arduous than you expect. Using an OPA 1.0 binary locally, you can run: More details here: https://www.styra.com/blog/renovating-rego/ If you haven’t already, consider adding test coverage to confirm the behavior remains consistent before and after the process. This effort is likely more valuable than delaying the upgrade. You’ll not only benefit from modernized Rego but also from the significantly faster and improved OPA, which has seen substantial progress over the past two years. If you choose the 0.43.0-fix-vuln path, note that this will need to be done in a private fork, as it’s not something we can support in the public OPA repository. |
Beta Was this translation helpful? Give feedback.
-
@charlieegan3 Our team will begin the operation check for OPA's "v0 backwards compatibility" as you've shared starting on Jan 24 JST. Thank you in advance. |
Beta Was this translation helpful? Give feedback.
-
Hello,
Our team has been using
opa
andkube-mgmt
for a long time with the following fixed versions:opa
0.43.0kube-mgmt
7.0.6Since both versions have vulnerabilities, we want to update the package with no-found-vulnerabilities to meet our standards.
Yet it seems like there are some changes in:
between the current image
0.43.0
and the latest image1.0.0
.It is our fault that we haven't upgraded periodically, but yeah our team was a bit busy with other stuff.Correct me if I am wrong, but our system indicates that every
opa
version below 0.64.0 has vulnerabilities.So if we upgrade to an already-released version, it will most likely be 0.64.0.
Upgrading from 0.43.0 and 0.64.0 will not only take us some time to gradually upgrade
but also since we need to modify our Rego policies, there's a risk that these changes could unknowingly disrupt our production environments.
therefore, if possible, we would like to maintain our current policies while addressing the vulnerability issue with the following steps:
0.43.1-release
based on 0.43.0.0.43.0-fix-vuln
based on the branch0.43.1-release
.0.43.1-release
branch.0.43.1
as a patch version.This way, we can temporarily upgrade our internal OPA usage from 0.43.0 to 0.43.1 and later upgrade to the latest version 1.0.0 once we've completed some internal tasks we have in our organization.
Do you think this approach is feasible? Is there anything else I might be overlooking?
We would greatly appreciate your assistance with this matter.
Thank you in advance for considering our request.
Have a lovely day.
Beta Was this translation helpful? Give feedback.
All reactions