Skip to content

Commit

Permalink
Prepare v0.10.0 release
Browse files Browse the repository at this point in the history
Signed-off-by: Torin Sandall <[email protected]>
  • Loading branch information
tsandall committed Oct 25, 2018
1 parent 604985c commit dbf54cd
Show file tree
Hide file tree
Showing 9 changed files with 64 additions and 10 deletions.
56 changes: 55 additions & 1 deletion CHANGELOG.md
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,61 @@
All notable changes to this project will be documented in this file. This
project adheres to [Semantic Versioning](http://semver.org/).

## Unreleased
## 0.10.0

### Major Features

- **Wasm compiler**. This release adds initial/experimental support for
compiling Rego policies into Wasm executables. Wasm executables can be loaded
and executed in compatible Wasm runtimes like V8 (nodejs). You can try this
out by running `opa build`.

- **Data mocking**. This release adds support for replacing/mocking the `data`
document using the `with` keyword. In the past, `with` only supported the
`input` document. This made it tricky to test context-dependent policies. With
the new `with` keyword support, it's easier to write tests against contextual
policies.

- **Negation Optimization**. This release includes an optimization in partial
evaluation for dealing with negated statements (`not` keyword). In the past,
OPA would generate a support rule for negated statements. This is harder for
clients to consume and not readily optimized. The optimization computes the
necessary cross-product of the negated query and inlines it into the caller.
This leads to simpler partial evaluation results that are readily optimized,
translated into other query languages (e.g., [SQL and Elasticsearch](https://blog.openpolicyagent.org/write-policy-in-opa-enforce-policy-in-sql-d9d24db93bf4)),
or compiled into Wasm.

### Fixes

- Add builtin to verify and decode JWT ([#884](https://github.com/open-policy-agent/opa/issues/884))
- Add GoDoc sample for using rego.Tracer ([#1002](https://github.com/open-policy-agent/opa/issues/1002))
- Add built-in function to get runtime info ([#420](https://github.com/open-policy-agent/opa/issues/420))
- Add support for YAML encoded input values ([#290](https://github.com/open-policy-agent/opa/issues/290))
- Add support for client certificates ([#684](https://github.com/open-policy-agent/opa/issues/684))
- Add support for non-zero exit code in eval subcommand ([#981](https://github.com/open-policy-agent/opa/issues/981))
- Fix == rewriting on embedded terms ([#995](https://github.com/open-policy-agent/opa/issues/995))
- Fix copy propagation panic in comprehensions ([#1012](https://github.com/open-policy-agent/opa/issues/1012))
- Implement regex.find_n (#1001) ([#747](https://github.com/open-policy-agent/opa/issues/747))
- Improve with modifier target error ([#343](https://github.com/open-policy-agent/opa/issues/343))
- Iterate over smaller set when intersecting ([#531](https://github.com/open-policy-agent/opa/issues/531))
- Only write one trailing newline at end of file ([#1032](https://github.com/open-policy-agent/opa/issues/1032))
- Redirect HTTP requests with trailing slashes ([#972](https://github.com/open-policy-agent/opa/issues/972))
- Update bundle reader to allow relative data.json ([#1019](https://github.com/open-policy-agent/opa/issues/1019))
- Expose version information via REST API ([#277](https://github.com/open-policy-agent/opa/issues/277))

### Miscellaneous

- Add default decision configuration
- Add extra helpers to loader result
- Add indentation to trace in failure output
- Add router option to the HTTP server
- Add support for headers in http.send (thanks @repenno)
- Deprecating --insecure-addr flag (thanks @repenno)
- Add POST v1/query API for large inputs (thanks @rite2nikhil)
- Remove heap allocations from AST set with open addressing
- Replace siphash with xxhash in AST
- Output traces on failures in verbose mode (thanks @srenatus)
- Rewrite duplicate test rule names (thanks @srenatus)

## 0.9.2

Expand Down
2 changes: 1 addition & 1 deletion Makefile
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
# Use of this source code is governed by an Apache2
# license that can be found in the LICENSE file.

VERSION := 0.9.3-dev
VERSION := 0.10.0

GO := go
GOVERSION := 1.10
Expand Down
2 changes: 1 addition & 1 deletion docs/book/deployments.md
Original file line number Diff line number Diff line change
Expand Up @@ -13,7 +13,7 @@ recommend you review this section to familiarize yourself with the basics.

OPA releases are available as images on Docker Hub.

* [openpolicyagent/opa:0.9.2](https://hub.docker.com/r/openpolicyagent/opa/)
* [openpolicyagent/opa:0.10.0](https://hub.docker.com/r/openpolicyagent/opa/)

### Running with Docker

Expand Down
4 changes: 2 additions & 2 deletions docs/book/get-started.md
Original file line number Diff line number Diff line change
Expand Up @@ -36,13 +36,13 @@ If this is your first time using OPA, download the latest executable for your sy
On macOS (64-bit):

```shell
curl -L -o opa https://github.com/open-policy-agent/opa/releases/download/v0.9.2/opa_darwin_amd64
curl -L -o opa https://github.com/open-policy-agent/opa/releases/download/v0.10.0/opa_darwin_amd64
```

On Linux (64-bit):

```shell
curl -L -o opa https://github.com/open-policy-agent/opa/releases/download/v0.9.2/opa_linux_amd64
curl -L -o opa https://github.com/open-policy-agent/opa/releases/download/v0.10.0/opa_linux_amd64
```

> Windows users can obtain the OPA executable from [GitHub Releases](https://github.com/open-policy-agent/opa/releases). The steps below are the same for Windows users except the executable name will be different.
Expand Down
2 changes: 1 addition & 1 deletion docs/book/http-api-authorization.md
Original file line number Diff line number Diff line change
Expand Up @@ -29,7 +29,7 @@ First, create a `docker-compose.yml` file that runs OPA and the demo web server.
version: '2'
services:
opa:
image: openpolicyagent/opa:0.9.2
image: openpolicyagent/opa:0.10.0
ports:
- 8181:8181
# WARNING: OPA is NOT running with an authorization policy configured. This
Expand Down
2 changes: 1 addition & 1 deletion docs/book/kafka-authorization.md
Original file line number Diff line number Diff line change
Expand Up @@ -48,7 +48,7 @@ version: "2"
services:
opa:
hostname: opa
image: openpolicyagent/opa:0.9.2
image: openpolicyagent/opa:0.10.0
ports:
- 8181:8181
# WARNING: OPA is NOT running with an authorization policy configured. This
Expand Down
2 changes: 1 addition & 1 deletion docs/book/ssh-and-sudo-authorization.md
Original file line number Diff line number Diff line change
Expand Up @@ -50,7 +50,7 @@ represent our backend and frontend hosts.
version: '2'
services:
opa:
image: openpolicyagent/opa:0.9.2
image: openpolicyagent/opa:0.10.0
ports:
- 8181:8181
# WARNING: OPA is NOT running with an authorization policy configured. This
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -14,7 +14,7 @@ spec:
spec:
containers:
- name: opa
image: openpolicyagent/opa:0.9.2
image: openpolicyagent/opa:0.10.0
ports:
- name: http
containerPort: 8181
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -78,7 +78,7 @@ spec:
# authentication and authorization on the daemon. See the Security page for
# details: https://www.openpolicyagent.org/docs/security.html.
- name: opa
image: openpolicyagent/opa:0.9.2
image: openpolicyagent/opa:0.10.0
args:
- "run"
- "--server"
Expand Down

0 comments on commit dbf54cd

Please sign in to comment.