Write tests against structured configuration data using the Open Policy Agent Rego query language
-
Updated
Nov 1, 2024 - Go
The Open Policy Agent (OPA, pronounced “oh-pa”) is an open source, general-purpose policy engine that unifies policy enforcement across the stack. OPA provides a high-level declarative language that lets you specify policy as code and simple APIs to offload policy decision-making from your software. You can use OPA to enforce policies in microservices, Kubernetes, CI/CD pipelines, API gateways, and more.
What is OPA
Write tests against structured configuration data using the Open Policy Agent Rego query language
A curated list of OPA related tools, frameworks and articles
Inspektor is a protocol-aware proxy that is used to enforce access policies👮
Scan Kubernetes resource files , and helm charts for security configurations issues and best practices.
A lightweight container for distributed security policy evaluation
Easily sync open-policy rules to your feature toggles
CLI for searching Rego policies
A Golang restful API boilerplate based on Echo framework v4. Includes tools for module generation, db migration, authorization, modular, authentication and more.
Pre-commit git hooks for Open Policy Agent (OPA) and Rego development
Build a platform with the Kubernetes resource model!
A Helm plugin for testing Helm Charts using Open Policy Agent
Open Policy Agent (OPA) plug-in for Kafka authorization
koans for OPA
A proof of concept for RBAC on nginx with Open Policy Agent
A set of utilities and classes for working with Open Policy Agent based tools, including Gatekeeper and Conftest
A GitHub Action for using Conftest
Open Policy Agent for Spring Security
Pluggable ABAC/PBAC middleware