KPR validates multiple kubernetes manifests.
-
Updated
Jul 21, 2020 - Open Policy Agent
The Open Policy Agent (OPA, pronounced “oh-pa”) is an open source, general-purpose policy engine that unifies policy enforcement across the stack. OPA provides a high-level declarative language that lets you specify policy as code and simple APIs to offload policy decision-making from your software. You can use OPA to enforce policies in microservices, Kubernetes, CI/CD pipelines, API gateways, and more.
What is OPA
KPR validates multiple kubernetes manifests.
Use Open Policy Agent in combination with Azure Kubernetes cluster
A demo showcasing some examples of Test-Driven Development (TDD) for Infrastructure
A policy evaluation Java client for OPA.
A simple example showing how to restrict a custom HTTP API using the Open Policy Agent.
open policy agent gin middleware for custom usage
Check K8s yaml-files and helm-charts with rego policies
A collection of various Rego utility functions
An example of local Open Policy Agent (OPA) testing pipeline for Java\Spring Boot\Maven projects
CLI audit tool for GitHub organization with OPA/Rego
A tool to visualize policies written in Rego and their evaluation process.
Silly little example how you could delegate policy decisions to ChatGPT.
The Styra-supported driver to connect to Open Policy Agent (OPA) and Enterprise OPA deployments
Microservices Authantication and Authorization
📦 Ready-to-use Docker container image with cloud tools (AWS CLI, Google Cloud CLI, Terraform, Packer, Ansible)
Open Policy Agent Demo for Webassembly in Typescript
Using OPA and Linux-PAM to enforce fine-grained, host-level access controls over sudo.
Open Policy Agent (OPA) Authorization middleware for Traefik
OPA rules for the Please build system